Ecoer Logo

@cryptonomads

1

Crypto News

steemit.com/@cryptonomads
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS80.05%
Net Worth
2.640USD
STEEM
3.701STEEM
SBD
0.006SBD
Own SP
45.071SP

Detailed Balance

STEEM
balance
3.701STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
0.000STEEM
STEEM POWER
Own SP
45.071SP
Delegated Out
0.000SP
Delegation In
0.000SP
Effective Power
45.071SP
Reward SP (pending)
0.000SP
SBD
sbd_balance
0.006SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.000SBD
{
  "balance": "3.701 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "0.000 STEEM",
  "vesting_shares": "73392.042496 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "sbd_balance": "0.006 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.000 SBD",
  "conversions": []
}

Account Info

namecryptonomads
id1273687
rank43,723
reputation-488465221336
created2019-05-13T15:47:21
recovery_accountblocktrades
proxyNone
post_count93
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2019-09-04T09:05:45
last_root_post2019-09-04T09:05:45
last_vote_time2019-08-26T19:04:48
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power9,810
delayed_votes0
balance3.701 STEEM
savings_balance0.000 STEEM
sbd_balance0.006 SBD
savings_sbd_balance0.000 SBD
vesting_shares73392.042496 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares0.000000 VESTS
reward_vesting_balance0.000000 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn497765643
to_withdraw497765643
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update2019-07-10T13:56:03
minedNo
sbd_seconds0
sbd_last_interest_payment1970-01-01T00:00:00
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 1273687,
  "name": "cryptonomads",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM53j9JYr8Lkc2nnGnbc8Gu49dJAUSencEWVMxNzfbNgNoUBgthb",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8RfswPc2AqmTaNLXY9kfVYKdkM4ySStF6RUiszGMmW7zzpCxNs",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7WSgbzVuMSbHSqeFNzUDXjiGM9MA4jXx2H86jxJGwu5sv6LVBz",
        1
      ]
    ]
  },
  "memo_key": "STM7p1BYFgmXhBgHfURLhmW5ppxzRASvHNm6oWaP7Js4cZbs72UiU",
  "json_metadata": "{\"profile\":{\"website\":\"https://cryptonomad.info\",\"profile_image\":\"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg\",\"name\":\"Crypto Nomad\",\"about\":\"Crypto News\",\"cover_image\":\"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg\"}}",
  "posting_json_metadata": "{\"profile\":{\"website\":\"https://cryptonomad.info\",\"profile_image\":\"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg\",\"name\":\"Crypto Nomad\",\"about\":\"Crypto News\",\"cover_image\":\"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg\"}}",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "2019-07-10T13:56:03",
  "created": "2019-05-13T15:47:21",
  "mined": false,
  "recovery_account": "blocktrades",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 93,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": "71999249398",
    "last_update_time": 1566846288
  },
  "downvote_manabar": {
    "current_mana": 0,
    "last_update_time": 1557762441
  },
  "voting_power": 9810,
  "balance": "3.701 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "0.006 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "2019-08-20T15:28:48",
  "sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.000 SBD",
  "reward_steem_balance": "0.000 STEEM",
  "reward_vesting_balance": "0.000000 VESTS",
  "reward_vesting_steem": "0.000 STEEM",
  "vesting_shares": "73392.042496 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 497765643,
  "to_withdraw": 497765643,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 7111,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2019-09-04T09:05:45",
  "last_root_post": "2019-09-04T09:05:45",
  "last_vote_time": "2019-08-26T19:04:48",
  "post_bandwidth": 0,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": -488465221336,
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 43723
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
ph-supportsent 0.001 STEEM to @cryptonomads
2022/08/16 23:58:27
fromph-support
tocryptonomads
amount0.001 STEEM
memo
Transaction InfoBlock #66866814/Trx 41c234f40b9c41587bde88582d440c235f7c5774
View Raw JSON Data
{
  "trx_id": "41c234f40b9c41587bde88582d440c235f7c5774",
  "block": 66866814,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-08-16T23:58:27",
  "op": [
    "transfer",
    {
      "from": "ph-support",
      "to": "cryptonomads",
      "amount": "0.001 STEEM",
      "memo": ""
    }
  ]
}
2020/10/01 07:58:54
parent authorcryptonomads
parent permlinkmining-the-technical-part
authorjemavillitr
permlinkqhiji6
title
body<a href="https://thinkmobiles.com/products/36247/">wise care 365 pro</a> and other overclocking programs let you increase the working frequency of GPU, CPU, VRAM, RAM to literally gain free performance in exchange of decreased lifespan expectancy.
json metadata{"links":["https://thinkmobiles.com/products/36247/"],"app":"steemit/0.2"}
Transaction InfoBlock #47341001/Trx b384d08a0dc27335a7997c47488b682d875539f4
View Raw JSON Data
{
  "trx_id": "b384d08a0dc27335a7997c47488b682d875539f4",
  "block": 47341001,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-10-01T07:58:54",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "mining-the-technical-part",
      "author": "jemavillitr",
      "permlink": "qhiji6",
      "title": "",
      "body": "<a href=\"https://thinkmobiles.com/products/36247/\">wise care 365 pro</a> and other overclocking programs let you increase the working frequency of GPU, CPU, VRAM, RAM to literally gain free performance in exchange of decreased lifespan expectancy.",
      "json_metadata": "{\"links\":[\"https://thinkmobiles.com/products/36247/\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
2019/11/24 08:08:33
votersagardhital77
authorcryptonomads
permlinkanonymous-p2p
weight10000 (100.00%)
Transaction InfoBlock #38449677/Trx 7909fcbf3bd74a1fd0a0d02b7506176d75eaf6b4
View Raw JSON Data
{
  "trx_id": "7909fcbf3bd74a1fd0a0d02b7506176d75eaf6b4",
  "block": 38449677,
  "trx_in_block": 17,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-11-24T08:08:33",
  "op": [
    "vote",
    {
      "voter": "sagardhital77",
      "author": "cryptonomads",
      "permlink": "anonymous-p2p",
      "weight": 10000
    }
  ]
}
crypto.piotrsent 0.002 STEEM to @cryptonomads- "Good morning @cryptonomads, Would you like to win 250$ for your BTC price prediction? My dear friend @ritxi is sharing info to interesting contest, which you may find worth your time. We're both not p..."
2019/10/22 09:45:06
fromcrypto.piotr
tocryptonomads
amount0.002 STEEM
memoGood morning @cryptonomads, Would you like to win 250$ for your BTC price prediction? My dear friend @ritxi is sharing info to interesting contest, which you may find worth your time. We're both not part of BlockFi (they are behind this contest) and we only share it with you since you've been posting about blockchain/crypto and I figured you may find this contest interesting. Yours, Piotr // LINK: https://steemit.com/contest/@ritxi/win-250-usd-for-you-btc-price-tip-or-by-blockfi
Transaction InfoBlock #37503047/Trx a00edecb1fb522c5c495ae99be6fa773f401bc78
View Raw JSON Data
{
  "trx_id": "a00edecb1fb522c5c495ae99be6fa773f401bc78",
  "block": 37503047,
  "trx_in_block": 37,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-10-22T09:45:06",
  "op": [
    "transfer",
    {
      "from": "crypto.piotr",
      "to": "cryptonomads",
      "amount": "0.002 STEEM",
      "memo": "Good morning @cryptonomads, Would you like to win 250$ for your BTC price prediction? My dear friend @ritxi is sharing info to interesting contest, which you may find worth your time. We're both not part of BlockFi (they are behind this contest) and we only share it with you since you've been posting about blockchain/crypto and I figured you may find this contest interesting. Yours, Piotr // LINK: https://steemit.com/contest/@ritxi/win-250-usd-for-you-btc-price-tip-or-by-blockfi"
    }
  ]
}
dtubesent 0.001 STEEM to @cryptonomads- "DTube Coin Round #1 is live! Visit https://token.d.tube for more information"
2019/09/20 21:58:18
fromdtube
tocryptonomads
amount0.001 STEEM
memoDTube Coin Round #1 is live! Visit https://token.d.tube for more information
Transaction InfoBlock #36597981/Trx 392b33fd53a575dc316c0e5a5a28c3d732a478ce
View Raw JSON Data
{
  "trx_id": "392b33fd53a575dc316c0e5a5a28c3d732a478ce",
  "block": 36597981,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-20T21:58:18",
  "op": [
    "transfer",
    {
      "from": "dtube",
      "to": "cryptonomads",
      "amount": "0.001 STEEM",
      "memo": "DTube Coin Round #1 is live! Visit https://token.d.tube for more information"
    }
  ]
}
cryptonomadsreceived 0.000 STEEM from power down installment (0.000 SP)
2019/09/20 20:25:54
from accountcryptonomads
to accountcryptonomads
withdrawn0.000011 VESTS
deposited0.000 STEEM
Transaction InfoBlock #36596135/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 36596135,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2019-09-20T20:25:54",
  "op": [
    "fill_vesting_withdraw",
    {
      "from_account": "cryptonomads",
      "to_account": "cryptonomads",
      "withdrawn": "0.000011 VESTS",
      "deposited": "0.000 STEEM"
    }
  ]
}
cryptonomadsreceived 0.019 STEEM from power down installment (0.024 SP)
2019/09/13 20:25:54
from accountcryptonomads
to accountcryptonomads
withdrawn38.289664 VESTS
deposited0.019 STEEM
Transaction InfoBlock #36394965/Virtual Operation #2
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 36394965,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 2,
  "timestamp": "2019-09-13T20:25:54",
  "op": [
    "fill_vesting_withdraw",
    {
      "from_account": "cryptonomads",
      "to_account": "cryptonomads",
      "withdrawn": "38.289664 VESTS",
      "deposited": "0.019 STEEM"
    }
  ]
}
cryptonomadsreceived 0.019 STEEM from power down installment (0.024 SP)
2019/09/06 20:25:54
from accountcryptonomads
to accountcryptonomads
withdrawn38.289664 VESTS
deposited0.019 STEEM
Transaction InfoBlock #36194120/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 36194120,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2019-09-06T20:25:54",
  "op": [
    "fill_vesting_withdraw",
    {
      "from_account": "cryptonomads",
      "to_account": "cryptonomads",
      "withdrawn": "38.289664 VESTS",
      "deposited": "0.019 STEEM"
    }
  ]
}
2019/09/04 09:05:45
parent author
parent permlinkblog
authorcryptonomads
permlinksecuring-online-services
titleSecuring online services
body<html> <p>&nbsp;Like any financial system, Bitcoin represents an attractive target for thieves and hackers. Any organization that accepts or sends significant volumes of money must, therefore, ensure they can&nbsp;<strong>secure their online service</strong>&nbsp;against these risks. This page details some best practices for merchants and other organizations, along with avenues for future research. It is&nbsp;<em>not</em>&nbsp;about securing your personal wallet.&nbsp;</p> <p><img src="https://cryptonomad.info/wp-content/uploads/2019/09/security-265130_1280-1024x682.jpg" width="1024" height="682"/></p> <p>&nbsp;</p> <h2><strong>Traditional payment risks</strong></h2> <p>Any time you accept payments online, you must deal with risk. This is true both of Bitcoin and credit cards, but the risks and responses to those risks are different. Let’s recap the risks involved with traditional payment networks so we can compare them with Bitcoin.</p> <h3><strong>Risks involved with accepting credit card payments online</strong></h3> <p>To accept credit card payments online, you must perform the following tasks:</p> <ol> <li>Obtain a merchant account with a bank</li> <li>Build a database and online ordering system that can store credit card details</li> <li>Ensure it is secured to the level specified by the PCI DSS (Payment Card Industry Data Security Standards)</li> <li>Handle inspections by PCI auditors</li> <li>Be prepared to handle chargebacks, potentially large volumes of them depending on the type of business</li> </ol> <p>A&nbsp;<em>chargeback</em>&nbsp;occurs when the owner of a credit card disputes a transaction, typically because either they believe you did not deliver satisfactorily, or because the card details were stolen and used by a card fraudster. If a chargeback occurs, the credit card company will take back the money and also fine you. If too many of your transactions result in chargebacks, you will lose the ability to accept credit card transactions and most likely your online business with it.As you may have noticed, whilst happy customers are somewhat under your control in aggregate, you have no control over how many credit card numbers are stolen. For this reason, credit-card accepting merchants typically have large and sophisticated fraud control measures in place, involving dedicated risk operations staff, machine learning, JavaScript browser fingerprinting and so on. The goal being to spot repeat fraudsters and deny their transactions. Too many false positives and legitimate customers who want to pay for your product cannot, limiting your market. Too many false negatives and you can lose significant money to chargebacks, which may arrive weeks or months after the product or service has been delivered.Unsurprisingly, many merchants choose to outsource this arduous process to a third party payment gateway like&nbsp;PayPal, Google Checkout and so on or a third party fraud prevention like FraudLabs Pro, Signifyd and so on. However, all these services add their own policies, fees and often do not provide any guarantees of chargeback protection.</p> <h3><strong>Risks involved in online banking</strong></h3> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/09/safe-913452_640.jpg" width="640" height="556"/></p> <p>&nbsp;Storing money in an internet-accessible bank account is convenient, but how safe it depends very heavily on the type and quality of security measures put in place by your bank. A good online banking system looks like this:</p> <ol> <li>To log in, it requires you to input a code into a dedicated hardware device and then type back the response.</li> <li>To wire money, it requires you to input a fragment of the destination account number into a dedicated hardware device and then type back the response. Typically this is only required the first time you send money to an account. After that repeat transactions will be considered OK.</li> <li>It uses SSL.</li> <li>The bank will not issue new hardware or other credentials based purely on a phone conversation and a few personal trivia checks.</li> <li>The bank may also perform a manual inspection of unusual transactions and call you to verify them.</li> </ol> <p>With such a setup the rates of fraudulent bank wires are low and so bank transfers tend to be hard to reverse, so merchants are also protected. This setup describes many banks around the world, especially in the European SEPA zone. Unfortunately some banks, particularly American banks, often look like this:</p> <ol> <li>To log in you have to provide a password and something vaguely password-ish like a secret question</li> <li>There are no dedicated hardware devices used</li> <li>Security may be entirely heuristic</li> <li>Though Fedwire bank wires are not reversible, banks can still return funds that were received such as when the transfer was the result of phishing, for instance.</li> <li>Whilst consumer accounts may have some liability protection, business accounts do not</li> </ol> <p>Because the security mechanisms in place are entirely controlled by your bank, if yours is unacceptable your only choice is to find another bank. If all banks serving your local market are the same, you’re out of luck. Even if your bank has good security, accepting payments from a bank that does not can entail significant risk.</p> <h2><strong>Risks involved in handling Bitcoins</strong></h2> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/09/hacker-1944688_640.jpg" width="640" height="426"/></p> <p>&nbsp;In contrast to the above systems, Bitcoin carries a different set of risks which can be managed in different ways.</p> <ol> <li>The server containing your wallet may be hacked and the coins stolen</li> <li>Money sent to your wallet may be reversed</li> <li>Your wallet may be accidentally destroyed, along with all the money in it.</li> <li>You may be scammed into sending your money elsewhere (this problem is not unique to Bitcoin)</li> </ol> <p>However, unlike with traditional payment schemes, the risk of fraudulent payments is low and Bitcoin gives you tremendous flexibility to implement as much or as little security as you like. At no point are you at the mercy of third-party payment processors who may or may not be properly incentivized to be secure? Below we discuss each problem Bitcoin using traders may face, and some common solutions.</p> <h3><strong>Server hacking</strong></h3> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/09/cyber-security-1805632_640.png" width="640" height="465"/></p> <p>&nbsp;Server hacks have resulted in the loss of tens of thousands of Bitcoins. Any internet-connected computer that has liquid access to data worth hundreds of thousands of dollars will come under sophisticated and sustained attack, but there are some simple techniques you can use to reduce your risk.</p> <ul> <li>For merchants who need to automatically accept payments online but not make them, use an&nbsp;<strong>encrypted wallet</strong>&nbsp;that does not have the password on the server. To receive payment all you need is a public key (for better privacy most merchants use one fresh key per-user or transaction). The public key alone does not allow you to spend the money. By creating a wallet with plenty of keys on your own local computer and then uploading the encrypted version to the server, you ensure that whilst the server can accept payments only your own computer can make them, even though they share the same balance. Thus hacking the server doesn’t allow any financial gain. Of course, you must still ensure your local computer is secured.</li> <li>Some organizations need to be able to automatically send money as well as receive it. Examples include trading platforms and mining pools. These typically use&nbsp;<strong>cold storage</strong>&nbsp;as much as possible, where only the minimum balance necessary to handle withdrawals is on the server. The rest is sent to a separate wallet which is kept away from internet-connected computers. Because a wallet can receive coins without it being online, profit can be moved from the server to cold storage without risking the cold money. If an unusually large withdrawal takes place the transaction can be placed on hold until a human operator has time to reach the cold wallet and send money from it to the live site. This limits your losses to the size of your hot wallet in the case of a server breach.</li> <li>Avoid managed server hosting. During 2012 several high profile breaches were caused not by lax security on the part of the site operators themselves but rather the companies providing the servers. Many data center operators, even large well-known ones, are&nbsp;not&nbsp;equipped to handle sensitive data regardless of what assurances they may provide. They can be vulnerable to hacking and social engineering themselves. Instead, purchase your own server(s) and rent a cage/network connection from a local datacenter that you can visit in person. For added security, either disable remote access entirely or ensure only connections from your home IP ranges are allowed. Make sure the data center operator won’t provide remote access on request without some pre-agreed security protocol being followed, like a callback.</li> <li>Consider implementing a supervisor system. In this scheme, the site gives its users multi-signature addresses for sending payments. The money received requires a signature by both the website and an independent supervisor computer. The job of the supervisor is to analyze the stream of payment requests from the other server and try to spot anomalies. If a payment request looks OK then it will be signed. If it looks iffy a human will be called for further attention. The supervisor can be made a lot more secure than the website because it has only a single, well-defined purpose and does not need to run complex user-facing software like a web site or email system. So the job of the attacker now becomes either to hack both systems (hard if they are deliberately set up differently) or to find a way to extract the money that the supervisor won’t notice. What exactly “good” vs “bad” transactions look like are merchant-specific.</li> </ul> <h3><strong>Transaction reversals</strong></h3> <p>Whilst both credit cards and Bitcoins can experience transaction reversals, in Bitcoin the risk is entirely theoretical and has yet to be observed in the wild, whilst chargebacks are extremely common in the credit card world. Nevertheless, you should understand the risks:</p> <ul> <li>For merchants that are shipping physical goods, you probably don’t have to worry. Reversing a transaction gets harder and harder with time. After only one hour it becomes computationally infeasible to reverse a Bitcoin transaction. Inserting a small delay before shipping isolates you from this risk entirely.</li> <li>For automated trading platforms that may pay out some other currency in response to Bitcoin deposits, you should also delay payment for a short time until reversal becomes infeasible. Low-risk deposits from trusted customers could be processed faster, as reversing a Bitcoin transaction is a nontrivial problem at this time which is suited only to relatively skilled attackers who are after large sums of money.</li> <li>For merchants shipping things immediately, like digital downloads, measuring the propagation of a transaction across the network and waiting until most nodes have reported it is probably good enough. This allows you to accept the payment within seconds. Whilst there’s a higher risk of transaction reversal here, the attack is still expensive and the attacker cannot choose the timing of the attack. Therefore watching out for users who receive an address and then delay the act of payment significantly is probably enough to insulate you from this attack (the&nbsp;Finney attack).</li> </ul> <h3><strong>Your wallet may be accidentally destroyed</strong></h3> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/09/security-2168234_640.jpg" width="640" height="405"/></p> <p>&nbsp;Backing up Bitcoin wallets is easy, as they are just files. For high volume sites with the existing software (Bitcoin 0.6), you should pre-generate a large number of keys such that a single old backup is enough to restore all your money. Future versions will derive new keys deterministically, so a single backup should be enough to ensure you can always restore your wallet after an accidental or malicious deletion.</p> <h3><strong>You may be scammed into sending the money elsewhere</strong></h3> <p>Whilst no financial system can completely solve human gullibility, Bitcoins multi-signature keys allow you to lock up money such that multiple people have to agree in order for it to be spent. For example, the bulk of your balance could be assigned to a multi-signature key that requires you and your business partners to agree …. thus forcing a mental sanity check from multiple people, hopefully making the act of scamming harder.</p> <h2><strong>Future research</strong></h2> <p>Whilst running your own physical servers with no datacenter operator access is secure, it lacks convenience. In future, it may be possible to the use TPM (trusted platform module) chips to allow managed hosting such that root or even physical access is insufficient to steal the funds, as the wallet keys would be bound to a particular software environment. Well-engineered trusted computing solutions have some degree of physical resistance so rebooting the machine, opening it up or logging in with local/remote root would not allow you to steal the balance of the wallet.Unfortunately engineering such systems is nontrivial and the technical difficulty places this solution out of reach for most traders right now. In future easy to use software libraries, documentation, examples and managed hosting providers that sell TC enabled hardware may increase its attractiveness.</p> <p><a href="https://cryptonomad.info/securing-online-services/"><strong>Read the original full article here.&nbsp;</strong></a></p> </html>
