Bitcoin Core Wallet Synchronizing With Network Slow

I've reached the extent that I think I can tell this story. This is my experience with the cult

Introduction
I am hesitant to begin writing about these memories, and for two reasons. The first is out of fear - fear of retaliation. You see, I was taken advantage of by a cult that I escaped a few years ago in the summer of 2018. I wasn’t involved for long - ten months - but that wasn’t the end of the cult’s influence on me, as they cleverly had a previously unaffiliated visitor contact me and try to bring me back during the period afterwards. I believe they are still keeping tabs on be covertly, but this may just be my paranoid nature.
For nearly the entire first year afterwards, I was always looking over my shoulder to see if I was being followed. They definitely have an interest in roping me back into the fold, as you will see how sociopathic these people are. I’m still traumatized, and although I have healed a great deal from these trials, there is still lingering conditioning that causes me panic attacks and anxiety, which exemplifies my schizoaffective disorder. I attribute much of the reason I’m houseless now to the combination of my mental health and trauma caused by this group.
The second reason I am hesitant to begin writing is also out of fear, but this is instead a fear of not being able to deliver on my promise to expose this cult. I know I have the ability to write about my account, but will it be good enough? Will I be throwing these words into the electronic ocean like so many others with little effect on the world? I feel that no matter how hard I try, I will be unable to capture the cult’s devious acts in such a way to convey what it was like for me, a vulnerable individual, to be slowly turned into an obedient slave.
Inadequacy. This is an important piece of my psychology. After watching my mother decay and die for the first nine years of my life, followed by being raised by an abusive, narcissistic father, I have a profound feeling of inadequacy ruling me. I never feel like I am good enough; that I have to self-sacrifice - to the point where I believed I had to be as good as Jesus Christ - in order to achieve a passable level of human adequacy. The cult took advantage of these feelings in spades and left me a shell of who I was previously.
Fortunately, the period of houselessness that has extended the last year or so of my life has been a radically transformative period where I feel able to step out from barriers that previously trapped me. I feel freer than I ever have been, and to be honest, I owe a lot to the cult for pushing me to my breaking point and learning where my boundaries are. In fact, I don’t believe I could have stepped away from the denial of having a feminine side if it weren’t for the ridiculousness of how far I was pushed.
Now, I stand strong, ready to accomplish this mission life has presented me. It is my basic civic duty to tell my story and warn the public about this group and others who prey on vulnerable individuals in an unstable socioeconomic period. They deliberately attract people who are vulnerable for personal or financial reasons. For instance, there was a flat-earther from Belgium who was here illegally that got roped into our group by being attracted to the messages of sovereignty and their abundance of kooky new age beliefs. They even tried to get me to recruit more members using the same strategies they hooked me with - which is standard cult behavior.
This leads right into how I got involved with the cult in the first place. Part of it is my fault, as I was young and naive. I still am, but now I have the wisdom to not throw myself out there for any group to start manipulating. There are many people who can be drawn into their preying behavior, and it is important that I elaborate on how easy it is to get duped, so others don’t follow in my footsteps.
As you will see, the group was bizarre in many ways. I want to start off by saying that I did not join an organization of pee-drinkers who practiced blood-magick on the side of Main Street. Instead, I started working for a nonprofit that promised to change the world, and appeared to have the ability to do that. The weirdness grew exponentially over time, gradually as they conditioned us to accept their way of life.
On my own end, I wanted to join an intentional community; one where everyone involved works towards a singular end as one unit. I longed for the camaraderie and an alternate way of life. I wanted something different than what - as the cult called the common culture - “The Matrix,” or “Babylon” offered. There are such communities, but because of devious groups like this, everyone needs to be cautious when attempting to find them. I still seek to find or create an alternative lifestyle for myself where I can live amongst my brothers and sisters away from the mass-produced consumer culture of the world.
It’s been a hell of a journey, but I am happy where I am now. If anything, the group taught me that self-love is our first love; if the gardener does not take care of themselves, then who takes care of the garden? With my efforts to find such a community as I wanted, it was inevitable that some group would have sunk their teeth into me. I am grateful that I was able to recognize the far-flung insanity that I was trapped in and escape. Now I just need to focus on recovering and helping others who may be searching for the same things I am.
Chapter 1
It all started early in 2017. I was working on reverse networking, like trying to place a letter on someone’s shoes to let them know I exist. I was hoping to find a project I could use my skills as a writer and juggler by broadcasting who I was on our small online community, The Shrug Life Syndicate, on Reddit. I was so desperate to find such a community that fit my ideals and goals that I didn’t even conceive that someone could be watching in order to learn about me.
They first posted a link to their site on our community’s board, when they were still going by the Awakening Sovereignty Collective. To best understand how I perceived them initially, you have to understand that I was lost in what we at the Shrug Life Syndicate call the synchronicity slip stream. An aspect of my schizoaffective disorder, I often get lost in various series of synchronicities that form a coherent narrative that compels me to behave differently than I otherwise would. It is an amazing feature of my mental health for creativity and finding alternative solutions to problems, but it can be debilitating when trying to fit in to the normal world. When the ASC posted, I believed applying on their website was the obvious thing I should do in order to accomplish my cosmic mission.
Well, nothing happened at first, and I forgot about them until several months later until I received an email stating I was hired. This came after a series of strange tasks from anonymous accounts that seemed to be tests to see if I was as capable of a writer as I portrayed myself as being. I remember one test was to see if I could write a sales pitch for “Unicorn Poop,” an edible snack with a humorous twist. I don’t have any proof that these two events are connected, but it definitely tripped my radar as odd that they happened one after another, and nothing ever came from the sales tasks.
Having passed their tests, I began working with them online. It was a slow process, as there wasn’t a lot of work right out the gate, but there was a lot to learn. Their websites were many in number and often confusing. I had difficulty navigating them and almost quit trying within days of getting started. I remember crumbling back into my addictive nature one night as the wailing cries of depression came roaring back with my initial perceived failure.
If I were not partially psychotic, believing the universe was guiding me to the salvation I sought, then that would have been the end of it. Many other people seemed to have given up while I was still new to working for them. If I were to guess, I would say that this was deliberate on their part in order to weed out only people like me, who were in some way desperate to be a part of the group. With only a small number of desperate people finding their way into the clutches of these people, it must be easier to control them as well.
The ASC promised a new way of life for anyone seeking it. They claimed to be a planetary alliance that was helping ecovillages, nonprofits, conscious businesses, and individual change agents. They were working on a cryptocurrency and software suite that would help communities better serve the world. This was at the peak of the bitcoin bubble, where many people unfamiliar with cryptocurrencies were trying to get in on the hype. They touted a number of figures and claims which ultimately turned out to be false or otherwise misrepresentative of the truth, but in the moment I believed everything they were shoveling.
It was easy for them to sell the idea and project as they were all natural sales personalities. I attended a lot of meetings, particularly with the writer’s team, and started to get to know the people behind the project. In the moment, they appeared to be down-to-Earth and relatable, but highly conscious individuals who really cared about the world and were motivated to do the work necessary to make the changes needed for the planet. In hindsight, they really only cared about money, and were playing a part to catch people like me.
The leader was named Dakota, if that was his real name (I believe most of the main group had adopted a second name to hide who they really were). He was a young man claiming to have graduated high school at ten, and he founded a company known as STADA which was facilitating much if not all of the software needs of the ASC. He was brilliant, but I believe most of his brilliance was self-generated through his ability to sell himself as more than he really was. He always acted like a millionaire who was going to change the world, which made it easy for him to sell the project to people like me.
The co-leader was named Lila. She was a cheerful person who always had something positive to add to the conversation. While working with her, I found this to be a powerful part of her personality. It was hard to say no to her, as she had a motherly vibe and she strategically would ask you to do things that left you feeling compelled to help her, for the good of the project. She first won me over by claiming to run a retreat center for circus skills. I only heard of this in the beginning of my journey with the group, so I believe it may have been a bogus means to shift my opinion of them.
The leader of the writer’s team was named Teahna, who was beautiful and knew how to use her womanly charm to influence others. She seemed to be new to the project as well, having recently written her first book, and my time working with her online seemed to be a learning experience for both of us. I believe this was also planned, so that I would have some support learning what I was supposed to be doing on the various websites that seemed to pile up more and more as time went on.
The work was easy at first. There were no assignments or anything like that. It was all pile work - as in, just grab a shovel and get paid for what you move. As a writer, I naturally gravitated to the writers team’s tasks, but I also helped with the education team and the core tasks of the group. Mostly I wrote articles and website content for them, but I also wrote fake twitter bios, social media posts, and began working on their constitution/manifesto before arriving at their headquarters.
I was making good money, both in real dollars and their own cryptocurrency, Equality Keys. They claimed we could trade their currency for real money at any time, which turned out to be a lie. They often only let us exchange it at certain times at a reduced value. But, I was naive enough to believe that the numbers on my screen were real and meant I was doing good. It wasn’t long before I earned upwards of thousands of dollars worth of their currency, which was promised to rise in value as the project continued to grow and evolve.
After a few weeks working with them, they began toying with a name change to Earth Nation. I believe this is a key part of their method of staying under the radar. By changing names and projects frequently, they never gather enough clout to be exposed as the charlatans that they are. They would later create a new project known as Earth Cycle, and there was a tentacle organization we got hooked into after our stay with the main group called Lovecycle. In regards to the latter, I will never forget the name Lovecycle, as that is when the bulk of bizarre and traumatic events occured.
This is around the same time that my girlfriend at the time began helping out as well. We worked together as a writer and artist combo, and they were initially excited to have another person joining to help. There was some friction though, such as bluntly being told they had no need for an artist at this time after they welcomed her onboard, and there were moments where it seemed like they did not want her to be a part of the project. As they turned her and I against each other much later in our odyssey with them, I think this must have been deliberate to sow the seeds of conflict between us. Again, this is classic cult behavior. I regret bringing her into the whole thing, as she is no doubt as traumatized as I am.
What really allowed me to lose myself in the hope of the project was the possibility to do exactly as I dreamed: travel with a caravan, juggle at festivals, help sell whatever my girlfriend and others made, and write gonzo journalism about what Earth Nation was doing. One of the main draws of the group was that they advertised in the meetings about how they had a proposal system, where anyone could come with their plan and it could be voted on to be given resources. They were interested in my idea (how much of that was just gaslighting me to believe I’ve found the perfect gig, I don’t know), and wanted me to do some journalism about my experiences moving to their headquarters just outside Eugene, Oregon - on the other side of the country.
My girlfriend and I were ecstatic at the idea of starting a new life on the west coast. It was the dream we both shared, to abandon the broken world we knew and join something better. We began preparing for the move, sold all of our stuff, and eventually took off from the airport with only three bags to our name. It was a leap of faith, and we were never happier to embrace our dreams and begin to live a much more interesting life.
Chapter 2
We left on October 25th, about a couple months after I first began working for the ASC. It was an amazing trip that we thought would represent our rebirth. I remember arriving at the airport feeling as though I was leaving a part of my past behind. I felt a wave of solemn emptiness and fear over this, but I have since learned such feelings are common with change of this magnitude. Mostly, I felt joy that a new chapter of my life was unfolding before my eyes.
It was a time where it seemed like we had infinite potential right at our fingertips. Who knew what would actually go down over the coming months? We were grateful for the opportunity and happy about the change. My girlfriend even changed her name to Awen to start over fresh as a new person. I still stuck with my birth name, Gregory, but eventually I would start going by the name Rory after having been pressured to by the group.
I remember looking out the window while Awen took pictures of everything we flew over. It was a trip in itself to see the world from such an angle. I was amazed at the number of wind farms in the middle of the country. Likewise, the closer we got to our destination, the more mountainous the ground beneath us became. The change in scenery would pale in comparison with the change in the culture of the west coast - one of the main reasons I now consider Portland my new home.
Landing in Eugene’s airport, we were regaled with Ducks memorabilia. This was a pleasant surprise, as I had forgotten that this was where an old hero from my track days, Steve Prefontaine, used to run. This made me feel hopeful while waiting for Teahna and Prism, the leader of the educational team. I remember pacing the entrance hall of the airport with a giddy smile stretching from ear to ear. This was it, I told myself: I had finally found my new home.
After a long day of airline travel, we were eventually picked up in Prism’s van. We were met with hugs and smiles, which rejuvenated us after the natural stress of the trip. We chatted the entire way back to Triangle Lake, where their headquarters supposedly was. Both Awen and I were antsy while being shaken back and forth while sitting on Prism’s bed for the duration of the drive. I distinctly remember the beautiful colors of the autumn trees as we drove past. This last little bit of our trip took roughly forty-five minutes, but it felt like we were pulling up to the headquarters in an instant.
