De-anonymizing bitcoin networks Proceedings of the ACM ...

Daily General Discussion - August 31, 2018

Welcome to the Daily General Discussion thread of /EthTrader.
Thread guidelines:
Resources and other information:
  • Newcomers who have basic questions about Ethereum can find answers by visiting /EthereumNoobies or our Ethereum Education wiki page, see here.
  • To view live streaming comments for this thread, click here. Account permissions are required to post comments through Reddit-Stream.com.
Enjoy!
submitted by AutoModerator to ethtrader [link] [comments]

The importance of Fungibility, your future = your choice.

I took notice that there are more and more people interested in crypto and I would like to make them realize that this is a technology that can save us all or enslave us all. Or at least make some people think about fungibility and it’s importance in this “new world” they are being introduced to.
Short example posted above TLDR
First off, what is fungibility?
Taken from https://www.investopedia.com/terms/f/fungibility.asp
If Person A lends Person B a $50 bill, it does not matter to Person A if he is repaid with a different $50 bill, as it is mutually substitutable. In the same sense, Person A can be repaid with two $20 bills and one $10 bill and still be satisfied, since the total equals $50. Conversely, as an example of non-fungibility, if Person A lends Person B his car, it is not acceptable for Person B to return a different car, even if it is the same make and model as the original car lent by Person A. Cars are not fungible with respect to ownership, but the gasoline that powers the cars is fungible.
Hypothetical question:
You have money to buy one Bitcoin and are confronted with two options:
1) You buy it from a regulated reputable exchange. 2) You buy it from your friend who got it as payment from a recent extortion. 
Immediately you are faced with two fundamental problems:
1) Clean BTC should actually be more valuable then dirty BTC, since you would obviously want the BTC that can not be backtraced to any criminal activity. (Note that what China defines as criminal activities for instance may not be the case in another country) 2) BTC could be confiscated at any point in time since it’s origin can be traced, even when it hasn’t been blacklisted straight away. You could be facing serious consequences. 
We see this already today, addresses that hold coins related to criminal activities are closely being monitored. When they move, it gets noticed and all eyes are on them.
https://news.bitcoin.com/bitcoin-worth-282k-from-the-2016-bitfinex-hack-on-the-move/
If you buy OTC or through DEXes how will you know that your BTC is clean?
This is not a post to tell you criminals should get away with their activities because they shouldn’t, i’m trying to explain that you should never be in any position where your money can be confiscated because it suddenly gets tied to those activities. Your money being confiscated could actually be the least of your problems in such a situation anyway. Think about how easy it becomes to imprison someone that your government doesn’t like.
I’m sure the governments would love to fade out regular cash though, because obviously they can just block your account and take away your basic rights. It happens already to people all over the world who use digital money services like PayPall for instance. https://www.elliott.org/blog/banned-from-palpal-account-limitations/
For people like Snowden, or for Wikileaks bitcoin was their solution at that time. Today, there are better alternatives and everyone should think carefully about what world they want to live in.
To bitcoins defense, there are certain things you can do to make your transactions more private. Bitcoin mixing is a thing. Bitcoin's Lightning Network is expected to give users the option to make transactions that will not be recorded on the blockchain.
Optional privacy raises eyebrows though, authorities could be knocking on your door asking you why you made an optional private transaction. Privacy by default is what we need in the future we see in front of us.
You can find tons of information about deanonymization. This is something that China can “easily“ accomplish.
This is taken from here https://blockchain.princeton.edu/papers/2018-10-ben-kaiser.pdf
Deanonymization: Bitcoin is designed to preserve the pseudonymity of its users, meaning that their real-world identity cannot be linked to a Bitcoin address they have used to transact. However, in practice there are complications that make deanonymization attacks possible. China might seek to deanonymize users for two reasons. First, they may wish to enforce laws and regulations; for example, enforcing capital flight restrictions by identifying users purchasing foreign goods or exchanging Bitcoin into foreign currencies. They might also use a deanonymization attack for ideological (or political) ends: to publicly reveal malfeasance by subversives or political opponents or simply to demonstrate the superiority of centralized control as an ideology and discourage enthusiasm for decentralized systems. We identify four attacks that China could use to deanonymize specific users. First, they could use known research techniques to (a) heuristically cluster pseudonymous identities (e.g., connect multiple addresses to the same user) [31,44]. The simplest example of such a heuristic is to cluster addresses that appear as multiple inputs to the same transaction, as they presumably belong to the same user. The only required capabilities are access to the blockchain and marginal compute power to run the analytics, so these attacks are not unique to China; virtually anyone could commit them. Where China has an advantage over typical adversaries is in linking these pseudonyms to IP addresses. One approach would be to covertly (b) monitor Bitcoin network traffic and identify which IP addresses transactions originate from [4,27]. Because Bitcoin traffic is unencrypted, this can be done through deep packet inspection (DPI). China could also use (c) coercion or regulation to covertly compel service providers that deal in Bitcoin, such as merchants or exchanges, to identify their users. Further, it has been shown that when Bitcoin is used for online purchases, enough information is leaked to web trackers that they can uniquely identify the transaction on the blockchain and link it to any identifying information provided by the purchaser [21]. China could covertly (d) intercept this tracking information over the Internet (using DPI) to perform the same attack, compel domestic tracking companies to provide the information (also covertly), or inject their own trackers into Internet traffic to collect similar information themselves. Tracker injection could be detected by anyone specifically monitoring Internet traffic for such attacks, so we note that it would be overt. Finally, China could target users directly using (e) coercion or regulation to compel them to deanonymize themselves or their transaction partners. Again, as long as targets are compelled to keep quiet about orders to reveal information, this attack is covert.
For fungible coins these deanonymization attacks are probably not impossible but a hell of a lot harder.
Just to clarify i am not an expert on the matter. I just feel that to few people are aware about the importance and hope this post maybe sparkle some interesting opinions and conversations along the way.
If you made it this far I applaud you :-), now check how much balance this guy has in his wallet and see how much he earns every month :D
https://moneroblocks.info/search/4AdUndXHHZ6cfufTMvppY6JwXNouMBzSkbLYfpAV5Usx3skxNgYeYTRj5UzqtReoS44qo9mtmXCqY45DJ852K5Jv2684Rge
Example:
Imagine you want to buy a CAR, and your friend needs to sell his CAR. You did some digging in the market to find an agreement on the price and proceed with the transfer. It happens OTC because there is no need for a middleman, it’s your buddy right?! (For clarity, you both sign a contract to change ownership) You are super excited with your new cool ass CAR, never had one before :-) do some drinking and have an accident. You turn up in the hospital and while you pay for your way out you get arrested. Apparently the CAR was stolen and used in a kidnapping affair.
1st point: A lot of people can buy CARs, and since the CAR owners/transactions are all stored somewhere on a ledger... do you think the authorities will let you keep that CAR when they find out it was stolen or maybe something worse?
2nd point: a CAR is a non fungible asset, meaning that you can trace past owners/origin and could end up with a CAR that should actually be worth A LOT less than what you paid for (because it was obviously dirty)
Now go back to the beginning of the example and switch CAR with BTC, then you will know why fungibility matters.
TLDR; to fungible or not to fungible, that is the question and the answer will either save us all or enslave us all.
Edit: added short example
submitted by zwarbo to CryptoCurrency [link] [comments]

Does Moving Your Bitcoin Through Non-KYC Exchanges "Clean" It?

Thanks in advance to anyone who knows the answer to this...
If I have, say, 10 BTC, and I send that 1 BTC to an exchange (without doing KYC), and then send that 10 BTC back out to a completely different wallet, can that be traced back to me, or have I essentially broken the chain?
As it's my understanding that the Bitcoin you send to an exchange is not the exact same Bitcoin you withdraw, this would SEEM to make it anonymous again...but is this the case?
Again, thanks in advance to anyone who knows exactly how this works.
submitted by godsjwfb to Bitcoin [link] [comments]

TOP 3 Anonymous Cryptocurrencies

TOP 3 Anonymous Cryptocurrencies
Last year Bitfury’s multidisciplinary Blockchain specialists announced the possibility of revealing the identities of more than 16% of all owners of Bitcoin addresses. Several years ago, a team of CryptoLux developers, having conducted a study of transaction privacy on the Bitcoin network, concluded that 60% of all addresses can be deanonymized. Summarizing all this, it’s worth highlighting three existing methods that can successfully deanonymize private transactions.

Clustering

The easiest way to cluster (link Bitcoin addresses) is by analyzing transactional networks. In other words, this is a method that allows finding several inputs combined in one transaction. The second clustering method is “distribution analysis”. It allows calculation the percentage of cryptocurrency at the certain address that comes from another specific address and it becomes clear whether these addresses are connected by one direct transaction or a chain of transactions or not.

Graph analysis

It consists of quantitative and temporal analyzes. Quantitative analysis studies not certain transactions, but amounts. Time analysis tracks specific periods.

Memory Pool Method

When a transaction is made through the user’s wallet, the input nodes send information about the transaction to the Blockchain network. The purpose of this method is to identify the set of input nodes through the wallet and the user. In this case, the IP address of the client can be associated with its transactions. There are certain private cryptocurrency-leaders which are popular and trusted among users. Using one feature-privacy, they have different ways of functioning.

Basic principles of work: anonymous cryptocurrencies (Monero, Dash, Zcash)

Monero

The platform focuses on privacy and decentralization. The coin uses three levels of protection:
• Ring signatures, that hide the origin of the sender by mixing the user’s address with the addresses of other group members. • Ring confidential transactions, which hide the amount of the transaction. • Stealth addresses, that allow a user to hide the recipient’s address.
Such way guarantees the privacy of the sender and the recipient. Monero can be bought on Poloniex, Bitfinex, Livecoin, and Kraken crypto exchanges. It is possible to store Monero via an online wallet. More secure is its computer wallet. Due to its privacy, the popularity of the coin is expected to grow, so it makes sense to add a coin to an investment portfolio.
Advantages
• Increased privacy. Cryptocurrency is suitable for those who are afraid of deanonymizing network transactions. • Unlimited and difficult mining. • It takes less time to find blocks. • Resistance to the centralization of mining capacities.
Disadvantages
• Resources. All currency protection technologies require impressive machine performance for normal operation. The Monero block size is constantly growing, and this requires additional resources of network participants. • The popularity in the dark web leads to problems in working with regulatory authorities, exchanges often delist it. Speaking of reputation, Monero’s reputation is far from the best. The coin is often used on the dark web as payment for various illegal services. It happens to almost all crypto coins that provide privacy. • Large transaction sizes. Since Monero Blockchain is five times larger than the Bitcoin Blockchain in terms of one transaction. • Problems with scalability.