json metadata{"tags":["blog","security","securing","online","service"],"image":["https://cryptonomad.info/wp-content/uploads/2019/09/security-265130_1280-1024x682.jpg","https://cryptonomad.info/wp-content/uploads/2019/09/safe-913452_640.jpg","https://cryptonomad.info/wp-content/uploads/2019/09/hacker-1944688_640.jpg","https://cryptonomad.info/wp-content/uploads/2019/09/cyber-security-1805632_640.png","https://cryptonomad.info/wp-content/uploads/2019/09/security-2168234_640.jpg"],"links":["https://cryptonomad.info/securing-online-services/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #36123265/Trx c6d0b001596ee01546aecf1bc9f6bb61e1258402
View Raw JSON Data
{
  "trx_id": "c6d0b001596ee01546aecf1bc9f6bb61e1258402",
  "block": 36123265,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-04T09:05:45",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "blog",
      "author": "cryptonomads",
      "permlink": "securing-online-services",
      "title": "Securing online services",
      "body": "<html>\n<p>&nbsp;Like any financial system, Bitcoin represents an attractive target for thieves and hackers. Any organization that accepts or sends significant volumes of money must, therefore, ensure they can&nbsp;<strong>secure their online service</strong>&nbsp;against these risks. This page details some best practices for merchants and other organizations, along with avenues for future research. It is&nbsp;<em>not</em>&nbsp;about securing your personal wallet.&nbsp;</p>\n<p><img src=\"https://cryptonomad.info/wp-content/uploads/2019/09/security-265130_1280-1024x682.jpg\" width=\"1024\" height=\"682\"/></p>\n<p>&nbsp;</p>\n<h2><strong>Traditional payment risks</strong></h2>\n<p>Any time you accept payments online, you must deal with risk. This is true both of Bitcoin and credit cards, but the risks and responses to those risks are different. Let’s recap the risks involved with traditional payment networks so we can compare them with Bitcoin.</p>\n<h3><strong>Risks involved with accepting credit card payments online</strong></h3>\n<p>To accept credit card payments online, you must perform the following tasks:</p>\n<ol>\n  <li>Obtain a merchant account with a bank</li>\n  <li>Build a database and online ordering system that can store credit card details</li>\n  <li>Ensure it is secured to the level specified by the PCI DSS (Payment Card Industry Data Security Standards)</li>\n  <li>Handle inspections by PCI auditors</li>\n  <li>Be prepared to handle chargebacks, potentially large volumes of them depending on the type of business</li>\n</ol>\n<p>A&nbsp;<em>chargeback</em>&nbsp;occurs when the owner of a credit card disputes a transaction, typically because either they believe you did not deliver satisfactorily, or because the card details were stolen and used by a card fraudster. If a chargeback occurs, the credit card company will take back the money and also fine you. If too many of your transactions result in chargebacks, you will lose the ability to accept credit card transactions and most likely your online business with it.As you may have noticed, whilst happy customers are somewhat under your control in aggregate, you have no control over how many credit card numbers are stolen. For this reason, credit-card accepting merchants typically have large and sophisticated fraud control measures in place, involving dedicated risk operations staff, machine learning, JavaScript browser fingerprinting and so on. The goal being to spot repeat fraudsters and deny their transactions. Too many false positives and legitimate customers who want to pay for your product cannot, limiting your market. Too many false negatives and you can lose significant money to chargebacks, which may arrive weeks or months after the product or service has been delivered.Unsurprisingly, many merchants choose to outsource this arduous process to a third party payment gateway like&nbsp;PayPal, Google Checkout and so on or a third party fraud prevention like FraudLabs Pro, Signifyd and so on. However, all these services add their own policies, fees and often do not provide any guarantees of chargeback protection.</p>\n<h3><strong>Risks involved in online banking</strong></h3>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/09/safe-913452_640.jpg\" width=\"640\" height=\"556\"/></p>\n<p>&nbsp;Storing money in an internet-accessible bank account is convenient, but how safe it depends very heavily on the type and quality of security measures put in place by your bank. A good online banking system looks like this:</p>\n<ol>\n  <li>To log in, it requires you to input a code into a dedicated hardware device and then type back the response.</li>\n  <li>To wire money, it requires you to input a fragment of the destination account number into a dedicated hardware device and then type back the response. Typically this is only required the first time you send money to an account. After that repeat transactions will be considered OK.</li>\n  <li>It uses SSL.</li>\n  <li>The bank will not issue new hardware or other credentials based purely on a phone conversation and a few personal trivia checks.</li>\n  <li>The bank may also perform a manual inspection of unusual transactions and call you to verify them.</li>\n</ol>\n<p>With such a setup the rates of fraudulent bank wires are low and so bank transfers tend to be hard to reverse, so merchants are also protected. This setup describes many banks around the world, especially in the European SEPA zone. Unfortunately some banks, particularly American banks, often look like this:</p>\n<ol>\n  <li>To log in you have to provide a password and something vaguely password-ish like a secret question</li>\n  <li>There are no dedicated hardware devices used</li>\n  <li>Security may be entirely heuristic</li>\n  <li>Though Fedwire bank wires are not reversible, banks can still return funds that were received such as when the transfer was the result of phishing, for instance.</li>\n  <li>Whilst consumer accounts may have some liability protection, business accounts do not</li>\n</ol>\n<p>Because the security mechanisms in place are entirely controlled by your bank, if yours is unacceptable your only choice is to find another bank. If all banks serving your local market are the same, you’re out of luck. Even if your bank has good security, accepting payments from a bank that does not can entail significant risk.</p>\n<h2><strong>Risks involved in handling Bitcoins</strong></h2>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/09/hacker-1944688_640.jpg\" width=\"640\" height=\"426\"/></p>\n<p>&nbsp;In contrast to the above systems, Bitcoin carries a different set of risks which can be managed in different ways.</p>\n<ol>\n  <li>The server containing your wallet may be hacked and the coins stolen</li>\n  <li>Money sent to your wallet may be reversed</li>\n  <li>Your wallet may be accidentally destroyed, along with all the money in it.</li>\n  <li>You may be scammed into sending your money elsewhere (this problem is not unique to Bitcoin)</li>\n</ol>\n<p>However, unlike with traditional payment schemes, the risk of fraudulent payments is low and Bitcoin gives you tremendous flexibility to implement as much or as little security as you like. At no point are you at the mercy of third-party payment processors who may or may not be properly incentivized to be secure? Below we discuss each problem Bitcoin using traders may face, and some common solutions.</p>\n<h3><strong>Server hacking</strong></h3>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/09/cyber-security-1805632_640.png\" width=\"640\" height=\"465\"/></p>\n<p>&nbsp;Server hacks have resulted in the loss of tens of thousands of Bitcoins. Any internet-connected computer that has liquid access to data worth hundreds of thousands of dollars will come under sophisticated and sustained attack, but there are some simple techniques you can use to reduce your risk.</p>\n<ul>\n  <li>For merchants who need to automatically accept payments online but not make them, use an&nbsp;<strong>encrypted wallet</strong>&nbsp;that does not have the password on the server. To receive payment all you need is a public key (for better privacy most merchants use one fresh key per-user or transaction). The public key alone does not allow you to spend the money. By creating a wallet with plenty of keys on your own local computer and then uploading the encrypted version to the server, you ensure that whilst the server can accept payments only your own computer can make them, even though they share the same balance. Thus hacking the server doesn’t allow any financial gain. Of course, you must still ensure your local computer is secured.</li>\n  <li>Some organizations need to be able to automatically send money as well as receive it. Examples include trading platforms and mining pools. These typically use&nbsp;<strong>cold storage</strong>&nbsp;as much as possible, where only the minimum balance necessary to handle withdrawals is on the server. The rest is sent to a separate wallet which is kept away from internet-connected computers. Because a wallet can receive coins without it being online, profit can be moved from the server to cold storage without risking the cold money. If an unusually large withdrawal takes place the transaction can be placed on hold until a human operator has time to reach the cold wallet and send money from it to the live site. This limits your losses to the size of your hot wallet in the case of a server breach.</li>\n  <li>Avoid managed server hosting. During 2012 several high profile breaches were caused not by lax security on the part of the site operators themselves but rather the companies providing the servers. Many data center operators, even large well-known ones, are&nbsp;not&nbsp;equipped to handle sensitive data regardless of what assurances they may provide. They can be vulnerable to hacking and social engineering themselves. Instead, purchase your own server(s) and rent a cage/network connection from a local datacenter that you can visit in person. For added security, either disable remote access entirely or ensure only connections from your home IP ranges are allowed. Make sure the data center operator won’t provide remote access on request without some pre-agreed security protocol being followed, like a callback.</li>\n  <li>Consider implementing a supervisor system. In this scheme, the site gives its users multi-signature addresses for sending payments. The money received requires a signature by both the website and an independent supervisor computer. The job of the supervisor is to analyze the stream of payment requests from the other server and try to spot anomalies. If a payment request looks OK then it will be signed. If it looks iffy a human will be called for further attention. The supervisor can be made a lot more secure than the website because it has only a single, well-defined purpose and does not need to run complex user-facing software like a web site or email system. So the job of the attacker now becomes either to hack both systems (hard if they are deliberately set up differently) or to find a way to extract the money that the supervisor won’t notice. What exactly “good” vs “bad” transactions look like are merchant-specific.</li>\n</ul>\n<h3><strong>Transaction reversals</strong></h3>\n<p>Whilst both credit cards and Bitcoins can experience transaction reversals, in Bitcoin the risk is entirely theoretical and has yet to be observed in the wild, whilst chargebacks are extremely common in the credit card world. Nevertheless, you should understand the risks:</p>\n<ul>\n  <li>For merchants that are shipping physical goods, you probably don’t have to worry. Reversing a transaction gets harder and harder with time. After only one hour it becomes computationally infeasible to reverse a Bitcoin transaction. Inserting a small delay before shipping isolates you from this risk entirely.</li>\n  <li>For automated trading platforms that may pay out some other currency in response to Bitcoin deposits, you should also delay payment for a short time until reversal becomes infeasible. Low-risk deposits from trusted customers could be processed faster, as reversing a Bitcoin transaction is a nontrivial problem at this time which is suited only to relatively skilled attackers who are after large sums of money.</li>\n  <li>For merchants shipping things immediately, like digital downloads, measuring the propagation of a transaction across the network and waiting until most nodes have reported it is probably good enough. This allows you to accept the payment within seconds. Whilst there’s a higher risk of transaction reversal here, the attack is still expensive and the attacker cannot choose the timing of the attack. Therefore watching out for users who receive an address and then delay the act of payment significantly is probably enough to insulate you from this attack (the&nbsp;Finney attack).</li>\n</ul>\n<h3><strong>Your wallet may be accidentally destroyed</strong></h3>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/09/security-2168234_640.jpg\" width=\"640\" height=\"405\"/></p>\n<p>&nbsp;Backing up Bitcoin wallets is easy, as they are just files. For high volume sites with the existing software (Bitcoin 0.6), you should pre-generate a large number of keys such that a single old backup is enough to restore all your money. Future versions will derive new keys deterministically, so a single backup should be enough to ensure you can always restore your wallet after an accidental or malicious deletion.</p>\n<h3><strong>You may be scammed into sending the money elsewhere</strong></h3>\n<p>Whilst no financial system can completely solve human gullibility, Bitcoins multi-signature keys allow you to lock up money such that multiple people have to agree in order for it to be spent. For example, the bulk of your balance could be assigned to a multi-signature key that requires you and your business partners to agree …. thus forcing a mental sanity check from multiple people, hopefully making the act of scamming harder.</p>\n<h2><strong>Future research</strong></h2>\n<p>Whilst running your own physical servers with no datacenter operator access is secure, it lacks convenience. In future, it may be possible to the use TPM (trusted platform module) chips to allow managed hosting such that root or even physical access is insufficient to steal the funds, as the wallet keys would be bound to a particular software environment. Well-engineered trusted computing solutions have some degree of physical resistance so rebooting the machine, opening it up or logging in with local/remote root would not allow you to steal the balance of the wallet.Unfortunately engineering such systems is nontrivial and the technical difficulty places this solution out of reach for most traders right now. In future easy to use software libraries, documentation, examples and managed hosting providers that sell TC enabled hardware may increase its attractiveness.</p>\n<p><a href=\"https://cryptonomad.info/securing-online-services/\"><strong>Read the original full article here.&nbsp;</strong></a></p>\n</html>",
      "json_metadata": "{\"tags\":[\"blog\",\"security\",\"securing\",\"online\",\"service\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/09/security-265130_1280-1024x682.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/09/safe-913452_640.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/09/hacker-1944688_640.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/09/cyber-security-1805632_640.png\",\"https://cryptonomad.info/wp-content/uploads/2019/09/security-2168234_640.jpg\"],\"links\":[\"https://cryptonomad.info/securing-online-services/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/09/04 07:18:42
voterspaminator
authorcryptonomads
permlinkaddress-reuse
weight-5 (-0.05%)
Transaction InfoBlock #36121141/Trx 1ce149094d49e18a0109e67c7a3cfe09197fbeff
View Raw JSON Data
{
  "trx_id": "1ce149094d49e18a0109e67c7a3cfe09197fbeff",
  "block": 36121141,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-04T07:18:42",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "address-reuse",
      "weight": -5
    }
  ]
}
2019/09/04 04:46:03
voterspaminator
authorcryptonomads
permlink51-attack
weight-5 (-0.05%)
Transaction InfoBlock #36118114/Trx 54987c7f1922b736c27023879c1ac1567ee29e20
View Raw JSON Data
{
  "trx_id": "54987c7f1922b736c27023879c1ac1567ee29e20",
  "block": 36118114,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-04T04:46:03",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "51-attack",
      "weight": -5
    }
  ]
}
2019/09/04 00:00:48
voterspaminator
authorcryptonomads
permlinksilk-road
weight-5 (-0.05%)
Transaction InfoBlock #36112456/Trx de8851d2e7374f7ddca062ab13b268fe0373e975
View Raw JSON Data
{
  "trx_id": "de8851d2e7374f7ddca062ab13b268fe0373e975",
  "block": 36112456,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-04T00:00:48",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "silk-road",
      "weight": -5
    }
  ]
}
spaminatorflagged (-0.05%) @cryptonomads / tor
2019/09/03 23:54:09
voterspaminator
authorcryptonomads
permlinktor
weight-5 (-0.05%)
Transaction InfoBlock #36112325/Trx 3020c61e42643f58c8d50fdc7b16caa2fb2ffd7f
View Raw JSON Data
{
  "trx_id": "3020c61e42643f58c8d50fdc7b16caa2fb2ffd7f",
  "block": 36112325,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-03T23:54:09",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "tor",
      "weight": -5
    }
  ]
}
2019/09/03 23:48:57
voterspaminator
authorcryptonomads
permlinkzerocoin
weight-5 (-0.05%)
Transaction InfoBlock #36112221/Trx a211829ea65685d6db936ff6a4fc69b6d466314a
View Raw JSON Data
{
  "trx_id": "a211829ea65685d6db936ff6a4fc69b6d466314a",
  "block": 36112221,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-03T23:48:57",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "zerocoin",
      "weight": -5
    }
  ]
}
2019/09/03 23:43:09
voterspaminator
authorcryptonomads
permlinksetting-up-a-tor-hidden-service
weight-5 (-0.05%)
Transaction InfoBlock #36112106/Trx 17344ed2f19db04bc5712509f944e1ab9ca00ab7
View Raw JSON Data
{
  "trx_id": "17344ed2f19db04bc5712509f944e1ab9ca00ab7",
  "block": 36112106,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-03T23:43:09",
  "op": [
    "vote",
    {
      "voter": "spaminator",
      "author": "cryptonomads",
      "permlink": "setting-up-a-tor-hidden-service",
      "weight": -5
    }
  ]
}
dtubesent 0.001 STEEM to @cryptonomads- "Final call to claim your DTube account! It takes only 5 minutes. Go now to https://d.tube"
2019/09/03 17:42:48
fromdtube
tocryptonomads
amount0.001 STEEM
memoFinal call to claim your DTube account! It takes only 5 minutes. Go now to https://d.tube
Transaction InfoBlock #36104960/Trx aa80f45a3a348e50aeb3edd1dfc341ae977a5240
View Raw JSON Data
{
  "trx_id": "aa80f45a3a348e50aeb3edd1dfc341ae977a5240",
  "block": 36104960,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-09-03T17:42:48",
  "op": [
    "transfer",
    {
      "from": "dtube",
      "to": "cryptonomads",
      "amount": "0.001 STEEM",
      "memo": "Final call to claim your DTube account! It takes only 5 minutes. Go now to https://d.tube"
    }
  ]
}
2019/08/31 08:48:57
votermack-bot
authorcryptonomads
permlinkaddress-reuse
weight-50 (-0.50%)
Transaction InfoBlock #36024122/Trx c6539ed044f88add348e59febe753758a096f7fd
View Raw JSON Data
{
  "trx_id": "c6539ed044f88add348e59febe753758a096f7fd",
  "block": 36024122,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T08:48:57",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "address-reuse",
      "weight": -50
    }
  ]
}
mack-botflagged (-0.50%) @cryptonomads / 51-attack
2019/08/31 08:26:48
votermack-bot
authorcryptonomads
permlink51-attack
weight-50 (-0.50%)
Transaction InfoBlock #36023682/Trx e4bccb66b6f601bf5610092d1188a12a3b907f26
View Raw JSON Data
{
  "trx_id": "e4bccb66b6f601bf5610092d1188a12a3b907f26",
  "block": 36023682,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T08:26:48",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "51-attack",
      "weight": -50
    }
  ]
}
mack-botflagged (-0.50%) @cryptonomads / silk-road
2019/08/31 07:39:12
votermack-bot
authorcryptonomads
permlinksilk-road
weight-50 (-0.50%)
Transaction InfoBlock #36022738/Trx 840fffef4013ad5824adf25a1190fbbd50539a76
View Raw JSON Data
{
  "trx_id": "840fffef4013ad5824adf25a1190fbbd50539a76",
  "block": 36022738,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T07:39:12",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "silk-road",
      "weight": -50
    }
  ]
}
mack-botflagged (-0.50%) @cryptonomads / tor
2019/08/31 07:38:06
votermack-bot
authorcryptonomads
permlinktor
weight-50 (-0.50%)
Transaction InfoBlock #36022716/Trx 3f1412fbde7667a7be55ad437a9e4a553b37e895
View Raw JSON Data
{
  "trx_id": "3f1412fbde7667a7be55ad437a9e4a553b37e895",
  "block": 36022716,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T07:38:06",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "tor",
      "weight": -50
    }
  ]
}
mack-botflagged (-0.50%) @cryptonomads / zerocoin
2019/08/31 07:36:57
votermack-bot
authorcryptonomads
permlinkzerocoin
weight-50 (-0.50%)
Transaction InfoBlock #36022693/Trx a555e3dfe07f46c82a984ecfeae014a015dc18ad
View Raw JSON Data
{
  "trx_id": "a555e3dfe07f46c82a984ecfeae014a015dc18ad",
  "block": 36022693,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T07:36:57",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "zerocoin",
      "weight": -50
    }
  ]
}
2019/08/31 07:35:57
votermack-bot
authorcryptonomads
permlinksetting-up-a-tor-hidden-service
weight-50 (-0.50%)
Transaction InfoBlock #36022673/Trx f42f3516c9d8791e9717f9b9620d363e4c34d3d4
View Raw JSON Data
{
  "trx_id": "f42f3516c9d8791e9717f9b9620d363e4c34d3d4",
  "block": 36022673,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-31T07:35:57",
  "op": [
    "vote",
    {
      "voter": "mack-bot",
      "author": "cryptonomads",
      "permlink": "setting-up-a-tor-hidden-service",
      "weight": -50
    }
  ]
}
cryptonomadsreceived 0.019 STEEM from power down installment (0.024 SP)
2019/08/30 20:25:54
from accountcryptonomads
to accountcryptonomads
withdrawn38.289664 VESTS
deposited0.019 STEEM
Transaction InfoBlock #36009359/Virtual Operation #106
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 36009359,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 106,
  "timestamp": "2019-08-30T20:25:54",
  "op": [
    "fill_vesting_withdraw",
    {
      "from_account": "cryptonomads",
      "to_account": "cryptonomads",
      "withdrawn": "38.289664 VESTS",
      "deposited": "0.019 STEEM"
    }
  ]
}
2019/08/29 14:25:24
votersteemcleaners
authorcryptonomads
permlinkarmory
weight-5000 (-50.00%)
Transaction InfoBlock #35973642/Trx 4abc072f1e0f7fed489343ca188388662f6f643c
View Raw JSON Data
{
  "trx_id": "4abc072f1e0f7fed489343ca188388662f6f643c",
  "block": 35973642,
  "trx_in_block": 27,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-29T14:25:24",
  "op": [
    "vote",
    {
      "voter": "steemcleaners",
      "author": "cryptonomads",
      "permlink": "armory",
      "weight": -5000
    }
  ]
}
2019/08/29 14:25:21
parent authorcryptonomads
parent permlinkarmory
authorsteemcleaners
permlinkre-cryptonomads-armory-20190829t142521470z
title
body[Source](https://en.bitcoin.it/wiki/Armory) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #35973641/Trx 5ea3eadff9db92742aec4b1f31f2c148138d601c
View Raw JSON Data
{
  "trx_id": "5ea3eadff9db92742aec4b1f31f2c148138d601c",
  "block": 35973641,
  "trx_in_block": 29,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-29T14:25:21",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "armory",
      "author": "steemcleaners",
      "permlink": "re-cryptonomads-armory-20190829t142521470z",
      "title": "",
      "body": "[Source](https://en.bitcoin.it/wiki/Armory)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
glitterfartupvoted (10.00%) @cryptonomads / armory
2019/08/28 21:20:21
voterglitterfart
authorcryptonomads
permlinkarmory
weight1000 (10.00%)
Transaction InfoBlock #35953309/Trx 0359dffdb3bb1c31e10fffbb4494d6a8710cae5e
View Raw JSON Data
{
  "trx_id": "0359dffdb3bb1c31e10fffbb4494d6a8710cae5e",
  "block": 35953309,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T21:20:21",
  "op": [
    "vote",
    {
      "voter": "glitterfart",
      "author": "cryptonomads",
      "permlink": "armory",
      "weight": 1000
    }
  ]
}
cryptonomadspublished a new post: armory
2019/08/28 20:51:48
parent author
parent permlinkbitcoin
authorcryptonomads
permlinkarmory
titleArmory