I caught a glimpse of a sign as we pulled into the long driveway: Circle of Children. This would be where we stayed for the first two months. The area was gorgeous. Giant trees covered in green moss extended as far as the eye could see. With the abundance of fern-life, it reminded me of a Jurassic paradise. Out the cracked window of the van, I could hear tree frogs chirping in harmony. It was certainly something out of another world compared to the east coast.
We stopped in front of the main office - the only building with wifi. If I were to graph the amount of access to the internet we had across the ten months we were involved, it would have a steady, negative slope. Of course, while being conditioned by the group, it was barely noticed, as we grew less dependent on the internet as time went on. We were never barred from the outside world - in fact we interacted with it regularly - but the idea of leaving was made so impossibly far outside the bounds of possible choices through a long series of scripted events.
Which is why the entire beginning of our stay at the Triangle Lake Convention Center seemed like something out of a fantasy paradise. Everything, from the overarching narrative we were fed, to the day-to-day interactions, was designed to win us over, gaslight us, and manipulate us emotionally by using our traumas against us. In the aftermath of the whole escapade, I learned that this is the type of manipulation that cults use to prevent members from seeing reason while keeping them docile, obedient work horses for the greater project, whatever it may be.
It is clear to me now that Earth Nation and all tentacle organizations are a purely criminal enterprise - a money-making machine for those at the top of the hierarchical pyramid. Even though we were supposedly a DAO - a decentralized autonomous organization - there were clearly people who were centralized leaders profiting from everything the group did.
And everybody played their roles well upon our arrival. We were greeted with another barrage of hugs as we got out of the van. Everybody was excited to finally meet us in person, as were we to meet them. We chatted with Dakota and Lila for some time outside of the office. They were the exact same as their online personas. In the moment, this gave us a sense that these people were genuine, but in hindsight it serves as a reminder that anyone can create a convincing character and play them whenever they want - even if they choose to never take their deceptive masks off.
We were then shown where we would be staying. Up the hill and to the left we drove until we were in front of Carmen Hall. It was a quaint dorm-style lodging with a large common area and a small kitchenette. Many nights were spent in the common room with the others who were staying in the building. Because we were a couple, we were given the largest room with its own bathroom.
That’s another thing that changed in a downward slope: our living quarters. Over the course of the ten months we were with them, we were downgraded from having our own space, to sharing space, to living in a tent. And again, because of the conditioning, we were fine with the change.
Sometime during the early evening, we went back down to the dining hall and kitchen which was across the way from the main office. Here, we met a variety of characters, including Tuva, a humble appearing guy with a large social network he brought with him to the project, and Daniella, who would turn out to be mommy dearest as she was the sole woman controlling us for the majority of our adventure on the west coast. A Brazillian native, she was as good of a manipulator as she was a cook, and we all enjoyed a wonderful meal on our first night in Oregon.
Before the night was up, we went behind the kitchen to smoke with a man named Grizzly; a wild looking man who mostly kept quiet but had a mouth to use if he needed it. It was the first time we smoked in Oregon and it felt liberating to finally be in a legal state. But, as freeing and fun as being able to smoke whenever we wanted, I believe the abundance of weed we were constantly fed was a means to keep us docile. Daniella always made sure we had some weed, and would frequently smoke with us. I feel I would have been able to say something as things changed if I were not dependent on the constant stream of marijuana.
Afterwards, we went back to Carmen Hall with a couple of members who also stayed there, and Daniella performed a pendulum reading for me and my girlfriend. Holding a crystal on a chain, she “read” the direction it spun as she brought it up in alignment with our chakras. She was spot on and I wanted to say that she had excellent observation skills, but I kept my mouth shut. I didn’t want to offend anyone’s beliefs, especially my girlfriend who considered herself a mystic and bought into the act.
That night we cuddled in our room, smiling as wide as our mouths could. We had done it - we successfully started our new lives and were going to be a part of something we still had yet to fully comprehend. Everything was new and exciting, and while we were overjoyed, we were glad we had each other because things were still scary. If only we had known then how scary things would become.
Chapter 3
The next morning, we showered, dressed, and went down to the kitchen. There was a slight fog in the air, and we saw a family of deer in a clearing off the road. We would see this family of deer several times during out stay at Triangle Lake, which greatly enthused my girlfriend. She said they were a symbol of wisdom, and must be a good sign as we continued to be indoctrinated by the new age beliefs of the group.
We were early, as our daily meetings were at ten and that is when most people started to show up at the office. But Grizzly was there, as he stayed at the nurses station that sat next to the main office. He offered us some dabs, which just further enforced our belief that this was a great group to be a part of. He also offered me a metal six-shooter pipe, which proved to be the main piece I would smoke out of for the entirety of our adventure.
Breakfast consisted of whatever we could scrounge up. There was a huge walk-in freezer in the kitchen that hosted tons of food when we first got there. There were also a wide selection of dry foods such as figs and nuts. That whole selection would dwindle over time, as the group got everything as donations, usually by soliciting the local food pantries and the Eugene mission and much was close to their expiration dates. It was common to open the freezer and find something moldy.
This was the first time I really interacted with Doran. Doran looked a lot like me - complete with similar beard and glasses - but had shorter, curlier, and darker hair. It was joked that “I was another you.” He appeared to be a really kind-hearted person, and we frequently went to him with problems. This is likely planned as well, to have someone to vent the frustrations we were experiencing as the project transitioned to something different than what we signed up for. I opened up to him before I did with other members, even asking for relationship advice as they tried turning Awen and I against each other between, and received what I now consider a long-standing act of being a good ear with standard advice from the group. Still, he was funny and I enjoyed making strange mixtures of food with him.
As it neared ten, we shuffled to the office to have our meeting. The office had two rooms, and we were all huddled in a circle in one of them. This was nice during the coming months as it was also the only room with the heater. These meetings proved to be a main means to program us, as there were many exchanges that could have only been scripted. We would often talk about one thing, but there would be a subtopic that was teased that would change the meaning of the whole meeting in the context that I heard it. Often there would be some crosstalk in the kitchen beforehand, or something during the day that warped my understanding of what was said
We were required to work thirty hours a week in order to receive our basic income of two hundred dollars a month, as per our agreements before moving to the headquarters. However, it wasn’t long before they duped us by saying the basic income would be used to cover our time staying at Triangle Lake. We weren’t able to fight it, because our tongues were tied by the desire to fit in and be accepted by the group. The ways that they changed things were gradual and deliberate, so that you would never really feel like you were getting taken advantage of. It was just a change, which was alright, because there was a world to save and we were the group who was going to get it done.
That was one of the major ways they were able to get away with a lot of the back-pedaling of agreements - they would always have new, unexpected surprises waiting for us. It was gradual, but they introduced several new elements of communal living that required us to sacrifice more of our money and autonomy. They did this by having so-and-so nonchalantly bringing up these concerns in the meetings, then downplaying the resulting effects as something that should be expected, then agreeing with Dakota or Lila.
Keeping track of my hours was a joke. For everything I did, I was told I should have taken less time in order to do. The criticism I received came tongue-in-cheek and constructive at first, but steadily devolved into a series of harsh critiques that would leave me distraught and unable to think clearly. I was still unmedicated back then, and my emotional state was as turbulent as a hurricane. They did similar things to my girlfriend, as Lila took her under her wing, treating her as her child in order to take advantage of her own trauma she had with her mother.
If there was one thing these people really excelled at it is control. They figured us out quickly and efficiently and then used our traumas against us. Our second night there consisted of an informal group of the residents who stayed at Carmen Hall staring into each other’s eyes and then saying out loud what we felt at that moment. I remember staring at Daniella, who was a silhouette with the lamp directly behind her, and asking for healing. Something about the way she stared at me seemed to provoke a sense of trust and I felt that she would be able to help with a lot of the problems.
That’s one way they won over us and got us to do whatever they wanted. They are experts at gaining people’s trust and then they take advantage of that fact. Through these scripted and planned events they were able to warp our realities to the point where we were already robotic slaves right off the bat. We certainly were eager to earn their approval and work our way to a position where we were seen as valuable members of the project.
One of these planned events was Kukui’s birthday, which was just a few days after we got there. Kukui was a groundskeeper who had previously lived in Hawaii and was joked as being a ginger Jesus. He was an incredible person who really cared about the Earth. I have no idea if he was part of the manipulation or if he was there on similar beliefs that this was a group doing immense good in the world.
Early on during the night’s preparation, Dakota and Lila walked up to us and asked if we wanted to go out to eat with them. This struck us as odd that they would abandon Kukui on his birthday, but we didn’t see it as too weird at the time. We struck up a conversation, where it was revealed that Dakota had two EBT cards from different states.
One big hook they sunk into us was the idea that it was us versus the government. They managed to convince us that the institutions of the world were parasitic - which they usually are - but did it in such a way that made us feel like we were in a spiritual war against the bad boogie men of the world. And they managed this by gradually exposing us to more and more deliberate acts of defiance, in order to manifest our own sovereignty against the parasitic government.
It’s what led to us accepting some of their more diabolic schemes. For instance, there was talk about building a village in Ava, Missouri, moving all their people in, and then taking over the mayorship. They chose Missouri for this plan due to the different building codes of the state. In the moment, this seemed like a brilliant plan for expanding the influence of Earth Nation, but in hindsight appears to be a dystopian means to increase their power and continue taking advantage of people.
These were little seeds they planted that made us more comfortable with doing certain things that we otherwise wouldn’t. Awen was particularly uncomfortable with many of the things we did, but eventually they did get her to help out with their schemes. By keeping us under fear and gradually conditioning us, they were able to make us obedient as we were always looking out for our immediate survival.
Fear. That is an emotion I am now excessively familiar with as a result of this cult. While I have battled paranoia all my life, they took those primal emotions and twisted them to the point that I had no idea which way was up. Each day gradually became a battle while being on high alert, as I constantly scrambled to overcome whatever artificial set-backs were planted in my way and keep up with the workload that was presented to me.
My first exposure to this form of emotional manipulation came during Halloween. The night began jovially as Doran wore a plastic bag as a costume and invented a new dance that we all participated in. Daniella was preparing a large meal in the kitchen while we helped and played in rhythm to one another. The dinner we shared was only part of the night’s events that would change my life completely.
After dinner, Awen and I went back to our room and talked about what we wanted to do that night. The rest of the group was still down at the dining hall and preparing for a fun night of festivities. Awen was not opposed to me going, but she was and still is a pagan and wanted to celebrate her ancestors as per the tradition of Samhain. I debated spending the night with her, but the opportunity to spend time with these new people in our life made me curious as to what they would be doing. I will also admit that I was much more controlled by my addictive nature and was excited to drink with them.
So down I went. As I entered the dining hall, I saw that they were drinking tequila and generally having a great time. Naturally, I joined in and took a shot. Jovial times were had, and some time later I was offered another shot, but I did not see them pour this one. This turned out to be a crucial mistake on my part as I would find out that there was something else, something with psychedelic qualities, in the drink. It was not LSD, as I am familiar with the effects of that drug, so I am at a loss for what it could have been.
As the night went on I began to feel funny. It wasn’t until we were in a smoke circle that I began to notice something was wrong. I had trouble forming words and when Grizzly asked me a question all I could muster was a “hi!” This tripped me up and I went inside to go sit down.
This is where my memory starts to get fuzzy. I was mostly left alone as I sat cross-legged on a mat on the floor, but eventually there were three other people sitting around me, with a bottle placed in the center of us. I remember Prism and Josh, a carpenter who was doing some work on the buildings at Triangle Lake, were two of the people surrounding me, but I don’t remember any of the conversation they were having. I just remember getting really spooked at that time and tried to leave.
I don’t know how long it took me to get back to Awen, but I do remember the headlights of a vehicle coming down the hill as I was going up. It was late by the time I made it back in into Carmen Hall, which suggests that I have no memory of what happened after the apparent spin-the-bottle episode. My memory starts to get better as I remember lying there with Awen trying to articulate what was going on, but my words just spiraled into incomprehensible nonsense. She was worried for me, just as I was worried for myself.
The next morning continued on as if nothing ever happened, but I was emotionally jostled for the next few days. Nothing was ever said about what happened the night before, and a part of me was terrified that something happened Because my mother had AIDS, and that is a terror I still battle to this day, I obsessed over the idea that Prism, who was HIV positive, may have done something with me. I’ve since been tested and everything’s fine, but for a while I was terrified that I was raped.
Was that a rational or irrational fear? I’ll never know. What I do know is that they took advantage of my perturbed state by subtly twisting the knife in the following days with their synchronous set-ups, making me feel guilty that I did not choose to spend time with Awen that night, and thus making me work harder than ever before.
Chapter 4 in comments
submitted by Shrugbeternowthaneva to ShrugLifeSyndicate [link] [comments]