Dash

The Dash platform is a classic decentralized Blockchain-based payment system and the most technologically advanced cryptocurrency. It implements multi-off-chain money transfers without loss of reliability and overall security of the Blockchain. Its confidentiality is rather an additional option that can be used optionally. In the case of anonymity, it is possible to send a hidden transaction, but at a more expensive cost, which also requires additional time. Dash developed a hashing algorithm with eleven cryptographic functions-X 11 for the first time. The coin developers have released apps for other platforms. Today it is possible to use Dash for IOS, Zeal for Linux, LovelyDocs for Android and Velocity for Windows.
As well known, the CoinJoin is an anonymization method for crypto transactions, which is used by Dash as an improved version called the PrivateSend. Its mixing sessions are limited to 1,000 DASH for each session and will require multiple mixing sessions to anonymize a large amount of money.
Advantages
• High transaction speed. It is achieved via InstantX technology, which enables the confirmation of operations in less than 4 seconds. • Law transaction fees. • Energy consumption. Unlike Monero, it does not require a lot of power or high commission costs.
Disadvantages
• “Transparency” of the network. Without triggering the “mixing” mechanism, the directions of transactions and their balances are publicly visible to everyone. • Lack of proper cryptographic technologies that provide privacy, but can provide a sufficiently high level of protection. • Transaction visibility to the founders and the team.

Zcash

An open-source decentralized cryptocurrency that provides users with maximum privacy. Zcash is the first private cryptocurrency, using cryptographic protocol zk-SNARKS, a zero-knowledge security layer. It allows users to make hidden and open transactions.
Mathematically guaranteed privacy is something cryptocurrency can not be proud of. This fact makes the currency specific. All Zcash coins are identical, it means that interchangeable coins do not contain information about past use created. In this regard, the connection of coins with their history on the Blockchain is broken, which makes them universal and identical to each other. Zcash blocks are generated 4 times faster than Bitcoin. The currency trades on Huobi, Bitfinex and Binance exchanges, and after purchase, it can be stored on the exchange’s internal wallet, as well as transferred to Jaxx, Cryptonator and Coinomi multi-currency wallets. Coins can also be stored on hardware wallets like Ledger and Trezor.
Advantages
• Privacy. Since no information except the time stamp, is recorded in the Blockchain, transactions cannot be tracked, and the identity of the sender and recipient is almost impossible to establish. • Interchangeability. Due to interchangeability, all coins have a “clean” history. This means that it is practically impossible to determine which transactions coin was used. • Security. Lack of information about user keys, which protects user wallets and the network.Mining energy efficiency. Zcash mining hardware consumes less electricity than Bitcoin mining ASICs. • The difficulty of mining. Zcash is beneficial for those who want to get coins for block creation. Bitcoin mining becomes more and more complicated, so miners cannot earn enough money via their computers with high capacity.
Disadvantages
• 6 users can decide to leave the transferred data completely open. • It takes a lot of calculations to complete a transaction. • Insecurity. There are fears that the system could be hacked, or users may accidentally open the data. • Legally ZCash is supported only by Linux, however, it provides users with wallets for other platforms: Jaxx, Ledger, Trezor, Trust, Zecwallet, Ibitcome, Exodus, Guarda, Coinomi, Cobowallet, and Bitgo.
Private cryptocurrencies are necessary for anyone who values the privacy and confidentiality of financial transactions. Privacy can generate more value, than danger, as Eric Hughes says: “Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world”.
submitted by Stealthex_io to StealthEX [link] [comments]

Cryptocurrency regulations of the future

Will China/USA/Europe ban the use of Bitcoin and traditional cryptocurrencies (including privacy coins) after they introduce their own state-controlled Central Bank Digital Currencies? Will they use fear, fake news of crime to justify this? They want to control money, they want data.
Will they first cripple these currencies by regulating the shit out of them, assigning different value to coins people they don't like owed at some point? Regulations already started, everyone owning crypto is deanonymized, exchange is heavily controlled, centralized exchanges steal money from people they don't like by "freezing" their accounts.
If big cuntries ban real cryptocurrencies, when 25%/50%/75% of all users loose access, how will that fuck with the price?
Will people use decentralized networks -- like Tor and I2P -- to have access to crypto? China already bans Tor, and makes it almost impossible to access the network. Hardware and software spies on all of us. China banned the real internet, now Russia wants to follow. Australia tries to ban cryptography, now USA wants to follow, again. What will we do when other cuntries start banning privacy networks?
Support decentralization, support free software. Don't let propaganda influence you, don't accept regulations.
-gen_server | post signed | pgp:F778933194DC122F8AD860FE3258E0996EC21CBD |
submitted by gen_server to CryptoCurrency [link] [comments]

Which are your Top 5 favourite coins out of the Top 100? An analysis.

I am putting together my investment portfolio for 2018 and made a complete summary of the current Top 100. Interestingly, I noticed that all coins can be categorized into 12 markets. Which markets do you think will play the biggest role in the coming year?
Here is a complete overview of all coins in an excel sheet including name, market, TPS, risk profile, time since launch (negative numbers mean that they are launching that many months in the future) and market cap. You can also sort by all of these fields of course. Coins written in bold are the strongest contenders within their market either due to having the best technology or having a small market cap and still excellent technology and potential. https://docs.google.com/spreadsheets/d/1s8PHcNvvjuy848q18py_CGcu8elRGQAUIf86EYh4QZo/edit#gid=0
The 12 markets are
  1. Currency 13 coins
  2. Platform 25 coins
  3. Ecosystem 9 coins
  4. Privacy 10 coins
  5. Currency Exchange Tool 8 coins
  6. Gaming & Gambling 5 coins
  7. Misc 15 coins
  8. Social Network 4 coins
  9. Fee Token 3 coins
  10. Decentralized Data Storage 4 coins
  11. Cloud Computing 3 coins
  12. Stable Coin 2 coins
Before we look at the individual markets, we need to take a look of the overall market and its biggest issue scalability first:
Cryptocurrencies aim to be a decentralized currency that can be used worldwide. Its goal is to replace dollar, Euro, Yen, all FIAT currencies worldwide. The coin that will achieve that will be worth several trillion dollars.
Bitcoin can only process 7 transactions per second (TPS). In order to replace all FIAT, it would need to perform at at least VISA levels, which usually processes around 3,000 TPS, up to 25,000 TPS during peak times and a maximum of 64,000 TPS. That means that this cryptocurrency would need to be able to perform at least several thousand TPS. However, a ground breaking technology should not look at current technology to set a goal for its use, i.e. estimating the number of emails sent in 1990 based on the number of faxes sent wasn’t a good estimate.
For that reason, 10,000 TPS is the absolute baseline for a cryptocurrency that wants to replace FIAT. This brings me to IOTA, which wants to connect all 80 billion IoT devices that are expected to exist by 2025, which constantly communicate with each other, creating 80 billion or more transactions per second. This is the benchmark that cryptocurrencies should be aiming for. Currently, 8 billion devices are connected to the Internet.
With its Lightning network recently launched, Bitcoin is realistically looking at 50,000 possible soon. Other notable cryptocurrencies besides IOTA and Bitcoin are Nano with 7,000 TPS already tested, Dash with several billion TPS possible with Masternodes, Neo, LISK and RHOC with 100,000 TPS by 2020, Ripple with 50,000 TPS, Ethereum with 10,000 with Sharding.
However, it needs to be said that scalability usually goes at the cost of decentralization and security. So, it needs to be seen, which of these technologies can prove itself resilient and performant.
Without further ado, here are the coins of the first market

Market 1 - Currency:

  1. Bitcoin: 1st generation blockchain with currently bad scalability currently, though the implementation of the Lightning Network looks promising and could alleviate most scalability concerns, scalability and high energy use.
  2. Ripple: Centralized currency that might become very successful due to tight involvement with banks and cross-border payments for financial institutions; banks and companies like Western Union and Moneygram (who they are currently working with) as customers customers. However, it seems they are aiming for more decentralization now.https://ripple.com/dev-blog/decentralization-strategy-update/. Has high TPS due to Proof of Correctness algorithm.
  3. Bitcoin Cash: Bitcoin fork with the difference of having an 8 times bigger block size, making it 8 times more scalable than Bitcoin currently. Further block size increases are planned. Only significant difference is bigger block size while big blocks lead to further problems that don't seem to do well beyond a few thousand TPS. Opponents to a block size argue that increasing the block size limit is unimaginative, offers only temporary relief, and damages decentralization by increasing costs of participation. In order to preserve decentralization, system requirements to participate should be kept low. To understand this, consider an extreme example: very big blocks (1GB+) would require data center level resources to validate the blockchain. This would preclude all but the wealthiest individuals from participating.Community seems more open than Bitcoin's though.
  4. Litecoin : Little brother of Bitcoin. Bitcoin fork with different mining algorithm but not much else.Copies everything that Bitcoin does pretty much. Lack of real innovation.
  5. Dash: Dash (Digital Cash) is a fork of Bitcoin and focuses on user ease. It has very fast transactions within seconds, low fees and uses Proof of Service from Masternodes for consensus. They are currently building a system called Evolution which will allow users to send money using usernames and merchants will find it easy to integrate Dash using the API. You could say Dash is trying to be a PayPal of cryptocurrencies. Currently, cryptocurrencies must choose between decentralization, speed, scalability and can pick only 2. With Masternodes, Dash picked speed and scalability at some cost of decentralization, since with Masternodes the voting power is shifted towards Masternodes, which are run by Dash users who own the most Dash.
  6. IOTA: 3rd generation blockchain called Tangle, which has a high scalability, no fees and instant transactions. IOTA aims to be the connective layer between all 80 billion IOT devices that are expected to be connected to the Internet in 2025, possibly creating 80 billion transactions per second or 800 billion TPS, who knows. However, it needs to be seen if the Tangle can keep up with this scalability and iron out its security issues that have not yet been completely resolved.
  7. Nano: 3rd generation blockchain called Block Lattice with high scalability, no fees and instant transactions. Unlike IOTA, Nano only wants to be a payment processor and nothing else, for now at least. With Nano, every user has their own blockchain and has to perform a small amount of computing for each transaction, which makes Nano perform at 300 TPS with no problems and 7,000 TPS have also been tested successfully. Very promising 3rd gen technology and strong focus on only being the fastest currency without trying to be everything.
  8. Decred: As mining operations have grown, Bitcoin’s decision-making process has become more centralized, with the largest mining companies holding large amounts of power over the Bitcoin improvement process. Decred focuses heavily on decentralization with their PoW Pos hybrid governance system to become what Bitcoin was set out to be. They will soon implement the Lightning Network to scale up. While there do not seem to be more differences to Bitcoin besides the novel hybrid consensus algorithm, which Ethereum, Aeternity and Bitcoin Atom are also implementing, the welcoming and positive Decred community and professoinal team add another level of potential to the coin.
  9. Aeternity: We’ve seen recently, that it’s difficult to scale the execution of smart contracts on the blockchain. Crypto Kitties is a great example. Something as simple as creating and trading unique assets on Ethereum bogged the network down when transaction volume soared. Ethereum and Zilliqa address this problem with Sharding. Aeternity focuses on increasing the scalability of smart contracts and dapps by moving smart contracts off-chain. Instead of running on the blockchain, smart contracts on Aeternity run in private state channels between the parties involved in the contracts. State channels are lines of communication between parties in a smart contract. They don’t touch the blockchain unless they need to for adjudication or transfer of value. Because they’re off-chain, state channel contracts can operate much more efficiently. They don’t need to pay the network for every time they compute and can also operate with greater privacy. An important aspect of smart contract and dapp development is access to outside data sources. This could mean checking the weather in London, score of a football game, or price of gold. Oracles provide access to data hosted outside the blockchain. In many blockchain projects, oracles represent a security risk and potential point of failure, since they tend to be singular, centralized data streams. Aeternity proposes decentralizing oracles with their oracle machine. Doing so would make outside data immutable and unchangeable once it reaches Aeternity’s blockchain. Of course, the data source could still be hacked, so Aeternity implements a prediction market where users can bet on the accuracy and honesty of incoming data from various oracles.It also uses prediction markets for various voting and verification purposes within the platform. Aeternity’s network runs on on a hybrid of proof of work and proof of stake. Founded by a long-time crypto-enthusiast and early colleague of Vitalik Buterin, Yanislav Malahov. Promising concept though not product yet
  10. Bitcoin Atom: Atomic Swaps and hybrid consenus. This looks like the only Bitcoin clone that actually is looking to innovate next to Bitcoin Cash.
  11. Dogecoin: Litecoin fork, fantastic community, though lagging behind a bit in technology.
  12. Bitcoin Gold: A bit better security than bitcoin through ASIC resistant algorithm, but that's it. Not that interesting.
  13. Digibyte: Digibyte's PoS blockchain is spread over a 100,000+ servers, phones, computers, and nodes across the globe, aiming for the ultimate level of decentralization. DigiByte rebalances the load between the five mining algorithms by adjusting the difficulty of each so one algorithm doesn’t become dominant. The algorithm's asymmetric difficulty has gained notoriety and been deployed in many other blockchains.DigiByte’s adoption over the past four years has been slow. It’s still a relatively obscure currency compared its competitors. The DigiByte website offers a lot of great marketing copy and buzzwords. However, there’s not much technical information about what they have planned for the future. You could say Digibyte is like Bitcoin, but with shorter blocktimes and a multi-algorithm. However, that's not really a difference big enough to truly set themselves apart from Bitcoin, since these technologies could be implemented by any blockchain without much difficulty. Their decentralization is probably their strongest asset, however, this also change quickly if the currency takes off and big miners decide to go into Digibyte.
  14. Bitcoin Diamond Asic resistant Bitcoin and Copycat