body<html> <p>&nbsp;Bitcoin Armory is an open-source, python-based, wallet-management application for the Bitcoin&nbsp;network.&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/Armory.png" width="400" height="90"/></p> <p>&nbsp;Armory is a desktop application for Bitcoin funds management. It is a full-featured&nbsp;Bitcoin wallet&nbsp;management application which aims to combine the two characteristics of wallets previously perceived as mutually exclusive:&nbsp;security&nbsp;and usability. It comes with a set of unique features not available in any other client, although it is possible to use its split interface to choose “standard” mode which is devoid of some information people new to Bitcoin may consider excessive.</p> <h2><strong>Concept</strong></h2> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/ArmoryMainScreen.png" width="300" height="225"/></p> <p>&nbsp;Multi-currency wallet Armory allows you to create messages using a private&nbsp;key&nbsp;– the recipient will always know that he received a message from a particular user.Armory wallet, in fact, is an addition to&nbsp;Bitcoin Core, which allows increasing the level of security in the operation of virtual means.The main requirement for the installation of the wallet Armory is the presence of another workstation, which has more than 512 megabytes of RAM and USB-drive for storing information. In this case, the second station – a computer should not be connected to the Internet. This condition ensures the safety of confidential data, even if the attacker hacked your account-access to the tools will be limited due to the lack of an online connection.When using a mobile wallet, it is necessary to ensure high-quality encryption of the client, and the backup copy of the keys of the wallet Armory should be stored in another source of information. This is a guarantee that even if you lose control of the application passwords will provide an adequate level of protection for your funds.</p> <h4><strong>History</strong></h4> <p>The Armory project was announced on January 3rd, 2012.</p> <h4><strong>Crowdfunding</strong></h4> <p>The project received $2,661 by 26 funders on crowdfunding site RocketHub. The project completed it’s funding on 2012-March-19.</p> <h2><strong>Features</strong></h2> <ul> <li><strong>The unlimited</strong> number of wallets&nbsp;– Armory was designed from the start to support multi-wallet operations without limit on the number.</li> <li>The dialogue option&nbsp;to print paper backup when creating the wallet.</li> <li>Watching-only wallets&nbsp;– there is a possibility of forking a “watching-only” wallet that contains no private-key data, but can still be used to generate addresses and confirm payments.</li> <li><strong>Wallet-update logic</strong>&nbsp;guarantees all atomic file operations. The system will automatically recover user’s wallets after any power failures or extremely rare-but-possible RAM/HDD errors.</li> </ul> <p>The Armory wallet site offers users several user modes:</p> <ul> <li>Standard – standard;</li> <li>Advanced-advanced;</li> <li>Developer-expert mode.</li> </ul> <h2><strong>Advantages</strong></h2> <p>Armory bitcoin wallets are a reliable way to store and manipulate&nbsp;cryptocurrency. Why is it necessary to choose an electronic wallet&nbsp;Armory Wallet&nbsp;when creating a wallet – to get an answer to this question will allow an overview of all the advantages that this client provides to the user:</p> <ul> <li>secure management of funds even if you are connected to the Internet;</li> <li>storing private keys on the offline media, working in offline mode;</li> <li>address&nbsp;creation and control of funds without risk of hacking by intruders;</li> <li>operation by means of offline mode when using USB-key;</li> <li>the ability to create a&nbsp;paper wallet.</li> </ul> <h2><strong>Disadvantages</strong></h2> <p>Despite the fact that the installation of the Armory wallet on the computer offers bitcoin a lot of positive aspects of the client’s use, among its positive aspects it is also necessary to highlight some disadvantages, which somewhat darken the picture:</p> <ul> <li>Armory requires that you have plenty of free disk space to install;</li> <li>operation options the Armory client requires specific skills and experience in the use of such programs;</li> <li>to generate the Armory wallet requires the official Bitcoin Core wallet because of the lack of Armory needed network functions;</li> <li>easy of use in the Armory only for Windows platforms, Linux, Mac, Ubuntu.</li> </ul> <p><a href="https://cryptonomad.info/armory/"><strong>Read the original full article here.</strong></a></p> </html>
json metadata{"tags":["bitcoin","cryptocurrency","crypto","blockchain","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/Armory.png","https://cryptonomad.info/wp-content/uploads/2019/08/ArmoryMainScreen.png"],"links":["https://cryptonomad.info/armory/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35952743/Trx 11d5b9b4b4ea3b6f9748007197d8c0c7e51ba3b4
View Raw JSON Data
{
  "trx_id": "11d5b9b4b4ea3b6f9748007197d8c0c7e51ba3b4",
  "block": 35952743,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T20:51:48",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "bitcoin",
      "author": "cryptonomads",
      "permlink": "armory",
      "title": "Armory",
      "body": "<html>\n<p>&nbsp;Bitcoin Armory is an open-source, python-based, wallet-management application for the Bitcoin&nbsp;network.&nbsp;</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/Armory.png\" width=\"400\" height=\"90\"/></p>\n<p>&nbsp;Armory is a desktop application for Bitcoin funds management. It is a full-featured&nbsp;Bitcoin wallet&nbsp;management application which aims to combine the two characteristics of wallets previously perceived as mutually exclusive:&nbsp;security&nbsp;and usability. It comes with a set of unique features not available in any other client, although it is possible to use its split interface to choose “standard” mode which is devoid of some information people new to Bitcoin may consider excessive.</p>\n<h2><strong>Concept</strong></h2>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/ArmoryMainScreen.png\" width=\"300\" height=\"225\"/></p>\n<p>&nbsp;Multi-currency wallet Armory allows you to create messages using a private&nbsp;key&nbsp;– the recipient will always know that he received a message from a particular user.Armory wallet, in fact, is an addition to&nbsp;Bitcoin Core, which allows increasing the level of security in the operation of virtual means.The main requirement for the installation of the wallet Armory is the presence of another workstation, which has more than 512 megabytes of RAM and USB-drive for storing information. In this case, the second station – a computer should not be connected to the Internet. This condition ensures the safety of confidential data, even if the attacker hacked your account-access to the tools will be limited due to the lack of an online connection.When using a mobile wallet, it is necessary to ensure high-quality encryption of the client, and the backup copy of the keys of the wallet Armory should be stored in another source of information. This is a guarantee that even if you lose control of the application passwords will provide an adequate level of protection for your funds.</p>\n<h4><strong>History</strong></h4>\n<p>The Armory project was announced on January 3rd, 2012.</p>\n<h4><strong>Crowdfunding</strong></h4>\n<p>The project received $2,661 by 26 funders on crowdfunding site RocketHub. The project completed it’s funding on 2012-March-19.</p>\n<h2><strong>Features</strong></h2>\n<ul>\n  <li><strong>The unlimited</strong> number of wallets&nbsp;– Armory was designed from the start to support multi-wallet operations without limit on the number.</li>\n  <li>The dialogue option&nbsp;to print paper backup when creating the wallet.</li>\n  <li>Watching-only wallets&nbsp;– there is a possibility of forking a “watching-only” wallet that contains no private-key data, but can still be used to generate addresses and confirm payments.</li>\n  <li><strong>Wallet-update logic</strong>&nbsp;guarantees all atomic file operations. The system will automatically recover user’s wallets after any power failures or extremely rare-but-possible RAM/HDD errors.</li>\n</ul>\n<p>The Armory wallet site offers users several user modes:</p>\n<ul>\n  <li>Standard – standard;</li>\n  <li>Advanced-advanced;</li>\n  <li>Developer-expert mode.</li>\n</ul>\n<h2><strong>Advantages</strong></h2>\n<p>Armory bitcoin wallets are a reliable way to store and manipulate&nbsp;cryptocurrency. Why is it necessary to choose an electronic wallet&nbsp;Armory Wallet&nbsp;when creating a wallet – to get an answer to this question will allow an overview of all the advantages that this client provides to the user:</p>\n<ul>\n  <li>secure management of funds even if you are connected to the Internet;</li>\n  <li>storing private keys on the offline media, working in offline mode;</li>\n  <li>address&nbsp;creation and control of funds without risk of hacking by intruders;</li>\n  <li>operation by means of offline mode when using USB-key;</li>\n  <li>the ability to create a&nbsp;paper wallet.</li>\n</ul>\n<h2><strong>Disadvantages</strong></h2>\n<p>Despite the fact that the installation of the Armory wallet on the computer offers bitcoin a lot of positive aspects of the client’s use, among its positive aspects it is also necessary to highlight some disadvantages, which somewhat darken the picture:</p>\n<ul>\n  <li>Armory requires that you have plenty of free disk space to install;</li>\n  <li>operation options the Armory client requires specific skills and experience in the use of such programs;</li>\n  <li>to generate the Armory wallet requires the official Bitcoin Core wallet because of the lack of Armory needed network functions;</li>\n  <li>easy of use in the Armory only for Windows platforms, Linux, Mac, Ubuntu.</li>\n</ul>\n<p><a href=\"https://cryptonomad.info/armory/\"><strong>Read the original full article here.</strong></a></p>\n</html>",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"cryptocurrency\",\"crypto\",\"blockchain\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/Armory.png\",\"https://cryptonomad.info/wp-content/uploads/2019/08/ArmoryMainScreen.png\"],\"links\":[\"https://cryptonomad.info/armory/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 19:19:03
parent authorcryptonomads
parent permlinkaddress-reuse
authorcheetah
permlinkcheetah-re-cryptonomadsaddress-reuse
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://en.bitcoin.it/wiki/Address_reuse
json metadata
Transaction InfoBlock #35950906/Trx c255b01532157d01ec14db8fea972b5a067b808f
View Raw JSON Data
{
  "trx_id": "c255b01532157d01ec14db8fea972b5a067b808f",
  "block": 35950906,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T19:19:03",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "address-reuse",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptonomadsaddress-reuse",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://en.bitcoin.it/wiki/Address_reuse",
      "json_metadata": ""
    }
  ]
}
2019/08/28 19:18:57
votercheetah
authorcryptonomads
permlinkaddress-reuse
weight8 (0.08%)
Transaction InfoBlock #35950904/Trx 46b6e0293a3ef2113f3d82a7076537c0be1515e7
View Raw JSON Data
{
  "trx_id": "46b6e0293a3ef2113f3d82a7076537c0be1515e7",
  "block": 35950904,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T19:18:57",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptonomads",
      "permlink": "address-reuse",
      "weight": 8
    }
  ]
}
cryptonomadspublished a new post: address-reuse
2019/08/28 19:18:42
parent author
parent permlinkbitcoin
authorcryptonomads
permlinkaddress-reuse
titleAddress reuse
body<html> <p>&nbsp;<strong>Address reuse</strong>&nbsp;refers to the use of the same&nbsp;address&nbsp;for multiple&nbsp;transactions. It is an unintended practice, abusing the&nbsp;privacy&nbsp;and&nbsp;security&nbsp;of the participants of the transactions as well as future holders of their value. It also only functions by accident, not by design, so cannot be depended on to work reliably.&nbsp;</p> <p><img src="https://cryptonomad.info/wp-content/uploads/2019/08/business-3194671_1280-1024x576.jpg" width="1024" height="576"/></p> <p>&nbsp;</p> <h2><strong>Problems</strong></h2> <h3><strong>Privacy</strong></h3> <p>Address reuse harms the privacy of not only yourself but also others – including many not related to the&nbsp;transaction. In some cases, these risks are serious enough that they are likely in violation of reasonable consumer protection laws.</p> <p>When addresses are re-used, they allow others too much more easily and reliably determine that the address being reused is&nbsp;yours. Every time the re-used address’s&nbsp;private key signs a fresh transaction, whoever receives it can use the histories of that address to discover information about you, and everyone who is interested in discovering the identity of the address’s owner has one more&nbsp;target&nbsp;they can try to contact to discover who you are.</p> <p>The relationship graph in a re-used address is powerfully-linked in that&nbsp;<strong>all</strong>&nbsp;of the inputs to that address are necessarily joined (via the spending authority of your private key) to all of its outputs.</p> <p>There has been significant&nbsp;research&nbsp;into the area of what researchers are calling ‘identity collapse’, which is what happens when more than one&nbsp;Bitcoin&nbsp;address is strongly-linked via the&nbsp;Bitcoin transaction&nbsp;graph to another. Re-using addresses makes their job trivial. There are publically-known databases that exist, right now, that have not only collapsed millions of Bitcoin addresses but used publically-available information to&nbsp;<strong>link</strong>&nbsp;those collapsed identities to individuals, and these databases are being actively maintained.</p> <p>While you may be okay with some random European researcher bound by his ethics board to conceal your identity from the public-at-large, it is very possible that&nbsp;people&nbsp;who accept money from you may not be aware of your decision: thus, via your privacy-decreasing action, people further on the address signing&nbsp;chain&nbsp;could thus be putting&nbsp;<strong>you</strong>&nbsp;at risk if they spend their bitcoin on something that catches the attention of law enforcement.</p> <p>Additionally, in the event that you knowingly make this choice (which you are doing, now that you’ve read this,) the transaction histories that you are responsible for linking in the event you are a retailer of some sort could put the privacy of your customers at risk because now your well-known singular address(es) which can be strongly linked to your corporate identity can be assumed to be economic activity interacting with your corporate identity.</p> <p>See also:&nbsp;<a href="http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/">Innovations that Enhance Bitcoin Anonymity</a></p> <h4><strong>Worked Example 1</strong></h4> <ul> <li>You save in bitcoin, using a single-address paper <a href="https://cryptonomad.info/cryptocurrency-wallet/">wallet</a>.</li> <li>All your <a href="https://cryptonomad.info/bitcoin/">bitcoin</a> savings to this same address, let’s say it contains $1 million worth.</li> <li>You buy a small amount of&nbsp;bitcoins&nbsp;to add to your savings, depositing in the paper&nbsp;<a href="https://cryptonomad.info/cryptocurrency-wallet/">wallet</a>.</li> <li>The person who sold you the bitcoins follows their trail on the&nbsp;<a href="https://cryptonomad.info/blockchain/">blockchain</a>&nbsp;and finds your paper wallet containing $1 million.</li> <li>He mentions it to someone in a&nbsp;cafe&nbsp;or bar.</li> <li>Word gets around. A burglar raids your home. Kidnappers capture your children and know exactly how much to demand in ransom.</li> </ul> <h4><strong>Worked Example 2</strong></h4> <ul> <li>You use a single&nbsp;<a href="https://cryptonomad.info/bitcoin-address/">Bitcoin address</a>&nbsp;for all your earning and spending. Anyone you&nbsp;trade&nbsp;with can see a complete&nbsp;history&nbsp;of your finances.</li> <li>Your landlord can see your salary when he raises the rent he&nbsp;knows&nbsp;exactly how much to ask for.</li> <li>Your shopkeeper can see your spending. Gossip gets around of how much you spend on pornography and how little on church donations.</li> <li>Your employer can see your spending. When you pay labor union dues or donate to&nbsp;WikiLeaks&nbsp;or another non-profit, your boss knows who not to trust.</li> </ul> <h3><strong>Security</strong></h3> <p><a href="https://cryptonomad.info/bitcoin/">Bitcoin </a>does not, at a low level, have any concept of addresses, only individual&nbsp;coins. Address reuse, at this layer, requires producing multiple digital signatures when you&nbsp;spend bitcoins. Multiple situations have been found where more than one digital signature can be used to calculate the private key needed to spend bitcoins. Even if you spend all the bitcoins claimed by this private key at once, it is still possible to double-spend them in theft before they confirm. While the known situations for finding the private key from signatures have been fixed, it is not prudent to assume there aren’t more such situations yet unknown.</p> <p>In the&nbsp;case&nbsp;of spending all the TXOs in a single transaction, there is an additional risk if someone is actively monitoring the&nbsp;network&nbsp;for vulnerable transactions. Upon receiving such a transaction, they can split up their double spends such that there is only one&nbsp;ECDSA&nbsp;verification per transaction (making a single transaction for each TXO). This will cause the attacker’s transactions to relay across the rest of the nodes&nbsp;<em>faster</em>&nbsp;than the legitimate one, increasing success of a double spend.</p> <h4><strong>Known attacks</strong></h4> <ul> <li>Same K in multiple signatures, see;&nbsp;<a href="http://www.nilsschneider.net/2013/01/28/recovering-bitcoin-private-keys.html">Recovering Bitcoin private keys using weak signatures from the blockchain</a>.</li> <li><a href="https://eprint.iacr.org/2014/140.pdf">Timing side-channel</a></li> </ul> <h3><strong>Accidental loss</strong></h3> <p>In <a href="https://cryptonomad.info/bitcoin/">Bitcoin</a> abstraction, an address is an invoice for a specific payment. Once that payment is made, the receiving party has no reason to retain the data for the address (technical details simplified) and may discard it. Even if someone does not choose to discard that data, it may have since been lost in an accident or compromised. In any of these situations, any future payments to the same address would go into a “black hole”, and be forever lost through no fault of the recipient.</p> <h3><strong>Confusion</strong></h3> <p>Users who see addresses reused may incorrectly be led to believe they function similarly to&nbsp;wallets&nbsp;or bank accounts. Often this is manifested in people talking about nonsense like “address balance”, “wallet address”, “from address”, and similar&nbsp;misconceptions&nbsp;that don’t actually exist in Bitcoin.</p> <h3><strong>High Fees</strong></h3> <p>A single invoice payment using&nbsp;P2PKH&nbsp;can be redeemed and spent with a predictable fee because the transaction should have a predictable size.&nbsp;Software&nbsp;that determines payment and available funds based on “address balance” can cause loss through high fees. If you are paid to an address in many small increments, you will pay a much higher&nbsp;transaction fee when redeeming those payments. It is much more useful for a&nbsp;client&nbsp;to display transaction outputs spendable than address balances for this reason.</p> <h2><strong>Notable offenders</strong></h2> <p>Some notable Bitcoin software and services encourage or require address reuse:</p> <ul> <li>Many bitcoin&nbsp;mining pools&nbsp;(especially&nbsp;Eligius)</li> <li>Paper wallet&nbsp;which use a single bitcoin private key/address pair</li> </ul> <p><br></p> <p>&nbsp;<a href="https://cryptonomad.info/address-reuse/"><strong>Read the original full article here&nbsp;</strong></a></p> </html>
json metadata{"tags":["bitcoin","cryptocurrency","crypto","blockchain","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/business-3194671_1280-1024x576.jpg"],"links":["http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/","https://cryptonomad.info/cryptocurrency-wallet/","https://cryptonomad.info/bitcoin/","https://cryptonomad.info/blockchain/","https://cryptonomad.info/bitcoin-address/","http://www.nilsschneider.net/2013/01/28/recovering-bitcoin-private-keys.html","https://eprint.iacr.org/2014/140.pdf","https://cryptonomad.info/address-reuse/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35950899/Trx f5bbb4d05100c26240bb4a8e2a41f1b88cf28052
View Raw JSON Data
{
  "trx_id": "f5bbb4d05100c26240bb4a8e2a41f1b88cf28052",
  "block": 35950899,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T19:18:42",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "bitcoin",
      "author": "cryptonomads",
      "permlink": "address-reuse",
      "title": "Address reuse",
      "body": "<html>\n<p>&nbsp;<strong>Address reuse</strong>&nbsp;refers to the use of the same&nbsp;address&nbsp;for multiple&nbsp;transactions. It is an unintended practice, abusing the&nbsp;privacy&nbsp;and&nbsp;security&nbsp;of the participants of the transactions as well as future holders of their value. It also only functions by accident, not by design, so cannot be depended on to work reliably.&nbsp;</p>\n<p><img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/business-3194671_1280-1024x576.jpg\" width=\"1024\" height=\"576\"/></p>\n<p>&nbsp;</p>\n<h2><strong>Problems</strong></h2>\n<h3><strong>Privacy</strong></h3>\n<p>Address reuse harms the privacy of not only yourself but also others – including many not related to the&nbsp;transaction. In some cases, these risks are serious enough that they are likely in violation of reasonable consumer protection laws.</p>\n<p>When addresses are re-used, they allow others too much more easily and reliably determine that the address being reused is&nbsp;yours. Every time the re-used address’s&nbsp;private key signs a fresh transaction, whoever receives it can use the histories of that address to discover information about you, and everyone who is interested in discovering the identity of the address’s owner has one more&nbsp;target&nbsp;they can try to contact to discover who you are.</p>\n<p>The relationship graph in a re-used address is powerfully-linked in that&nbsp;<strong>all</strong>&nbsp;of the inputs to that address are necessarily joined (via the spending authority of your private key) to all of its outputs.</p>\n<p>There has been significant&nbsp;research&nbsp;into the area of what researchers are calling ‘identity collapse’, which is what happens when more than one&nbsp;Bitcoin&nbsp;address is strongly-linked via the&nbsp;Bitcoin transaction&nbsp;graph to another. Re-using addresses makes their job trivial. There are publically-known databases that exist, right now, that have not only collapsed millions of Bitcoin addresses but used publically-available information to&nbsp;<strong>link</strong>&nbsp;those collapsed identities to individuals, and these databases are being actively maintained.</p>\n<p>While you may be okay with some random European researcher bound by his ethics board to conceal your identity from the public-at-large, it is very possible that&nbsp;people&nbsp;who accept money from you may not be aware of your decision: thus, via your privacy-decreasing action, people further on the address signing&nbsp;chain&nbsp;could thus be putting&nbsp;<strong>you</strong>&nbsp;at risk if they spend their bitcoin on something that catches the attention of law enforcement.</p>\n<p>Additionally, in the event that you knowingly make this choice (which you are doing, now that you’ve read this,) the transaction histories that you are responsible for linking in the event you are a retailer of some sort could put the privacy of your customers at risk because now your well-known singular address(es) which can be strongly linked to your corporate identity can be assumed to be economic activity interacting with your corporate identity.</p>\n<p>See also:&nbsp;<a href=\"http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/\">Innovations that Enhance Bitcoin Anonymity</a></p>\n<h4><strong>Worked Example 1</strong></h4>\n<ul>\n  <li>You save in bitcoin, using a single-address paper <a href=\"https://cryptonomad.info/cryptocurrency-wallet/\">wallet</a>.</li>\n  <li>All your <a href=\"https://cryptonomad.info/bitcoin/\">bitcoin</a> savings to this same address, let’s say it contains $1 million worth.</li>\n  <li>You buy a small amount of&nbsp;bitcoins&nbsp;to add to your savings, depositing in the paper&nbsp;<a href=\"https://cryptonomad.info/cryptocurrency-wallet/\">wallet</a>.</li>\n  <li>The person who sold you the bitcoins follows their trail on the&nbsp;<a href=\"https://cryptonomad.info/blockchain/\">blockchain</a>&nbsp;and finds your paper wallet containing $1 million.