Agreement with Satoshi – On the Formalization of Nakamoto Consensus

Cryptology ePrint Archive: Report 2018/400
Date: 2018-05-01
Author(s): Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl

Link to Paper


Abstract
The term Nakamoto consensus is generally used to refer to Bitcoin's novel consensus mechanism, by which agreement on its underlying transaction ledger is reached. It is argued that this agreement protocol represents the core innovation behind Bitcoin, because it promises to facilitate the decentralization of trusted third parties. Specifically, Nakamoto consensus seeks to enable mutually distrusting entities with weak pseudonymous identities to reach eventual agreement while the set of participants may change over time. When the Bitcoin white paper was published in late 2008, it lacked a formal analysis of the protocol and the guarantees it claimed to provide. It would take the scientific community several years before first steps towards such a formalization of the Bitcoin protocol and Nakamoto consensus were presented. However, since then the number of works addressing this topic has grown substantially, providing many new and valuable insights. Herein, we present a coherent picture of advancements towards the formalization of Nakamoto consensus, as well as a contextualization in respect to previous research on the agreement problem and fault tolerant distributed computing. Thereby, we outline how Bitcoin's consensus mechanism sets itself apart from previous approaches and where it can provide new impulses and directions to the scientific community. Understanding the core properties and characteristics of Nakamoto consensus is of key importance, not only for assessing the security and reliability of various blockchain systems that are based on the fundamentals of this scheme, but also for designing future systems that aim to fulfill comparable goals.