Market 2 - Platform

Most of the cryptos here have smart contracts and allow dapps (Decentralized apps) to be build on their platform and to use their token as an exchange of value between dapp services.
  1. Ethereum: 2nd generation blockchain that allows the use of smart contracts. Bad scalability currently, though this concern could be alleviated by the soon to be implemented Lightning Network aka Plasma and its Sharding concept.
  2. EOS: Promising technology that wants to be able do everything, from smart contracts like Ethereum, scalability similar to Nano with 1000 tx/second + near instant transactions and zero fees, to also wanting to be a platform for dapps. However, EOS doesn't have a product yet and everything is just promises still. Highly overvalued right now. However, there are lots of red flags, have dumped $500 million Ether over the last 2 months and possibly bought back EOS to increase the size of their ICO, which has been going on for over a year and has raised several billion dollars. All in all, their market cap is way too high for that and not even having a product.
  3. Cardano: Similar to Ethereum/EOS, however, only promises made with no delivery yet, highly overrated right now. Interesting concept though. Market cap way too high for not even having a product. Somewhat promising technology.
  4. VeChain: Singapore-based project that’s building a business enterprise platform and inventory tracking system. Examples are verifying genuine luxury goods and food supply chains. Has one of the strongest communities in the crypto world. Most hyped token of all, with merit though.
  5. Neo: Neo is a platform, similar to Eth, but more extensive, allowing dapps and smart contracts, but with a different smart contract gas system, consensus mechanism (PoS vs. dBfT), governance model, fixed vs unfixed supply, expensive contracts vs nearly free contracts, different ideologies for real world adoption. There are currently only 9 nodes, each of which are being run by a company/entity hand selected by the NEO council (most of which are located in china) and are under contract. This means that although the locations of the nodes may differ, ultimately the neo council can bring them down due to their legal contracts. In fact this has been done in the past when the neo council was moving 50 million neo that had been locked up. Also dbft (or neo's implmentation of it) has failed underload causing network outages during major icos. The first step in decentralization is that the NEO Counsel will select trusted nodes (Universities, business partners, etc.) and slowly become less centralized that way. The final step in decentralization will be allowing NEO holders to vote for new nodes, similar to a DPoS system (ARK/EOS/LISK). NEO has a regulation/government friendly ideology. Finally they are trying to work undewith the Chinese government in regards to regulations. If for some reason they wanted it shut down, they could just shut it down.
  6. Stellar: PoS system, similar goals as Ripple, but more of a platform than only a currency. 80% of Stellar are owned by Stellar.org still, making the currency centralized.
  7. Ethereum classic: Original Ethereum that decided not to fork after a hack. The Ethereum that we know is its fork. Uninteresing, because it has a lot of less resources than Ethereum now and a lot less community support.
  8. Ziliqa: Zilliqa is building a new way of sharding. 2400 tpx already tested, 10,000 tps soon possible by being linearly scalable with the number of nodes. That means, the more nodes, the faster the network gets. They are looking at implementing privacy as well.
  9. QTUM: Enables Smart contracts on the Bitcoin blockchain. Useful.
  10. Icon: Korean ethereum. Decentralized application platform that's building communities in partnership with banks, insurance providers, hospitals, and universities. Focused on ID verification and payments. No big differentiators to the other 20 Ethereums, except that is has a product. That is a plus. Maybe cheap alternative to Ethereum.
  11. LISK: Lisk's difference to other BaaS is that side chains are independent to the main chain and have to have their own nodes. Similar to neo whole allows dapps to deploy their blockchain to. However, Lisk is currently somewhat centralized with a small group of members owning more than 50% of the delegated positions. Lisk plans to change the consensus algorithm for that reason in the near future.
  12. Rchain: Similar to Ethereum with smart contract, though much more scalable at an expected 40,000 TPS and possible 100,000 TPS. Not launched yet. No product launched yet, though promising technology. Not overvalued, probably at the right price right now.
  13. ARDR: Similar to Lisk. Ardor is a public blockchain platform that will allow people to utilize the blockchain technology of Nxt through the use of child chains. A child chain, which is a ‘light’ blockchain that can be customized to a certain extent, is designed to allow easy self-deploy for your own blockchain. Nxt claims that users will "not need to worry" about security, as that part is now handled by the main chain (Ardor). This is the chief innovation of Ardor. Ardor was evolved from NXT by the same company. NEM started as a NXT clone.
  14. Ontology: Similar to Neo. Interesting coin
  15. Bytom: Bytom is an interactive protocol of multiple byte assets. Heterogeneous byte-assets (indigenous digital currency, digital assets) that operate in different forms on the Bytom Blockchain and atomic assets (warrants, securities, dividends, bonds, intelligence information, forecasting information and other information that exist in the physical world) can be registered, exchanged, gambled and engaged in other more complicated and contract-based interoperations via Bytom.
  16. Nxt: Similar to Lisk
  17. Stratis: Different to LISK, Stratis will allow businesses and organizations to create their own blockchain according to their own needs, but secured on the parent Stratis chain. Stratis’s simple interface will allow organizations to quickly and easily deploy and/or test blockchain functionality of the Ethereum, BitShares, BitCoin, Lisk and Stratis environements.
  18. Status: Status provides access to all of Ethereum’s decentralized applications (dapps) through an app on your smartphone. It opens the door to mass adoption of Ethereum dapps by targeting the fastest growing computer segment in the world – smartphone users.16. Ark: Fork of Lisk that focuses on a smaller feature set. Ark wallets can only vote for one delegate at a time which forces delegates to compete against each other and makes cartel formations incredibly hard, if not impossible.
  19. Neblio: Similar to Neo, but 30x smaller market cap.
  20. NEM: Is similar to Neo No marketing team, very high market cap for little clarilty what they do.
  21. Bancor: Bancor is a Decentralized Liquidity Network that allows you to hold any Ethereum token and convert it to any other token in the network, with no counter party, at an automatically calculated price, using a simple web wallet.
  22. Dragonchain: The Purpose of DragonChain is to help companies quickly and easily incorporate blockchain into their business applications. Many companies might be interested in making this transition because of the benefits associated with serving clients over a blockchain – increased efficiency and security for transactions, a reduction of costs from eliminating potential fraud and scams, etc.
  23. Skycoin: Transactions with zero fees that take apparently two seconds, unlimited transaction rate, no need for miners and block rewards, low power usage, all of the usual cryptocurrency technical vulnerabilities fixed, a consensus mechanism superior to anything that exists, resistant to all conceivable threats (government censorship, community infighting, cybenucleaconventional warfare, etc). Skycoin has their own consensus algorithm known as Obelisk written and published academically by an early developer of Ethereum. Obelisk is a non-energy intensive consensus algorithm based on a concept called ‘web of trust dynamics’ which is completely different to PoW, PoS, and their derivatives. Skywire, the flagship application of Skycoin, has the ambitious goal of decentralizing the internet at the hardware level and is about to begin the testnet in April. However, this is just one of the many facets of the Skycoin ecosystem. Skywire will not only provide decentralized bandwidth but also storage and computation, completing the holy trinity of commodities essential for the new internet. Skycion a smear campaign launched against it, though they seem legit and reliable. Thus, they are probably undervalued.

Market 3 - Ecosystem

The 3rd market with 11 coins is comprised of ecosystem coins, which aim to strengthen the ease of use within the crypto space through decentralized exchanges, open standards for apps and more
  1. Nebulas: Similar to how Google indexes webpages Nebulas will index blockchain projects, smart contracts & data using the Nebulas rank algorithm that sifts & sorts the data. Developers rewarded NAS to develop & deploy on NAS chain. Nebulas calls this developer incentive protocol – basically rewards are issued based on how often dapp/contract etc. is used, the more the better the rewards and Proof of devotion. Works like DPoS except the best, most economically incentivised developers (Bookkeeppers) get the forging spots. Ensuring brains stay with the project (Cross between PoI & PoS). 2,400 TPS+, DAG used to solve the inter-transaction dependencies in the PEE (Parallel Execution Environment) feature, first crypto Wallet that supports the Lightening Network.
  2. Waves: Decentralized exchange and crowdfunding platform. Let’s companies and projects to issue and manage their own digital coin tokens to raise money.
  3. Salt: Leveraging blockchain assets to secure cash loands. Plans to offer cash loans in traditional currencies, backed by your cryptocurrency assets. Allows lenders worldwide to skip credit checks for easier access to affordable loans.
  4. CHAINLINK: ChainLink is a decentralized oracle service, the first of its kind. Oracles are defined as an ‘agent’ that finds and verifies real-world occurrences and submits this information to a blockchain to be used in smart contracts.With ChainLink, smart contract users can use the network’s oracles to retrieve data from off-chain application program interfaces (APIs), data pools, and other resources and integrate them into the blockchain and smart contracts. Basically, ChainLink takes information that is external to blockchain applications and puts it on-chain. The difference to Aeternity is that Chainlink deploys the smart contracts on the Ethereum blockchain while Aeternity has its own chain.
  5. WTC: Combines blockchain with IoT to create a management system for supply chains Interesting
  6. Ethos unifyies all cryptos. Ethos is building a multi-cryptocurrency phone wallet. The team is also building an investment diversification tool and a social network
  7. Aion: Aion is the token that pays for services on the Aeternity platform.
  8. USDT: is no cryptocurrency really, but a replacement for dollar for trading After months of asking for proof of dollar backing, still no response from Tether.