</li>\n  <li>He mentions it to someone in a&nbsp;cafe&nbsp;or bar.</li>\n  <li>Word gets around. A burglar raids your home. Kidnappers capture your children and know exactly how much to demand in ransom.</li>\n</ul>\n<h4><strong>Worked Example 2</strong></h4>\n<ul>\n  <li>You use a single&nbsp;<a href=\"https://cryptonomad.info/bitcoin-address/\">Bitcoin address</a>&nbsp;for all your earning and spending. Anyone you&nbsp;trade&nbsp;with can see a complete&nbsp;history&nbsp;of your finances.</li>\n  <li>Your landlord can see your salary when he raises the rent he&nbsp;knows&nbsp;exactly how much to ask for.</li>\n  <li>Your shopkeeper can see your spending. Gossip gets around of how much you spend on pornography and how little on church donations.</li>\n  <li>Your employer can see your spending. When you pay labor union dues or donate to&nbsp;WikiLeaks&nbsp;or another non-profit, your boss knows who not to trust.</li>\n</ul>\n<h3><strong>Security</strong></h3>\n<p><a href=\"https://cryptonomad.info/bitcoin/\">Bitcoin </a>does not, at a low level, have any concept of addresses, only individual&nbsp;coins. Address reuse, at this layer, requires producing multiple digital signatures when you&nbsp;spend bitcoins. Multiple situations have been found where more than one digital signature can be used to calculate the private key needed to spend bitcoins. Even if you spend all the bitcoins claimed by this private key at once, it is still possible to double-spend them in theft before they confirm. While the known situations for finding the private key from signatures have been fixed, it is not prudent to assume there aren’t more such situations yet unknown.</p>\n<p>In the&nbsp;case&nbsp;of spending all the TXOs in a single transaction, there is an additional risk if someone is actively monitoring the&nbsp;network&nbsp;for vulnerable transactions. Upon receiving such a transaction, they can split up their double spends such that there is only one&nbsp;ECDSA&nbsp;verification per transaction (making a single transaction for each TXO). This will cause the attacker’s transactions to relay across the rest of the nodes&nbsp;<em>faster</em>&nbsp;than the legitimate one, increasing success of a double spend.</p>\n<h4><strong>Known attacks</strong></h4>\n<ul>\n  <li>Same K in multiple signatures, see;&nbsp;<a href=\"http://www.nilsschneider.net/2013/01/28/recovering-bitcoin-private-keys.html\">Recovering Bitcoin private keys using weak signatures from the blockchain</a>.</li>\n  <li><a href=\"https://eprint.iacr.org/2014/140.pdf\">Timing side-channel</a></li>\n</ul>\n<h3><strong>Accidental loss</strong></h3>\n<p>In <a href=\"https://cryptonomad.info/bitcoin/\">Bitcoin</a> abstraction, an address is an invoice for a specific payment. Once that payment is made, the receiving party has no reason to retain the data for the address (technical details simplified) and may discard it. Even if someone does not choose to discard that data, it may have since been lost in an accident or compromised. In any of these situations, any future payments to the same address would go into a “black hole”, and be forever lost through no fault of the recipient.</p>\n<h3><strong>Confusion</strong></h3>\n<p>Users who see addresses reused may incorrectly be led to believe they function similarly to&nbsp;wallets&nbsp;or bank accounts. Often this is manifested in people talking about nonsense like “address balance”, “wallet address”, “from address”, and similar&nbsp;misconceptions&nbsp;that don’t actually exist in Bitcoin.</p>\n<h3><strong>High Fees</strong></h3>\n<p>A single invoice payment using&nbsp;P2PKH&nbsp;can be redeemed and spent with a predictable fee because the transaction should have a predictable size.&nbsp;Software&nbsp;that determines payment and available funds based on “address balance” can cause loss through high fees. If you are paid to an address in many small increments, you will pay a much higher&nbsp;transaction fee when redeeming those payments. It is much more useful for a&nbsp;client&nbsp;to display transaction outputs spendable than address balances for this reason.</p>\n<h2><strong>Notable offenders</strong></h2>\n<p>Some notable Bitcoin software and services encourage or require address reuse:</p>\n<ul>\n  <li>Many bitcoin&nbsp;mining pools&nbsp;(especially&nbsp;Eligius)</li>\n  <li>Paper wallet&nbsp;which use a single bitcoin private key/address pair</li>\n</ul>\n<p><br></p>\n<p>&nbsp;<a href=\"https://cryptonomad.info/address-reuse/\"><strong>Read the original full article here&nbsp;</strong></a></p>\n</html>",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"cryptocurrency\",\"crypto\",\"blockchain\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/business-3194671_1280-1024x576.jpg\"],\"links\":[\"http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/\",\"https://cryptonomad.info/cryptocurrency-wallet/\",\"https://cryptonomad.info/bitcoin/\",\"https://cryptonomad.info/blockchain/\",\"https://cryptonomad.info/bitcoin-address/\",\"http://www.nilsschneider.net/2013/01/28/recovering-bitcoin-private-keys.html\",\"https://eprint.iacr.org/2014/140.pdf\",\"https://cryptonomad.info/address-reuse/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 17:55:54
parent authorcryptonomads
parent permlinkzerocoin
authorbrainceo
permlinkpwykh5
title
bodyhas a great future ahead for sure
json metadata{"tags":["bitcoin","steemleo"],"app":"steemleo/0.1"}
Transaction InfoBlock #35949258/Trx 62654b57ccc36d88e63c81f661d8956771fb50ea
View Raw JSON Data
{
  "trx_id": "62654b57ccc36d88e63c81f661d8956771fb50ea",
  "block": 35949258,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T17:55:54",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "zerocoin",
      "author": "brainceo",
      "permlink": "pwykh5",
      "title": "",
      "body": "has a great future ahead for sure",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"steemleo\"],\"app\":\"steemleo/0.1\"}"
    }
  ]
}
2019/08/28 17:54:00
parent authorcryptonomads
parent permlink51-attack
authorbrainceo
permlinkpwykdz
title
bodyThanks for explaining that in details
json metadata{"tags":["bitcoin","steemleo"],"app":"steemleo/0.1"}
Transaction InfoBlock #35949220/Trx e0c0466b8afc6b2af801aa0f4b4a124c9e228051
View Raw JSON Data
{
  "trx_id": "e0c0466b8afc6b2af801aa0f4b4a124c9e228051",
  "block": 35949220,
  "trx_in_block": 20,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T17:54:00",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "51-attack",
      "author": "brainceo",
      "permlink": "pwykdz",
      "title": "",
      "body": "Thanks for explaining that in details",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"steemleo\"],\"app\":\"steemleo/0.1\"}"
    }
  ]
}
2019/08/28 16:49:30
votersteemgroup2
authorcryptonomads
permlink51-attack
weight500 (5.00%)
Transaction InfoBlock #35947943/Trx ea1d68d2a8f0a3166661534bf20aa2fb2f3aac54
View Raw JSON Data
{
  "trx_id": "ea1d68d2a8f0a3166661534bf20aa2fb2f3aac54",
  "block": 35947943,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T16:49:30",
  "op": [
    "vote",
    {
      "voter": "steemgroup2",
      "author": "cryptonomads",
      "permlink": "51-attack",
      "weight": 500
    }
  ]
}
cryptonomadspublished a new post: 51-attack
2019/08/28 16:46:03
parent author
parent permlinkbitcoin
authorcryptonomads
permlink51-attack
title51% attack
body<html> <p>&nbsp;<strong>51% attack</strong>&nbsp;is a term which signifies that an attacker has accumulated more computing power in his hands than all the other members of the&nbsp;network&nbsp;combined: a sort of controlling interest of generating power.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/51.jpg" width="300" height="169"/></p> <h2><strong>Consequences of 51% attack</strong></h2> <p><strong>51% attack</strong>&nbsp;vulnerability is a kind of cryptocurrency’s sickness and a terminal one at that. When a new&nbsp;cryptocurrency&nbsp;isn’t trusted it’s network’s power is poor so enough power for an attack can be accumulated easily. Of course, there’s no economic gain to be yielded at this stage but an attacker could, for example, “kill off” a rising competitor.&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/51percentattack.png" width="300" height="177"/></p> <p>&nbsp;Another possible way of application is an attack on already commercially successful currency for profit. However, this case implies that the coin is commercially mined by network members who use their computing power for the generation of cherished coins. In the case of a successful currency, this means that the total network power is enormous as there’s a massive number of people who are engaged in&nbsp;the mining&nbsp;process. Thus a 51% attack becomes hard to conduct.</p> <p>Therefore 51% attack is a tool of a natural selection of sorts that separates the&nbsp;coins&nbsp;with high potential from all others at early stages of their existence. At the same time, it may present a problem in the future when commercial mining will come to an end. Once in every four years, the reward for a block is halved. Now, this reward equals 25 BTC per block and at the end of 2016 will drop to 12.5. Sooner or later this number will become lower than efforts spent on block generation. Lower people engaged in mining means lower combined network power means higher applicability of 51% attack.</p> <p>Vulnerability to attack 51% is a kind of children’s disease of cryptocurrency, and the disease is deadly. When confidence in the new currency is small, generating capacity is still negligible, you can easily collect the necessary forces for the attack. Of course, no commercial benefits at this stage can not be obtained, but you can, for example, “kill a competitor.” Another scenario is an attack on a commercially successful currency for profit. However, in this case, the currency provides for commercial mining — its users use their power to generate the coveted coins. In a successful currency, this phenomenon is massive, the total generation capacity is huge. And, therefore, attack 51% becomes intractable. Thus, 51% attack carries out a kind of natural selection of cryptocurrencies in the early stages of development — only the strong survive.</p> <p>However, it can also be a problem in the future when commercial mining will come to an end. Every 4 years in the network is halving the rewards for the block. So, closer to the end of 2012, the award will be 25 PTS, and approximately by the end of 2016 already 12.5 PTS. Sooner or later, this figure will be less than the effort spent on block generation. Less people are involved in the generation, the less the capacity of the network, the more likely the attack 51%. It turns out that everyone is interested in the continuation of the network, but no one wants to generate blocks for free. The classic scenario of “tragedy of the Commons”.</p> <h2><strong>51% attack and Bitcoin</strong></h2> <p>&nbsp;So, put yourself in the place of an attacker who intended to gain control of the blockchain. Let him manage to split the chain in the above way. One of the formed branches he controls, how to make it so that the network discarded the other? This requires that the aggregate complexity of the blocks in that branch be greater than the true complexity. In practice, this means that the attacker must have more power than the rest of the network, a kind of “controlling packet” of generating capacity. Hence the name “attack of 51%”. What does a burglar get in case of luck? Control of the entire network, no more or less. The ability to carry out any transaction at its discretion. It is clear that it means the death of the currency.</p> <p>This type of attack can also take place in the Bitcoin network if for example someone will buy an entire batch of BFL ASICs and commit them all to an attack. Although there will be no profit in it. Entire Bitcoin&nbsp;capitalization&nbsp;is around $5.5 billion at the moment. If someone starts withdrawing them at once their price will drop in an order of magnitude or two. Now one just has to compare this to the price of buying the equipment needed for such an attack. Most probably the attacker will be a manufacturer of&nbsp;mining&nbsp;equipment and not a buyer. What is more profitable in the end: to blow up a goldmine and get 10% of all gold in the process or continuously sell shovels to the prospectors for several years? Almost certainly it’s the second.</p> <p>There’s also a dreamlike possibility of the appearance of fundamentally new kinds of computing equipment, for example, quantum computers. Although in this case&nbsp;the Bitcoin&nbsp;price drop will be the least of our problems. In this scenario, cryptographic resistance will be lost by most of the current encryption systems including those used by governments and banks.</p> <p>All this doesn’t mean however that a 51% attack on Bitcoin or even Litecoin is theoretically impossible.</p> <h2><strong>Solutions</strong></h2> <p>The vulnerability is fundamental, stemming from the architecture of bitcoin-like cryptocurrencies. This means that by making some changes to the process of generating blocks and confirming transactions, it can be eliminated. One example of how this can be done demonstrates the recently introduced currency of PPCoin. It implements the Proof-of-Stake principle instead of the standard Proof-of-Work principle. Its meaning is that the probability of generating a block is not affected by the generation power, but by the number of coins that the miner already has. That is, to generate 51% or more of the units must have 51% of coins, which makes the attacker the most injured member of the network. Thus, commercial hacking is excluded completely, and destructive becomes difficult and expensive, Nevertheless, the technology is very controversial and carries other dangers, such as the possibility of monopolization of the transaction process by one major holder of funds. In other words, it turns out the same Issuer-the Central Bank, voluntarily distributing the currency in the economy. Strictly speaking, ppcoin uses hybrid technology — and Proof-of-Work and Proof-of-Stake at the same time. Such a system needs to be time-tested, since removing one problem can give rise to a dozen others.</p> <p>This vulnerability is part of the lives of all involved in various cryptocurrencies. Also, this is a very likely cause of death of the young currency “standard design”, which does not have additional protection mechanisms. Moreover, this problem is fundamental and will not disappear. The night is a nightmare or a Ghost threat — everyone decides for himself.</p> <p><a href="https://en.bitcoinwiki.org/wiki/51%25_attack">Read the original full article here.</a>&nbsp;</p> </html>
json metadata{"tags":["bitcoin","cryptocurrency","crypto","blockchain","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/51.jpg","https://cryptonomad.info/wp-content/uploads/2019/08/51percentattack.png"],"links":["https://en.bitcoinwiki.org/wiki/51%25_attack"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35947874/Trx 1cd0007ba152d6cc961239544e7698f70fbfb9aa
View Raw JSON Data
{
  "trx_id": "1cd0007ba152d6cc961239544e7698f70fbfb9aa",
  "block": 35947874,
  "trx_in_block": 22,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T16:46:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "bitcoin",
      "author": "cryptonomads",
      "permlink": "51-attack",
      "title": "51% attack",
      "body": "<html>\n<p>&nbsp;<strong>51% attack</strong>&nbsp;is a term which signifies that an attacker has accumulated more computing power in his hands than all the other members of the&nbsp;network&nbsp;combined: a sort of controlling interest of generating power.</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/51.jpg\" width=\"300\" height=\"169\"/></p>\n<h2><strong>Consequences of 51% attack</strong></h2>\n<p><strong>51% attack</strong>&nbsp;vulnerability is a kind of cryptocurrency’s sickness and a terminal one at that. When a new&nbsp;cryptocurrency&nbsp;isn’t trusted it’s network’s power is poor so enough power for an attack can be accumulated easily. Of course, there’s no economic gain to be yielded at this stage but an attacker could, for example, “kill off” a rising competitor.&nbsp;</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/51percentattack.png\" width=\"300\" height=\"177\"/></p>\n<p>&nbsp;Another possible way of application is an attack on already commercially successful currency for profit. However, this case implies that the coin is commercially mined by network members who use their computing power for the generation of cherished coins. In the case of a successful currency, this means that the total network power is enormous as there’s a massive number of people who are engaged in&nbsp;the mining&nbsp;process. Thus a 51% attack becomes hard to conduct.</p>\n<p>Therefore 51% attack is a tool of a natural selection of sorts that separates the&nbsp;coins&nbsp;with high potential from all others at early stages of their existence. At the same time, it may present a problem in the future when commercial mining will come to an end. Once in every four years, the reward for a block is halved. Now, this reward equals 25 BTC per block and at the end of 2016 will drop to 12.5. Sooner or later this number will become lower than efforts spent on block generation. Lower people engaged in mining means lower combined network power means higher applicability of 51% attack.</p>\n<p>Vulnerability to attack 51% is a kind of children’s disease of cryptocurrency, and the disease is deadly. When confidence in the new currency is small, generating capacity is still negligible, you can easily collect the necessary forces for the attack. Of course, no commercial benefits at this stage can not be obtained, but you can, for example, “kill a competitor.” Another scenario is an attack on a commercially successful currency for profit. However, in this case, the currency provides for commercial mining — its users use their power to generate the coveted coins. In a successful currency, this phenomenon is massive, the total generation capacity is huge. And, therefore, attack 51% becomes intractable. Thus, 51% attack carries out a kind of natural selection of cryptocurrencies in the early stages of development — only the strong survive.</p>\n<p>However, it can also be a problem in the future when commercial mining will come to an end. Every 4 years in the network is halving the rewards for the block. So, closer to the end of 2012, the award will be 25 PTS, and approximately by the end of 2016 already 12.5 PTS. Sooner or later, this figure will be less than the effort spent on block generation. Less people are involved in the generation, the less the capacity of the network, the more likely the attack 51%. It turns out that everyone is interested in the continuation of the network, but no one wants to generate blocks for free. The classic scenario of “tragedy of the Commons”.</p>\n<h2><strong>51% attack and Bitcoin</strong></h2>\n<p>&nbsp;So, put yourself in the place of an attacker who intended to gain control of the blockchain. Let him manage to split the chain in the above way. One of the formed branches he controls, how to make it so that the network discarded the other? This requires that the aggregate complexity of the blocks in that branch be greater than the true complexity. In practice, this means that the attacker must have more power than the rest of the network, a kind of “controlling packet” of generating capacity. Hence the name “attack of 51%”. What does a burglar get in case of luck? Control of the entire network, no more or less. The ability to carry out any transaction at its discretion. It is clear that it means the death of the currency.</p>\n<p>This type of attack can also take place in the Bitcoin network if for example someone will buy an entire batch of BFL ASICs and commit them all to an attack. Although there will be no profit in it. Entire Bitcoin&nbsp;capitalization&nbsp;is around $5.5 billion at the moment. If someone starts withdrawing them at once their price will drop in an order of magnitude or two. Now one just has to compare this to the price of buying the equipment needed for such an attack. Most probably the attacker will be a manufacturer of&nbsp;mining&nbsp;equipment and not a buyer. What is more profitable in the end: to blow up a goldmine and get 10% of all gold in the process or continuously sell shovels to the prospectors for several years? Almost certainly it’s the second.</p>\n<p>There’s also a dreamlike possibility of the appearance of fundamentally new kinds of computing equipment, for example, quantum computers. Although in this case&nbsp;the Bitcoin&nbsp;price drop will be the least of our problems. In this scenario, cryptographic resistance will be lost by most of the current encryption systems including those used by governments and banks.</p>\n<p>All this doesn’t mean however that a 51% attack on Bitcoin or even Litecoin is theoretically impossible.</p>\n<h2><strong>Solutions</strong></h2>\n<p>The vulnerability is fundamental, stemming from the architecture of bitcoin-like cryptocurrencies. This means that by making some changes to the process of generating blocks and confirming transactions, it can be eliminated. One example of how this can be done demonstrates the recently introduced currency of PPCoin. It implements the Proof-of-Stake principle instead of the standard Proof-of-Work principle. Its meaning is that the probability of generating a block is not affected by the generation power, but by the number of coins that the miner already has. That is, to generate 51% or more of the units must have 51% of coins, which makes the attacker the most injured member of the network. Thus, commercial hacking is excluded completely, and destructive becomes difficult and expensive, Nevertheless, the technology is very controversial and carries other dangers, such as the possibility of monopolization of the transaction process by one major holder of funds. In other words, it turns out the same Issuer-the Central Bank, voluntarily distributing the currency in the economy. Strictly speaking, ppcoin uses hybrid technology — and Proof-of-Work and Proof-of-Stake at the same time. Such a system needs to be time-tested, since removing one problem can give rise to a dozen others.</p>\n<p>This vulnerability is part of the lives of all involved in various cryptocurrencies. Also, this is a very likely cause of death of the young currency “standard design”, which does not have additional protection mechanisms. Moreover, this problem is fundamental and will not disappear. The night is a nightmare or a Ghost threat — everyone decides for himself.</p>\n<p><a href=\"https://en.bitcoinwiki.org/wiki/51%25_attack\">Read the original full article here.</a>&nbsp;</p>\n</html>",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"cryptocurrency\",\"crypto\",\"blockchain\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/51.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/08/51percentattack.png\"],\"links\":[\"https://en.bitcoinwiki.org/wiki/51%25_attack\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 12:01:09
parent authorcryptonomads
parent permlinksilk-road
authorcheetah
permlinkcheetah-re-cryptonomadssilk-road
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://en.bitcoinwiki.org/wiki/Silk_Road
json metadata
Transaction InfoBlock #35942227/Trx 838d648d747eb26d738ac5fe3d8470332fccb545
View Raw JSON Data
{
  "trx_id": "838d648d747eb26d738ac5fe3d8470332fccb545",
  "block": 35942227,
  "trx_in_block": 27,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T12:01:09",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "silk-road",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptonomadssilk-road",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://en.bitcoinwiki.org/wiki/Silk_Road",
      "json_metadata": ""
    }
  ]
}
2019/08/28 12:01:06
votercheetah
authorcryptonomads
permlinksilk-road
weight8 (0.08%)
Transaction InfoBlock #35942226/Trx 38d0e80feb6cd08b091de3a72280420e597918ef
View Raw JSON Data
{
  "trx_id": "38d0e80feb6cd08b091de3a72280420e597918ef",
  "block": 35942226,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T12:01:06",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptonomads",
      "permlink": "silk-road",
      "weight": 8
    }
  ]
}
cryptonomadspublished a new post: silk-road
2019/08/28 12:00:48
parent author
parent permlinksilkroad
authorcryptonomads
permlinksilk-road
titleSilk Road