References
[AAC+05] Amitanand S Aiyer, Lorenzo Alvisi, Allen Clement, Mike Dahlin, Jean-Philippe Martin, and Carl Porth. Bar fault tolerance for cooperative services. In ACM SIGOPS operating systems review, volume 39, pages 45–58. ACM, 2005.
[ABSFG08] Eduardo A Alchieri, Alysson Neves Bessani, Joni Silva Fraga, and Fab´ıola Greve. Byzantine consensus with unknown participants. In Proceedings of the 12th International Conference on Principles of Distributed Systems, pages 22–40. SpringerVerlag, 2008.
[AFJ06] Dana Angluin, Michael J Fischer, and Hong Jiang. Stabilizing consensus in mobile networks. In Distributed Computing in Sensor Systems, pages 37–50. Springer, 2006.
[AJK05] James Aspnes, Collin Jackson, and Arvind Krishnamurthy. Exposing computationally-challenged byzantine impostors. Department of Computer Science, Yale University, New Haven, CT, Tech. Rep, 2005.
[AMN+16] Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. Solidus: An incentive-compatible cryptocurrency based on permissionless byzantine consensus. https://arxiv.org/abs/1612.02916, Dec 2016. Accessed: 2017-02-06.
[AS98] Yair Amir and Jonathan Stanton. The spread wide area group communication system. Technical report, TR CNDS-98-4, The Center for Networking and Distributed Systems, The Johns Hopkins University, 1998.
[Bag00] Walter Bagehot. The english constitution, volume 3. Kegan Paul, Trench, Trubner, 1900. ¨
[Ban98] Bela Ban. Design and implementation of a reliable group communication toolkit for java, 1998.
[BBRTP07] Roberto Baldoni, Marin Bertier, Michel Raynal, and Sara Tucci-Piergiovanni. Looking for a definition of dynamic distributed systems. In International Conference on Parallel Computing Technologies, pages 1–14. Springer, 2007.
[Bit] Bitcoin community. Bitcoin-core source code. https://github.com/bitcoin/bitcoin. Accessed: 2015-06-30.
[BJ87] Ken Birman and Thomas Joseph. Exploiting virtual synchrony in distributed systems. volume 21. ACM, 1987.
[BMC+15] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In IEEE Symposium on Security and Privacy, 2015.
[BO83] Michael Ben-Or. Another advantage of free choice (extended abstract): Completely asynchronous agreement protocols. In Proceedings of the second annual ACM symposium on Principles of distributed computing, pages 27–30. ACM, 1983.
[BPS16a] Iddo Bentov, Rafael Pass, and Elaine Shi. The sleepy model of consensus. https://eprint.iacr.org/2016/918.pdf, 2016. Accessed: 2016-11-08.
[BPS16b] Iddo Bentov, Rafael Pass, and Elaine Shi. Snow white: Provably secure proofs of stake. https://eprint.iacr.org/2016/919.pdf, 2016. Accessed: 2016-11-08.
[BR09] Franc¸ois Bonnet and Michel Raynal. The price of anonymity: Optimal consensus despite asynchrony, crash and anonymity. In Proceedings of the 23rd international conference on Distributed computing, pages 341–355. Springer-Verlag, 2009.
[Bre00] EA Brewer. Towards robust distributed systems. abstract. In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, page 7, 2000.
[BSAB+17] Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. Consensus in the age of blockchains. arXiv:1711.03936, 2017. Accessed:2017-12-11.
[BT16] Zohir Bouzid and Corentin Travers. Anonymity-preserving failure detectors. In International Symposium on Distributed Computing, pages 173–186. Springer, 2016.
[Can00] Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of CRYPTOLOGY, 13(1):143–202, 2000.
[Can01] Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on, pages 136–145. IEEE, 2001.
[CFN90] David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Proceedings on Advances in cryptology, pages 319–327. Springer-Verlag New York, Inc., 1990.
[CGR07] Tushar D Chandra, Robert Griesemer, and Joshua Redstone. Paxos made live: an engineering perspective. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, pages 398–407. ACM, 2007.
[CGR11] Christian Cachin, Rachid Guerraoui, and Luis Rodrigues. Introduction to reliable and secure distributed programming. Springer Science & Business Media, 2011.
[CKS00] Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in constantinople: Practical asynchronous byzantine agreement using cryptography. In Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing, pages 123–132. ACM, 2000.
[CL+99] Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173–186, 1999.
[CL02] Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398–461, 2002.
[CNV04] Miguel Correia, Nuno Ferreira Neves, and Paulo Verissimo. How to tolerate half less one byzantine nodes in practical distributed systems. In Reliable Distributed Systems, 2004. Proceedings of the 23rd IEEE International Symposium on, pages 174–183. IEEE, 2004.
[Coo09] J. L. Coolidge. The gambler’s ruin. Annals of Mathematics, 10(4):181–192, 1909.
[Cri91] Flaviu Cristian. Reaching agreement on processor-group membrship in synchronous distributed systems. Distributed Computing, 4(4):175–187, 1991.
[CT96] Tushar Deepak Chandra and Sam Toueg. Unreliable failure detectors for reliable distributed systems. volume 43, pages 225–267. ACM, 1996.
[CV17] Christian Cachin and Marko Vukolic. Blockchain con- ´sensus protocols in the wild. arXiv:1707.01873, 2017. Accessed:2017-09-26.
[CVL10] Miguel Correia, Giuliana S Veronese, and Lau Cheuk Lung. Asynchronous byzantine consensus with 2f+ 1 processes. In Proceedings of the 2010 ACM symposium on applied computing, pages 475–480. ACM, 2010.
[CVNV11] Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, and Paulo Verissimo. Byzantine consensus in asynchronous message-passing systems: a survey. volume 2, pages 141–161. Inderscience Publishers, 2011.
[CWA+09] Allen Clement, Edmund L Wong, Lorenzo Alvisi, Michael Dahlin, and Mirco Marchetti. Making byzantine fault tolerant systems tolerate byzantine faults. In NSDI, volume 9, pages 153–168, 2009.
[DDS87] Danny Dolev, Cynthia Dwork, and Larry Stockmeyer. On the minimal synchronism needed for distributed consensus. volume 34, pages 77–97. ACM, 1987.
[Dei] Wei Dei. b-money. http://www.weidai.com/bmoney.txt. Accessed on 03/03/2017.
[DGFGK10] Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, and Anne-Marie Kermarrec. Brief announcement: Byzantine agreement with homonyms. In Proceedings of the twentysecond annual ACM symposium on Parallelism in algorithms and architectures, pages 74–75. ACM, 2010.
[DGG02] Assia Doudou, Benoˆıt Garbinato, and Rachid Guerraoui. Encapsulating failure detection: From crash to byzantine failures. In International Conference on Reliable Software Technologies, pages 24–50. Springer, 2002.
[DGKR17] Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexan- ˇder Russell. Ouroboros praos: An adaptively-secure, semisynchronous proof-of-stake protocol. Cryptology ePrint Archive, Report 2017/573, 2017. Accessed: 2017-06-29.
[DLP+86] Danny Dolev, Nancy A Lynch, Shlomit S Pinter, Eugene W Stark, and William E Weihl. Reaching approximate agreement in the presence of faults. volume 33, pages 499–516. ACM, 1986.
[DLS88] Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. volume 35, pages 288–323. ACM, 1988.
[DN92] Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference, pages 139–147. Springer, 1992.
[Dol81] Danny Dolev. Unanimity in an unknown and unreliable environment. In Foundations of Computer Science, 1981. SFCS’81. 22nd Annual Symposium on, pages 159–168. IEEE, 1981.
[Dou02] John R Douceur. The sybil attack. In International Workshop on Peer-to-Peer Systems, pages 251–260. Springer, 2002.
[DSU04] Xavier Defago, Andr ´ e Schiper, and P ´ eter Urb ´ an. Total order ´ broadcast and multicast algorithms: Taxonomy and survey. ACM Computing Surveys (CSUR), 36(4):372–421, 2004.
[DW13] Christian Decker and Roger Wattenhofer. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pages 1–10. IEEE, 2013.
[EGSvR16] Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert van Renesse. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Security Symposium on Networked Systems Design and Implementation (NSDI’16). USENIX Association, Mar 2016.
[ES14] Ittay Eyal and Emin Gun Sirer. Majority is not enough: Bitcoin ¨ mining is vulnerable. In Financial Cryptography and Data Security, pages 436–454. Springer, 2014.
[Fin04] Hal Finney. Reusable proofs of work (rpow). http://web.archive.org/web/20071222072154/http://rpow.net/, 2004. Accessed: 2016-04-31.
[Fis83] Michael J Fischer. The consensus problem in unreliable distributed systems (a brief survey). In International Conference on Fundamentals of Computation Theory, pages 127–140. Springer, 1983.
[FL82] Michael J FISCHER and Nancy A LYNCH. A lower bound for the time to assure interactive consistency. volume 14, Jun 1982.
[FLP85] Michael J Fischer, Nancy A Lynch, and Michael S Paterson. Impossibility of distributed consensus with one faulty process. volume 32, pages 374–382. ACM, 1985.
[Fuz08] Rachele Fuzzati. A formal approach to fault tolerant distributed consensus. PhD thesis, EPFL, 2008.
[GHM+17] Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. Cryptology ePrint Archive, Report 2017/454, 2017. Accessed: 2017-06-29.
[GKL15] Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology-EUROCRYPT 2015, pages 281–310. Springer, 2015.
[GKL16] Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol with chains of variable difficulty. http://eprint.iacr.org/2016/1048.pdf, 2016. Accessed: 2017-02-06.
[GKP17] Juan A. Garay, Aggelos Kiayias, and Giorgos Panagiotakos. Proofs of work for blockchain protocols. Cryptology ePrint Archive, Report 2017/775, 2017. http://eprint.iacr.org/2017/775.
[GKQV10] Rachid Guerraoui, Nikola Knezevi ˇ c, Vivien Qu ´ ema, and Marko ´ Vukolic. The next 700 bft protocols. In ´ Proceedings of the 5th European conference on Computer systems, pages 363–376. ACM, 2010.
[GKTZ12] Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, and Vassilis Zikas. Byzantine agreement with a rational adversary. pages 561–572. Springer, 2012.
[GKW+16] Arthur Gervais, Ghassan O Karame, Karl Wust, Vasileios ¨ Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. On the security and performance of proof of work blockchains. https://eprint.iacr.org/2016/555.pdf, 2016. Accessed: 2016-08-10.
[GL02] Seth Gilbert and Nancy Lynch. Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. volume 33, pages 51–59. ACM, 2002.
[GRKC15] Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 692–705. ACM, 2015.
[Her88] Maurice P Herlihy. Impossibility and universality results for wait-free synchronization. In Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, pages 276–290. ACM, 1988.
[Her91] Maurice Herlihy. Wait-free synchronization. ACM Transactions on Programming Languages and Systems (TOPLAS), 13(1):124–149, 1991.
[HKZG15] Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129–144, 2015.
[Hoe07] Jaap-Henk Hoepman. Distributed double spending prevention. In Security Protocols Workshop, pages 152–165. Springer, 2007.
[HT94] Vassos Hadzilacos and Sam Toueg. A modular approach to fault-tolerant broadcasts and related problems. Cornell University Technical Report 94-1425, 1994.
[IT08] Hideaki Ishii and Roberto Tempo. Las vegas randomized algorithms in distributed consensus problems. In 2008 American Control Conference, pages 2579–2584. IEEE, 2008.
[JB99] Ari Juels and John G Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, volume 99, pages 151–165, 1999.
[KMMS01] Kim Potter Kihlstrom, Louise E Moser, and P Michael MelliarSmith. The securering group communication system. ACM Transactions on Information and System Security (TISSEC), 4(4):371–406, 2001.
[KMMS03] Kim Potter Kihlstrom, Louise E Moser, and P Michael MelliarSmith. Byzantine fault detectors for solving consensus. volume 46, pages 16–35. Br Computer Soc, 2003.
[KMTZ13] Jonathan Katz, Ueli Maurer, Bjorn Tackmann, and Vassilis ¨ Zikas. Universally composable synchronous computation. In TCC, volume 7785, pages 477–498. Springer, 2013.
[KP15] Aggelos Kiayias and Giorgos Panagiotakos. Speed-security tradeoff s in blockchain protocols. https://eprint.iacr.org/2015/1019.pdf, Oct 2015. Accessed: 2016-10-17.
[KP16] Aggelos Kiayias and Giorgos Panagiotakos. On trees, chains and fast transactions in the blockchain. http://eprint.iacr.org/2016/545.pdf, 2016. Accessed: 2017-02-06.
[KRDO16] Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. Ouroboros: A provably secure proof-of-stake blockchain protocol. https://pdfs.semanticscholar.org/1c14/549f7ba7d6a000d79a7d12255eb11113e6fa.pdf, 2016. Accessed: 2017-02-20.
[Lam84] Leslie Lamport. Using time instead of timeout for fault-tolerant distributed systems. volume 6, pages 254–280. ACM, 1984.
[Lam98] Leslie Lamport. The part-time parliament. volume 16, pages 133–169. ACM, 1998.
[LCW+06] Harry C Li, Allen Clement, Edmund L Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, and Michael Dahlin. Bar gossip. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 191–204. USENIX Association, 2006.
[LSM06] Brian Neil Levine, Clay Shields, and N Boris Margolin. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA, 7, 2006.
[LSP82] Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. volume 4, pages 382–401. ACM, 1982.
[LSZ15] Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. Inclusive block chain protocols. In Financial Cryptography and Data Security, pages 528–547. Springer, 2015.
[LTKS15] Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. Demystifying incentives in the consensus computer. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 706–719. ACM, 2015.
[Lyn96] Nancy A Lynch. Distributed algorithms. Morgan Kaufmann, 1996.
[Mic16] Silvio Micali. Algorand: The efficient and democratic ledger. http://arxiv.org/abs/1607.01341, 2016. Accessed: 2017-02-09.
[Mic17] Silvio Micali. Byzantine agreement, made trivial. https://people.csail.mit.edu/silvio/SelectedApr 2017. Accessed:2018-02-21.
[MJ14] A Miller and LaViola JJ. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. https://socrates1024.s3.amazonaws.com/consensus.pdf, 2014. Accessed: 2016-03-09.
[MMRT03] Dahlia Malkhi, Michael Merritt, Michael K Reiter, and Gadi Taubenfeld. Objects shared by byzantine processes. volume 16, pages 37–48. Springer, 2003.
[MPR01] Hugo Miranda, Alexandre Pinto, and Luıs Rodrigues. Appia, a flexible protocol kernel supporting multiple coordinated channels. In Distributed Computing Systems, 2001. 21st International Conference on., pages 707–710. IEEE, 2001.
[MR97] Dahlia Malkhi and Michael Reiter. Unreliable intrusion detection in distributed computations. In Computer Security Foundations Workshop, 1997. Proceedings., 10th, pages 116–124. IEEE, 1997.
[MRT00] Achour Mostefaoui, Michel Raynal, and Fred´ eric Tronel. From ´ binary consensus to multivalued consensus in asynchronous message-passing systems. Information Processing Letters, 73(5-6):207–212, 2000.
[MXC+16] Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of bft protocols. https://eprint.iacr.org/2016/199.pdf, 2016. Accessed: 2017-01-10.
[Nak08a] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf, Dec 2008. Accessed: 2015-07-01.
[Nak08b] Satoshi Nakamoto. Bitcoin p2p e-cash paper, 2008.
[Nar16] Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven. Bitcoin and cryptocurrency technologies. https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton bitcoin book.pdf?a=1, 2016. Accessed: 2016-03-29.
[Nei94] Gil Neiger. Distributed consensus revisited. Information processing letters, 49(4):195–201, 1994.
[NG16] Christopher Natoli and Vincent Gramoli. The blockchain anomaly. In Network Computing and Applications (NCA), 2016 IEEE 15th International Symposium on, pages 310–317. IEEE, 2016.
[NKMS16] Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016.
[PS16a] Rafael Pass and Elaine Shi. Fruitchains: A fair blockchain. http://eprint.iacr.org/2016/916.pdf, 2016. Accessed: 2016-11-08.
[PS16b] Rafael Pass and Elaine Shi. Hybrid consensus: Scalable permissionless consensus. https://eprint.iacr.org/2016/917.pdf, Sep 2016. Accessed: 2016-10-17.
[PS17] Rafael Pass and Elaine Shi. Thunderella: Blockchains with optimistic instant confirmation. Cryptology ePrint Archive, Report 2017/913, 2017. Accessed:2017-09-26.
[PSL80] Marshall Pease, Robert Shostak, and Leslie Lamport. Reaching agreement in the presence of faults. volume 27, pages 228–234. ACM, 1980.
[PSs16] Rafael Pass, Lior Seeman, and abhi shelat. Analysis of the blockchain protocol in asynchronous networks. http://eprint.iacr.org/2016/454.pdf, 2016. Accessed: 2016-08-01.
[Rab83] Michael O Rabin. Randomized byzantine generals. In Foundations of Computer Science, 1983., 24th Annual Symposium on, pages 403–409. IEEE, 1983.
[Rei96] Michael K Reiter. A secure group membership protocol. volume 22, page 31, 1996.
[Ric93] Aleta M Ricciardi. The group membership problem in asynchronous systems. PhD thesis, Cornell University, 1993.
[Ros14] M. Rosenfeld. Analysis of hashrate-based double spending. http://arxiv.org/abs/1402.2009, 2014. Accessed: 2016-03-09.
[RSW96] Ronald L Rivest, Adi Shamir, and David A Wagner. Time-lock puzzles and timed-release crypto. 1996.
[Sch90] Fred B Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. volume 22, pages 299–319. ACM, 1990.
[SLZ16] Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. Spectre: A fast and scalable cryptocurrency protocol. Cryptology ePrint Archive, Report 2016/1159, 2016. Accessed: 2017-02-20.
[SSZ15] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. http://arxiv.org/pdf/1507.06183.pdf, 2015. Accessed: 2016-08-22.
[SW16] David Stolz and Roger Wattenhofer. Byzantine agreement with median validity. In LIPIcs-Leibniz International Proceedings in Informatics, volume 46. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2016.
[Swa15] Tim Swanson. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf, Apr 2015. Accessed: 2017-10-03.
[SZ13] Yonatan Sompolinsky and Aviv Zohar. Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains, 2013.
[SZ16] Yonatan Sompolinsky and Aviv Zohar. Bitcoin’s security model revisited. http://arxiv.org/pdf/1605.09193, 2016. Accessed: 2016-07-04.
[Sza14] Nick Szabo. The dawn of trustworthy computing. http://unenumerated.blogspot.co.at/2014/12/the-dawn-of-trustworthy-computing.html, 2014. Accessed: 2017-12-01.
[TS16] Florian Tschorsch and Bjorn Scheuermann. Bitcoin and ¨ beyond: A technical survey on decentralized digital currencies. In IEEE Communications Surveys Tutorials, volume PP, pages 1–1, 2016.
[VCB+13] Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. Efficient byzantine fault-tolerance. volume 62, pages 16–30. IEEE, 2013.
[Ver03] Paulo Ver´ıssimo. Uncertainty and predictability: Can they be reconciled? In Future Directions in Distributed Computing, pages 108–113. Springer, 2003.
[Vuk15] Marko Vukolic. The quest for scalable blockchain fabric: ´ Proof-of-work vs. bft replication. In International Workshop on Open Problems in Network Security, pages 112–125. Springer, 2015.
[Vuk16] Marko Vukolic. Eventually returning to strong consistency. https://pdfs.semanticscholar.org/a6a1/b70305b27c556aac779fb65429db9c2e1ef2.pdf, 2016. Accessed: 2016-08-10.
[XWS+17] Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. A taxonomy of blockchain-based systems for architecture design. In Software Architecture (ICSA), 2017 IEEE International Conference on , pages 243–252. IEEE, 2017.
[YHKC+16] Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, Sooyong Park, and Kari Smolander. Where is current research on blockchain technology? – a systematic review. volume 11, page e0163477. Public Library of Science, 2016.
[ZP17] Ren Zhang and Bart Preneel. On the necessity of a prescribed block validity consensus: Analyzing bitcoin unlimited mining protocol. http://eprint.iacr.org/2017/686, 2017. Accessed: 2017-07-20.
submitted by dj-gutz to myrXiv [link] [comments]

Cocos-BCX:The decentralized gaming application & crypto assets creation platform

Cocos-BCX:The decentralized gaming application & crypto assets creation platform

I. Project Overview

Cocos-BCX is a platform used for the development, operation, management and transfer of decentralized applications and in-application assets on the blockchain ecosystem. The platform mainly includes three function modules:
(1)The application development framework that supports multiple operating systems and various blockchain environments.
(2)Completely scripted, componentized and data-driven application development tools;
(3)An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Cocos-BCX can allow developers to perform programming, debugging, and publishing of decentralized applications oriented to the blockchain environment, and hybrid architecture applications. Meanwhile, the platform integrates the distributed user account system, wallet and digital asset circulation platform based on the blockchain, which can realize the permanent saving and cross-chain use of in-application assets.