Market 4 - Privacy

The 4th market are privacy coins. As you might know, Bitcoin is not anonymous. If the IRS or any other party asks an exchange who is the identity behind a specific Bitcoin address, they know who you are and can track back almost all of the Bitcoin transactions you have ever made and all your account balances. Privacy coins aim to prevent exactly that through address fungability, which changes addresses constantly, IP obfuscation and more. There are 2 types of privacy coins, one with completely privacy and one with optional privacy. Optional Privacy coins like Dash and Nav have the advantage of more user friendliness over completely privacy coins such as Monero and Enigma.
  1. Monero: Currently most popular privacy coin, though with a very high market cap. Since their privacy is all on chain, all prior transactions would be deanonymized if their protocol is ever cracked. This requires a quantum computing attack though. PIVX is better in that regard.
  2. Zcash: A decentralized and open-source cryptocurrency that hide the sender, recipient, and value of transactions. Offers users the option to make transactions public later for auditing. Decent privacy coin, though no default privacy
  3. Verge: Calls itself privacy coin without providing private transactions, multiple problems over the last weeks has a toxic community, and way too much hype for what they have.
  4. Bytecoin: First privacy-focused cryptocurrency with anonymous transactions. Bytecoin’s code was later adapted to create Monero, the more well-known anonymous cryptocurrency. Has several scam accusations, 80% pre-mine, bad devs, bad tech
  5. Bitcoin Private: A merge fork of Bitcoin and Zclassic with Zclassic being a fork of Zcash with the difference of a lack of a founders fee required to mine a valid block. This promotes a fair distribution, preventing centralized coin ownership and control. Bitcoin private offers the optional ability to keep the sender, receiver, and amount private in a given transaction. However, this is already offered by several good privacy coins (Monero, PIVX) and Bitcoin private doesn't offer much more beyond this.
  6. Komodo: The Komodo blockchain platform uses Komodo’s open-source cryptocurrency for doing transparent, anonymous, private, and fungible transactions. They are then made ultra-secure using Bitcoin’s blockchain via a Delayed Proof of Work (dPoW) protocol and decentralized crowdfunding (ICO) platform to remove middlemen from project funding. Offers services for startups to create and manage their own Blockchains.
  7. PIVX: As a fork of Dash, PIVX uses an advanced implementation of the Zerocoin protocol to provide it’s privacy. This is a form of zeroknowledge proofs, which allow users to spend ‘Zerocoins’ that have no link back to them. Unlike Zcash u have denominations in PIVX, so they can’t track users by their payment amount being equal to the amount of ‘minted’ coins, because everyone uses the same denominations. PIVX is also implementing Bulletproofs, just like Monero, and this will take care of arguably the biggest weakness of zeroknowledge protocols: the trusted setup.
  8. Zcoin: PoW cryptocurrency. Private financial transactions, enabled by the Zerocoin Protocol. Zcoin is the first full implementation of the Zerocoin Protocol, which allows users to have complete privacy via Zero-Knowledge cryptographic proofs.
  9. Enigma: Monero is to Bitcoin what enigma is to Ethereum. Enigma is for making the data used in smart contracts private. More of a platform for dapps than a currency like Monero. Very promising.
  10. Navcoin: Like bitcoin but with added privacy and pos and 1,170 tps, but only because of very short 30 second block times. Though, privacy is optional, but aims to be more user friendly than Monero. However, doesn't really decide if it wants to be a privacy coin or not. Same as Zcash.Strong technology, non-shady team.
  11. Tenx: Raised 80 million, offers cryptocurrency-linked credit cards that let you spend virtual money in real life. Developing a series of payment platforms to make spending cryptocurrency easier. However, the question is if full privacy coins will be hindered in growth through government regulations and optional privacy coins will become more successful through ease of use and no regulatory hindrance.

Market 5 - Currency Exchange Tool

Due to the sheer number of different cryptocurrencies, exchanging one currency for the other it still cumbersome. Further, merchants don’t want to deal with overcluttered options of accepting cryptocurrencies. This is where exchange tool like Req come in, which allow easy and simple exchange of currencies.
  1. Cryptonex: Fiat and currency exchange between various blockchain services, similar to REQ.
  2. QASH: Qash is used to fuel its liquid platform which will be an exchange that will distribute their liquidity pool. Its product, the Worldbook is a multi-exchange order book that matches crypto to crypto, and crypto to fiat and the reverse across all currencies. E.g., someone is selling Bitcoin is USD on exchange1 not owned by Quoine and someone is buying Bitcoin in EURO on exchange 2 not owned by Quoine. If the forex conversions and crypto conversions match then the trade will go through and the Worldbook will match it, it'll make the sale and the purchase on either exchange and each user will get what they wanted, which means exchanges with lower liquidity if they join the Worldbook will be able to fill orders and take trade fees they otherwise would miss out on.They turned it on to test it a few months ago for an hour or so and their exchange was the top exchange in the world by 4x volume for the day because all Worldbook trades ran through it. Binance wants BNB to be used on their one exchange. Qash wants their QASH token embedded in all of their partners. More info here https://www.reddit.com/CryptoCurrency/comments/8a8lnwhich_are_your_top_5_favourite_coins_out_of_the/dwyjcbb/?context=3
  3. Kyber: network Exchange between cryptocurrencies, similar to REQ. Features automatic coin conversions for payments. Also offers payment tools for developers and a cryptocurrency wallet.
  4. Achain: Building a boundless blockchain world like Req .
  5. Req: Exchange between cryptocurrencies.
  6. Bitshares: Exchange between cryptocurrencies. Noteworthy are the 1.5 second average block times and throughput potential of 100,000 transactions per second with currently 2,400 TPS having been proven. However, bitshares had several Scam accusations in the past.
  7. Loopring: A protocol that will enable higher liquidity between exchanges and personal wallets.
  8. ZRX: Open standard for dapps. Open, permissionless protocol allowing for ERC20 tokens to be traded on the Ethereum blockchain. In 0x protocol, orders are transported off-chain, massively reducing gas costs and eliminating blockchain bloat. Relayers help broadcast orders and collect a fee each time they facilitate a trade. Anyone can build a relayer.

Market 6 - Gaming

With an industry size of $108B worldwide, Gaming is one of the largest markets in the world. For sure, cryptocurrencies will want to have a share of that pie.
  1. Storm: Mobile game currency on a platform with 9 million players.
  2. Fun: A platform for casino operators to host trustless, provably-fair gambling through the use of smart contracts, as well as creating their own implementation of state channels for scalability.
  3. Electroneum: Mobile game currency They have lots of technical problems, such as several 51% attacks
  4. Wax: Marketplace to trade in-game items

Market 7 - Misc

There are various markets being tapped right now. They are all summed up under misc.
  1. OMG: Omise is designed to enable financial services for people without bank accounts. It works worldwide and with both traditional money and cryptocurrencies.
  2. Power ledger: Australian blockchain-based cryptocurrency and energy trading platform that allows for decentralized selling and buying of renewable energy. Unique market and rather untapped market in the crypto space.
  3. Populous: A platform that connects business owners and invoice buyers without middlemen. Invoice sellers get cash flow to fund their business and invoice buyers earn interest. Similar to OMG, small market.
  4. Monacoin: The first Japanese cryptocurrency. Focused on micro-transactions and based on a popular internet meme of a type-written cat. This makes it similar to Dogecoin. Very niche, tiny market.
  5. Revain: Legitimizing reviews via the blockchain. Interesting concept, though market not as big.
  6. Augur: Platform to forecast and make wagers on the outcome of real-world events (AKA decentralized predictions). Uses predictions for a “wisdom of the crowd” search engine. Not launched yet.
  7. Substratum: Revolutionzing hosting industry via per request billing as a decentralized internet hosting system. Uses a global network of private computers to create the free and open internet of the future. Participants earn cryptocurrency. Interesting concept.
  8. Veritaseum: Is supposed to be a peer to peer gateway, though it looks like very much like a scam.
  9. TRON: Tronix is looking to capitalize on ownership of internet data to content creators. However, they plagiarized their white paper, which is a no go. They apologized, so it needs to be seen how they will conduct themselves in the future. Extremely high market cap for not having a product, nor proof of concept.
  10. Syscoin: A cryptocurrency with a decentralized marketplace that lets people buy and sell products directly without third parties. Trying to remove middlemen like eBay and Amazon.
  11. Hshare: Most likely scam because of no code changes, most likely pump and dump scheme, dead community.
  12. BAT: An Ethereum-based token that can be exchanged between content creators, users, and advertisers. Decentralized ad-network that pays based on engagement and attention.
  13. Dent: Decentralizeed exchange of mobile data, enabling mobile data to be marketed, purchased or distributed, so that users can quickly buy or sell data from any user to another one.
  14. Ncash: End to end encrypted Identification system for retailers to better serve their customers .
  15. Factom Secure record-keeping system that allows companies to store their data directly on the Blockchain. The goal is to make records more transparent and trustworthy .

Market 8 - Social network

Web 2.0 is still going strong and Web 3.0 is not going to ignore it. There are several gaming tokens already out there and a few with decent traction already, such as Steem, which is Reddit with voting through money is a very interesting one.
  1. Mithril: As users create content via social media, they will be rewarded for their contribution, the better the contribution, the more they will earn
  2. Steem: Like Reddit, but voting with money. Already launched product and Alexa rank 1,000 Thumbs up.
  3. Rdd: Reddcoin makes the process of sending and receiving money fun and rewarding for everyone. Reddcoin is dedicated to one thing – tipping on social networks as a way to bring cryptocurrency awareness and experience to the general public.
  4. Kin: Token for the platform Kik. Kik has a massive user base of 400 million people. Replacing paying with FIAT with paying with KIN might get this token to mass adoption very quickly.