body<html> <p>&nbsp;<strong>Silk Road</strong>&nbsp;was an anonymous online trading platform located in the zone&nbsp;.onion&nbsp;of the anonymous tor&nbsp;network&nbsp;and worked from 2011 to 2013. Most of the products was to prove to delegate, however, recently site banned pair-the sale of raw details of bank cards, about money, children’s section, personal data, services of a killer and a weapon. The site was best known as a platform for the trade of illicit psychoactive, which are costly 70% of the goods, in addition they prove other commodities, including legal, for example, a paragraph or an electronic copy of forbidden books.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/Silk-road-logo.jpg" width="300" height="173"/></p> <h2><strong>Description</strong></h2> <p>&nbsp;Buyers and sellers conduct all monetary transactions through&nbsp;Bitcoin&nbsp;cryptocurrency, which in combination with&nbsp;Tor&nbsp;can ensure the anonymity of participants in the transaction and the inability to block payment. Buyers register on silk road for free, and sellers are required to purchase an account via an auction to reduce the risk of fraud</p> <h3><strong>History</strong></h3> <p>The website launched in February 2011; development had begun six months prior. It is held to be part of the&nbsp;Deep Web. Silk Road was operated by “Dread Pirate Roberts” (named after the fictional character from The Princess Bride), who was known for espousing libertarian ideals and criticizing regulation.</p> <p>Initially, buyers could register for free, but there were a limited number of new seller accounts available; new sellers had to purchase an account via an auction. Later, a fixed fee for each new seller account was chosen to mitigate the possibility of malicious individuals distributing tainted goods.</p> <p>On October 2, 2013, the FBI shut down Silk Road. They arrested&nbsp;Ross William Ulbricht&nbsp;on charges of alleged murder-for-hire and narcotics trafficking violation and identified him as the founder and chief operator “Dread Pirate Roberts.” On 6 November 2013 Forbes and Vice reported that Silk Road 2.0 was online and being run by former administrators of Silk Road and that a different user was now using the name, Dread Pirate Roberts.&nbsp;</p> <p><img src="https://cryptonomad.info/wp-content/uploads/2019/08/businessman-3205454_1280-1024x442.jpg" width="1024" height="442"/></p> <p>&nbsp;</p> <h3><strong>Products</strong></h3> <p>As of March 2013, the site had 10,000 products for sale by vendors, 70% were drugs that are considered contraband in most jurisdictions. 340 varieties of drugs were being sold, including heroin, LSD, and cannabis. There were also legal goods and services for sale, such as apparel, art, books, cigarettes, erotica, jewelry, and writing services. A sister site, called “The&nbsp;Armory”, sold weapons (primarily guns) during 2012 but was shut down due to a lack of demand.</p> <h3><strong>Sales</strong></h3> <p>The criminal complaint published when Ulbricht was arrested included information the FBI gained from a system image of the Silk Road server collected on 23 July 2013. It noted that, “From February 6, 2011 to July 23, 2013 there were approximately 1,229,465&nbsp;transactions&nbsp;completed on the site. The total revenue generated from these sales was 9,519,664 Bitcoins, and the total commissions collected by Silk Road from the sales amounted to 614,305 Bitcoins. These figures are equivalent to roughly $1.2 billion in revenue and $79.8 million in commissions, at current&nbsp;Bitcoin&nbsp;exchange rates…”, according to the September 2013 complaint, and involved 146,946 buyers and 3,877 vendors. According to information users provided upon registering, 30 percent were from the United States, 27 percent chose to be “undeclared,” and beyond that, in descending order of prevalence: the United Kingdom, Australia, Germany, Canada, Sweden, France, Russia, Italy, and the Netherlands.</p> <h2><strong>Interesting facts</strong></h2> <p>&nbsp;</p> <ul> <li>The total volume of transactions on the site for 2.5 years amounted to 9.5 million bitcoins, which is comparable to the total number of bitcoins at the time of closure of the site, that is, 11.75 million with about 78% of bitcoins from their total never used in any turnover. According to the FBI, this ratio between the volume of transactions on the site and the number of bitcoins may indicate that the main use of&nbsp;cryptocurrency, with the exception of speculative investments, was the purchase of illegal goods.</li> <li>The largest investors in bitcoins Winkelvoss brothers planning to launch Winkelvoss Bitcoin Trust in the United States after obtaining permission, associate the growth of the bitcoin rate (as of January 22, 2014 8 times) after the closure of Silk Road with the fact that bitcoin has ceased to be associated with the shadow market. Cameron Winkelvoss in his online interview with Reddit users gave an assessment of Silk Road’s turnover in the bitcoin economy. In his opinion, it amounted to 4&nbsp;%.</li> <li>In 2013, Forbes magazine wrote about similar small shops Atlantis and Black Market Reloaded. Currently they are both closed by their owners. Another similar shop Sheep Marketplace shut down after break-in and steal 5400 bitcoins from him.</li> <li>This website was cited at the 2011 SOPA amendment hearings as an example of the evolution of some websites into distributed networks and computer systems that cannot be blocked in a constructive way by the domain filtering method proposed in SOPA.</li> </ul> <p><a href="https://cryptonomad.info/silk-road/"><strong>Read the original full article here.</strong></a></p> </html>
json metadata{"tags":["silkroad","darknet","tor","bitcoin","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/Silk-road-logo.jpg","https://cryptonomad.info/wp-content/uploads/2019/08/businessman-3205454_1280-1024x442.jpg"],"links":["https://cryptonomad.info/silk-road/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35942220/Trx 06b0cd275a8aa9fc83b8a9d2be6b33ab21295c28
View Raw JSON Data
{
  "trx_id": "06b0cd275a8aa9fc83b8a9d2be6b33ab21295c28",
  "block": 35942220,
  "trx_in_block": 22,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T12:00:48",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "silkroad",
      "author": "cryptonomads",
      "permlink": "silk-road",
      "title": "Silk Road",
      "body": "<html>\n<p>&nbsp;<strong>Silk Road</strong>&nbsp;was an anonymous online trading platform located in the zone&nbsp;.onion&nbsp;of the anonymous tor&nbsp;network&nbsp;and worked from 2011 to 2013. Most of the products was to prove to delegate, however, recently site banned pair-the sale of raw details of bank cards, about money, children’s section, personal data, services of a killer and a weapon. The site was best known as a platform for the trade of illicit psychoactive, which are costly 70% of the goods, in addition they prove other commodities, including legal, for example, a paragraph or an electronic copy of forbidden books.</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/Silk-road-logo.jpg\" width=\"300\" height=\"173\"/></p>\n<h2><strong>Description</strong></h2>\n<p>&nbsp;Buyers and sellers conduct all monetary transactions through&nbsp;Bitcoin&nbsp;cryptocurrency, which in combination with&nbsp;Tor&nbsp;can ensure the anonymity of participants in the transaction and the inability to block payment. Buyers register on silk road for free, and sellers are required to purchase an account via an auction to reduce the risk of fraud</p>\n<h3><strong>History</strong></h3>\n<p>The website launched in February 2011; development had begun six months prior. It is held to be part of the&nbsp;Deep Web. Silk Road was operated by “Dread Pirate Roberts” (named after the fictional character from The Princess Bride), who was known for espousing libertarian ideals and criticizing regulation.</p>\n<p>Initially, buyers could register for free, but there were a limited number of new seller accounts available; new sellers had to purchase an account via an auction. Later, a fixed fee for each new seller account was chosen to mitigate the possibility of malicious individuals distributing tainted goods.</p>\n<p>On October 2, 2013, the FBI shut down Silk Road. They arrested&nbsp;Ross William Ulbricht&nbsp;on charges of alleged murder-for-hire and narcotics trafficking violation and identified him as the founder and chief operator “Dread Pirate Roberts.” On 6 November 2013 Forbes and Vice reported that Silk Road 2.0 was online and being run by former administrators of Silk Road and that a different user was now using the name, Dread Pirate Roberts.&nbsp;</p>\n<p><img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/businessman-3205454_1280-1024x442.jpg\" width=\"1024\" height=\"442\"/></p>\n<p>&nbsp;</p>\n<h3><strong>Products</strong></h3>\n<p>As of March 2013, the site had 10,000 products for sale by vendors, 70% were drugs that are considered contraband in most jurisdictions. 340 varieties of drugs were being sold, including heroin, LSD, and cannabis. There were also legal goods and services for sale, such as apparel, art, books, cigarettes, erotica, jewelry, and writing services. A sister site, called “The&nbsp;Armory”, sold weapons (primarily guns) during 2012 but was shut down due to a lack of demand.</p>\n<h3><strong>Sales</strong></h3>\n<p>The criminal complaint published when Ulbricht was arrested included information the FBI gained from a system image of the Silk Road server collected on 23 July 2013. It noted that, “From February 6, 2011 to July 23, 2013 there were approximately 1,229,465&nbsp;transactions&nbsp;completed on the site. The total revenue generated from these sales was 9,519,664 Bitcoins, and the total commissions collected by Silk Road from the sales amounted to 614,305 Bitcoins. These figures are equivalent to roughly $1.2 billion in revenue and $79.8 million in commissions, at current&nbsp;Bitcoin&nbsp;exchange rates…”, according to the September 2013 complaint, and involved 146,946 buyers and 3,877 vendors. According to information users provided upon registering, 30 percent were from the United States, 27 percent chose to be “undeclared,” and beyond that, in descending order of prevalence: the United Kingdom, Australia, Germany, Canada, Sweden, France, Russia, Italy, and the Netherlands.</p>\n<h2><strong>Interesting facts</strong></h2>\n<p>&nbsp;</p>\n<ul>\n  <li>The total volume of transactions on the site for 2.5 years amounted to 9.5 million bitcoins, which is comparable to the total number of bitcoins at the time of closure of the site, that is, 11.75 million with about 78% of bitcoins from their total never used in any turnover. According to the FBI, this ratio between the volume of transactions on the site and the number of bitcoins may indicate that the main use of&nbsp;cryptocurrency, with the exception of speculative investments, was the purchase of illegal goods.</li>\n  <li>The largest investors in bitcoins Winkelvoss brothers planning to launch Winkelvoss Bitcoin Trust in the United States after obtaining permission, associate the growth of the bitcoin rate (as of January 22, 2014 8 times) after the closure of Silk Road with the fact that bitcoin has ceased to be associated with the shadow market. Cameron Winkelvoss in his online interview with Reddit users gave an assessment of Silk Road’s turnover in the bitcoin economy. In his opinion, it amounted to 4&nbsp;%.</li>\n  <li>In 2013, Forbes magazine wrote about similar small shops Atlantis and Black Market Reloaded. Currently they are both closed by their owners. Another similar shop Sheep Marketplace shut down after break-in and steal 5400 bitcoins from him.</li>\n  <li>This website was cited at the 2011 SOPA amendment hearings as an example of the evolution of some websites into distributed networks and computer systems that cannot be blocked in a constructive way by the domain filtering method proposed in SOPA.</li>\n</ul>\n<p><a href=\"https://cryptonomad.info/silk-road/\"><strong>Read the original full article here.</strong></a></p>\n</html>",
      "json_metadata": "{\"tags\":[\"silkroad\",\"darknet\",\"tor\",\"bitcoin\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/Silk-road-logo.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/08/businessman-3205454_1280-1024x442.jpg\"],\"links\":[\"https://cryptonomad.info/silk-road/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 11:54:33
parent authorcryptonomads
parent permlinktor
authorcheetah
permlinkcheetah-re-cryptonomadstor
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://en.bitcoin.it/wiki/Tor
json metadata
Transaction InfoBlock #35942099/Trx 25a1924c1e1dc805405984ecedcff3b6474d2253
View Raw JSON Data
{
  "trx_id": "25a1924c1e1dc805405984ecedcff3b6474d2253",
  "block": 35942099,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:54:33",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "tor",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptonomadstor",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://en.bitcoin.it/wiki/Tor",
      "json_metadata": ""
    }
  ]
}
cheetahupvoted (0.08%) @cryptonomads / tor
2019/08/28 11:54:30
votercheetah
authorcryptonomads
permlinktor
weight8 (0.08%)
Transaction InfoBlock #35942098/Trx a0d76e031fb0252291789a7386b75b2e8fc9227a
View Raw JSON Data
{
  "trx_id": "a0d76e031fb0252291789a7386b75b2e8fc9227a",
  "block": 35942098,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:54:30",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptonomads",
      "permlink": "tor",
      "weight": 8
    }
  ]
}
cryptonomadspublished a new post: tor
2019/08/28 11:54:09
parent author
parent permlinkanonym
authorcryptonomads
permlinktor
titleTor
body<html> <p>&nbsp;<a href="https://www.torproject.org/"><strong>Tor</strong></a>&nbsp;is a distributed ‘onion’ network, that makes it more difficult for an adversary to track any one peer on the&nbsp;network. Tor also is very useful to access the ‘uncensored’ internet in countries such as China and Iran. Preserving&nbsp;privacy&nbsp;means not only hiding the content of messages, but also hiding who is talking to whom (traffic analysis). Tor provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/370px-Tor-logo-2011-flat.svg_.png" width="370" height="224"/></p> <p>Bitcoin&nbsp;can run easily on the Tor network.</p> <h2><strong>Description</strong></h2> <p>&nbsp;</p> <h3><strong>Tor installation &amp; use</strong></h3> <p><em>todo explain: onion routing (how tor network helps to anonymize), encryption used, exit nodes, routers</em>.Please follow the instructions provided with installation files and read the&nbsp;<a href="http://www.torproject.org/download/download.html.en#warning">list of warnings</a>.&nbsp;<em>Tor doesn’t magically anonymize all your traffic just because you install it.</em>&nbsp;Down the page you can find examples how to configure applications to use Tor to anonymize the origin of your traffic. This is a detailed installation guide for Windows. Before you setup Bitcoin or mIRC to use Tor, please install Tor and start in. On the taskbar of your compute you’ll see a small green onion when Tor is running.</p> <h3><strong>GUI</strong></h3> <p>Once you have your Tor client up &amp; running, you can configure your Bitcoin client to use it. Select in menu Settings -&gt; OptionsCheck “Connect through socks 4 proxy” with the address 127.0.0.1 and port 9050 (the Tor default port number). Configuring an application to use Tor is also called to torify it.&nbsp;<em>the note about bitcoin-otc promote on a more appropriate place in this page? reference to trading and IRC</em>.Conducting business using&nbsp;Bitcoin-OTC&nbsp;can be done more anonymously when directly connected to a Freenode IRC hidden service.</p> <h3><strong>bitcoind</strong></h3> <p>Run&nbsp;Bitcoind&nbsp;with -proxy=127.0.0.1:9050 (or whatever your SocksPort is).bitcoind will detect that you are using a proxy on 9050 and will force the “nolisten” flag. If you are not running tor on 9050, you need to set “nolisten” manually otherwise you will listen on your public IP and possibly reveal that you are running a node.</p> <h3><strong>Hidden services</strong></h3> <p>These services are running within the tor network. You can connect to them, for example, using the -connect= parameter to bitcoind. Note that you do not need to use them – tor can also anonymize your normal internet traffic, including bitcoin connections. There are some technical reasons why hidden services may be beneficial, see the tor documentation if you’re really interested.Services are listed at Tor network along with instructions for using them.</p> <h3><strong>Pooled Mining</strong></h3> <p>Some&nbsp;mining&nbsp;pools are available as a hidden service on the tor network. Any pool can be reached over tor. The general methodology here is to tell your mining client to use your local Tor proxy. This is client-specific but there are some helpful hints.</p> <h3><strong>Linux / BSD</strong></h3> <p>Any client can have its traffic routed via Tor by using the torify command and invoking the miner with that. Another method is to set the http_proxy environment variable as some miners use libraries which support that.</p> <h3><strong>Windows / OS X</strong></h3> <p>It is possible to set the http_proxy environment variable as some miners use libraries which support that.</p> <h3><strong>mIRC</strong></h3> <p>mIRC is a popular&nbsp;IRC&nbsp;client. This is a guide how to connect to Freenode IRC using Tor + SASL + mIRC.</p> <h3><strong>Register your nick with freenode nickserv</strong></h3> <p>Freenode only allows SASL authenticated users to connect to the onion IRC server. SASL authentication works only with a registered nickname. Connect to Freenode IRC without using tor &amp; execute /msg nickserv register &lt;password&gt; &lt;email&gt;You will see something like this -NickServ- An email containing nickname activation instructions has been sent to &lt;email&gt; -NickServ- If you do not complete registration within one day, your nickname will expire.To finish your nick registration go the provided email and copy/paste the command from e-mail to irc.</p> <h3><strong>Add SASL support to your mIRC installation</strong></h3> <p>Download the SASL.dll and sasl.mrc files and copy them to your mIRC installation directory Load sasl.mrc script (Alt + R to open script editor, Ctrl + L to load file, browse to sasl.mrc, press OK or “save &amp; exit”).Type /dialog -m SASL.main SASL.main to open the SASL connection manager.Add Freenode entry.Network is Freenode. Username and NS Password must match your nickserv reservation. Auth Type can be PLAIN&nbsp;</p> <p><img src="https://cryptonomad.info/wp-content/uploads/2019/08/darknet-3588402_1280-1024x576.jpg" width="1024" height="576"/></p> <p>&nbsp;</p> <h2><strong>setup mIRC to use Tor</strong></h2> <p>Add the entry for Freenode onion IRC serverConfigure mIRC to use a Proxy (your local Tor proxy)Now you should be able to connect.&nbsp;<a href="https://www.bitcointalk.org/index.php?topic=2602">Bitcoin forum where this topic is discussed</a></p> <h2><strong>How Tor works</strong></h2> <p>Unlike Freenet, I2P, etc., Tor’s&nbsp;security&nbsp;is very well-defined. While weaknesses do exist (described below), they have been known since Tor was created, and new weaknesses of significance are not expected.Tor sends TCP packets over 3 (normal) or 7 (hidden services) Tor relays. This is why it is so slow: your packet might have to go through 100 computers (counting Internet routers) before it reaches its destination. Tor uses multiple&nbsp;<em>layers</em>&nbsp;of encryption that are&nbsp;<em>pulled away</em>&nbsp;for each&nbsp;node. Hence the name&nbsp;<strong>T</strong>he&nbsp;<strong>O</strong>nion&nbsp;<strong>R</strong>outer, which is always capitalized as&nbsp;<strong>Tor</strong>, and never TOR or t.o.r.Say that I want to connect to&nbsp;Bitcoin.org&nbsp;through Tor. I first select three Tor relays that I know about. Then, I send a message to my ISP that looks like this:</p> <pre><code>Send to this IP: &lt;IP of Relay1&gt;<br> &lt;Encrypted data for Relay1&gt;<br> </code></pre> <p>When Relay1 receives this, he decrypts the payload using his private key. The payload contains this:</p> <pre><code>Send to this Tor node: &lt;Relay2&gt;<br> &lt;Encrypted data for Relay2&gt;<br> </code></pre> <p>Relay2 decrypts his payload:</p> <pre><code>Send to this Tor node: &lt;Relay3&gt;<br> &lt;Encrypted data for Relay3&gt;<br> </code></pre> <p>Relay3 receives the&nbsp;real&nbsp;TCP payload, which he sends to the destination:</p> <pre><code>Send to this IP: &lt;IP of destination&gt;<br> &lt;Unencrypted payload&gt;</code></pre> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/protest-2265287_640.jpg" width="640" height="400"/></p> <p>&nbsp;The payload is not and can not be further encrypted by Tor. However, if the protocol itself uses encryption (HTTPS, SSH, etc.), the data will be encrypted. This means that the last node (the&nbsp;<em>exit node</em>) can see everything you do on HTTP sites, and can steal your passwords if they are transmitted unencrypted. Many people become exit nodes just so they can view this information — Tor is much more dangerous than open WiFi for snooping!The encryption arrangement described above ensures that no single Tor node&nbsp;<a href="https://en.bitcoinwiki.org/wiki/KNOWS">knows</a>&nbsp;both the sender and the destination. Relay1 and your ISP know that you are using Tor and sending a packet at a certain time, but they don’t know what you’re sending or who you’re sending to. Relay3 knows exactly what you’re sending, but he can’t determine who is sending it because Relay2 and Relay1 are blocking him. All three relays need to work together in order to conclusively connect the sender and the destination.However, Tor is weak to a&nbsp;<em>timing attack</em>&nbsp;that allows only two participants in certain positions to determine the sender with high accuracy. Consider this Tor connection:</p> <pre><code>Sender &lt;-&gt; S-ISP &lt;-&gt; Relay1 &lt;-&gt; Relay2 &lt;-&gt; Relay3 &lt;-&gt; D-ISP &lt;-&gt; Destination<br> </code></pre> <p>If the sender’s ISP (S-ISP) and the destination are working together, they can record the size and times of packets sent and received. Over a large number of packets, they can determine with very high accuracy that the sender is, in fact, the person sending packets to the destination. This requires active surveillance or detailed logging by both sides. Relay1 can also perform the same role as S-ISP.Additionally, more configurations are possible if the underlying connection is not encrypted (normal HTTP, for example):</p> <ul> <li>S-ISP &amp; Relay3</li> <li>Relay1 &amp; Relay3</li> <li>S-ISP &amp; D-ISP</li> <li>Relay1 &amp; D-ISP</li> </ul> <p>This second set can always see that the sender is connected to the destination, but they can only see what the sender is doing on the site if the connection is not encrypted. (Pathnames are encrypted in HTTPS.)&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/v-for-vendetta-2855606_640.jpg" width="427" height="640"/></p> <p>&nbsp;Because the first relay (the&nbsp;<em>entry node</em>) is a weak point in the connection, Tor takes certain defensive measures. When you first start Tor, it chooses three&nbsp;<em>entry guards</em>&nbsp;that don’t change for the entire time that you run Tor. You will always use one of those three unless one goes down. If all of those nodes are safe and your ISP is safe, then you are OK.These timing attacks are of special importance to Bitcoin because anyone can be the “destination” in a connection. Packets are broadcast to every peer in the Bitcoin network. This might allow your ISP alone to associate your transactions to you without much&nbsp;difficulty. However, a timing attack relies on receiving at least several dozen packets from the sender, so the “destination” might actually have to be one of your direct Bitcoin peers. It’s not too difficult to flood the Bitcoin network with peers, though. Because of this attack, it is wise to use an&nbsp;EWallet&nbsp;instead of the Bitcoin client when using Tor.To discover Tor relays, Tor uses a centralized directory server model. There are nine authoritative directory servers. To become a relay, you register with one of these. The directory servers share their data and produce a&nbsp;<em>network&nbsp;status&nbsp;consensus</em>&nbsp;document every so often containing all Tor nodes. Tor clients don’t connect directly to the authoritative directory servers — they connect to one of many&nbsp;<em>directory mirrors</em>, which have a copy of the network status consensus. Since there is no peer-to-peer bootstrap mechanism in Tor, the entire network can be destroyed if half of the authoritative directory servers are destroyed, and the entire network can be subverted if half of the authoritative directory servers become evil.Hidden services allow both the sender and destination to remain anonymous. A&nbsp;hidden service&nbsp;connection is made like this:</p> <ul> <li>The destination tells several Tor relays to act as&nbsp;<em>introduction points</em>&nbsp;for the hidden service. The destination stays connected to all of these introduction points through a regular three-node Tor circuit.</li> <li>The destination registers these introduction points on a Tor DHT. The introduction points are associated with the first 16 characters of an encoded SHA-1&nbsp;hash&nbsp;of the destination’s key. This is the information in&nbsp;.onion&nbsp;addresses. The use of&nbsp;SHA-1&nbsp;is a possible weakness.</li> <li>The sender creates a four-node Tor circuit. The fourth node is called the&nbsp;<em>rendezvous point</em>.</li> <li>The sender searches the DHT for the introduction points of the desired hidden service. The sender connects to one through a regular three-node Tor circuit and, through the introduction point, tells the destination about the rendezvous point he has chosen.</li> <li>The destination connects to the rendezvous point over a three-node Tor circuit. The sender and destination are now in contact over a seven-node connection.</li> </ul> <p>For clients, hidden services are more secure than encrypted Tor HTTPS connections because:</p> <ul> <li>If the destination remains anonymous, they are less likely to become controlled by an evil party.</li> <li>The destination’s ISP isn’t involved as they are in the HTTPS case. Only these configurations are possible for a timing attack: <ul> <li>S-ISP &amp; Destination</li> <li>Relay1 &amp; Destination</li> </ul> </li> </ul> <p>Running a hidden service is more dangerous, however. A simple intersection attack can be performed by the hidden service’s ISP alone:</p> <ul> <li>Your Internet service is cut off.</li> <li>If the hidden service went down at that exact moment, you are unmasked.</li> </ul> <p>The same sort of timing attacks as above are also possible.See the&nbsp;<a href="http://www.usenix.org/events/sec04/tech/full_papers/dingledine/dingledine_html/index.html">Tor design paper</a>&nbsp;for more info.</p> <h2><strong>Exchange Restrictions</strong></h2> <p>Some&nbsp;exchanges&nbsp;will treat activity occurring through Tor with greater precautions. For instance, the now-defunct Mt. Gox signup sheet read:Please be advised that accessing your account via the Tor network and/or public proxies may result in a temporary suspension of your account, and having to submit AML documents.&nbsp;</p> <p><a href="https://cryptonomad.info/tor/"><strong>&nbsp;Read the original full article here.</strong></a><br> &nbsp;</p> </html>