II. Project evaluation

(一) Market analysis

1. Market conditions | 8 points

The organizing pattern of productivity dominated by governments in some areas or industrial domains is apt to change in the context of bottlenecks existing for global scientific and technological progress, rising resource consumption, an aging population, and intensified geopolitical conflicts. In particular, in 2008, when Nakamot published his thesis "Bitcoin: A Peer-to-Peer Electronic Cash System", discussions on blockchain and digital currency have gradually extended from technological aspects to economic, social and political, and other fields. The general public have begun to pay close attention to the impact of blockchain on social development as well as the role of digital currency in the world economy. Based on the decentralized characteristics of the blockchain and the vibrant vitality of the digital economy, the general public has enough confidence to predict that the decentralized "digital assets" will be a sweeping trend in the future, and will derive new business models and social values.
At the same time, in the development process of decentralized applications of different types, the game industry enjoys unique development advantages, because the game's production mode is the most sophisticated, enjoys the highest degree in terms of commercialization, and is one of the scenarios with the most profound foundation in terms of developers and users.
u Analysis: The game field has a huge room for development, which is highly consistent with the characteristics of the blockchain, and accords with the future development tendency of the digital economy.
The digital asset economy model carried by the project through the blockchain technology will assetize the content produced by the developer, enable the developer to continue reaping benefits during the use, management and transfer of his assets, and provide him with a convenient, decentralized game distribution channel; meanwhile, it helps players to transform the data formed by time and energy as well as the props they obtain as a result of their consumption into the assets that can be safely stored and circulated, offering players the right to manage and commercialize them.

2. Competition | 8 points

Since the last century till now, owing to the sustained efforts and promotion by a variety of IT technology game enterprises, the national and even global online game market is developing by leaps and bounds. If there is no systematic risks, such as policy regulation, vicious incidents and other factors, there will be no smooth and endless development momentum unless something unexpected happens. However, an objective analysis reveals that the current online game market is still dominated by IT technology companies, and even in a controlled and monopolized development, which, of course, also brings substantial profits, such as Tencent, Blizzard Tech.
u Analysis: It can be predicted that the Cocos-BCX project will hardly have any direct competitors in the strict sense for the time being, but will encounter a marginal pressure competitive environment from two dimensions. In summary, the classical IT game companies at home and abroad are massive in size and have obvious capital advantages. However, the Cocos-BCX project has an advanced philosophy and cutting edge technology, and thereby enjoys first-mover advantages for a breakthrough; The blockchain game project of the same business is currently marked by wide participation and generic applicability. But in comparison, the Cocos-BCX game industry has such advantages as a salient background, special project orientation and sophisticated development in technical modules, and therefore has greater development potential.

(二) Token Status

1. Token situation | 6 points

(1) Basic situation of Token
Token name: COCOS
Total tokens in circulation: 100 billion
Consensus mechanism: DPOS
(2) Token usage and allocation
Part I 82%: Cocos-BCX is used for the platform community construction in various ways, including but not limited to the witness' block reward, incentives for platform ecological developers, global community construction, marketing and promotion, industry alliances, eco-investment, research, financial and legal compliance. The use of this part of Cocos-BCX includes swapping by means of the consensus work contributions, free gifts, gifts in exchange for service, and gifts in exchange for other tokens, etc.
Part II, 18%: Cocos-BCX is intended as incentives for the sponsoring team of the project. The incentive part will set up a locking mechanism, which will be issued and unlocked one-third at the end of each year after Token generation, and the issuance will be completed within three years.

https://preview.redd.it/sahtuohmtb821.jpg?width=684&format=pjpg&auto=webp&s=324cbde0e5911f219649d8a64470dc3d70ecdb7f
u Analysis: The use of Token is mainly divided into two parts, among which, 82% is used for project development and construction. The remaining 18%, which has a locked position mechanism, is intended for team incentive and construction. The use design is rather rational, but the team part is slightly higher. Given that the industry is in the initial stage of development, it is of great importance to seize the first opportunity and acquire early traffic users. It is suggested that the proportion of Token used by the team be reduced slightly, which is more conducive to the long-term development of the project. It should be noted that the original holding distribution of Token has not been queried via the official channel, while this link for the conventional blockchain project are basically disclosed. Meanwhile, from the standpoint of ordinary investors, Token’s original holding ratio is also one of the important parameters for its investment.

2. Ecological cycle | 8 points

(1)The Token (COCOS) positioning of the platform: circulation media and governance proof in eco-economic activities
COCOS not only serves as a value exchange carrier and community participation proof for Cocox-BCX, but its orientation as a basic pricing Token is likely to play a critical role in the digital asset ecosystem. With the continuous development of the industry, a large quantity of decentralized digital assets will exist in multiple blockchain ecosystems according to different standards in the future, and the value existing in asset pricing media transcending the chain ecology will be infinitely magnified.
, which is specifically manifested in that developers and users can evaluate, compare, trade and manage digital assets of different chain ecosystems, worldview content, and technical standards based on COCOS. Meanwhile, as a primary and basic pricing medium, COCOS is positioned to become the necessary conditions for the blockchain industry to develop and trade financial products and derivatives of digital assets in the future.
(2)Basic use model of Token (COCOS)
Ø Value exchange medium within the platform ecosystem;
Ø Entrusted consensus equity share representative of the Cocos-BCX public blockchain;
Ø The reference and basis for the measurement of the participation in and contribution to the platform community.
(3)How to obtain Token (COCOS)
Ø Value creation: It includes the contribution of the behavior of creating digital assets, that is, developing games, making props, etc.
Ø Platform contribution reward: Users who contribute to the Cocos-BCX community is entitled to COCOS;
Ø Market transaction: Selling the prop assets obtained in the game to get COCOS;
Ø Behavioral incentives: Various effective behaviors within the Cocos-BCX platform, community and platform games will be converted into COCOS
according to a certain contribution degree.
u Analysis: The use model, scenario application, acquisition method, market orientation, etc. for the Token ecosystem design are all well deliberated, to be verified by the market.
The ecosystem design of the Token project not only takes the macroscopic use model and scenario application, but also gives a detailed description of the acquisition method. Another point that must be pointed out is that it has a clear market orientation and future prospect as soon as the design begins, therefore, in general the Token ecosystem design is well-considered and far-sighted. However, for the volatile blockchain market, the crux depends on whether the ecological design philosophy can keep pace with the times, which is very essential. In a word, in the face of massive uncertainties, it needs to be finally verified by the market.

(三) Team member

1. Founder | 8 points


https://preview.redd.it/6xhhabgntb821.jpg?width=200&format=pjpg&auto=webp&s=f8b038f4b4016724adf160c180c1eab3fb86aa1b
Haozhi Chen
China's renowned Internet serial entrepreneur, and has successively led and participated in the creation of Joyo.com, Xcar.com.cn, and cdn.yeeyan.org since 1999, and founded Chukong Technology in 2009. Chukong is a leading game development and distribution enterprise in China and a major maintainer and supporter of the Cocos-BCX global open source game engine and developer community.

https://preview.redd.it/t5siu9cotb821.jpg?width=200&format=pjpg&auto=webp&s=262123cfe0f40dbc87177d62ff57bd9e270a12cf
Xiaolong Yang
With over 14 years of experience in technology entrepreneurship and investment, he once co-founded China's leading entertainment social networking company. As an investor, he once worked for China's leading private equity fund, during which period, he led and participated in investment projects totalling over 1 billion US dollars, and realized the exit of some projects at home and abroad. His interests and expertise mainly concentrate on information technology of the global primary market and secondary market in the later stage, and macro multiple asset category investment, and has a profound understanding of the financial market mechanism and asset pricing. He is also an investment partner in China's major technology investment fund and provides counselling for Chinese and American hedge funds, venture capital funds and large enterprises.
u Analysis: Chen Haozhi, as a founder, has rich experience in the game industry, and enjoys widespread networking and abundant resources in the industry as being one of the early Internet entrepreneurs; Another founder, Yang Xiaolong, has a strong experience in technology venture capital investment, and has the expertise for global investment layout. On the whole, two co-founders have a prominent advantage in overall industry background and integrating resources.

2. Founding team | 8 points


https://preview.redd.it/15ytlu4ptb821.png?width=877&format=png&auto=webp&s=26839b00d4921c925431e8f0be337c9828e0eb49
Kevin Yin: An early contributor of CocosChina community, NOI winner, and ACM guest. A senior developer of blockchain, and having years of experience in compilation and distributed computing. An investor of the blockchain technology.
Jane Jin: Responsible for CocosChina community, the "Aipuworks" incubator, etc., and an expert of the Techincal Committee for Blockchain, China Software Industry Association. Bachelor of Economics, Zhejiang Gongshang University, and mini-EMBA of Tsinghua University. He once served important functions in "Fortune Global 500" including Lucent, Nortel, NSN, Nokia, Intel and other multinational companies in the marketing, sales, executive and developer relationship domain.
James Jeon: Responsible for the business development strategy and implementation of the project's South Korean section. From 2012 to 2015, he served as CEO of Gurum Company, a South Korean subsidiary of Chukong Technologies, earning an annual revenue of over $30 million from the scratch for the South Korean company and leading the South Korean subsidiary in going public successfully.
Frederick Lim: Responsible for the business development strategy and implementation of the project's South Korean section. From 2014 to 2015, he served as co-CEO of Gurum Company, and was once the director of the Strategic Investment Department of Hyundai Group, responsible for investment in Internet, communication, telecommunications and other fields. He is a doctor of Engineering Technology, Sungkyunkwan University, South Korea.
Hirokuni Fujita: originally head of the Japanese subsidiary of Chukong Technologies. He graduated from Graduate School of Arts and Sciences, The University of Tokyo, majoring in Interdisciplinary Cultural Studies.
Jason: preacher of the Cocos-BCX community and meanwhile, senior manager of the Cocos 2d-x global community. He started to program on the Commodore-64 computer when he was 8. In addition to developing the community, he was keen on studying mathematics, finance, C++ and improving his Chinese proficiency.
Qinzhou Wang: Since entering the game industry in 2009, he has worked in the brand market in ZOL. Com. CN, Howell Expo, host of ChinaJoy, and is responsible for the brand market in Chukong Technologies.
u Analysis: The special technological talent construction of the team technicians needs to be further strengthened. At present, there is a blockchain technician. The game background and the advantages of the international architecture building enjoy prominent advantages, and there are sufficient team members on the strategic level and in the aspect of ecological construction. It is worth mentioning that team building is stable, and there is a high level of consensus among team members, which is conducive to the robust development of the project.
One member of the founding team has experience in the blockchain project development, that is, Chief Technical Officer, who is a senior blockchain developer. He has many years of experience in compiling and distributed computing, and is also a technology investor of blockchain.
In the early stage, owing to the demand of the game industry in the Japanese and Korean markets, Japanese and Korean market leaders were specially arranged in the early team structure of Chukong Technologies. In particular, due to the prosperity and popularity of the game industry in the Korean market, two co-leaders were specially arranged for the Korea market, responsible for strategic and investment issues respectively.
Consultant Team | 8 points

https://preview.redd.it/7d9dp2wptb821.jpg?width=558&format=pjpg&auto=webp&s=39fd3b0aa342403493df250d99c09472c48e0c72
Zhe Wang: Founder of the Cocos engine, and CEO of Xiamen Yaji Software Co., Ltd. He graduated from Department of Electronics, Nanjing University, and later studied a postgraduate program at Department of Management Science, Xiamen University. He created the Cocos engine in 2011, which currently has 1.1 million registered developers worldwide and 300,000 monthly active developers in over 200 countries and regions in the world. The Cocos engine has arrested the attention of platform vendors at home and abroad, and has established a long-term cooperative partnership with Microsoft, Google, ARM, Intel, Qualcomm, Samsung, Huawei and Tencent, etc.
Edith Yeung: One of some "Silicon Valley's Must Meet" investors as covered in Inc magazine. She is the head of 500 Startups, Silicon Valley's famous venture capital company and incubator in Greater China, and meanwhile, manages a Mobile Collective fund worth tens of millions of dollars. She has invested in over 40 mobile Internet, VR, AR and AI start-ups, including Hooked (App store's No. 1 reading App), DayDayCook (one of Asia's largest food communities), Fleksy (acquired by Pinterest), Human (acquired by Mapbox), AISense and so on.
u Analysis: The consultant team has obvious advantages in technological achievements, rich experience in technology innovation investment and incubation experience for startups.
The consultant team consists of a Maker-oriented technical talent and two venture capital managers with a senior venture capital background, among whom, Wang Zhe, technical consultant, graduated from Department of Electronics, Nanjing University and CEO of Xiamen Yaji Software. Wang is the founder of Cocos-BCX engine. At present, the Cocos engine has 1.1 million registered developers and 300,000 monthly active developers in over 200 countries and regions worldwide.