Market 9 - Fee token

Popular exchanges realized that they can make a few billion dollars more by launching their own token. Owning these tokens gives you a reduction of trading fees. Very handy and BNB (Binance Coin) has been one of the most resilient tokens, which have withstood most market drops over the last weeks and was among the very few coins that could show growth.
  1. BNB: Fee token for Binance
  2. Gas: Not a Fee token for an exchange, but it is a dividend paid out on Neo and a currency that can be used to purchase services for dapps.
  3. Kucoin: Fee token for Kucoin

Market 10 - Decentralized Data Storage

Currently, data storage happens with large companies or data centers that are prone to failure or losing data. Decentralized data storage makes loss of data almost impossible by distributing your files to numerous clients that hold tiny pieces of your data. Remember Torrents? Torrents use a peer-to-peer network. It is similar to that. Many users maintain copies of the same file, when someone wants a copy of that file, they send a request to the peer-to-peer network., users who have the file, known as seeds, send fragments of the file to the requester., he requester receives many fragments from many different seeds, and the torrent software recompiles these fragments to form the original file.
  1. Gbyte: Byteball data is stored and ordered using directed acyclic graph (DAG) rather than blockchain. This allows all users to secure each other's data by referencing earlier data units created by other users, and also removes scalability limits common for blockchains, such as blocksize issue.
  2. Siacoin: Siacoin is decentralized storage platform. Distributes encrypted files to thousands of private users who get paid for renting out their disk space. Anybody with siacoins can rent storage from hosts on Sia. This is accomplish via "smart" storage contracts stored on the Sia blockchain. The smart contract provides a payment to the host only after the host has kept the file for a given amount of time. If the host loses the file, the host does not get paid.
  3. Maidsafecoin: MaidSafe stands for Massive Array of Internet Disks, Secure Access for Everyone.Instead of working with data centers and servers that are common today and are vulnerable to data theft and monitoring, SAFE’s network uses advanced P2P technology to bring together the spare computing capacity of all SAFE users and create a global network. You can think of SAFE as a crowd-sourced internet. All data and applications reside in this network. It’s an autonomous network that automatically sets prices and distributes data and rents out hard drive disk space with a Blockchain-based storage solutions.When you upload a file to the network, such as a photo, it will be broken into pieces, hashed, and encrypted. The data is then randomly distributed across the network. Redundant copies of the data are created as well so that if someone storing your file turns off their computer, you will still have access to your data. And don’t worry, even with pieces of your data on other people’s computers, they won’t be able to read them. You can earn MadeSafeCoins by participating in storing data pieces from the network on your computer and thus earning a Proof of Resource.
  4. Storj: Storj aims to become a cloud storage platform that can’t be censored or monitored, or have downtime. Your files are encrypted, shredded into little pieces called 'shards', and stored in a decentralized network of computers around the globe. No one but you has a complete copy of your file, not even in an encrypted form.

Market 11 - Cloud computing

Obviously, renting computing power, one of the biggest emerging markets as of recent years, e.g. AWS and Digital Ocean, is also a service, which can be bought and managed via the blockchain.
  1. Golem: Allows easy use of Supercomputer in exchange for tokens. People worldwide can rent out their computers to the network and get paid for that service with Golem tokens.
  2. Elf: Allows easy use of Cloud computing in exchange for tokens.

Market 12 - Stablecoin

Last but not least, there are 2 stablecoins that have established themselves within the market. A stable coin is a coin that wants to be independent of the volatility of the crypto markets. This has worked out pretty well for Maker and DGD, accomplished through a carefully diversified currency fund and backing each token by 1g or real gold respectively. DO NOT CONFUSE DGD AND MAKER with their STABLE COINS DGX and DAI. DGD and MAKER are volatile, because they are the companies of DGX and DAI. DGX and DAI are the stable coins.
  1. DGD: Platform of the Stablecoin DGX. Every DGX coin is backed by 1g of gold and make use proof of asset consensus.
  2. Maker: Platform of the Stablecoin DAI that doesn't vary much in price through widespread and smart diversification of assets.
EDIT: Added a risk factor from 0 to 10. The baseline is 2 for any crypto. Significant scandals, mishaps, shady practices, questionable technology, increase the risk factor. Not having a product yet automatically means a risk factor of 6. Strong adoption and thus strong scrutiny or positive community lower the risk factor.
EDIT2: Added a subjective potential factor from 0 to 10, where its overall potential and a small or big market cap is factored in. Bitcoin with lots of potential only gets a 9, because of its massive market cap, because if Bitcoin goes 10x, smaller coins go 100x, PIVX gets a 10 for being as good as Monero while carrying a 10x smaller market cap, which would make PIVX go 100x if Monero goes 10x.
submitted by galan77 to CryptoCurrency [link] [comments]

Which are your top 5 coins out of the top100? An analysis.

I am putting together my investment portfolio for 2018 and made a complete summary of the current Top 100. Interestingly, I noticed that all coins can be categorized into 12 markets. Which markets do you think will play the biggest role in the coming year?
Here is a complete overview of all coins in an excel sheet including name, a full description, market, TPS, risk profile, time since launch (negative numbers mean that they are launching that many months in the future) and market cap. You can also sort by all of these fields of course. Coins written in bold are the strongest contenders within their market either due to having the best technology or having a small market cap and still excellent technology and potential. https://docs.google.com/spreadsheets/d/1s8PHcNvvjuy848q18py_CGcu8elRGQAUIf86EYh4QZo/edit#gid=0
The 12 markets are
  1. Currency 13 coins
  2. Platform 25 coins
  3. Ecosystem 9 coins
  4. Privacy 9 coins
  5. Currency Exchange Tool 8 coins
  6. Gaming & Gambling 4 coins
  7. Misc 15 coins
  8. Social Network 4 coins
  9. Fee Token 3 coins
  10. Decentralized Data Storage 4 coins
  11. Cloud Computing 2 coins
  12. Stable Coin 3 coins
Before we look at the individual markets, we need to take a look of the overall market and its biggest issue, scalability, first:
Cryptocurrencies aim to be a decentralized currency that can be used worldwide. Their goal is to replace dollar, Euro, Yen, all FIAT currencies globally. The coin that will achieve that will be worth several trillion dollars.
Bitcoin can only process 7 transactions per second (TPS) currently. In order to replace all FIAT, it would need to perform at least at VISA levels, which usually processes around 3,000 TPS, up to 25,000 TPS during peak times and a maximum of 64,000 TPS. That means that this cryptocurrency would need to be able to perform at least several thousand TPS. However, a ground breaking technology should not look at current technology to set a goal for its use, i.e. estimating the number of emails sent in 1990 based on the number of faxes sent wasn’t a good estimate.
For that reason, 10,000 TPS is the absolute baseline for a cryptocurrency that wants to replace FIAT. This brings me to IOTA, which wants to connect all 80 billion IoT devices that are expected to exist by 2025, which constantly communicate with each other, possibly creating 80 billion or more transactions per second. This is the benchmark that cryptocurrencies should be aiming for. Currently, 8 billion devices are connected to the Internet.
With its Lightning network recently launched, Bitcoin is realistically looking at 50,000 possible TPS soon. Other notable cryptocurrencies besides IOTA and Bitcoin are Nano with 7,000 TPS already tested, Dash with several billion TPS possible with Masternodes, Neo, LISK and RHOC with 100,000 TPS by 2020, Ripple with 50,000 TPS, Ethereum with 10,000 TPS with Sharding.
However, it needs to be said that scalability usually goes at the cost of decentralization and security. So, it needs to be seen, which of these technologies can prove themselves decentralized while maintaining high TPS.
Without further ado, here are the coins of the first market. Each market is sorted by market cap.

Market 1 - Currency:

  1. Bitcoin: 1st generation blockchain with currently bad scalability, though the implementation of the Lightning Network looks promising and could alleviate most scalability and high energy use concerns.
  2. Ripple: Centralized currency that might become very successful due to tight involvement with banks and cross-border payments for financial institutions; banks and companies like Western Union and Moneygram (who they are currently working with) as customers customers. However, it seems they are aiming for more decentralization now.https://ripple.com/dev-blog/decentralization-strategy-update/. Has high TPS due to Proof of Correctness algorithm.
  3. Bitcoin Cash: Bitcoin fork with the difference of having an 8 times bigger block size, making it 8 times more scalable than Bitcoin currently. Further block size increases are planned. Only significant difference is bigger block size while big blocks lead to further problems that don't seem to do well beyond a few thousand TPS. Opponents to a block size argue that increasing the block size limit is unimaginative, offers only temporary relief, and damages decentralization by increasing costs of participation. In order to preserve decentralization, system requirements to participate should be kept low. To understand this, consider an extreme example: very big blocks (1GB+) would require data center level resources to validate the blockchain. This would preclude all but the wealthiest individuals from participating.Community seems more open than Bitcoin's though.
  4. Litecoin : Little brother of Bitcoin. Bitcoin fork with different mining algorithm but not much else.Copies everything that Bitcoin does pretty much. Lack of real innovation.
  5. Dash: Dash (Digital Cash) is a fork of Bitcoin and focuses on user ease. It has very fast transactions within seconds, low fees and uses Proof of Service from Masternodes for consensus. They are currently building a system called Evolution which will allow users to send money using usernames and merchants will find it easy to integrate Dash using the API. You could say Dash is trying to be a PayPal of cryptocurrencies. Currently, cryptocurrencies must choose between decentralization, speed, scalability and can pick only 2. With Masternodes, Dash picked speed and scalability at some cost of decentralization, since with Masternodes the voting power is shifted towards Masternodes, which are run by Dash users who own the most Dash.
  6. IOTA: 3rd generation blockchain called Tangle, which has a high scalability, no fees and instant transactions. IOTA aims to be the connective layer between all 80 billion IOT devices that are expected to be connected to the Internet in 2025, possibly creating 80 billion transactions per second or 800 billion TPS, who knows. However, it needs to be seen if the Tangle can keep up with this scalability and iron out its security issues that have not yet been completely resolved.
  7. Nano: 3rd generation blockchain called Block Lattice with high scalability, no fees and instant transactions. Unlike IOTA, Nano only wants to be a payment processor and nothing else, for now at least. With Nano, every user has their own blockchain and has to perform a small amount of computing for each transaction, which makes Nano perform at 300 TPS with no problems and 7,000 TPS have also been tested successfully. Very promising 3rd gen technology and strong focus on only being the fastest currency without trying to be everything.
  8. Decred: As mining operations have grown, Bitcoin’s decision-making process has become more centralized, with the largest mining companies holding large amounts of power over the Bitcoin improvement process. Decred focuses heavily on decentralization with their PoW Pos hybrid governance system to become what Bitcoin was set out to be. They will soon implement the Lightning Network to scale up. While there do not seem to be more differences to Bitcoin besides the novel hybrid consensus algorithm, which Ethereum, Aeternity and Bitcoin Atom are also implementing, the welcoming and positive Decred community and professoinal team add another level of potential to the coin.
  9. Bitcoin Atom: Atomic Swaps and hybrid consenus. This looks like the only Bitcoin clone that actually is looking to innovate next to Bitcoin Cash.
  10. Dogecoin: Litecoin fork, fantastic community, though lagging behind a bit in technology.
  11. Bitcoin Gold: A bit better security than bitcoin through ASIC resistant algorithm, but that's it. Not that interesting.
  12. Digibyte: Digibyte's PoS blockchain is spread over a 100,000+ servers, phones, computers, and nodes across the globe, aiming for the ultimate level of decentralization. DigiByte’s adoption over the past four years has been slow. The DigiByte website offers a lot of great marketing copy and buzzwords. However, there’s not much technical information about what they have planned for the future. You could say Digibyte is like Bitcoin, but with shorter blocktimes and a multi-algorithm. However, that's not really a difference big enough to truly set themselves apart from Bitcoin, since these technologies could be implemented by any blockchain without much difficulty. Their decentralization is probably their strongest asset, however, this also change quickly if the currency takes off and big miners decide to go into Digibyte.
  13. Bitcoin Diamond Asic resistant Bitcoin and Copycat