json metadata{"tags":["anonym","anonymous","tor","browser","darknet"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/370px-Tor-logo-2011-flat.svg_.png","https://cryptonomad.info/wp-content/uploads/2019/08/darknet-3588402_1280-1024x576.jpg","https://cryptonomad.info/wp-content/uploads/2019/08/protest-2265287_640.jpg","https://cryptonomad.info/wp-content/uploads/2019/08/v-for-vendetta-2855606_640.jpg"],"links":["https://www.torproject.org/","http://www.torproject.org/download/download.html.en#warning","https://www.bitcointalk.org/index.php?topic=2602","https://en.bitcoinwiki.org/wiki/KNOWS","http://www.usenix.org/events/sec04/tech/full_papers/dingledine/dingledine_html/index.html","https://cryptonomad.info/tor/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35942091/Trx aeb621194983ce97e6a40fee6df989a5d7da6215
View Raw JSON Data
{
  "trx_id": "aeb621194983ce97e6a40fee6df989a5d7da6215",
  "block": 35942091,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:54:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "anonym",
      "author": "cryptonomads",
      "permlink": "tor",
      "title": "Tor",
      "body": "<html>\n<p>&nbsp;<a href=\"https://www.torproject.org/\"><strong>Tor</strong></a>&nbsp;is a distributed ‘onion’ network, that makes it more difficult for an adversary to track any one peer on the&nbsp;network. Tor also is very useful to access the ‘uncensored’ internet in countries such as China and Iran. Preserving&nbsp;privacy&nbsp;means not only hiding the content of messages, but also hiding who is talking to whom (traffic analysis). Tor provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis.</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/370px-Tor-logo-2011-flat.svg_.png\" width=\"370\" height=\"224\"/></p>\n<p>Bitcoin&nbsp;can run easily on the Tor network.</p>\n<h2><strong>Description</strong></h2>\n<p>&nbsp;</p>\n<h3><strong>Tor installation &amp; use</strong></h3>\n<p><em>todo explain: onion routing (how tor network helps to anonymize), encryption used, exit nodes, routers</em>.Please follow the instructions provided with installation files and read the&nbsp;<a href=\"http://www.torproject.org/download/download.html.en#warning\">list of warnings</a>.&nbsp;<em>Tor doesn’t magically anonymize all your traffic just because you install it.</em>&nbsp;Down the page you can find examples how to configure applications to use Tor to anonymize the origin of your traffic. This is a detailed installation guide for Windows. Before you setup Bitcoin or mIRC to use Tor, please install Tor and start in. On the taskbar of your compute you’ll see a small green onion when Tor is running.</p>\n<h3><strong>GUI</strong></h3>\n<p>Once you have your Tor client up &amp; running, you can configure your Bitcoin client to use it. Select in menu Settings -&gt; OptionsCheck “Connect through socks 4 proxy” with the address 127.0.0.1 and port 9050 (the Tor default port number). Configuring an application to use Tor is also called to torify it.&nbsp;<em>the note about bitcoin-otc promote on a more appropriate place in this page? reference to trading and IRC</em>.Conducting business using&nbsp;Bitcoin-OTC&nbsp;can be done more anonymously when directly connected to a Freenode IRC hidden service.</p>\n<h3><strong>bitcoind</strong></h3>\n<p>Run&nbsp;Bitcoind&nbsp;with -proxy=127.0.0.1:9050 (or whatever your SocksPort is).bitcoind will detect that you are using a proxy on 9050 and will force the “nolisten” flag. If you are not running tor on 9050, you need to set “nolisten” manually otherwise you will listen on your public IP and possibly reveal that you are running a node.</p>\n<h3><strong>Hidden services</strong></h3>\n<p>These services are running within the tor network. You can connect to them, for example, using the -connect= parameter to bitcoind. Note that you do not need to use them – tor can also anonymize your normal internet traffic, including bitcoin connections. There are some technical reasons why hidden services may be beneficial, see the tor documentation if you’re really interested.Services are listed at Tor network along with instructions for using them.</p>\n<h3><strong>Pooled Mining</strong></h3>\n<p>Some&nbsp;mining&nbsp;pools are available as a hidden service on the tor network. Any pool can be reached over tor. The general methodology here is to tell your mining client to use your local Tor proxy. This is client-specific but there are some helpful hints.</p>\n<h3><strong>Linux / BSD</strong></h3>\n<p>Any client can have its traffic routed via Tor by using the torify command and invoking the miner with that. Another method is to set the http_proxy environment variable as some miners use libraries which support that.</p>\n<h3><strong>Windows / OS X</strong></h3>\n<p>It is possible to set the http_proxy environment variable as some miners use libraries which support that.</p>\n<h3><strong>mIRC</strong></h3>\n<p>mIRC is a popular&nbsp;IRC&nbsp;client. This is a guide how to connect to Freenode IRC using Tor + SASL + mIRC.</p>\n<h3><strong>Register your nick with freenode nickserv</strong></h3>\n<p>Freenode only allows SASL authenticated users to connect to the onion IRC server. SASL authentication works only with a registered nickname. Connect to Freenode IRC without using tor &amp; execute /msg nickserv register &lt;password&gt; &lt;email&gt;You will see something like this -NickServ- An email containing nickname activation instructions has been sent to &lt;email&gt; -NickServ- If you do not complete registration within one day, your nickname will expire.To finish your nick registration go the provided email and copy/paste the command from e-mail to irc.</p>\n<h3><strong>Add SASL support to your mIRC installation</strong></h3>\n<p>Download the SASL.dll and sasl.mrc files and copy them to your mIRC installation directory Load sasl.mrc script (Alt + R to open script editor, Ctrl + L to load file, browse to sasl.mrc, press OK or “save &amp; exit”).Type /dialog -m SASL.main SASL.main to open the SASL connection manager.Add Freenode entry.Network is Freenode. Username and NS Password must match your nickserv reservation. Auth Type can be PLAIN&nbsp;</p>\n<p><img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/darknet-3588402_1280-1024x576.jpg\" width=\"1024\" height=\"576\"/></p>\n<p>&nbsp;</p>\n<h2><strong>setup mIRC to use Tor</strong></h2>\n<p>Add the entry for Freenode onion IRC serverConfigure mIRC to use a Proxy (your local Tor proxy)Now you should be able to connect.&nbsp;<a href=\"https://www.bitcointalk.org/index.php?topic=2602\">Bitcoin forum where this topic is discussed</a></p>\n<h2><strong>How Tor works</strong></h2>\n<p>Unlike Freenet, I2P, etc., Tor’s&nbsp;security&nbsp;is very well-defined. While weaknesses do exist (described below), they have been known since Tor was created, and new weaknesses of significance are not expected.Tor sends TCP packets over 3 (normal) or 7 (hidden services) Tor relays. This is why it is so slow: your packet might have to go through 100 computers (counting Internet routers) before it reaches its destination. Tor uses multiple&nbsp;<em>layers</em>&nbsp;of encryption that are&nbsp;<em>pulled away</em>&nbsp;for each&nbsp;node. Hence the name&nbsp;<strong>T</strong>he&nbsp;<strong>O</strong>nion&nbsp;<strong>R</strong>outer, which is always capitalized as&nbsp;<strong>Tor</strong>, and never TOR or t.o.r.Say that I want to connect to&nbsp;Bitcoin.org&nbsp;through Tor. I first select three Tor relays that I know about. Then, I send a message to my ISP that looks like this:</p>\n<pre><code>Send to this IP: &lt;IP of Relay1&gt;<br>\n&lt;Encrypted data for Relay1&gt;<br>\n</code></pre>\n<p>When Relay1 receives this, he decrypts the payload using his private key. The payload contains this:</p>\n<pre><code>Send to this Tor node: &lt;Relay2&gt;<br>\n&lt;Encrypted data for Relay2&gt;<br>\n</code></pre>\n<p>Relay2 decrypts his payload:</p>\n<pre><code>Send to this Tor node: &lt;Relay3&gt;<br>\n&lt;Encrypted data for Relay3&gt;<br>\n</code></pre>\n<p>Relay3 receives the&nbsp;real&nbsp;TCP payload, which he sends to the destination:</p>\n<pre><code>Send to this IP: &lt;IP of destination&gt;<br>\n&lt;Unencrypted payload&gt;</code></pre>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/protest-2265287_640.jpg\" width=\"640\" height=\"400\"/></p>\n<p>&nbsp;The payload is not and can not be further encrypted by Tor. However, if the protocol itself uses encryption (HTTPS, SSH, etc.), the data will be encrypted. This means that the last node (the&nbsp;<em>exit node</em>) can see everything you do on HTTP sites, and can steal your passwords if they are transmitted unencrypted. Many people become exit nodes just so they can view this information — Tor is much more dangerous than open WiFi for snooping!The encryption arrangement described above ensures that no single Tor node&nbsp;<a href=\"https://en.bitcoinwiki.org/wiki/KNOWS\">knows</a>&nbsp;both the sender and the destination. Relay1 and your ISP know that you are using Tor and sending a packet at a certain time, but they don’t know what you’re sending or who you’re sending to. Relay3 knows exactly what you’re sending, but he can’t determine who is sending it because Relay2 and Relay1 are blocking him. All three relays need to work together in order to conclusively connect the sender and the destination.However, Tor is weak to a&nbsp;<em>timing attack</em>&nbsp;that allows only two participants in certain positions to determine the sender with high accuracy. Consider this Tor connection:</p>\n<pre><code>Sender &lt;-&gt; S-ISP &lt;-&gt; Relay1 &lt;-&gt; Relay2 &lt;-&gt; Relay3 &lt;-&gt; D-ISP &lt;-&gt; Destination<br>\n</code></pre>\n<p>If the sender’s ISP (S-ISP) and the destination are working together, they can record the size and times of packets sent and received. Over a large number of packets, they can determine with very high accuracy that the sender is, in fact, the person sending packets to the destination. This requires active surveillance or detailed logging by both sides. Relay1 can also perform the same role as S-ISP.Additionally, more configurations are possible if the underlying connection is not encrypted (normal HTTP, for example):</p>\n<ul>\n  <li>S-ISP &amp; Relay3</li>\n  <li>Relay1 &amp; Relay3</li>\n  <li>S-ISP &amp; D-ISP</li>\n  <li>Relay1 &amp; D-ISP</li>\n</ul>\n<p>This second set can always see that the sender is connected to the destination, but they can only see what the sender is doing on the site if the connection is not encrypted. (Pathnames are encrypted in HTTPS.)&nbsp;</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/v-for-vendetta-2855606_640.jpg\" width=\"427\" height=\"640\"/></p>\n<p>&nbsp;Because the first relay (the&nbsp;<em>entry node</em>) is a weak point in the connection, Tor takes certain defensive measures. When you first start Tor, it chooses three&nbsp;<em>entry guards</em>&nbsp;that don’t change for the entire time that you run Tor. You will always use one of those three unless one goes down. If all of those nodes are safe and your ISP is safe, then you are OK.These timing attacks are of special importance to Bitcoin because anyone can be the “destination” in a connection. Packets are broadcast to every peer in the Bitcoin network. This might allow your ISP alone to associate your transactions to you without much&nbsp;difficulty. However, a timing attack relies on receiving at least several dozen packets from the sender, so the “destination” might actually have to be one of your direct Bitcoin peers. It’s not too difficult to flood the Bitcoin network with peers, though. Because of this attack, it is wise to use an&nbsp;EWallet&nbsp;instead of the Bitcoin client when using Tor.To discover Tor relays, Tor uses a centralized directory server model. There are nine authoritative directory servers. To become a relay, you register with one of these. The directory servers share their data and produce a&nbsp;<em>network&nbsp;status&nbsp;consensus</em>&nbsp;document every so often containing all Tor nodes. Tor clients don’t connect directly to the authoritative directory servers — they connect to one of many&nbsp;<em>directory mirrors</em>, which have a copy of the network status consensus. Since there is no peer-to-peer bootstrap mechanism in Tor, the entire network can be destroyed if half of the authoritative directory servers are destroyed, and the entire network can be subverted if half of the authoritative directory servers become evil.Hidden services allow both the sender and destination to remain anonymous. A&nbsp;hidden service&nbsp;connection is made like this:</p>\n<ul>\n  <li>The destination tells several Tor relays to act as&nbsp;<em>introduction points</em>&nbsp;for the hidden service. The destination stays connected to all of these introduction points through a regular three-node Tor circuit.</li>\n  <li>The destination registers these introduction points on a Tor DHT. The introduction points are associated with the first 16 characters of an encoded SHA-1&nbsp;hash&nbsp;of the destination’s key. This is the information in&nbsp;.onion&nbsp;addresses. The use of&nbsp;SHA-1&nbsp;is a possible weakness.</li>\n  <li>The sender creates a four-node Tor circuit. The fourth node is called the&nbsp;<em>rendezvous point</em>.</li>\n  <li>The sender searches the DHT for the introduction points of the desired hidden service. The sender connects to one through a regular three-node Tor circuit and, through the introduction point, tells the destination about the rendezvous point he has chosen.</li>\n  <li>The destination connects to the rendezvous point over a three-node Tor circuit. The sender and destination are now in contact over a seven-node connection.</li>\n</ul>\n<p>For clients, hidden services are more secure than encrypted Tor HTTPS connections because:</p>\n<ul>\n  <li>If the destination remains anonymous, they are less likely to become controlled by an evil party.</li>\n  <li>The destination’s ISP isn’t involved as they are in the HTTPS case. Only these configurations are possible for a timing attack:\n    <ul>\n      <li>S-ISP &amp; Destination</li>\n      <li>Relay1 &amp; Destination</li>\n    </ul>\n  </li>\n</ul>\n<p>Running a hidden service is more dangerous, however. A simple intersection attack can be performed by the hidden service’s ISP alone:</p>\n<ul>\n  <li>Your Internet service is cut off.</li>\n  <li>If the hidden service went down at that exact moment, you are unmasked.</li>\n</ul>\n<p>The same sort of timing attacks as above are also possible.See the&nbsp;<a href=\"http://www.usenix.org/events/sec04/tech/full_papers/dingledine/dingledine_html/index.html\">Tor design paper</a>&nbsp;for more info.</p>\n<h2><strong>Exchange Restrictions</strong></h2>\n<p>Some&nbsp;exchanges&nbsp;will treat activity occurring through Tor with greater precautions. For instance, the now-defunct Mt. Gox signup sheet read:Please be advised that accessing your account via the Tor network and/or public proxies may result in a temporary suspension of your account, and having to submit AML documents.&nbsp;</p>\n<p><a href=\"https://cryptonomad.info/tor/\"><strong>&nbsp;Read the original full article here.</strong></a><br>\n&nbsp;</p>\n</html>",
      "json_metadata": "{\"tags\":[\"anonym\",\"anonymous\",\"tor\",\"browser\",\"darknet\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/370px-Tor-logo-2011-flat.svg_.png\",\"https://cryptonomad.info/wp-content/uploads/2019/08/darknet-3588402_1280-1024x576.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/08/protest-2265287_640.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/08/v-for-vendetta-2855606_640.jpg\"],\"links\":[\"https://www.torproject.org/\",\"http://www.torproject.org/download/download.html.en#warning\",\"https://www.bitcointalk.org/index.php?topic=2602\",\"https://en.bitcoinwiki.org/wiki/KNOWS\",\"http://www.usenix.org/events/sec04/tech/full_papers/dingledine/dingledine_html/index.html\",\"https://cryptonomad.info/tor/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 11:49:18
parent authorcryptonomads
parent permlinkzerocoin
authorcheetah
permlinkcheetah-re-cryptonomadszerocoin
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://en.bitcoinwiki.org/wiki/Zerocoin
json metadata
Transaction InfoBlock #35941994/Trx 13c2d1d5adc60575bba85b010b8670f72044d9f3
View Raw JSON Data
{
  "trx_id": "13c2d1d5adc60575bba85b010b8670f72044d9f3",
  "block": 35941994,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:49:18",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "zerocoin",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptonomadszerocoin",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://en.bitcoinwiki.org/wiki/Zerocoin",
      "json_metadata": ""
    }
  ]
}
cheetahupvoted (0.08%) @cryptonomads / zerocoin
2019/08/28 11:49:15
votercheetah
authorcryptonomads
permlinkzerocoin
weight8 (0.08%)
Transaction InfoBlock #35941993/Trx 100aa9536e03bc0168fb699b3c1b57a46b5fbd85
View Raw JSON Data
{
  "trx_id": "100aa9536e03bc0168fb699b3c1b57a46b5fbd85",
  "block": 35941993,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:49:15",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptonomads",
      "permlink": "zerocoin",
      "weight": 8
    }
  ]
}
cryptonomadspublished a new post: zerocoin
2019/08/28 11:48:57
parent author
parent permlinkbitcoin
authorcryptonomads
permlinkzerocoin
titleZerocoin
body<html> <p>&nbsp;<a href="http://zerocoin.org/"><strong>Zerocoin</strong></a>&nbsp;is a cryptocurrency proposed by Johns Hopkins University professor Matthew D. Green and graduate students Ian Miers and Christina Garman as an extension to the&nbsp;bitcoin protocol&nbsp;that would add true <a href="https://cryptonomad.info/cryptography/">cryptographic&nbsp;</a>anonymity&nbsp;to <a href="https://cryptonomad.info/bitcoin/">bitcoin</a>transactions. Zerocoin was first implemented into a fully functional <a href="https://cryptonomad.info/">cryptocurrency</a> released to the public by Poramin Insom, as the Zcoin. Zerocoin provides anonymity by the introduction of a separate&nbsp;<a href="https://cryptonomad.info/mixing-service/">mixing service</a>&nbsp;known as&nbsp;<em>zerocoin</em>&nbsp;that is stored in the bitcoin <a href="https://cryptonomad.info/blockchain/">blockchain</a>. Though originally proposed for use with the bitcoin network, zerocoin could be integrated into any&nbsp;<a href="https://cryptonomad.info/">cryptocurrency</a>.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/Zerocoin.png" width="500" height="167"/></p> <h2><strong>Description</strong></h2> <p><a href="https://cryptonomad.info/bitcoin-transaction/">Bitcoin transactions</a> are all stored, by design, in a public ledger (the blockchain) that is accessible to everyone. These transactions provide privacy through&nbsp;pseudonymity, in that while each transaction is associated with the public address of the sender and receiver, the names of the owners of these addresses are at no time made known to the bitcoin network. To increase privacy, each person could create as many public addresses as they like, making it difficult to link transactions to the same person. If additional privacy were required, it is possible to&nbsp;launder&nbsp;bitcoin through a trusted third party, where the input coins are mixed in a large pool and output to a new address.</p> <p>Regardless of the best precautions, by data <a href="https://cryptonomad.info/crypto-mining/">mining</a> of the&nbsp;blockchain, it becomes possible in certain cases to link a set of public addresses to a specific (unnamed) individual. For example, this could be done by the analysis of spending habits, or by having the change of a transaction from one public address being sent to another. Furthermore, by utilizing information external to the blockchain, such as public bitcoin addresses posted on a web site, or the postal address used with a bitcoin purchase, the possibility exists that every single bitcoin transaction of a given person could be determined.</p> <p>Zerocoins are purchased with bitcoin in fixed denominations by a zerocoin mint transaction. Later, these zerocoins can be redeemed for bitcoin to a different bitcoin address by a zerocoin spend transaction. Through the use of cryptographic accumulators and digital commitments with zero-knowledge proofs, it is not possible to link the&nbsp;<a href="https://cryptonomad.info/bitcoin-address/">bitcoin address</a>&nbsp;that was used to mint the original zerocoin to the <a href="https://cryptonomad.info/bitcoin-address/">bitcoin address</a> used to redeem the zerocoin.</p> <h2><strong>Zerocoin protocol</strong></h2> <p><img src="https://cryptonomad.info/wp-content/uploads/2019/08/ace-1869825_1280-1024x682.jpg" width="1024" height="682"/></p> <p>&nbsp;The zerocoin&nbsp;extension to bitcoin would have functioned like a money laundering pool, temporarily pooling bitcoins together in exchange for a temporary currency called zerocoins. While the laundering pool is an established concept already utilized by several currency laundering services, zerocoin would have implemented this at the protocol level, eliminating any reliance on trusted third parties. It anonymizes the&nbsp;<a href="https://cryptonomad.info/cryptocurrency-exchange/">exchanges</a>&nbsp;to and from the pool using <a href="https://cryptonomad.info/cryptography/">cryptographic</a> principles, and as a proposed extension to the bitcoin protocol, it would have recorded the transactions within bitcoin’s existing blockchain.The anonymity afforded by zerocoin is the result of cryptographic operations involved with separate zerocoin mint and spend transactions.