(四) Tech Analysis

1. Tech highlights | 9 points

(1) Smart contract system which can be updated iteratively: The smart contract system, represented by Ethereum, is not subject to modification once its definition is published, making it difficult to meet the volatile demands of market. Therefore, an iterative smart contract system is designed to address this pain spot.
(2) Prop circulation platform: Unlike conventional game transaction platform, Cocos-BCX's decentralized digital asset circulation platform does not have intermediary agencies. Players can complete the transfer and purchase of non-homogeneous assets, including "game gold coins" and prop assets acquired in the game on the prop circulation platform. In the whole process of transfer, the platform will adopt smart contract for automatic matching to help users complete the transfer process more efficiently.
(3) Game interactive operation environment:
Based on the judgment of the operation environment characteristics of blockchain games in the future, Cocos-BCX has designed a set of integrated operation environment that accommodates various types of APPs, as well as the supporting interoperability interface. Combined with COCOS Creator, it simplifies the process of docking game programs and blockchain, making intra-chain interaction transparent to developers, and allowing conventional game developers to develop or migrate blockchain game without a threshold.
(4) Mapping gateway that supports multi-chain and asset riveting:
Cocos-BCX provides a set of mapping gateways used for the automatic mapping of game gold coins and props. Under the unified value measurement system, it realizes the smooth transition of different in-chain game content and different platform content. The content that can be used for mapping includes game gold coins, game equipment data, etc.
(5) Transaction authentication mechanism that prevents BP/developers from cheating:
BP, as the core of transaction processing and communication of the whole network, can know the processing result of the latest transaction prior to general nodes. Therefore, BP enjoys a priority for information with timeliness or confidentiality
, as compared with general nodes, so it has a cheating potential in terms of
information acquisition. To address the drawbacks of this technical link, five modular confrontation mechanisms has been specially designed to hold the likelihood of BP/developer cheating at bay.
(6) Economies Principle Design of Cocos-BCX:
The Cocos-BCX platform carries the game assets value created by developers by providing a complete set of functional components including the underlying public blockchain, digital property management, and exchanges. Its technology and governance structure design, based on the graphene standard, has the economic attributes corresponding to the DPoS consensus mechanism.
u Analysis: There are a multiplicity of technical highlights in that the overall technology construction shows characteristics such as rigid logic and prominent modularity, and various technical solutions and mechanisms with a strong pertinence have been put forward.
Based on the market pain spots of the game industry, and combined with the development opportunities of blockchain technology, the Cocos-BCX project puts forward a vision system to create consistence between the content producer and consumer in the digital world. In view of the initial intention of the project and the relatively profound background of the game industry, the overall technical structure design of the project is highly targeted and has a strong logic, which can be described as closely connected with each other. Based on the large technical framework system, each technical link and organization also has a strong sense of target and logical gene, and on this basis, many modular and modified technical programs or mechanisms have been proposed. However, it is worth noting that the synergy of a series of highlight technologies remains to be verified and examined. Meanwhile, attention should also be paid to the practicability and rationality.

2. Impossible Triangle | 7 points

(1) Decentralization
Ø Low fork risk: Cocos-BCX uses the DPoS consensus mechanism, which does not require miners to use mining machines for mining, and thereby it can effectively avoid the impact of centralized computing on the entire basechain, which in turn reduces a low fork risk. Under the DPoS mechanism, if a witness wants to fork by voting, it is necessary to guarantee that over one third of the witnesses violate this mechanism at the same time.
Ø Improved DPOS consensus mechanism: The consensus layer of the Cocos-BCX test chain adopts the DPoS consensus algorithm. The advantage characteristics of the improved edition DPOS are as follows: all active witnesses have the same block predefined probability as the witnesses' predefined algorithm in the DPoS consensus algorithm, which ensures that the block probability of all witnesses is consistent with the block reward.
Ø Lightweight node: In Cocos-BCX design, lightweight node is essentially an environment with chain interoperability. Unlike the whole node, the lightweight node does not require to synchronize the whole network data. Instead, it needs the contract information and environment data required for synchronous running. This design can greatly reduce the data volume and synchronization time required for node synchronization, enabling the in-chain game terminal software to have a capacity which is actually used and a plausible time cost.
(2) Security
Ø Player autonomy and asset security: Because of the open and transparent characteristics of the blockchain network, the digital asset information obtained by players in the game can be viewed through the blockchain.
Ø Guarantee by modern cryptography: Modern cryptography is a technology based on mathematics. Currently, it has been widely used in many industries in the Internet domain. Common symmetric encryption technologies include AES encryption used for WiFi, and asymmetric encryption algorithms (public and private key cryptography) RSA, ECC, etc., among which, ECC (Elliptic Curves Cryptography) is an encryption algorithm commonly used in the blockchain field.
Ø A transaction verification mechanism that prevents BP/developers from cheating: BP enjoys a priority compared with general nodes, so it has the probability to cheat in terms of information acquisition. Therefore, the BCX program has designed a set of transaction execution, messaging, and operating mechanisms to address the possible links that allow cheating by BP and developers.
Ø Iterative updated smart contract system: It can provide logical updating and loophole repair for the in-chain game smart contract, thus ensuring the security and timeliness of the smart contract.
(3) Expandability:
Ø Strong expandability of the top-level design of the project
The expandability of Cocos-BCX is powerful, which is specifically shown in a decentralized game production and an overall solution to the game economy operation established by means of the game engine, development environment and Cocos-BCX game chain.

https://preview.redd.it/xm5n7esrtb821.jpg?width=1207&format=pjpg&auto=webp&s=c3daa5d913560c0e8143c0635374596566bdbfc9
A business ecosystem is constructed based on the above overall solution, with the purpose of connecting the global game ecosystem. The main ecological links include developers, users, creative content, key ecological links and blockchain system, etc.

https://preview.redd.it/h4ssn41ttb821.jpg?width=1276&format=pjpg&auto=webp&s=ca6244d17b9745ce41b5be235f75a39f8a8af051
Ø Expanded design of specific technologies and mechanisms
  1. Multi-platform game integration running environment: This platform is mainly characterized by four features, consistent and perfect chain interoperability interface, downward transparent accepting mode, encapsulated atomic operation and multi-platform compatibility.
  2. Interactive interface of blockchain:
Cocos-BCX provides a chain-interactive development environment so that developers can easily interact with the chain through this set of environment. Meanwhile, its blockchain interactive development environment provides development components compatible with multiple working platforms, including SDK for the Android and iOS system, javascript libraries for front-terminal web applications, and python and PHP libraries for back-terminal applications.
u Analysis: The expandability of the project's "impossible triangle" shows the most prominently, and the decentralized attribute is the weakest, whose security is between the two. However, the project takes the three into consideration in terms of the technical mechanism and program function. Yet, the focus is different.
The project interprets the “impossible triangle” by means of thinking and design that focus on technical aspects and key issues.
The security level first guarantees the assets security and freedom of the ecosystem participants, and meanwhile ensures the rationality and security of the overall framework design, and finally takes its system updating and safe recovery into consideration mainly by means of player autonomy, modern cryptography and transaction verification mechanism that prevents BP/developers from cheating.

3. Development difficulty | 8 points

According to the summary of the project white paper, the blockchain game can be generally divided into four developmental stages.
(1)Using the homogeneous assets for the settlement of the game "gold coins";
(2)Free conversion of the game "gold coins" and props;
(3)In-chain operation of critical rules;
(4)Overall in-chain operation of the game
The game in-chain operation is the final form of the industry. Based on the above summary, Cocos-BCX proposes the future development prospect, mainly represented in seven aspects:
(1)Players having a lightweight full-node environment;
(2)The service stack operating in the blockchain environment;
(3)The game engine as one of the node infrastructures;
(4)Providing a joint development/debugging environment including engine, visual IDE, and chain network interactive interface;
(5)a set of asynchronous consensus tasks between nodes to ensure the trustworthiness of the engine environment. This consensus may be based on the discrimination of feature code of
the engine critical function's target code
(6) The game code (contract) is executed by the secure virtual machine controlled by the engine, and the key numerical calculation of the contract may adopt
the “Trusted Execution Environment” scheme, which is executed independently of the main part of the contract;
(7) The key process of the contract is witnessed by the adjacent or related nodes (like players in a copy).
u Analysis: The project covers a multiplicity of technical characteristics and functional mechanisms. The overall development is rather difficult. However, it is highly practicable in terms of performance.
At the initial stage of the project, four stages of blockchain game development were analyzed. After combing, the highest prospect was proposed, implicating to create a complete multi-platform game running environment, which can provide game developers with convenience in developing blockchain games and a perfect ecological environment to the maximum, while bringing game users a brand-new gaming experience and a game form that transcends the previous ones.
Based on the initial project prospect, numerous technical goals and functional modules are listed, indicating that the technical support for the project vision is rather effective. However, as public blockchain of the industry application basis, it encompasses various technical applications and functional modules. Comparatively speaking, the development difficulty is rather big. Meanwhile, as released by the white paper, the theoretical throughput of the Cocos-BCX test chain can reach up to 100,000 tps. The actual throughput is approximate to 3,500 tps, and the block time is 3 seconds, that is, the information broadcast across the entire network is completed once every 3 seconds. It can be seen from the project technical performance data that it has a relatively strong realistic significance. Therefore, on the whole, the project puts forward a sizeable technical challenge, and in the meantime has a reasonable practicability, therefore, it is worthwhile to look forward to!

(五) Project status

1. Product | 7 points

(1)System-level products
Ø The application development framework that supports multiple operating systems and various blockchain environments.
Ø Completely scripted, componentized and data-driven application development tools;
Ø An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Ø Supporting non-homogeneous wallets;
Ø A blockchain browser that supports the contract event subscription;
Ø Supporting the third-party non-homogeneous asset exchanges;
Ø Supporting the blockchain game developed by a third party;
Ø Cross-chain asset acceptance gateway.
(2) Functional products
Ø De-intermediary assets (prop) operation interface;
Ø Paradigms of non-homogeneous assets circulation platform;
Ø Supporting player autonomy and blacksmith shop mechanism;
Ø Visual IDE (including visual editing of the game program and contract);
Ø Complete wallet, user system and blockchain browser;
Ø Smart contract system that allows iterative updating.
u Analysis: According to the information released on the official website of the project, the timeline shows that the Cocos-BCX main chain has started the closed beta test in the third quarter of 2018. Based on the obvious characteristics of the project technology module, Cocos-BCX has launched two series of projects, namely, system-level and function-level products, including development frameworks, blacksmith shop mechanisms tailored to various operations and multiple environment.

2. Code updating | 2 points

u Analysis: It is learned from official communication that the source code of the project has not been made public for the purpose of keeping the project's trade secret confidential. It is planned that the project will be open source in the future after the ecological and system products become gradually stabilized.

3. Completion status | 8 points

u Analysis: The project has formulated an overall development plan and recent work tasks, and at the same time it has demonstrated its strong vitality through weekly report, timeline and development broadcast.
According to the official channel inquiry, the project has formulated the Roadmap for the 2018 key milestone quarter and the recent detailed work task breakdown plan, and the project has a very complete display system featuring three major development progresses:
(1) Weekly reporting system
(2) Project timeline
(3) Development broadcast
Through the Roadmap+ work breakdown + 3 major system model, the project's development trajectory and dynamics have been display in a basically three-dimensional, spatial, meticulous and detailed manner, and in the meantime, the powerful execution and self-vitality of the project have been also displayed.

(六) Institution enabling (Investors)

1. Cooperative institutions | 9 points


https://preview.redd.it/w7g2hjxttb821.jpg?width=1036&format=pjpg&auto=webp&s=da35e0e9e453271300bdd8e6574e8c3a61e70225
u Analysis: Cocos-BCX has a wide margin for cooperation, and its cooperation institutions are not only numerous, but also mainly of leading and quality enterprises in the industry.
The cooperative institutions include HelloEOS, NEO, NEBULAS (chain), Loom, IMEOS.ONE, Kingsoft Cloud and SlowMist Technology, etc.
NEO is one of the earliest blockchain projects in China. It was officially created in 2014 and was open sourced in real time in Github in June 2015. Since its establishment, the NEO team has experienced ups and downs of the blockchain industry. This project can be said to be a veteran project in the industry. NEO combines with a series of technologies, such as point-to-point network, Byzantine fault tolerance, digital certificate, smart contract, superconducting transactions, and cross-chain interoperability protocols, to perform rapid, efficient, secure, and legitimate smart management of assets.