Market 2 - Platform

Most of the cryptos here have smart contracts and allow dapps (Decentralized apps) to be build on their platform and to use their token as an exchange of value between dapp services.
  1. Ethereum: 2nd generation blockchain that allows the use of smart contracts. Bad scalability currently, though this concern could be alleviated by the soon to be implemented Lightning Network aka the Raiden Network, Plasma and its Sharding concept.
  2. EOS: Promising technology that wants to be able do everything, from smart contracts like Ethereum, scalability similar to Nano with 1000 tx/second + near instant transactions and zero fees, to also wanting to be a platform for dapps. However, EOS doesn't have a product yet and everything is just promises still. There are lots of red flags, e.g. having dumped $500 million Ether over the last 2 months and possibly bought back EOS to increase the size of their ICO, which has been going on for over a year and has raised several billion dollars. All in all, their market cap is way too high for that and not even having a product. However, Mainnet release is in 1 month, which could change everything.
  3. Cardano: Similar to Ethereum/EOS, however, only promises made with no delivery yet, highly overrated right now. Interesting concept though. Market cap way too high for not even having a product. Somewhat promising technology.
  4. VeChain: Singapore-based project that’s building a business enterprise platform and inventory tracking system. Examples are verifying genuine luxury goods and food supply chains. Has one of the strongest communities in the crypto world. Most hyped token of all, with merit though.
  5. Neo: Neo is a platform, similar to Eth, but more extensive, allowing dapps and smart contracts, but with a different smart contract gas system, consensus mechanism (PoS vs. dBfT), governance model, fixed vs unfixed supply, expensive contracts vs nearly free contracts, different ideologies for real world adoption. There are currently only 9 nodes, each of which are being run by a company/entity hand selected by the NEO council (most of which are located in china) and are under contract. This means that although the locations of the nodes may differ, ultimately the neo council can bring them down due to their legal contracts. In fact this has been done in the past when the neo council was moving 50 million neo that had been locked up. Also dbft (or neo's implmentation of it) has failed underload causing network outages during major icos. The first step in decentralization is that the NEO Counsel will select trusted nodes (Universities, business partners, etc.) and slowly become less centralized that way. The final step in decentralization will be allowing NEO holders to vote for new nodes, similar to a DPoS system (ARK/EOS/LISK). NEO has a regulation/government friendly ideology. Finally they are trying to work undewith the Chinese government in regards to regulations. If for some reason they wanted it shut down, they could just shut it down.
  6. Stellar:PoS system, similar goals as Ripple, but more of a platform than only a currency. 80% of Stellar are owned by Stellar.org still, making the currency centralized.
  7. Ethereum classic: Original Ethereum that decided not to fork after a hack. The Ethereum that we know is its fork. Uninteresing, because it has a lot of less resources than Ethereum now and a lot less community support.
  8. Ziliqa: Zilliqa is building a new way of sharding. 2400 tpx already tested, 10,000 tps soon possible by being linearly scalable with the number of nodes. That means, the more nodes, the faster the network gets. They are looking at implementing privacy as well.
  9. QTUM: Enables Smart contracts on the Bitcoin blockchain. Useful.
  10. Icon: Korean ethereum. Decentralized application platform that's building communities in partnership with banks, insurance providers, hospitals, and universities. Focused on ID verification and payments.
  11. LISK: Lisk's difference to other BaaS is that side chains are independent to the main chain and have to have their own nodes. Similar to neo whole allows dapps to deploy their blockchain to. Like most cryptocurrencies, Lisk is currently somewhat centralized with a small group of members owning more than 50% of the delegated positions. Lisk plans to change the consensus algorithm for that reason in the near future.
  12. Rchain: Similar to Ethereum with smart contract, though much more scalable at an expected 40,000 TPS and possible 100,000 TPS. Not launched yet. No product launched yet, though promising technology. Not overvalued, probably at the right price right now.
  13. ARDR: Similar to Lisk. Ardor is a public blockchain platform that will allow people to utilize the blockchain technology of Nxt through the use of child chains. A child chain, which is a ‘light’ blockchain that can be customized to a certain extent, is designed to allow easy self-deploy for your own blockchain. Nxt claims that users will "not need to worry" about security, as that part is now handled by the main chain (Ardor). This is the chief innovation of Ardor. Ardor was evolved from NXT by the same company. NEM started as a NXT clone.
  14. Ontology: Similar to Neo. Interesting coin
  15. Bytom: Bytom is an interactive protocol of multiple byte assets. Heterogeneous byte-assets (indigenous digital currency, digital assets) that operate in different forms on the Bytom Blockchain and atomic assets (warrants, securities, dividends, bonds, intelligence information, forecasting information and other information that exist in the physical world) can be registered, exchanged, gambled and engaged in other more complicated and contract-based interoperations via Bytom.
  16. Nxt: Similar to Lisk
  17. Aeternity: We’ve seen recently, that it’s difficult to scale the execution of smart contracts on the blockchain. Crypto Kitties is a great example. Something as simple as creating and trading unique assets on Ethereum bogged the network down when transaction volume soared. Ethereum and Zilliqa address this problem with Sharding. Aeternity focuses on increasing the scalability of smart contracts and dapps by moving smart contracts off-chain. Instead of running on the blockchain, smart contracts on Aeternity run in private state channels between the parties involved in the contracts. State channels are lines of communication between parties in a smart contract. They don’t touch the blockchain unless they need to for adjudication or transfer of value. Because they’re off-chain, state channel contracts can operate much more efficiently. An important aspect of smart contract and dapp development is access to outside data sources. This could mean checking the weather in London, score of a football game, or price of gold. Oracles provide access to data hosted outside the blockchain. In many blockchain projects, oracles represent a security risk and potential point of failure, since they tend to be singular, centralized data streams. Aeternity proposes decentralizing oracles with their oracle machine. Doing so would make outside data immutable and unchangeable once it reaches Aeternity’s blockchain. Aeternity’s network runs on on a hybrid of proof of work and proof of stake. Founded by a long-time crypto-enthusiast and early colleague of Vitalik Buterin, Yanislav Malahov. Promising concept though not product yet
  18. Stratis: Different to LISK, Stratis will allow businesses and organizations to create their own blockchain according to their own needs, but secured on the parent Stratis chain. Stratis’s simple interface will allow organizations to quickly and easily deploy and/or test blockchain functionality of the Ethereum, BitShares, BitCoin, Lisk and Stratis environements.
  19. Status: Status provides access to all of Ethereum’s decentralized applications (dapps) through an app on your smartphone. It opens the door to mass adoption of Ethereum dapps by targeting the fastest growing computer segment in the world – smartphone users.
  20. Ark: Fork of Lisk that focuses on a smaller feature set. Ark wallets can only vote for one delegate at a time which forces delegates to compete against each other and makes cartel formations incredibly hard, if not impossible.
  21. Neblio: Similar to Neo, but at a 30x smaller market cap.
  22. NEM: Is similar to Neo. However, it has no marketing team, very high market cap for little clarilty what they do.
  23. Bancor: Bancor is a Decentralized Liquidity Network that allows you to hold any Ethereum token and convert it to any other token in the network, with no counter party, at an automatically calculated price, using a simple web wallet.
  24. Dragonchain: The Purpose of DragonChain is to help companies quickly and easily incorporate blockchain into their business applications. Many companies might be interested in making this transition because of the benefits associated with serving clients over a blockchain – increased efficiency and security for transactions, a reduction of costs from eliminating potential fraud and scams, etc.
  25. Skycoin: Transactions with zero fees that take apparently two seconds, unlimited transaction rate, no need for miners and block rewards, low power usage, all of the usual cryptocurrency technical vulnerabilities fixed, a consensus mechanism superior to anything that exists, resistant to all conceivable threats (government censorship, community infighting, cybenucleaconventional warfare, etc). Skycoin has their own consensus algorithm known as Obelisk written and published academically by an early developer of Ethereum. Obelisk is a non-energy intensive consensus algorithm based on a concept called ‘web of trust dynamics’ which is completely different to PoW, PoS, and their derivatives. Skywire, the flagship application of Skycoin, has the ambitious goal of decentralizing the internet at the hardware level and is about to begin the testnet in April. However, this is just one of the many facets of the Skycoin ecosystem. Skywire will not only provide decentralized bandwidth but also storage and computation, completing the holy trinity of commodities essential for the new internet. Skycion a smear campaign launched against it, though they seem legit and reliable. Thus, they are probably undervalued.

Market 3 - Ecosystem

The 3rd market with 11 coins is comprised of ecosystem coins, which aim to strengthen the ease of use within the crypto space through decentralized exchanges, open standards for apps and more
  1. Nebulas: Similar to how Google indexes webpages Nebulas will index blockchain projects, smart contracts & data using the Nebulas rank algorithm that sifts & sorts the data. Developers rewarded NAS to develop & deploy on NAS chain. Nebulas calls this developer incentive protocol – basically rewards are issued based on how often dapp/contract etc. is used, the more the better the rewards and Proof of devotion. Works like DPoS except the best, most economically incentivised developers (Bookkeeppers) get the forging spots. Ensuring brains stay with the project (Cross between PoI & PoS). 2,400 TPS+, DAG used to solve the inter-transaction dependencies in the PEE (Parallel Execution Environment) feature, first crypto Wallet that supports the Lightening Network.
  2. Waves: Decentralized exchange and crowdfunding platform. Let’s companies and projects to issue and manage their own digital coin tokens to raise money.
  3. Salt: Leveraging blockchain assets to secure cash loands. Plans to offer cash loans in traditional currencies, backed by your cryptocurrency assets. Allows lenders worldwide to skip credit checks for easier access to affordable loans.
  4. CHAINLINK: ChainLink is a decentralized oracle service, the first of its kind. Oracles are defined as an ‘agent’ that finds and verifies real-world occurrences and submits this information to a blockchain to be used in smart contracts.With ChainLink, smart contract users can use the network’s oracles to retrieve data from off-chain application program interfaces (APIs), data pools, and other resources and integrate them into the blockchain and smart contracts. Basically, ChainLink takes information that is external to blockchain applications and puts it on-chain. The difference to Aeternity is that Chainlink deploys the smart contracts on the Ethereum blockchain while Aeternity has its own chain.
  5. WTC: Combines blockchain with IoT to create a management system for supply chains Interesting
  6. Ethos unifyies all cryptos. Ethos is building a multi-cryptocurrency phone wallet. The team is also building an investment diversification tool and a social network
  7. Komodo: The Komodo blockchain platform uses Komodo’s open-source cryptocurrency for doing transparent, anonymous, private, and fungible transactions. They are then made ultra-secure using Bitcoin’s blockchain via a Delayed Proof of Work (dPoW) protocol and decentralized crowdfunding (ICO) platform to remove middlemen from project funding. Offers services for startups to create and manage their own Blockchains.
  8. Aion: Today, there are hundreds of blockchains. In the coming years, with widespread adoption by mainstream business and government, these will be thousands or millions. Blockchains don’t talk to each other at all right now, they are like the PCs of the 1980s. The Aion network is able to support custom blockchain architectures while still allowing for cross-chain interoperability by enabling users to exchange data between any Aion-compliant blockchains by making use of an interchain framework that allows for messages to be relayed between blockchains in a completely trust-free manner.
  9. Tenx: Raised 80 million, offers cryptocurrency-linked credit cards that let you spend virtual money in real life. Developing a series of payment platforms to make spending cryptocurrency easier.