&nbsp;To mint a zerocoin, a person generates a random serial number&nbsp;<em>S</em>, and encrypts (that is commits) this into a coin&nbsp;<em>C</em>&nbsp;by use of second random number&nbsp;<em>r</em>. In practice,&nbsp;<em>C</em>&nbsp;is a Pedersen Commitment. The&nbsp;coin&nbsp;<em>C</em>&nbsp;is added to a <a href="https://cryptonomad.info/cryptography/">cryptographic</a> accumulator by <a href="https://cryptonomad.info/crypto-mining/">miners</a>, and at the same time, the amount of bitcoin equal in value to the denomination of the zerocoin is added to a zerocoin escrow pool.To redeem the zerocoin into bitcoin (preferably to a new public address) the owner of the coin needs to prove two things by way of a zero-knowledge proof. (A zero-knowledge proof is a method by which one party can prove to another that a given statement is true, without conveying any additional information apart from the fact that the statement is indeed true.) The first is that they know a coin&nbsp;<em>C</em>&nbsp;that belongs to the set of all other minted zerocoins (<em>C1</em>,&nbsp;<em>C2</em>,…&nbsp;<em>Cn</em>), without revealing which coin it is. In practice, this is done quickly by use of a one-way accumulator that does not reveal the members of the set. The second is that the person knows a number&nbsp;<em>r</em>, that along with the serial number&nbsp;<em>S</em>&nbsp;corresponds to a zerocoin. The proof and serial number&nbsp;<em>S</em>&nbsp;are posted as a zerocoin spend&nbsp;transaction, where miners verify the proof and that the serial number&nbsp;<em>S</em>&nbsp;has not been spent previously. After verification, the transaction is posted to the blockchain, and the amount of bitcoin equal to the zerocoin denomination is transferred from the zerocoin escrow pool. <a href="https://cryptonomad.info/knowledge-base/anonymity%E2%80%8F%E2%80%8E/">Anonymity</a> in the transaction is assured because the minted coin&nbsp;<em>C</em>&nbsp;is not linked to the serial number&nbsp;<em>S</em>&nbsp;used to redeem the coin.The accumulator used for the zero-knowledge proof would have to be re-computed every time a spend transaction is verified, and although this can be done incrementally if the accumulator checkpoint is carried on from earlier blocks to the new block, it would still add some overhead to the verification-process. Additionally, both the accumulator checkpoint and all the zerocoin serial numbers would have to be added to every <a href="https://cryptonomad.info/bitcoin/">bitcoin</a>block, thus increasing the size (although not substantially).Since the verification process for zerocoins is much more computationally heavy than for bitcoins, the verification time for a&nbsp;block&nbsp;would increase up to 6 times depending on the ratio between bitcoins and zerocoins. Preliminary tests done by the developers show that even with the increased verification time and blocks twice the size of current bitcoin blocks, the verification time for an entire block would not exceed five minutes, and since a new bitcoin block is currently created every ten minutes on average, the increased verification time should not be a problem.</p> <h3><strong>Zcoin (XZC)</strong></h3> <p>Zerocoin was first implemented into a fully functional <a href="https://cryptonomad.info/">cryptocurrency</a> called Zcoin (XZC), a project that went live on September 28, 2016, 12AM UTC.&nbsp;The project’s testnet software was first released to the public on December 18, 2015 under the name Moneta (not Moneta Verde (MCN)) before it was dubbed to Zcoin.&nbsp;Roger Ver&nbsp;was one of Zcoin’s initial investors same as&nbsp;<a href="https://cryptonomad.info/zcash/">Zcash</a>.</p> <h3><strong>Private Instant Verified Transaction (PIVX)</strong></h3> <p>PIVX is the first&nbsp;<a href="https://cryptonomad.info/proof-of-stake/">Proof-of-stake</a> <a href="https://cryptonomad.info/">cryptocurrency</a> that has implemented the Zerocoin protocol. Zerocoin went live on PIVX on October 16th, 2017. The Zerocoin PIVX tokens are known as zPiv.</p> <h3><strong>SmartCash (SMART)</strong></h3> <p>SmartCash (SMART) is a Keccak SHA-3 algorithm, mineable coin that uses Zero-knowledge proofs from the zerocoin extension.</p> <h3><strong>ZeroVert (ZER)</strong></h3> <p>ZeroVert (ZER)&nbsp;is a Scrypt-N algorithm coin, merge-mineable on the VTC chain with a total circulation of 8.4 million ZER.</p> <h3><strong>CredaCash</strong></h3> <p>A faster implementation of zero-knowledge proofs using zk-SNARKs was created for a new cryptocurrency called CredaCash. CredaCash requires only about 3 seconds and 85 KB of memory to create a transaction proof. Similar to Zerocash, CredaCash is an alt-coin with its own blockchain and transaction protocol. The CredaCash developer hope they can offer CredaCash to the market in 2016.</p> <h2><strong>Reception</strong></h2> <p>One criticism of zerocoin is the added computation time required by the process, which would need to have been performed primarily by bitcoin miners. If the proofs were posted to the <a href="https://cryptonomad.info/blockchain/">blockchain</a>, this would also dramatically increase the size of the blockchain. Nevertheless, as stated by the original author, the proofs could be stored outside of the blockchain. To counter criticisms that the anonymity offered by zerocoin would facilitate illegal activity, it has been suggested that a backdoor, or other features, could be added to the zerocoin protocol to allow police to track money laundering, but this was not advocated in the original paper.Since a zerocoin will have the same denomination as the bitcoin used to mint the zerocoin, anonymity would be compromised if no other zerocoins (or few zerocoins) with the same denomination are currently minted but unspent. A potential solution to this problem would be to only allow zerocoins of specific set denominations, however this would increase the needed computation time since multiple zerocoins could be needed for one transaction.Depending on the specific implementation, the zerocoin protocol would rely on one or more trusted parties to generate two large prime numbers,&nbsp;<em>p</em>&nbsp;and&nbsp;<em>q</em>, so&nbsp;<em>n</em>&nbsp;=&nbsp;<em>p</em> <em>q</em>. Since&nbsp;<em>n</em>&nbsp;has to be hard to factor,&nbsp;<em>p</em>&nbsp;and&nbsp;<em>q</em>&nbsp;must be unknown to normal users for zerocoin to be secure. The protocol could rely on RSA unfactorable objects to avoid having to have a trusted party for the setup process. Such a setup, however, is not possible with the new Zerocash protocol.</p> <h2><strong>Extensions of Zerocoin</strong></h2> <p>Recognizing that <a href="https://cryptonomad.info/bitcoin/">Bitcoin</a> was unlikely to be implement Zerocoin, the authors of Zerocoin expressed hope that other <a href="https://cryptonomad.info/">cryptocurrencies</a> would incorporate Zerocoin anonymity features. Currently, Zerocoin is being implemented in the alternative cryptocurrency Anoncoin.&nbsp;</p> <p><a href="https://cryptonomad.info/zerocoin/"><strong>Read the original full article here.</strong></a></p> <p><br></p> </html>
json metadata{"tags":["bitcoin","cryptocurrency","crypto","blockchain","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/Zerocoin.png","https://cryptonomad.info/wp-content/uploads/2019/08/ace-1869825_1280-1024x682.jpg"],"links":["http://zerocoin.org/","https://cryptonomad.info/cryptography/","https://cryptonomad.info/bitcoin/","https://cryptonomad.info/","https://cryptonomad.info/mixing-service/","https://cryptonomad.info/blockchain/","https://cryptonomad.info/bitcoin-transaction/","https://cryptonomad.info/crypto-mining/","https://cryptonomad.info/bitcoin-address/","https://cryptonomad.info/cryptocurrency-exchange/","https://cryptonomad.info/knowledge-base/anonymity%E2%80%8F%E2%80%8E/","https://cryptonomad.info/zcash/","https://cryptonomad.info/proof-of-stake/","https://cryptonomad.info/zerocoin/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35941987/Trx e8c228e30830f989517a18824e1bc318200f4a23
View Raw JSON Data
{
  "trx_id": "e8c228e30830f989517a18824e1bc318200f4a23",
  "block": 35941987,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:48:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "bitcoin",
      "author": "cryptonomads",
      "permlink": "zerocoin",
      "title": "Zerocoin",
      "body": "<html>\n<p>&nbsp;<a href=\"http://zerocoin.org/\"><strong>Zerocoin</strong></a>&nbsp;is a cryptocurrency proposed by Johns Hopkins University professor Matthew D. Green and graduate students Ian Miers and Christina Garman as an extension to the&nbsp;bitcoin protocol&nbsp;that would add true <a href=\"https://cryptonomad.info/cryptography/\">cryptographic&nbsp;</a>anonymity&nbsp;to <a href=\"https://cryptonomad.info/bitcoin/\">bitcoin</a>transactions. Zerocoin was first implemented into a fully functional <a href=\"https://cryptonomad.info/\">cryptocurrency</a> released to the public by Poramin Insom, as the Zcoin. Zerocoin provides anonymity by the introduction of a separate&nbsp;<a href=\"https://cryptonomad.info/mixing-service/\">mixing service</a>&nbsp;known as&nbsp;<em>zerocoin</em>&nbsp;that is stored in the bitcoin <a href=\"https://cryptonomad.info/blockchain/\">blockchain</a>. Though originally proposed for use with the bitcoin network, zerocoin could be integrated into any&nbsp;<a href=\"https://cryptonomad.info/\">cryptocurrency</a>.</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/Zerocoin.png\" width=\"500\" height=\"167\"/></p>\n<h2><strong>Description</strong></h2>\n<p><a href=\"https://cryptonomad.info/bitcoin-transaction/\">Bitcoin transactions</a> are all stored, by design, in a public ledger (the blockchain) that is accessible to everyone. These transactions provide privacy through&nbsp;pseudonymity, in that while each transaction is associated with the public address of the sender and receiver, the names of the owners of these addresses are at no time made known to the bitcoin network. To increase privacy, each person could create as many public addresses as they like, making it difficult to link transactions to the same person. If additional privacy were required, it is possible to&nbsp;launder&nbsp;bitcoin through a trusted third party, where the input coins are mixed in a large pool and output to a new address.</p>\n<p>Regardless of the best precautions, by data <a href=\"https://cryptonomad.info/crypto-mining/\">mining</a> of the&nbsp;blockchain, it becomes possible in certain cases to link a set of public addresses to a specific (unnamed) individual. For example, this could be done by the analysis of spending habits, or by having the change of a transaction from one public address being sent to another. Furthermore, by utilizing information external to the blockchain, such as public bitcoin addresses posted on a web site, or the postal address used with a bitcoin purchase, the possibility exists that every single bitcoin transaction of a given person could be determined.</p>\n<p>Zerocoins are purchased with bitcoin in fixed denominations by a zerocoin mint transaction. Later, these zerocoins can be redeemed for bitcoin to a different bitcoin address by a zerocoin spend transaction. Through the use of cryptographic accumulators and digital commitments with zero-knowledge proofs, it is not possible to link the&nbsp;<a href=\"https://cryptonomad.info/bitcoin-address/\">bitcoin address</a>&nbsp;that was used to mint the original zerocoin to the <a href=\"https://cryptonomad.info/bitcoin-address/\">bitcoin address</a> used to redeem the zerocoin.</p>\n<h2><strong>Zerocoin protocol</strong></h2>\n<p><img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/ace-1869825_1280-1024x682.jpg\" width=\"1024\" height=\"682\"/></p>\n<p>&nbsp;The zerocoin&nbsp;extension to bitcoin would have functioned like a money laundering pool, temporarily pooling bitcoins together in exchange for a temporary currency called zerocoins. While the laundering pool is an established concept already utilized by several currency laundering services, zerocoin would have implemented this at the protocol level, eliminating any reliance on trusted third parties. It anonymizes the&nbsp;<a href=\"https://cryptonomad.info/cryptocurrency-exchange/\">exchanges</a>&nbsp;to and from the pool using <a href=\"https://cryptonomad.info/cryptography/\">cryptographic</a> principles, and as a proposed extension to the bitcoin protocol, it would have recorded the transactions within bitcoin’s existing blockchain.The anonymity afforded by zerocoin is the result of cryptographic operations involved with separate zerocoin mint and spend transactions.&nbsp;To mint a zerocoin, a person generates a random serial number&nbsp;<em>S</em>, and encrypts (that is commits) this into a coin&nbsp;<em>C</em>&nbsp;by use of second random number&nbsp;<em>r</em>. In practice,&nbsp;<em>C</em>&nbsp;is a Pedersen Commitment. The&nbsp;coin&nbsp;<em>C</em>&nbsp;is added to a <a href=\"https://cryptonomad.info/cryptography/\">cryptographic</a> accumulator by <a href=\"https://cryptonomad.info/crypto-mining/\">miners</a>, and at the same time, the amount of bitcoin equal in value to the denomination of the zerocoin is added to a zerocoin escrow pool.To redeem the zerocoin into bitcoin (preferably to a new public address) the owner of the coin needs to prove two things by way of a zero-knowledge proof. (A zero-knowledge proof is a method by which one party can prove to another that a given statement is true, without conveying any additional information apart from the fact that the statement is indeed true.) The first is that they know a coin&nbsp;<em>C</em>&nbsp;that belongs to the set of all other minted zerocoins (<em>C1</em>,&nbsp;<em>C2</em>,…&nbsp;<em>Cn</em>), without revealing which coin it is. In practice, this is done quickly by use of a one-way accumulator that does not reveal the members of the set. The second is that the person knows a number&nbsp;<em>r</em>, that along with the serial number&nbsp;<em>S</em>&nbsp;corresponds to a zerocoin. The proof and serial number&nbsp;<em>S</em>&nbsp;are posted as a zerocoin spend&nbsp;transaction, where miners verify the proof and that the serial number&nbsp;<em>S</em>&nbsp;has not been spent previously. After verification, the transaction is posted to the blockchain, and the amount of bitcoin equal to the zerocoin denomination is transferred from the zerocoin escrow pool. <a href=\"https://cryptonomad.info/knowledge-base/anonymity%E2%80%8F%E2%80%8E/\">Anonymity</a> in the transaction is assured because the minted coin&nbsp;<em>C</em>&nbsp;is not linked to the serial number&nbsp;<em>S</em>&nbsp;used to redeem the coin.The accumulator used for the zero-knowledge proof would have to be re-computed every time a spend transaction is verified, and although this can be done incrementally if the accumulator checkpoint is carried on from earlier blocks to the new block, it would still add some overhead to the verification-process. Additionally, both the accumulator checkpoint and all the zerocoin serial numbers would have to be added to every <a href=\"https://cryptonomad.info/bitcoin/\">bitcoin</a>block, thus increasing the size (although not substantially).Since the verification process for zerocoins is much more computationally heavy than for bitcoins, the verification time for a&nbsp;block&nbsp;would increase up to 6 times depending on the ratio between bitcoins and zerocoins. Preliminary tests done by the developers show that even with the increased verification time and blocks twice the size of current bitcoin blocks, the verification time for an entire block would not exceed five minutes, and since a new bitcoin block is currently created every ten minutes on average, the increased verification time should not be a problem.</p>\n<h3><strong>Zcoin (XZC)</strong></h3>\n<p>Zerocoin was first implemented into a fully functional <a href=\"https://cryptonomad.info/\">cryptocurrency</a> called Zcoin (XZC), a project that went live on September 28, 2016, 12AM UTC.&nbsp;The project’s testnet software was first released to the public on December 18, 2015 under the name Moneta (not Moneta Verde (MCN)) before it was dubbed to Zcoin.&nbsp;Roger Ver&nbsp;was one of Zcoin’s initial investors same as&nbsp;<a href=\"https://cryptonomad.info/zcash/\">Zcash</a>.</p>\n<h3><strong>Private Instant Verified Transaction (PIVX)</strong></h3>\n<p>PIVX is the first&nbsp;<a href=\"https://cryptonomad.info/proof-of-stake/\">Proof-of-stake</a> <a href=\"https://cryptonomad.info/\">cryptocurrency</a> that has implemented the Zerocoin protocol. Zerocoin went live on PIVX on October 16th, 2017. The Zerocoin PIVX tokens are known as zPiv.</p>\n<h3><strong>SmartCash (SMART)</strong></h3>\n<p>SmartCash (SMART) is a Keccak SHA-3 algorithm, mineable coin that uses Zero-knowledge proofs from the zerocoin extension.</p>\n<h3><strong>ZeroVert (ZER)</strong></h3>\n<p>ZeroVert (ZER)&nbsp;is a Scrypt-N algorithm coin, merge-mineable on the VTC chain with a total circulation of 8.4 million ZER.</p>\n<h3><strong>CredaCash</strong></h3>\n<p>A faster implementation of zero-knowledge proofs using zk-SNARKs was created for a new cryptocurrency called CredaCash. CredaCash requires only about 3 seconds and 85 KB of memory to create a transaction proof. Similar to Zerocash, CredaCash is an alt-coin with its own blockchain and transaction protocol. The CredaCash developer hope they can offer CredaCash to the market in 2016.</p>\n<h2><strong>Reception</strong></h2>\n<p>One criticism of zerocoin is the added computation time required by the process, which would need to have been performed primarily by bitcoin miners. If the proofs were posted to the <a href=\"https://cryptonomad.info/blockchain/\">blockchain</a>, this would also dramatically increase the size of the blockchain. Nevertheless, as stated by the original author, the proofs could be stored outside of the blockchain. To counter criticisms that the anonymity offered by zerocoin would facilitate illegal activity, it has been suggested that a backdoor, or other features, could be added to the zerocoin protocol to allow police to track money laundering, but this was not advocated in the original paper.Since a zerocoin will have the same denomination as the bitcoin used to mint the zerocoin, anonymity would be compromised if no other zerocoins (or few zerocoins) with the same denomination are currently minted but unspent. A potential solution to this problem would be to only allow zerocoins of specific set denominations, however this would increase the needed computation time since multiple zerocoins could be needed for one transaction.Depending on the specific implementation, the zerocoin protocol would rely on one or more trusted parties to generate two large prime numbers,&nbsp;<em>p</em>&nbsp;and&nbsp;<em>q</em>, so&nbsp;<em>n</em>&nbsp;=&nbsp;<em>p</em> <em>q</em>. Since&nbsp;<em>n</em>&nbsp;has to be hard to factor,&nbsp;<em>p</em>&nbsp;and&nbsp;<em>q</em>&nbsp;must be unknown to normal users for zerocoin to be secure. The protocol could rely on RSA unfactorable objects to avoid having to have a trusted party for the setup process. Such a setup, however, is not possible with the new Zerocash protocol.</p>\n<h2><strong>Extensions of Zerocoin</strong></h2>\n<p>Recognizing that <a href=\"https://cryptonomad.info/bitcoin/\">Bitcoin</a> was unlikely to be implement Zerocoin, the authors of Zerocoin expressed hope that other <a href=\"https://cryptonomad.info/\">cryptocurrencies</a> would incorporate Zerocoin anonymity features. Currently, Zerocoin is being implemented in the alternative cryptocurrency Anoncoin.&nbsp;</p>\n<p><a href=\"https://cryptonomad.info/zerocoin/\"><strong>Read the original full article here.</strong></a></p>\n<p><br></p>\n</html>",
      "json_metadata": "{\"tags\":[\"bitcoin\",\"cryptocurrency\",\"crypto\",\"blockchain\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/Zerocoin.png\",\"https://cryptonomad.info/wp-content/uploads/2019/08/ace-1869825_1280-1024x682.jpg\"],\"links\":[\"http://zerocoin.org/\",\"https://cryptonomad.info/cryptography/\",\"https://cryptonomad.info/bitcoin/\",\"https://cryptonomad.info/\",\"https://cryptonomad.info/mixing-service/\",\"https://cryptonomad.info/blockchain/\",\"https://cryptonomad.info/bitcoin-transaction/\",\"https://cryptonomad.info/crypto-mining/\",\"https://cryptonomad.info/bitcoin-address/\",\"https://cryptonomad.info/cryptocurrency-exchange/\",\"https://cryptonomad.info/knowledge-base/anonymity%E2%80%8F%E2%80%8E/\",\"https://cryptonomad.info/zcash/\",\"https://cryptonomad.info/proof-of-stake/\",\"https://cryptonomad.info/zerocoin/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/28 11:43:30
parent authorcryptonomads
parent permlinksetting-up-a-tor-hidden-service
authorcheetah
permlinkcheetah-re-cryptonomadssetting-up-a-tor-hidden-service
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://en.bitcoin.it/wiki/Setting_up_a_Tor_hidden_service
json metadata
Transaction InfoBlock #35941878/Trx 51266da1ff8db31c121dd45f4948773e1b6763ba
View Raw JSON Data
{
  "trx_id": "51266da1ff8db31c121dd45f4948773e1b6763ba",
  "block": 35941878,
  "trx_in_block": 30,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:43:30",
  "op": [
    "comment",
    {
      "parent_author": "cryptonomads",
      "parent_permlink": "setting-up-a-tor-hidden-service",
      "author": "cheetah",
      "permlink": "cheetah-re-cryptonomadssetting-up-a-tor-hidden-service",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://en.bitcoin.it/wiki/Setting_up_a_Tor_hidden_service",
      "json_metadata": ""
    }
  ]
}
2019/08/28 11:43:27
votercheetah
authorcryptonomads
permlinksetting-up-a-tor-hidden-service
weight8 (0.08%)
Transaction InfoBlock #35941877/Trx c4531c1440b96b1615c4afde4ea8ed0970cf7a7e
View Raw JSON Data
{
  "trx_id": "c4531c1440b96b1615c4afde4ea8ed0970cf7a7e",
  "block": 35941877,
  "trx_in_block": 29,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:43:27",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "cryptonomads",
      "permlink": "setting-up-a-tor-hidden-service",
      "weight": 8
    }
  ]
}
2019/08/28 11:43:09
parent author
parent permlinktor
authorcryptonomads
permlinksetting-up-a-tor-hidden-service
titleSetting up a Tor hidden service
body<html> <p>&nbsp;If you use a Bitcoin&nbsp;full node&nbsp;over Tor, then usually it will only be able to make outgoing connections. Therefore, you will only get a maximum of 8 total connections. This is fine, and is not something you usually need to worry about, but if your computer is often online and you want to be a big help to the network, you can run a Tor hidden service in order to accept incoming connections over Tor.&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/mask-1249922_640.jpg" width="640" height="426"/></p> <p>&nbsp;Note that there is no need to forward port 8333 when using a Tor hidden service. The hidden service will cause most firewalls and NAT setups to be bypassed. For this reason, running a Tor hidden service is also a good idea if you want incoming connections but are for some reason unable to forward port 8333.</p> <h3><strong>Prerequisites</strong></h3> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/invisible-man-154567_640.png" width="320" height="640"/></p> <p>&nbsp;These instructions are for &nbsp;&nbsp;Linux. It is possible to do on Windows, but the instructions would be rather different. (If you’ve done it on Windows, consider adding the instructions to this page.)You need Tor (at least version 0.2.7.1). Figure out where your&nbsp;torrc&nbsp;file is (/etc/tor/torrc&nbsp;is one possibility). This guide assumes default Tor settings. This guide assumes that Tor is running under the user and group&nbsp;tor, which will usually be the case if you install Tor using your distro’s package manager.You need Bitcoin Core (or similar). For method 1, you need at least version 0.12.0. Find&nbsp;bitcoin.conf&nbsp;in your&nbsp;data directory.</p> <h3><strong>Method 1 (recommended)</strong></h3> <p>This sets up an ephemeral hidden service. The hidden service address (xxxx.onion) will change every time Bitcoin Core is restarted.Add these lines to your&nbsp;torrc:</p> <pre><code>ControlPort 9051<br> CookieAuthentication 1<br> CookieAuthFileGroupReadable 1</code></pre> <p>You need to figure out what user bitcoind or bitcoin-qt is running as. Run the following command while Bitcoin is running:</p> <pre><code>ps -eo user,group,comm |egrep 'bitcoind|bitcoin-qt' |awk '{print "Bitcoin user: " $1}'</code></pre> <p>Write down the reported user.Run the following command as root, which adds your Bitcoin user to the tor group. Replace BITCOIN_USER with the actual user name found above:</p> <pre><code>usermod -a -G tor BITCOIN_USER</code></pre> <p>If you don’t modify any other settings, Bitcoin Core will usually connect over the regular Internet, but will also allow connections to and from the hidden service. If you want Bitcoin Core to only connect via Tor (for anonymity), add these lines to bitcoin.conf:</p> <pre><code>proxy=127.0.0.1:9050<br> listen=1<br> bind=127.0.0.1</code></pre> <p>If you additionally want Bitcoin Core to only connect out to Tor&nbsp;<em>hidden services</em>, also add this line (not particularly recommended):</p> <pre><code>onlynet=onion</code></pre> <p>If you’re only interested in running a hidden service in order to help the network, then there’s no need to modify any bitcoin.conf settings at all. Bitcoin Core will automatically detect Tor and create the hidden service.Now restart Tor, and then Bitcoin Core. You should eventually get incoming connections via the hidden service.&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://cryptonomad.info/wp-content/uploads/2019/08/mask-3579320_640.jpg" width="640" height="426"/></p> <p>&nbsp;</p> <h3><strong>Method 2</strong></h3> <p>This sets up a static hidden service. The hidden service address (xxxx.onion) will never change. This is probably even more helpful for the network, and you will probably get more incoming connections than method 1, but&nbsp;<em>maybe</em>&nbsp;it would be helpful to someone trying to track your transactions.<strong>Add these lines to your&nbsp;torrc:</strong></p> <pre><code>HiddenServiceDir /var/lib/tor/bitcoin-service/<br> HiddenServicePort 8333 127.0.0.1:8333</code></pre> <p>Restart Tor. As root, run&nbsp;cat /var/lib/tor/bitcoin-service/hostname. Your onion address will be reported. If it didn’t work, then probably your distro’s version of Tor doesn’t actually use&nbsp;/var/lib/tor&nbsp;for this purpose. You should try to figure out the correct HiddenServiceDir location.In the following steps, replace ONION_ADDR with the onion address reported above.If you don’t care about anonymity and are only looking to help the network, add the following lines to bitcoin.conf:</p> <pre><code>onion=127.0.0.1:9050<br> listen=1<br> externalip=ONION_ADDR<br> discover=1</code></pre> <p>This will allow you to accept connections both via your onion address and your IP address (if you have port 8333 forwarded), and Tor will only be used for connections to and from Tor hidden services.If you care about anonymity,&nbsp;<strong>instead</strong>&nbsp;of the above, add the following lines to bitcoin.conf to use Tor for everything:</p> <pre><code>proxy=127.0.0.1:9050<br> listen=1<br> bind=127.0.0.1<br> externalip=ONION_ADDR</code></pre> <p>If you additionally want Bitcoin Core to only connect out to Tor&nbsp;<em>hidden services</em>, also add this line (not particularly recommended):</p> <pre><code>onlynet=onion</code></pre> <p>Now restart Bitcoin Core. You should eventually get incoming connections via your hidden service.</p> <p><a href="https://cryptonomad.info/setting-up-a-tor-hidden-service/"><strong>Read the original full article here.&nbsp;</strong></a></p> </html>