2. Investment institutions | 9 points


https://preview.redd.it/s2td22eutb821.jpg?width=1273&format=pjpg&auto=webp&s=ffcd40c67fcd16739b16207e364b91e98180ffd8
u Analysis: There are numerous investment institutions, many of which are Class I institutions, with a strong institutional strength.
Investment institutions include NGC, Binance, INB Capital, Dfund, 500 Startups, BlockVC, OK Blockchain Capital, Yisu Capital, Xiong'an Capital, ONTology, FreeS FUND, NODE Capital, Consensus Capital, Hash Capital, NEO Capital, Ticker Capital , ContractVC, Junwu Capital, Candy Capital, Hofan VC, BMETA Capital, BYTE Capital, Nimble Capital, InsurFun, BA Capital, Consensus Lab, TOKENMANIA, Byzantium Capital, etc.
The rest investment institutions are also well-known. For example, DFUND was founded by Zhao Dong, a well-known figure in the digital currency domain in July 2017. Yisu Capital is engaged in the early investment and project cooperation, focusing on blockchain technology and big data intelligence analysis, and other domains.

(七) Drawing attention | 6 points


https://preview.redd.it/fa3k060vtb821.png?width=605&format=png&auto=webp&s=ca3b6a4b185c81bbafb5bccb571a43b9bbaba148
Project content description

https://preview.redd.it/y6w1f3hvtb821.png?width=796&format=png&auto=webp&s=8f3b2116d63a77f839a1e18787dd986c34a573a3
u Analysis: The game user and developer group are highly active, and meanwhile the publicity of the media and news client are enhanced. The overall heat and operation and maintenance thinking are well-balanced. However, the current community operation link is relatively weak, and requires improvement in the follow-up.
Presently, the number of community fans is small. Therefore, the operation link of project content is rather weak. However, media communication and news broadcasting, two links of propaganda and promotion efforts, are quite effective, basically realizing a timely and real-time posting of the latest developments of the project. Although the media and news client are widely disseminated, their social interaction is relatively weak. The social platform has its own communication limitations. However, it is highly involved in interaction.

(VIII) Social Response | 7.78

User A | Point: 7.9
Comment: From the perspective of production mode and commercialization, this game is the most sophisticated. So I think this project has a very extensive application scenario, especially for developers and users.
User B | Point: 7.0
Comment: Currently, it seems that the game industry is greatly influenced by macro policies. Tencent's recent performance is a case in point. However, the project orientation is quite good.
User C | Point: 8.0
Comment: The technical advantages of the project are particularly prominent, and it also seizes the development opportunities of the blockchain. However, ultimately it needs to undergo the test of the market.
User D | Point: 9.0
Comment: First of all, COCOS has a large number of developers, solid underlying technology and reliable team work, which is worth looking forward to. Of course, great "undertaking" calls for enormous input, especially in technology. The way is arduous and long. Come on.
User E | Point: 7.0
Comment:
As a game practitioner, I would talk something about Cocos-BCX project: when the concept of blockchain game is put forward for everyone to consider, at this stage, it is no doubt that the dimension (type) of the game is developed from the perspective of "inheritance" and "tracing its very origin". If the Cocos-BCX project can be applied by game developers in terms of "development kit", is easy to learn and use, and allows the mobile game developers to shift to the development of blockchain games without a threshold, then the game dimensions and users can be further expanded. In a word, phenomenal games of blockchain games need the support of Cocos-BCX and the efforts of developers, both of which are indispensable. It is hoped that the team will make great efforts in development and publicity. "Coin friends" may not need to know how the game is developed, but they will certainly care about its future space. Such evaluation can only be called prospects and expectations. It remains to be determined whether the project adopts capital operation or the mode as solid as the old engine of COCOS till the project is landed.

III. Evaluation Summary

The project orientation is accurate, and the team has a strong lineup. It merits pointing out that its technical strength and model architecture design are particularly prominent, and there are an array of investment and cooperation institutions with strong strength. However, at present, the code has not been open sourced and the community operation and maintenance is deficient. The information disclosure of the Token link is not particularly perfect, and individual investors may care much about it. The Roadmap of the project development is all too simple. These are the deficiencies of the project development at the current moment.
submitted by ONETOPGlobal to u/ONETOPGlobal [link] [comments]

"POS stands for the future? Qtum brings deep analysis"

Each cryptocurrency will adopt some kind of consensus mechanism so that the entire distributed network can maintain synchronization. Bitcoin adopted the Proof of Work (PoW) consensus mechanism from the very beginning of its birth to achieve proof of workload through continuous digital cryptographic hash operations. Since the hashing algorithm is unidirectional, even a small change in the input data will make the output hash value completely different. If the calculated hash value satisfies certain conditions (referred to as "mining difficulty"), participants in the bitcoin network identify the workload proof. Mining difficulty is an ever-changing hash target. When the speed of network-generated blocks becomes faster, the difficulty is automatically increased to maintain the average of the entire network every 10 minutes.
 
Definition
For those who are not very familiar with the blockchain, here are some basic definitions to help understand the post:
 
PoW and Blockchain Consensus System
Through 8 years of development of Bitcoin, the security of the PoW mechanism has been confirmed. However, PoW has the following problems:
 
  1. PoW has wasted a lot of power resources and is not friendly to the environment;
  2. PoW is only economically advantageous for big people who have a lot of power (normal users can hardly mine into mines);
  3. PoW lacks incentives for users to hold or use coins;
  4. PoW has a certain risk of centralization, because miners tend to join large pools, which makes large pools have a greater influence on the network;
 
The right to benefit prove mechanism (Proof of Stake, hereinafter referred to as PoS) can solve a lot of problems among this, because it enables any user with tokens in your wallet can have the opportunity to dig mine (of course, will get mining reward). The PoS was originally proposed by Sunny King in Peercoin. It was later refined and adopted in a variety of cryptocurrencies. Among these are PoS Vasin's PoS 2.0, Larry Ren's PoS Velocity, and the recent CASPER proposed by Vlad Zamfir, as well as various other relatively unknown projects.
 
The consensus mechanism adopted by Qtum is based on PoS3.0. PoS3.0 is an upgraded version of PoS2.0, also proposed and implemented by Pavel Vasin. This article will focus on this version of the PoS implementation. Qtum made some changes based on PoS3.0, but the core consensus mechanism is basically the same.
 
For general community members and even some developers, PoS is not particularly easy to understand because there are currently fewer documents detailing how to ensure network security in networks that use only token ownership to achieve consensus. This article will elaborate on how to generate, verify, and secure the PoS blockchain in PoS3.0. The article may involve some technical knowledge, but I will try to describe it with some of the basic definitions provided in this article. But at least the reader needs to have a basic idea of ​​a UTXO-based blockchain.
 
Before introducing PoS, let me briefly introduce PoW's working mechanism, which can help the following understanding of PoS. The PoW mining process can be represented by the following pseudocode:  
While(blockhash > difficulty) { Block.nonce = block.nonce + 1 Blockhash = sha256(sha256(block)) } 
 
The hash operation used here I explained earlier, that is, to use arbitrary length data as input, after a series of operations, get a fixed-length information digest as an output, but only know the information digest but it is impossible to reverse the corresponding input data . The whole process is a lot like the lottery winning mechanism. You can create a “voucher” by hashing the data and compare it with the target hash range to determine if you “win”. If you don't win, you can create a new "voucher" again by slightly changing some of the data. The random number nonce in Bitcoin is used to adjust the input data. Once the required hash is found, the block is legitimate and can be broadcast to a distributed network. Once the other miners in the network receive this new block message and pass the verification, they will add the block to the chain and continue to build the block after the new block.
 
PoS protocol structure and rules
 
Now we begin to introduce PoS. PoS has the following goals :
  1. Cannot fake blocks;
  2. "Large households" will not receive much disproportionately large rewards;
  3. Having strong computing power does not help create blocks;
  4. No one or several members of the network can control the entire blockchain;
The basic concept of PoS is very similar to PoW, and it is like a lottery. The only difference is that PoS can't get new "lotteries" just by fine-tuning the input data, PoW uses "block hash" as lottery ticket, and PoS introduces the concept of "kernel hash".
The Kernel hash takes as input multiple unmodifiable data in the current block. So, because the miners can't find a simple way to modify the kernal hash, they can't get legal through a lot of traversal of the possible hash.New block.
 
In order to achieve this goal, PoS added many additional consensus rules.
First, unlike PoW, the PoS's coinbase transaction (that is, the first transaction in the block) has zero output. At the same time, in order to reward Staker, a staking transaction was introduced as the second transaction of the block. The staking transaction has the following features:
  1. There are at least 1 legal vin
  2. The first vout must be empty script
  3. The second vout must not be empty
 
In addition, staking transactions must also obey the following rules :
  1. The second vout must be a pubkey script (note that it is not pubkeyhash) or an OP_RETURN script that cannot be used to save data on the chain;
  2. The timestamp in the transaction must be consistent with the block timestamp;
  3. The total output value of the staking transaction must be less than or equal to the sum of all input values, PoS block awards, and transaction fees (ie output <= (input + block_reward + tx_fees));
  4. The output corresponding to the first vin must pass the confirmation of at least 500 blocks (that is, the currency spent needs at least 500 blocks to confirm);
  5. Although the staking transaction can have multiple input vins, only the first vin is used for the consensus mechanism;
 
These rules make it easy to identify the staking transaction, thus ensuring that it can provide enough information to verify the block. It should be noted here that the first vout is not the only way to identify the staking transaction, but since the PoS3.0 designer Sunny King started using this method, and proved its reliability in long-term practice, so we have also adopted this method to identify staking transactions.
 
Now that we know the definition of the staking transaction and we understand the rules that it must follow, let's introduce the rules of the PoS block :
 
The most important of these rules for PoS is the "kernal hash". The role of the kernel hash is similar to that of the block hash in PoW. That is, if the hash value matches the condition, the block is considered valid. However, kernal hash cannot be obtained by directly modifying part of the current block. Next, I will first introduce the structure and operating mechanism of kernal hash, and then further explain the purpose of this design, and if you change the unforeseen consequences of this design will bring.
 
Kernel Hash in PoS
The kernal hash consists of the following data in order as input:
 
The "skate modifier" of a block refers to the hash value of the following data:
There are only two ways to change the current kernel hash (for mining), either change "prevout" or change the current block time.
 
In general, a wallet will contain multiple UTXOs. The balance of the wallet is actually the sum of all available UTXOs in the current wallet. This is also applicable in PoS wallets and is even more important because arbitrary output may be used for staking. One of these outputs will be the prevout in the staking transaction, which will be used to generate a valid block.
 
In addition, there is one more important change in the PoS block mining process (compared to PoW), which is that the difficulty of mining is inversely proportional to the number of coins owned (rather than the number of UTXOs). For example, a wallet with 2 coins is only half the difficulty of mining. If it is not designed this way, users will be encouraged to generate many UTXOs with small micro-regulations, which will cause the block size to become larger and may cause some security problems.
 
The calculation of kernal hash can be expressed in pseudo-code as:
While(true){ Foreach(utxo in wallet){ blockTime = currentTime - currentTime % 16 posDifficulty = difficulty * utxo.value Hash = hash(previousStakeModifier << utxo.time << utxo.hash << utxo.n << blockTime) If(hash < posDifficulty){ Done } } Wait 16s -- wait 16 seconds, until the block time can be changed } 
 
Through the above process, we find that one of the UTXOs can be used to generate a staking transaction. This staking transaction has 1 vin, the UTXO we found. At the same time this staking transaction has at least two vouts, the first one is empty, which is used to identify the blockchain, the second vout is an OP_RETURN transaction containing only one public key, or contains the pay-to-pub-key script. The role of the latter is relatively pure (payment), and data transactions can have more uses (such as an independent block signature machine) without destroying the original UTXO model.
 
Finally, all transactions in the mempool will be added to the block. What we need to do next is generate the signature. This signature must use the public key corresponding to the second vout of the staking transaction. The actual transaction data is calculated by block hash. After signing, we can broadcast this block to the network. Other nodes in the network will verify the block. If the block is valid, the node will accept the block and connect it to its own blockchain while broadcasting the new block to other nodes it connects to.
 