Market 4 - Privacy

The 4th market are privacy coins. As you might know, Bitcoin is not anonymous. If the IRS or any other party asks an exchange who is the identity behind a specific Bitcoin address, they know who you are and can track back almost all of the Bitcoin transactions you have ever made and all your account balances. Privacy coins aim to prevent exactly that through address fungability, which changes addresses constantly, IP obfuscation and more. There are 2 types of privacy coins, one with completely privacy and one with optional privacy. Optional Privacy coins like Dash and Nav have the advantage of more user friendliness over completely privacy coins such as Monero and Enigma.
  1. Monero: Currently most popular privacy coin, though with a very high market cap. Since their privacy is all on chain, all prior transactions would be deanonymized if their protocol is ever cracked. This requires a quantum computing attack though. PIVX is better in that regard.
  2. Zcash: A decentralized and open-source cryptocurrency that hide the sender, recipient, and value of transactions. Offers users the option to make transactions public later for auditing. Decent privacy coin, though no default privacy
  3. Verge: Calls itself privacy coin without providing private transactions, multiple problems over the last weeks has a toxic community, and way too much hype for what they have.
  4. Bytecoin: First privacy-focused cryptocurrency with anonymous transactions. Bytecoin’s code was later adapted to create Monero, the more well-known anonymous cryptocurrency. Has several scam accusations, 80% pre-mine, bad devs, bad tech
  5. Bitcoin Private: A merge fork of Bitcoin and Zclassic with Zclassic being a fork of Zcash with the difference of a lack of a founders fee required to mine a valid block. This promotes a fair distribution, preventing centralized coin ownership and control. Bitcoin private offers the optional ability to keep the sender, receiver, and amount private in a given transaction. However, this is already offered by several good privacy coins (Monero, PIVX) and Bitcoin private doesn't offer much more beyond this.
  6. PIVX: As a fork of Dash, PIVX uses an advanced implementation of the Zerocoin protocol to provide it’s privacy. This is a form of zeroknowledge proofs, which allow users to spend ‘Zerocoins’ that have no link back to them. Unlike Zcash u have denominations in PIVX, so they can’t track users by their payment amount being equal to the amount of ‘minted’ coins, because everyone uses the same denominations. PIVX is also implementing Bulletproofs, just like Monero, and this will take care of arguably the biggest weakness of zeroknowledge protocols: the trusted setup.
  7. Zcoin: PoW cryptocurrency. Private financial transactions, enabled by the Zerocoin Protocol. Zcoin is the first full implementation of the Zerocoin Protocol, which allows users to have complete privacy via Zero-Knowledge cryptographic proofs.
  8. Enigma: Monero is to Bitcoin what enigma is to Ethereum. Enigma is for making the data used in smart contracts private. More of a platform for dapps than a currency like Monero. Very promising.
  9. Navcoin: Like bitcoin but with added privacy and pos and 1,170 tps, but only because of very short 30 second block times. Though, privacy is optional, but aims to be more user friendly than Monero. However, doesn't really decide if it wants to be a privacy coin or not. Same as Zcash.Strong technology, non-shady team.

Market 5 - Currency Exchange Tool

Due to the sheer number of different cryptocurrencies, exchanging one currency for the other it still cumbersome. Further, merchants don’t want to deal with overcluttered options of accepting cryptocurrencies. This is where exchange tool like Req come in, which allow easy and simple exchange of currencies.
  1. Cryptonex: Fiat and currency exchange between various blockchain services, similar to REQ.
  2. QASH: Qash is used to fuel its liquid platform which will be an exchange that will distribute their liquidity pool. Its product, the Worldbook is a multi-exchange order book that matches crypto to crypto, and crypto to fiat and the reverse across all currencies. E.g., someone is selling Bitcoin is USD on exchange1 not owned by Quoine and someone is buying Bitcoin in EURO on exchange 2 not owned by Quoine. They turned it on to test it a few months ago for an hour or so and their exchange was the top exchange in the world by 4x volume for the day because all Worldbook trades ran through it. Binance wants BNB to be used on their one exchange. Qash wants their QASH token embedded in all of their partners.
  3. Kyber: network Exchange between cryptocurrencies, similar to REQ. Features automatic coin conversions for payments. Also offers payment tools for developers and a cryptocurrency wallet.
  4. Achain: Building a boundless blockchain world like Req .
  5. Centrality: Centrality is a decentralized market place for dapps that are all connected together on a blockchain-powered system. Centrality aims to allow businesses to work together using blockchain technology. With Centrality, startups can collaborate through shared acquisition of customers, data, merchants, and content. That shared acquisition occurs across the Centrality blockchain, which hosts a number of decentralized apps called Scenes. Companies can use CENTRA tokens to purchase Scenes for their app, then leverage the power of the Centrality ecosystem to quickly scale. Some of Centrality's top dapps are, Skoot, a travel experience marketplace that consists of a virtual companion designed for free independent travelers and inbound visitors, Belong, a marketplace and an employee engagement platform that seems at helping business provide rewards for employees, Merge, a smart travel app that acts as a time management system, Ushare, a transports application that works across rental cars, public transport, taxi services, electric bikes and more. All of these dapps are able to communicate with each other and exchange data through Centrality.
  6. Bitshares: Exchange between cryptocurrencies. Noteworthy are the 1.5 second average block times and throughput potential of 100,000 transactions per second with currently 2,400 TPS having been proven. However, Bitshares had several Scam accusations in the past.
  7. Loopring: A protocol that will enable higher liquidity between exchanges and personal wallets by pooling all orders sent to its network and fill these orders through the order books of multiple exchanges. When using Loopring, traders never have to deposit funds into an exchange to begin trading. Even with decentralized exchanges like Ether Delta, IDex, or Bitshares, you’d have to deposit your funds onto the platform, usually via an Ethereum smart contract. But with Loopring, funds always remain in user wallets and are never locked by orders. This gives you complete autonomy over your funds while trading, allowing you to cancel, trim, or increase an order before it is executed.
  8. ZRX: Open standard for dapps. Open, permissionless protocol allowing for ERC20 tokens to be traded on the Ethereum blockchain. In 0x protocol, orders are transported off-chain, massively reducing gas costs and eliminating blockchain bloat. Relayers help broadcast orders and collect a fee each time they facilitate a trade. Anyone can build a relayer.

Market 6 - Gaming

With an industry size of $108B worldwide, Gaming is one of the largest markets in the world. For sure, cryptocurrencies will want to have a share of that pie.
  1. Storm: Mobile game currency on a platform with 9 million players.
  2. Fun: A platform for casino operators to host trustless, provably-fair gambling through the use of smart contracts, as well as creating their own implementation of state channels for scalability.
  3. Electroneum: Mobile game currency They have lots of technical problems, such as several 51% attacks
  4. Wax: Marketplace to trade in-game items

Market 7 - Misc

There are various markets being tapped right now. They are all summed up under misc.
  1. OMG: Omise is designed to enable financial services for people without bank accounts. It works worldwide and with both traditional money and cryptocurrencies.
  2. Power ledger: Australian blockchain-based cryptocurrency and energy trading platform that allows for decentralized selling and buying of renewable energy. Unique market and rather untapped market in the crypto space.
  3. Populous: Populous is a platform that connects business owners and invoice buyers without middlemen. Furthermore, it is a peer-to-peer (P2P) platform that uses blockchain to provide small and medium-sized enterprises (SMEs) a more efficient way to participate in invoice financing. Businesses can sell their outstanding invoices at a discount to quickly free up some cash. Invoice sellers get cash flow to fund their business and invoice buyers earn interest.
  4. Monacoin: The first Japanese cryptocurrency. Focused on micro-transactions and based on a popular internet meme of a type-written cat. This makes it similar to Dogecoin. Very niche, tiny market.
  5. Revain: Legitimizing reviews via the blockchain. Interesting concept, though market not as big.
  6. Augur: Platform to forecast and make wagers on the outcome of real-world events (AKA decentralized predictions). Uses predictions for a “wisdom of the crowd” search engine. Not launched yet.
  7. Substratum: Revolutionzing hosting industry via per request billing as a decentralized internet hosting system. Uses a global network of private computers to create the free and open internet of the future. Participants earn cryptocurrency. Interesting concept.
  8. Veritaseum: Is supposed to be a peer to peer gateway, though it looks like very much like a scam.
  9. TRON: Tronix is looking to capitalize on ownership of internet data to content creators. However, they plagiarized their white paper, which is a no go. They apologized, so it needs to be seen how they will conduct themselves in the future. Extremely high market cap for not having a product, nor proof of concept.
  10. Syscoin: A cryptocurrency with a decentralized marketplace that lets people buy and sell products directly without third parties. Trying to remove middlemen like eBay and Amazon.
  11. Hshare: Most likely scam because of no code changes, most likely pump and dump scheme, dead community.
  12. BAT: An Ethereum-based token that can be exchanged between content creators, users, and advertisers. Decentralized ad-network that pays based on engagement and attention.
  13. Dent: Decentralizeed exchange of mobile data, enabling mobile data to be marketed, purchased or distributed, so that users can quickly buy or sell data from any user to another one.
  14. Ncash: End to end encrypted Identification system for retailers to better serve their customers .
  15. Factom Secure record-keeping system that allows companies to store their data directly on the Blockchain. The goal is to make records more transparent and trustworthy .

Market 8 - Social network

Web 2.0 is still going strong and Web 3.0 is not going to ignore it. There are several gaming tokens already out there and a few with decent traction already, such as Steem, which is Reddit with voting through money is a very interesting one.
  1. Mithril: As users create content via social media, they will be rewarded for their contribution, the better the contribution, the more they will earn
  2. Steem: Like Reddit, but voting with money. Already launched product and Alexa rank 1,000 Thumbs up.
  3. Rdd: Reddcoin makes the process of sending and receiving money fun and rewarding for everyone. Reddcoin is dedicated to one thing – tipping on social networks as a way to bring cryptocurrency awareness and experience to the general public.
  4. Kin: Token for the platform Kik. Kik has a massive user base of 400 million people. Replacing paying with FIAT with paying with KIN might get this token to mass adoption very quickly.