json metadata{"tags":["tor","browser","bitcoin","cryptocurrency","blog"],"image":["https://cryptonomad.info/wp-content/uploads/2019/08/mask-1249922_640.jpg","https://cryptonomad.info/wp-content/uploads/2019/08/invisible-man-154567_640.png","https://cryptonomad.info/wp-content/uploads/2019/08/mask-3579320_640.jpg"],"links":["https://cryptonomad.info/setting-up-a-tor-hidden-service/"],"app":"steemit/0.1","format":"html"}
Transaction InfoBlock #35941871/Trx 7b1ec079b7e4473d7ac85b14c8bc0d946e67fc6c
View Raw JSON Data
{
  "trx_id": "7b1ec079b7e4473d7ac85b14c8bc0d946e67fc6c",
  "block": 35941871,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-28T11:43:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "tor",
      "author": "cryptonomads",
      "permlink": "setting-up-a-tor-hidden-service",
      "title": "Setting up a Tor hidden service",
      "body": "<html>\n<p>&nbsp;If you use a Bitcoin&nbsp;full node&nbsp;over Tor, then usually it will only be able to make outgoing connections. Therefore, you will only get a maximum of 8 total connections. This is fine, and is not something you usually need to worry about, but if your computer is often online and you want to be a big help to the network, you can run a Tor hidden service in order to accept incoming connections over Tor.&nbsp;</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/mask-1249922_640.jpg\" width=\"640\" height=\"426\"/></p>\n<p>&nbsp;Note that there is no need to forward port 8333 when using a Tor hidden service. The hidden service will cause most firewalls and NAT setups to be bypassed. For this reason, running a Tor hidden service is also a good idea if you want incoming connections but are for some reason unable to forward port 8333.</p>\n<h3><strong>Prerequisites</strong></h3>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/invisible-man-154567_640.png\" width=\"320\" height=\"640\"/></p>\n<p>&nbsp;These instructions are for &nbsp;&nbsp;Linux. It is possible to do on Windows, but the instructions would be rather different. (If you’ve done it on Windows, consider adding the instructions to this page.)You need Tor (at least version 0.2.7.1). Figure out where your&nbsp;torrc&nbsp;file is (/etc/tor/torrc&nbsp;is one possibility). This guide assumes default Tor settings. This guide assumes that Tor is running under the user and group&nbsp;tor, which will usually be the case if you install Tor using your distro’s package manager.You need Bitcoin Core (or similar). For method 1, you need at least version 0.12.0. Find&nbsp;bitcoin.conf&nbsp;in your&nbsp;data directory.</p>\n<h3><strong>Method 1 (recommended)</strong></h3>\n<p>This sets up an ephemeral hidden service. The hidden service address (xxxx.onion) will change every time Bitcoin Core is restarted.Add these lines to your&nbsp;torrc:</p>\n<pre><code>ControlPort 9051<br>\nCookieAuthentication 1<br>\nCookieAuthFileGroupReadable 1</code></pre>\n<p>You need to figure out what user bitcoind or bitcoin-qt is running as. Run the following command while Bitcoin is running:</p>\n<pre><code>ps -eo user,group,comm |egrep 'bitcoind|bitcoin-qt' |awk '{print \"Bitcoin user: \" $1}'</code></pre>\n<p>Write down the reported user.Run the following command as root, which adds your Bitcoin user to the tor group. Replace BITCOIN_USER with the actual user name found above:</p>\n<pre><code>usermod -a -G tor BITCOIN_USER</code></pre>\n<p>If you don’t modify any other settings, Bitcoin Core will usually connect over the regular Internet, but will also allow connections to and from the hidden service. If you want Bitcoin Core to only connect via Tor (for anonymity), add these lines to bitcoin.conf:</p>\n<pre><code>proxy=127.0.0.1:9050<br>\nlisten=1<br>\nbind=127.0.0.1</code></pre>\n<p>If you additionally want Bitcoin Core to only connect out to Tor&nbsp;<em>hidden services</em>, also add this line (not particularly recommended):</p>\n<pre><code>onlynet=onion</code></pre>\n<p>If you’re only interested in running a hidden service in order to help the network, then there’s no need to modify any bitcoin.conf settings at all. Bitcoin Core will automatically detect Tor and create the hidden service.Now restart Tor, and then Bitcoin Core. You should eventually get incoming connections via the hidden service.&nbsp;</p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"https://cryptonomad.info/wp-content/uploads/2019/08/mask-3579320_640.jpg\" width=\"640\" height=\"426\"/></p>\n<p>&nbsp;</p>\n<h3><strong>Method 2</strong></h3>\n<p>This sets up a static hidden service. The hidden service address (xxxx.onion) will never change. This is probably even more helpful for the network, and you will probably get more incoming connections than method 1, but&nbsp;<em>maybe</em>&nbsp;it would be helpful to someone trying to track your transactions.<strong>Add these lines to your&nbsp;torrc:</strong></p>\n<pre><code>HiddenServiceDir /var/lib/tor/bitcoin-service/<br>\nHiddenServicePort 8333 127.0.0.1:8333</code></pre>\n<p>Restart Tor. As root, run&nbsp;cat /var/lib/tor/bitcoin-service/hostname. Your onion address will be reported. If it didn’t work, then probably your distro’s version of Tor doesn’t actually use&nbsp;/var/lib/tor&nbsp;for this purpose. You should try to figure out the correct HiddenServiceDir location.In the following steps, replace ONION_ADDR with the onion address reported above.If you don’t care about anonymity and are only looking to help the network, add the following lines to bitcoin.conf:</p>\n<pre><code>onion=127.0.0.1:9050<br>\nlisten=1<br>\nexternalip=ONION_ADDR<br>\ndiscover=1</code></pre>\n<p>This will allow you to accept connections both via your onion address and your IP address (if you have port 8333 forwarded), and Tor will only be used for connections to and from Tor hidden services.If you care about anonymity,&nbsp;<strong>instead</strong>&nbsp;of the above, add the following lines to bitcoin.conf to use Tor for everything:</p>\n<pre><code>proxy=127.0.0.1:9050<br>\nlisten=1<br>\nbind=127.0.0.1<br>\nexternalip=ONION_ADDR</code></pre>\n<p>If you additionally want Bitcoin Core to only connect out to Tor&nbsp;<em>hidden services</em>, also add this line (not particularly recommended):</p>\n<pre><code>onlynet=onion</code></pre>\n<p>Now restart Bitcoin Core. You should eventually get incoming connections via your hidden service.</p>\n<p><a href=\"https://cryptonomad.info/setting-up-a-tor-hidden-service/\"><strong>Read the original full article here.&nbsp;</strong></a></p>\n</html>",
      "json_metadata": "{\"tags\":[\"tor\",\"browser\",\"bitcoin\",\"cryptocurrency\",\"blog\"],\"image\":[\"https://cryptonomad.info/wp-content/uploads/2019/08/mask-1249922_640.jpg\",\"https://cryptonomad.info/wp-content/uploads/2019/08/invisible-man-154567_640.png\",\"https://cryptonomad.info/wp-content/uploads/2019/08/mask-3579320_640.jpg\"],\"links\":[\"https://cryptonomad.info/setting-up-a-tor-hidden-service/\"],\"app\":\"steemit/0.1\",\"format\":\"html\"}"
    }
  ]
}
2019/08/27 11:47:45
voterszabiiika
authorcryptonomads
permlinkairdrop-bankcex-50-tokens-300-usd
weight10000 (100.00%)
Transaction InfoBlock #35917952/Trx e7108fd4acd7c2cb8c3d6f94c00d19653eee3226
View Raw JSON Data
{
  "trx_id": "e7108fd4acd7c2cb8c3d6f94c00d19653eee3226",
  "block": 35917952,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:45",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "airdrop-bankcex-50-tokens-300-usd",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:42
voterszabiiika
authorcryptonomads
permlinkairdrop-localcoin-140-tokens-usd70
weight10000 (100.00%)
Transaction InfoBlock #35917951/Trx 107d69f00eeb6f7518f16fee57d4fdcc3c9c6476
View Raw JSON Data
{
  "trx_id": "107d69f00eeb6f7518f16fee57d4fdcc3c9c6476",
  "block": 35917951,
  "trx_in_block": 22,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:42",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "airdrop-localcoin-140-tokens-usd70",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:30
voterszabiiika
authorcryptonomads
permlinkairdrop-cubiex-binance
weight10000 (100.00%)
Transaction InfoBlock #35917947/Trx 7b7050739668a94f7c2f03a825e962a6f317169d
View Raw JSON Data
{
  "trx_id": "7b7050739668a94f7c2f03a825e962a6f317169d",
  "block": 35917947,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:30",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "airdrop-cubiex-binance",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:21
voterszabiiika
authorcryptonomads
permlinkblockfolio
weight10000 (100.00%)
Transaction InfoBlock #35917944/Trx 4758896c90debe6dbcc5bf6c42f951127591b05c
View Raw JSON Data
{
  "trx_id": "4758896c90debe6dbcc5bf6c42f951127591b05c",
  "block": 35917944,
  "trx_in_block": 36,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:21",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "blockfolio",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:18
voterszabiiika
authorcryptonomads
permlinkfreewallet
weight10000 (100.00%)
Transaction InfoBlock #35917943/Trx 39612023d12f975d497e4ee75629a168dbad56c2
View Raw JSON Data
{
  "trx_id": "39612023d12f975d497e4ee75629a168dbad56c2",
  "block": 35917943,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:18",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "freewallet",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:06
voterszabiiika
authorcryptonomads
permlinksamourai-wallet
weight10000 (100.00%)
Transaction InfoBlock #35917939/Trx 137f9901e90ce6cda0fe3774968ab632c7be6b5b
View Raw JSON Data
{
  "trx_id": "137f9901e90ce6cda0fe3774968ab632c7be6b5b",
  "block": 35917939,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:06",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "samourai-wallet",
      "weight": 10000
    }
  ]
}
2019/08/27 11:47:00
voterszabiiika
authorcryptonomads
permlinkairdrop-co-dex-usd12-5
weight10000 (100.00%)
Transaction InfoBlock #35917937/Trx 96b8e1919dbf2562ddaa84811a355aeae7fd1930
View Raw JSON Data
{
  "trx_id": "96b8e1919dbf2562ddaa84811a355aeae7fd1930",
  "block": 35917937,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:47:00",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "airdrop-co-dex-usd12-5",
      "weight": 10000
    }
  ]
}
2019/08/27 11:46:51
voterszabiiika
authorcryptonomads
permlinkanonymous-p2p
weight10000 (100.00%)
Transaction InfoBlock #35917934/Trx 33eb102c751e7c3231f81cd197a0177ea7e0186f
View Raw JSON Data
{
  "trx_id": "33eb102c751e7c3231f81cd197a0177ea7e0186f",
  "block": 35917934,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:46:51",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "anonymous-p2p",
      "weight": 10000
    }
  ]
}
szabiiikaupvoted (100.00%) @cryptonomads / localtill
2019/08/27 11:46:45
voterszabiiika
authorcryptonomads
permlinklocaltill
weight10000 (100.00%)
Transaction InfoBlock #35917932/Trx d757d8b745f1d9e9e017cf3d2b7493b4f709b52c
View Raw JSON Data
{
  "trx_id": "d757d8b745f1d9e9e017cf3d2b7493b4f709b52c",
  "block": 35917932,
  "trx_in_block": 20,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:46:45",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "localtill",
      "weight": 10000
    }
  ]
}
szabiiikaupvoted (100.00%) @cryptonomads / mailghost
2019/08/27 11:46:42
voterszabiiika
authorcryptonomads
permlinkmailghost
weight10000 (100.00%)
Transaction InfoBlock #35917931/Trx 86e10932e4f4750835cf9e2678abdd7a0d480cdb
View Raw JSON Data
{
  "trx_id": "86e10932e4f4750835cf9e2678abdd7a0d480cdb",
  "block": 35917931,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:46:42",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "mailghost",
      "weight": 10000
    }
  ]
}
2019/08/27 11:46:36
voterszabiiika
authorcryptonomads
permlinkairdrop-oceanex-250-jur-token
weight10000 (100.00%)
Transaction InfoBlock #35917929/Trx 15355a052264dcae1a05e3c339705b5bc369fc31
View Raw JSON Data
{
  "trx_id": "15355a052264dcae1a05e3c339705b5bc369fc31",
  "block": 35917929,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:46:36",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "airdrop-oceanex-250-jur-token",
      "weight": 10000
    }
  ]
}
2019/08/27 11:46:30
voterszabiiika
authorcryptonomads
permlinkrobert-p2p-software
weight10000 (100.00%)
Transaction InfoBlock #35917927/Trx 0159ea56c374d674ea7a5f1da3ce453d7db2b54c
View Raw JSON Data
{
  "trx_id": "0159ea56c374d674ea7a5f1da3ce453d7db2b54c",
  "block": 35917927,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:46:30",
  "op": [
    "vote",
    {
      "voter": "szabiiika",
      "author": "cryptonomads",
      "permlink": "robert-p2p-software",
      "weight": 10000
    }
  ]
}
2019/08/27 11:29:51
votercinemacity
authorcryptonomads
permlinkblockfolio
weight10000 (100.00%)
Transaction InfoBlock #35917594/Trx 463b0f0983aeb559b458f775664fbca823f75644
View Raw JSON Data
{
  "trx_id": "463b0f0983aeb559b458f775664fbca823f75644",
  "block": 35917594,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:29:51",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "blockfolio",
      "weight": 10000
    }
  ]
}
2019/08/27 11:29:09
votercinemacity
authorcryptonomads
permlinkairdrop-pynk
weight10000 (100.00%)
Transaction InfoBlock #35917580/Trx a129c3fe42e8d978d4362c9765d4a9242a823b0d
View Raw JSON Data
{
  "trx_id": "a129c3fe42e8d978d4362c9765d4a9242a823b0d",
  "block": 35917580,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:29:09",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-pynk",
      "weight": 10000
    }
  ]
}
2019/08/27 11:29:06
votercinemacity
authorcryptonomads
permlinkairdrop-cubiex-binance
weight10000 (100.00%)
Transaction InfoBlock #35917579/Trx 7b62c64b80596e19aa318bb2987fcf35d178acfe
View Raw JSON Data
{
  "trx_id": "7b62c64b80596e19aa318bb2987fcf35d178acfe",
  "block": 35917579,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:29:06",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-cubiex-binance",
      "weight": 10000
    }
  ]
}
2019/08/27 11:28:57
votercinemacity
authorcryptonomads
permlinkairdrop-localcoin-140-tokens-usd70
weight10000 (100.00%)
Transaction InfoBlock #35917576/Trx f8913831f7c68486597a9e33a1202ae237451a97
View Raw JSON Data
{
  "trx_id": "f8913831f7c68486597a9e33a1202ae237451a97",
  "block": 35917576,
  "trx_in_block": 32,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:57",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-localcoin-140-tokens-usd70",
      "weight": 10000
    }
  ]
}
cinemacityupvoted (100.00%) @cryptonomads / bitcoind
2019/08/27 11:28:54
votercinemacity
authorcryptonomads
permlinkbitcoind
weight10000 (100.00%)
Transaction InfoBlock #35917575/Trx 3d769c0477a2326588d4265b0ea8986811d841b7
View Raw JSON Data
{
  "trx_id": "3d769c0477a2326588d4265b0ea8986811d841b7",
  "block": 35917575,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:54",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "bitcoind",
      "weight": 10000
    }
  ]
}
2019/08/27 11:28:48
votercinemacity
authorcryptonomads
permlinkairdrop-gcox-100-acm-coins-usd20-ref
weight10000 (100.00%)
Transaction InfoBlock #35917573/Trx 7d722e1d5eb1e3589acc953af6e5a61008205457
View Raw JSON Data
{
  "trx_id": "7d722e1d5eb1e3589acc953af6e5a61008205457",
  "block": 35917573,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:48",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-gcox-100-acm-coins-usd20-ref",
      "weight": 10000
    }
  ]
}
cinemacityupvoted (100.00%) @cryptonomads / trueusd
2019/08/27 11:28:36
votercinemacity
authorcryptonomads
permlinktrueusd
weight10000 (100.00%)
Transaction InfoBlock #35917569/Trx bc2a1fa71c37af8b2e71ecf9535427425f1d423e
View Raw JSON Data
{
  "trx_id": "bc2a1fa71c37af8b2e71ecf9535427425f1d423e",
  "block": 35917569,
  "trx_in_block": 37,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:36",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "trueusd",
      "weight": 10000
    }
  ]
}
2019/08/27 11:28:27
votercinemacity
authorcryptonomads
permlinkfreewallet
weight10000 (100.00%)
Transaction InfoBlock #35917566/Trx 37a46c861afbb7fd6ed6de4fc622b7a009150436
View Raw JSON Data
{
  "trx_id": "37a46c861afbb7fd6ed6de4fc622b7a009150436",
  "block": 35917566,
  "trx_in_block": 37,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:27",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "freewallet",
      "weight": 10000
    }
  ]
}
2019/08/27 11:28:15
votercinemacity
authorcryptonomads
permlinksamourai-wallet
weight10000 (100.00%)
Transaction InfoBlock #35917562/Trx 5bd723f5c6e13006e3749ef33bd715fd5c0f592c
View Raw JSON Data
{
  "trx_id": "5bd723f5c6e13006e3749ef33bd715fd5c0f592c",
  "block": 35917562,
  "trx_in_block": 31,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:15",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "samourai-wallet",
      "weight": 10000
    }
  ]
}
2019/08/27 11:28:03
votercinemacity
authorcryptonomads
permlinkairdrop-co-dex-usd12-5
weight10000 (100.00%)
Transaction InfoBlock #35917558/Trx f62c9f7273ac27920d25b360ca4dcc3672b921ae
View Raw JSON Data
{
  "trx_id": "f62c9f7273ac27920d25b360ca4dcc3672b921ae",
  "block": 35917558,
  "trx_in_block": 41,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:28:03",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-co-dex-usd12-5",
      "weight": 10000
    }
  ]
}
2019/08/27 11:27:51
votercinemacity
authorcryptonomads
permlinkanonymous-p2p
weight10000 (100.00%)
Transaction InfoBlock #35917554/Trx 6fe80e76d6a8b7aac42a0643be606ba65e09852d
View Raw JSON Data
{
  "trx_id": "6fe80e76d6a8b7aac42a0643be606ba65e09852d",
  "block": 35917554,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:27:51",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "anonymous-p2p",
      "weight": 10000
    }
  ]
}
2019/08/27 11:27:39
votercinemacity
authorcryptonomads
permlinklocaltill
weight10000 (100.00%)
Transaction InfoBlock #35917550/Trx 461736a842c4cffb4722560f1e7e3c3177653923
View Raw JSON Data
{
  "trx_id": "461736a842c4cffb4722560f1e7e3c3177653923",
  "block": 35917550,
  "trx_in_block": 42,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:27:39",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "localtill",
      "weight": 10000
    }
  ]
}
2019/08/27 11:27:27
votercinemacity
authorcryptonomads
permlinkmailghost
weight10000 (100.00%)
Transaction InfoBlock #35917546/Trx fc1f41ac41e81824d2bcab06d494a2d74bd187ef
View Raw JSON Data
{
  "trx_id": "fc1f41ac41e81824d2bcab06d494a2d74bd187ef",
  "block": 35917546,
  "trx_in_block": 41,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:27:27",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "mailghost",
      "weight": 10000
    }
  ]
}
2019/08/27 11:27:09
votercinemacity
authorcryptonomads
permlinkairdrop-oceanex-250-jur-token
weight10000 (100.00%)
Transaction InfoBlock #35917540/Trx 294a54debd7d0350f467387cea6d83db868bb4ff
View Raw JSON Data
{
  "trx_id": "294a54debd7d0350f467387cea6d83db868bb4ff",
  "block": 35917540,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:27:09",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "airdrop-oceanex-250-jur-token",
      "weight": 10000
    }
  ]
}
2019/08/27 11:27:03
votercinemacity
authorcryptonomads
permlinkrobert-p2p-software
weight10000 (100.00%)
Transaction InfoBlock #35917538/Trx e78cfcd38978123006a8ac16ddd10c23dfc33fb0
View Raw JSON Data
{
  "trx_id": "e78cfcd38978123006a8ac16ddd10c23dfc33fb0",
  "block": 35917538,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:27:03",
  "op": [
    "vote",
    {
      "voter": "cinemacity",
      "author": "cryptonomads",
      "permlink": "robert-p2p-software",
      "weight": 10000
    }
  ]
}
2019/08/27 11:23:57
voterawesome0
authorcryptonomads
permlinkairdrop-wink-with-binance
weight10000 (100.00%)
Transaction InfoBlock #35917476/Trx 86b045069f3f98fb475e5971f7e85ce6fc64a1d4
View Raw JSON Data
{
  "trx_id": "86b045069f3f98fb475e5971f7e85ce6fc64a1d4",
  "block": 35917476,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:23:57",
  "op": [
    "vote",
    {
      "voter": "awesome0",
      "author": "cryptonomads",
      "permlink": "airdrop-wink-with-binance",
      "weight": 10000
    }
  ]
}
2019/08/27 11:23:51
voterawesome0
authorcryptonomads
permlinkkucoin-shares
weight10000 (100.00%)
Transaction InfoBlock #35917474/Trx 12f2351e14671433c807670bd9f8a5115792c8b1
View Raw JSON Data
{
  "trx_id": "12f2351e14671433c807670bd9f8a5115792c8b1",
  "block": 35917474,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-27T11:23:51",
  "op": [
    "vote",
    {
      "voter": "awesome0",
      "author": "cryptonomads",
      "permlink": "kucoin-shares",
      "weight": 10000
    }
  ]
}

Account Metadata

POSTING JSON METADATA
profile{"website":"https://cryptonomad.info","profile_image":"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg","name":"Crypto Nomad","about":"Crypto News","cover_image":"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg"}
JSON METADATA
profile{"website":"https://cryptonomad.info","profile_image":"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg","name":"Crypto Nomad","about":"Crypto News","cover_image":"https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg"}
{
  "posting_json_metadata": {
    "profile": {
      "website": "https://cryptonomad.info",
      "profile_image": "https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg",
      "name": "Crypto Nomad",
      "about": "Crypto News",
      "cover_image": "https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg"
    }
  },
  "json_metadata": {
    "profile": {
      "website": "https://cryptonomad.info",
      "profile_image": "https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg",
      "name": "Crypto Nomad",
      "about": "Crypto News",
      "cover_image": "https://cdn.steemitimages.com/DQmXpeSDztNf4GdyficRByP83Tshtfkfhcfrahxty2aqxn9/blockchain-3212312_1280.jpg"
    }
  }
}

Auth Keys

Owner
Single Signature
Public Keys
STM53j9JYr8Lkc2nnGnbc8Gu49dJAUSencEWVMxNzfbNgNoUBgthb1/1
Active
Single Signature
Public Keys
STM8RfswPc2AqmTaNLXY9kfVYKdkM4ySStF6RUiszGMmW7zzpCxNs1/1
Posting
Single Signature
Public Keys
STM7WSgbzVuMSbHSqeFNzUDXjiGM9MA4jXx2H86jxJGwu5sv6LVBz1/1
Memo
STM7p1BYFgmXhBgHfURLhmW5ppxzRASvHNm6oWaP7Js4cZbs72UiU
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM53j9JYr8Lkc2nnGnbc8Gu49dJAUSencEWVMxNzfbNgNoUBgthb",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM8RfswPc2AqmTaNLXY9kfVYKdkM4ySStF6RUiszGMmW7zzpCxNs",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7WSgbzVuMSbHSqeFNzUDXjiGM9MA4jXx2H86jxJGwu5sv6LVBz",
        1
      ]
    ]
  },
  "memo": "STM7p1BYFgmXhBgHfURLhmW5ppxzRASvHNm6oWaP7Js4cZbs72UiU"
}

Witness Votes

0 / 30
No active witness votes.
[]