Market 9 - Fee token

Popular exchanges realized that they can make a few billion dollars more by launching their own token. Owning these tokens gives you a reduction of trading fees. Very handy and BNB (Binance Coin) has been one of the most resilient tokens, which have withstood most market drops over the last weeks and was among the very few coins that could show growth.
  1. BNB: Fee token for Binance
  2. Gas: Not a Fee token for an exchange, but it is a dividend paid out on Neo and a currency that can be used to purchase services for dapps.
  3. Kucoin: Fee token for Kucoin

Market 10 - Decentralized Data Storage

Currently, data storage happens with large companies or data centers that are prone to failure or losing data. Decentralized data storage makes loss of data almost impossible by distributing your files to numerous clients that hold tiny pieces of your data. Remember Torrents? Torrents use a peer-to-peer network. It is similar to that. Many users maintain copies of the same file, when someone wants a copy of that file, they send a request to the peer-to-peer network., users who have the file, known as seeds, send fragments of the file to the requester. The requester receives many fragments from many different seeds, and the torrent software recompiles these fragments to form the original file.
  1. Gbyte: Byteball data is stored and ordered using directed acyclic graph (DAG) rather than blockchain. This allows all users to secure each other's data by referencing earlier data units created by other users, and also removes scalability limits common for blockchains, such as blocksize issue.
  2. Siacoin: Siacoin is decentralized storage platform. Distributes encrypted files to thousands of private users who get paid for renting out their disk space. Anybody with siacoins can rent storage from hosts on Sia. This is accomplish via "smart" storage contracts stored on the Sia blockchain. The smart contract provides a payment to the host only after the host has kept the file for a given amount of time. If the host loses the file, the host does not get paid.
  3. Maidsafecoin: MaidSafe stands for Massive Array of Internet Disks, Secure Access for Everyone.Instead of working with data centers and servers that are common today and are vulnerable to data theft and monitoring, You can think of SAFE as a crowd-sourced internet. It’s an autonomous network that automatically sets prices and distributes data and rents out hard drive disk space with a Blockchain-based storage solutions.When you upload a file to the network, such as a photo, it will be broken into pieces, hashed, and encrypted. Then, redundant copies of the data are created as well so that if someone storing your file turns off their computer, you will still have access to your data. And don’t worry, even with pieces of your data on other people’s computers, they won’t be able to read them. You can earn MadeSafeCoins by participating in storing data pieces from the network on your computer and thus earning a Proof of Resource.
  4. Storj: Storj aims to become a cloud storage platform that can’t be censored or monitored, or have downtime. Your files are encrypted, shredded into little pieces called 'shards', and stored in a decentralized network of computers around the globe. No one but you has a complete copy of your file, not even in an encrypted form.

Market 11 - Cloud computing

Obviously, renting computing power, one of the biggest emerging markets as of recent years, e.g. AWS and Digital Ocean, is also a service, which can be bought and managed via the blockchain.
  1. Golem: Allows easy use of Supercomputer in exchange for tokens. People worldwide can rent out their computers to the network and get paid for that service with Golem tokens.
  2. Elf: Allows easy use of Cloud computing in exchange for tokens.

Market 12 - Stablecoin

Last but not least, there are 2 stablecoins that have established themselves within the market. A stable coin is a coin that wants to be independent of the volatility of the crypto markets. This has worked out pretty well for Maker and DGD, accomplished through a carefully diversified currency fund and backing each token by 1g or real gold respectively. DO NOT CONFUSE DGD AND MAKER with their STABLE COINS DGX and DAI. DGD and MAKER are volatile, because they are the companies of DGX and DAI. DGX and DAI are the stable coins.
  1. DGD: Platform of the Stablecoin DGX. Every DGX coin is backed by 1g of gold and make use proof of asset consensus.
  2. Maker: Platform of the Stablecoin DAI that doesn't vary much in price through widespread and smart diversification of assets.
  3. USDT: is no cryptocurrency really, but a replacement for dollar for trading After months of asking for proof of dollar backing, still no response from Tether.
EDIT: Added a risk factor from 0 to 10. Significant scandals, mishaps, shady practices, questionable technology, increase the risk factor. Not having a product yet automatically means a risk factor of 6. Strong adoption and thus strong scrutiny or positive community lower the risk factor.
EDIT2: Added a subjective potential factor from 0 to 10, where its overall potential and a small or big market cap is factored in. Bitcoin with lots of potential only gets a 9, because of its massive market cap, because if Bitcoin goes 10x, smaller coins go 100x.
submitted by galan77 to ethtrader [link] [comments]

Deanonymization Risks on Lightning Network

A few days ago I posted about how the differences betweenTor and Lightning Network topologies might undermine the privacy that users are able to achieve with the Lightning implemenation of onion routing. Despite many disparaging remarks about my intentions, both Adam Back (u/adam3us) and Rusty Russell (u/rustyreddit) have replied and indicated that there is at least some validity to the concerns raised. Additional discussion of this topic in various comment threads has inevitably led to questions about what is at risk and what users can to do minimize those risks. I’ve had time to formulate the beginnings of a response to the former, which is a necessary precursor to eventually answering the latter. It may not be very satisfying to get the answers in this order, but it is the natural result of posting this work as it evolves. So let’s get right down to it and explore some of the risk areas I’ve been able to identify for Lightning Network operators.
Lightning Network results in many opportunities for an analyst to correlate data across several domains and tie them back to a single pseudonym. Let’s call this single identity the operator’s nym. For purposes of this post, the nym represents the complete anonymous persona of its associated operator - every Lightning operator has only one nym. An analyst may end up identifying multiple sub-nyms until they’re able to link them to a single operator.
The primary sub-nym on Lightning Network is the node. Nodes have many properties which can uniquely identify them over time and space. This is necessary to ensure you're transacting with whom you intend, even if you don't know their real identity. Long-term node identities are also a requirement for payment channels. Because these properties cover different domains but all link back to the same node identity, deanonymization in one domain affects activity across all domains that can be associated with the node. These properties can also be leveraged by an analyst to associate sub-nyms with their operator’s nym.
So what makes up a node identity?
Node ID. The most obvious identifier for a node is its node_id, the public key the node uses when signing messages on the network. A node’s node_id is known by all of its peers. It is not necessary for a transaction sender to expose their node_id, however, the sender must know the receiver’s. A node desiring to service third-party transactions must broadcast channel_announcement messages for the channels which can be used for routing, which exposes the node_id to the whole network.
IP addresses. While the node_id is certainly the strongest node identifier, it is not the only property that could identify a node or link multiple nodes to a nym. Lightning transactions are active, requiring bi-directional communication to complete. To communicate with peers on the internet, nodes require an IP address. At a minimum, this IP address is known to a node’s peers and, if the operator wants to invite other nodes to open channels, it may be broadcast to the network in node_announcement messages. Although IP addresses do not prove who is behind them, they can provide a lot of information about the operator’s identity and link multiple nodes to a single nym. Connecting to Lightning over anonymizing solutions such as VPNs and Tor can assist in disassociating the IP addresses from the operator, but also introduce new correlation data for observers of those domains.
Node customizations. The node_announcement messages carry some customizable fields (alias, rgb_color, features) which are not unique, but could still serve to fingerprint nodes if an operator regularly uses a unique or identifiable combination.
Channels. Nodes can be uniquely identified by their set of channels. Channels which are open at the same time are obvious correlation points; less obvious is the fact that channel relationships are transitive. For instance, if a node initially opens chA and chB, an analyst can easily identified them as belonging to the same node. chA isn’t very reliable so the operator closes that channel and some time later opens chC. The analyst, who has been observing the network, can now associate chC with chA through their shared concurrent channel, chB. If the operator then closes chB and later opens chD, the analyst can link all four channels to the single node thanks to this transitive nature, even though chA and chD were never open at the same time nor share any concurrent channels.
On-chain transactions. Each channel a node participates in will have several addresses which may associate back to the operator’s nym. Inputs to the funding transaction and outputs from the commitment transaction are implicitly transitive; there can be some doubt as to the ownership of an output, but there is a known relationship. An analyst monitoring the blockchain activities of a node may be able to use the inputs and outputs to reliably associate channels opened using the proceeds from previously closed channels, even when the channels are associated with different nodes. This is another way in which an analyst might link multiple sub-nyms to a single nym.
Lightning Transactions. A major trade-off that operators make by transacting over Lightning Network instead of on-chain is that of transaction privacy. In exchange for the promise of keeping their transactions off of the blockchain, Lightning imposes higher risk of transaction correlation. If the privacy guarantees that Lightning provides are breached, deanonymizing the sending and receiving nodes, all exposed transactions can be used by an analyst in an attempt to correlate them to a single nym or operator.
submitted by tripledogdareya to Bitcoin [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

r/Bitcoin recap - April 2018

Hi Bitcoiners!
I’m back with the sixteenth monthly Bitcoin news recap.
It's easy for news and developments to get drowned out by price talk, so each day I pick out the most popularelevant/interesting stories in Bitcoin and save them. At the end of the month I release them in one batch, to give you a quick (but not necessarily the best) overview of what happened in Bitcoin over the past month. Lots of gems this time around!
You can see recaps of the previous months on Bitcoinsnippets.com
A recap of Bitcoin in April 2018
submitted by SamWouters to Bitcoin [link] [comments]

The Eleventh HOPE (2016): De-Anonymizing Bitcoin One Transaction at a Time BITCOIN EXCHANGE GUIDE: REVIEWS AND COMPARISONS - YouTube What is CRYPTOCURRENCY TUMBLER? What does CRYPTOCURRENCY TUMBLER mean? EU to crack down on Bitcoin, seeks de-anonymizing exchanges citing terror threat Bitcoin Mining Software 2020 - YouTube

Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency enthusiasts. It only takes a minute to sign up. Sign up to join this community. Anybody can ask a question Anybody can answer The best answers are voted up and rise to the top Bitcoin . Home ... Bitcoin Stack Exchange is a question and answer site for Bitcoin crypto-currency enthusiasts. It only takes a minute to sign up. Sign up to join this community. Anybody can ask a question Anybody can answer The best answers are voted up and rise to the top Bitcoin . Home ; Questions ; Tags ; Users ; Jobs; Unanswered ; Deanonymizing dust attack. Ask Question Asked 1 year, 9 months ago. Active 9 ... One of the most common misconceptions regarding Bitcoin is that it is anonymous or untraceable, when in fact this couldn’t be further from the truth. Bitcoin is the opposite of untraceable. All of the transactions that have ever occurred in the network are stored in the immutable and public ledger that is the Blockchain. One […] Bitcoin network sometimes with Tor and sometimes without Tor. Bitcoin protocol messages. Bitcoin protocol uses a large number of applica- tion layer messages that are exchanged between the nodes for various purposes. Below we describe the important messages. { VERSION & VERACK: In the beginning of a connection, two nodes exchange VERSION and VERACK messages. The VERSION message contains ... So in the scenario Alice has a few Bitcoin's lying around with these different denominations, and the store lists the teapot for a price of eight Bitcoin's. That's a pretty expensive teapot at today's exchange rate, so imagine that's 70 Bitcoins or something, if you like. Any rate, Alice has these different addresses and wants to pay for the teapot. How is she going to accomplish this? She ...

[index] [27152] [18721] [34035] [49876] [4656] [16443] [30739] [50390] [15384] [49088]

The Eleventh HOPE (2016): De-Anonymizing Bitcoin One Transaction at a Time

Atari, one of the world’s most iconic consumer brands and interactive entertainment producers is launching on Bitcoin.com Exchange for a public sale and the ... DAS WIRD BITCOIN AM WOCHENENDE MACHEN... !!!!! Bis zu fast 2000$ kostenlos für deine ersten Trades auf diesen Exchanges! 🔶 ByBit: https://www.bybit.com/app/... A study from Crystal Blockchain Analytics on May 19 shows that the total USD value of Bitcoins transferred on the dark web rose by 65% in Q1 2020, despite ... Choosing the best Bitcoin exchange can be an exhausting task. This post will explain the important factors to take into account when choosing a Bitcoin excha... RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTn...

#