Through the above steps, we can get a complete and secure PoS3.0 blockchain. PoS3.0 is considered to be the best consensus mechanism against malicious attacks in a fully decentralized consensus system. Why is this conclusion? We can understand the history of PoS development.
 
The development of PoS
PoS has a long history. Here is a brief description:
 
PoS1.0 — Applied in Peercoin , heavily dependent on coin age (ie, the time elapsed since UTXO was spent), the higher the coin age, the lower the difficulty of mining. This has the side effect that the user will choose to open a wallet for a long period of time (for example, one month or longer), so that the UTXO of the wallet will have a relatively large currency and the user can quickly find a new block. This will lead to double-spend attacks more easily. Peercoin itself is not affected by this, because it uses PoW and PoS mixing mechanisms, and PoW can reduce this negative effect.
 
PoS2.0 — The coin age was removed from the consensus mechanism and a different stake modifier was used than PoS1.0. The contents of the amendments are relatively numerous, but basically they are all about how to remove the coin age and realize the security consensus mechanism without using the PoW/PoS hybrid mode.
 
PoS3.0 — PoS3.0 can actually be said to be an upgraded version of PoS2.0. In PoS2.0, the snapshot modifier also contains the block time of the previous block, which was removed in 3.0, mainly to prevent the so-called "short-range" attack, that is, it is possible to change the previous area by traversing. Block time to traverse mining. PoS2.0 uses block time and transaction time to determine the age of UTXO, which is slightly different from the previous coinage age. It indicates that a UTXO can be used for the minimum number of confirmations required by staking. The UTXO age in PoS 3.0 becomes simpler, it is determined by the height of the block. This avoids the introduction of a less accurate timestamp in the blockchain and can effectively immunize the "timewarp" attack. PoS3.0 also adds OP_RETURN support for staking transactions, making voutYou can include only the public key, not necessarily the full pay-to-pubkey script.
 
Original:https://mp.weixin.qq.com/s/BRPuRn7iOoqeWbMiqXI11g
submitted by thisthingismud to Qtum [link] [comments]

Cocos-BCX:Decentralized game application and digital asset creation platform

Cocos-BCX:Decentralized game application and digital asset creation platform

I. Project Overview

Cocos-BCX is a platform used for the development, operation, management and transfer of decentralized applications and in-application assets on the blockchain ecosystem. The platform mainly includes three function modules:
(1)The application development framework that supports multiple operating systems and various blockchain environments.
(2)Completely scripted, componentized and data-driven application development tools;
(3)An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Cocos-BCX can allow developers to perform programming, debugging, and publishing of decentralized applications oriented to the blockchain environment, and hybrid architecture applications. Meanwhile, the platform integrates the distributed user account system, wallet and digital asset circulation platform based on the blockchain, which can realize the permanent saving and cross-chain use of in-application assets.

II. Project evaluation

(一) Market analysis

1. Market conditions | 8 points

The organizing pattern of productivity dominated by governments in some areas or industrial domains is apt to change in the context of bottlenecks existing for global scientific and technological progress, rising resource consumption, an aging population, and intensified geopolitical conflicts. In particular, in 2008, when Nakamot published his thesis "Bitcoin: A Peer-to-Peer Electronic Cash System", discussions on blockchain and digital currency have gradually extended from technological aspects to economic, social and political, and other fields. The general public have begun to pay close attention to the impact of blockchain on social development as well as the role of digital currency in the world economy. Based on the decentralized characteristics of the blockchain and the vibrant vitality of the digital economy, the general public has enough confidence to predict that the decentralized "digital assets" will be a sweeping trend in the future, and will derive new business models and social values.
At the same time, in the development process of decentralized applications of different types, the game industry enjoys unique development advantages, because the game's production mode is the most sophisticated, enjoys the highest degree in terms of commercialization, and is one of the scenarios with the most profound foundation in terms of developers and users.
u Analysis: The game field has a huge room for development, which is highly consistent with the characteristics of the blockchain, and accords with the future development tendency of the digital economy.
The digital asset economy model carried by the project through the blockchain technology will assetize the content produced by the developer, enable the developer to continue reaping benefits during the use, management and transfer of his assets, and provide him with a convenient, decentralized game distribution channel; meanwhile, it helps players to transform the data formed by time and energy as well as the props they obtain as a result of their consumption into the assets that can be safely stored and circulated, offering players the right to manage and commercialize them.

2. Competition | 8 points

Since the last century till now, owing to the sustained efforts and promotion by a variety of IT technology game enterprises, the national and even global online game market is developing by leaps and bounds. If there is no systematic risks, such as policy regulation, vicious incidents and other factors, there will be no smooth and endless development momentum unless something unexpected happens. However, an objective analysis reveals that the current online game market is still dominated by IT technology companies, and even in a controlled and monopolized development, which, of course, also brings substantial profits, such as Tencent, Blizzard Tech.
u Analysis: It can be predicted that the Cocos-BCX project will hardly have any direct competitors in the strict sense for the time being, but will encounter a marginal pressure competitive environment from two dimensions. In summary, the classical IT game companies at home and abroad are massive in size and have obvious capital advantages. However, the Cocos-BCX project has an advanced philosophy and cutting edge technology, and thereby enjoys first-mover advantages for a breakthrough; The blockchain game project of the same business is currently marked by wide participation and generic applicability. But in comparison, the Cocos-BCX game industry has such advantages as a salient background, special project orientation and sophisticated development in technical modules, and therefore has greater development potential.

(二) Token Status

1. Token situation | 6 points

(1) Basic situation of Token
Token name: COCOS
Total tokens in circulation: 100 billion
Consensus mechanism: DPOS
(2) Token usage and allocation
Part I 82%: Cocos-BCX is used for the platform community construction in various ways, including but not limited to the witness' block reward, incentives for platform ecological developers, global community construction, marketing and promotion, industry alliances, eco-investment, research, financial and legal compliance. The use of this part of Cocos-BCX includes swapping by means of the consensus work contributions, free gifts, gifts in exchange for service, and gifts in exchange for other tokens, etc.
Part II, 18%: Cocos-BCX is intended as incentives for the sponsoring team of the project. The incentive part will set up a locking mechanism, which will be issued and unlocked one-third at the end of each year after Token generation, and the issuance will be completed within three years.

https://preview.redd.it/s47w2jtfj6521.jpg?width=684&format=pjpg&auto=webp&s=a60ea62b86dc0f177f9596608d1961e039d3bd1b
u Analysis: The use of Token is mainly divided into two parts, among which, 82% is used for project development and construction. The remaining 18%, which has a locked position mechanism, is intended for team incentive and construction. The use design is rather rational, but the team part is slightly higher. Given that the industry is in the initial stage of development, it is of great importance to seize the first opportunity and acquire early traffic users. It is suggested that the proportion of Token used by the team be reduced slightly, which is more conducive to the long-term development of the project. It should be noted that the original holding distribution of Token has not been queried via the official channel, while this link for the conventional blockchain project are basically disclosed. Meanwhile, from the standpoint of ordinary investors, Token’s original holding ratio is also one of the important parameters for its investment.

2. Ecological cycle | 8 points

(1)The Token (COCOS) positioning of the platform: circulation media and governance proof in eco-economic activities
COCOS not only serves as a value exchange carrier and community participation proof for Cocox-BCX, but its orientation as a basic pricing Token is likely to play a critical role in the digital asset ecosystem. With the continuous development of the industry, a large quantity of decentralized digital assets will exist in multiple blockchain ecosystems according to different standards in the future, and the value existing in asset pricing media transcending the chain ecology will be infinitely magnified.
, which is specifically manifested in that developers and users can evaluate, compare, trade and manage digital assets of different chain ecosystems, worldview content, and technical standards based on COCOS. Meanwhile, as a primary and basic pricing medium, COCOS is positioned to become the necessary conditions for the blockchain industry to develop and trade financial products and derivatives of digital assets in the future.
(2)Basic use model of Token (COCOS)
Ø Value exchange medium within the platform ecosystem;
Ø Entrusted consensus equity share representative of the Cocos-BCX public blockchain;
Ø The reference and basis for the measurement of the participation in and contribution to the platform community.
(3)How to obtain Token (COCOS)
Ø Value creation: It includes the contribution of the behavior of creating digital assets, that is, developing games, making props, etc.
Ø Platform contribution reward: Users who contribute to the Cocos-BCX community is entitled to COCOS;
Ø Market transaction: Selling the prop assets obtained in the game to get COCOS;
Ø Behavioral incentives: Various effective behaviors within the Cocos-BCX platform, community and platform games will be converted into COCOS
according to a certain contribution degree.
u Analysis: The use model, scenario application, acquisition method, market orientation, etc. for the Token ecosystem design are all well deliberated, to be verified by the market.
The ecosystem design of the Token project not only takes the macroscopic use model and scenario application, but also gives a detailed description of the acquisition method. Another point that must be pointed out is that it has a clear market orientation and future prospect as soon as the design begins, therefore, in general the Token ecosystem design is well-considered and far-sighted. However, for the volatile blockchain market, the crux depends on whether the ecological design philosophy can keep pace with the times, which is very essential. In a word, in the face of massive uncertainties, it needs to be finally verified by the market.

(三) Team member

1. Founder | 8 points


https://preview.redd.it/35gq3gyij6521.jpg?width=200&format=pjpg&auto=webp&s=c3e68b208bc15a0607557cf9be65739beba67375
Haozhi Chen
China's renowned Internet serial entrepreneur, and has successively led and participated in the creation of Joyo.com, Xcar.com.cn, and cdn.yeeyan.org since 1999, and founded Chukong Technology in 2009. Chukong is a leading game development and distribution enterprise in China and a major maintainer and supporter of the Cocos-BCX global open source game engine and developer community.

https://preview.redd.it/2wm6ki0kj6521.jpg?width=200&format=pjpg&auto=webp&s=be9cd5cbb527a9471faac4002065916f4ebd9bd5
Xiaolong Yang
With over 14 years of experience in technology entrepreneurship and investment, he once co-founded China's leading entertainment social networking company. As an investor, he once worked for China's leading private equity fund, during which period, he led and participated in investment projects totalling over 1 billion US dollars, and realized the exit of some projects at home and abroad. His interests and expertise mainly concentrate on information technology of the global primary market and secondary market in the later stage, and macro multiple asset category investment, and has a profound understanding of the financial market mechanism and asset pricing. He is also an investment partner in China's major technology investment fund and provides counselling for Chinese and American hedge funds, venture capital funds and large enterprises.
u Analysis: Chen Haozhi, as a founder, has rich experience in the game industry, and enjoys widespread networking and abundant resources in the industry as being one of the early Internet entrepreneurs; Another founder, Yang Xiaolong, has a strong experience in technology venture capital investment, and has the expertise for global investment layout. On the whole, two co-founders have a prominent advantage in overall industry background and integrating resources.

2. Founding team | 8 points


https://preview.redd.it/twotgvrxj6521.png?width=877&format=png&auto=webp&s=a03ab15246f51d9c1595266114fa1ee18ca943ed
Kevin Yin: An early contributor of CocosChina community, NOI winner, and ACM guest. A senior developer of blockchain, and having years of experience in compilation and distributed computing. An investor of the blockchain technology.
Jane Jin: Responsible for CocosChina community, the "Aipuworks" incubator, etc., and an expert of the Techincal Committee for Blockchain, China Software Industry Association. Bachelor of Economics, Zhejiang Gongshang University, and mini-EMBA of Tsinghua University. He once served important functions in "Fortune Global 500" including Lucent, Nortel, NSN, Nokia, Intel and other multinational companies in the marketing, sales, executive and developer relationship domain.
James Jeon: Responsible for the business development strategy and implementation of the project's South Korean section. From 2012 to 2015, he served as CEO of Gurum Company, a South Korean subsidiary of Chukong Technologies, earning an annual revenue of over $30 million from the scratch for the South Korean company and leading the South Korean subsidiary in going public successfully.
Frederick Lim: Responsible for the business development strategy and implementation of the project's South Korean section. From 2014 to 2015, he served as co-CEO of Gurum Company, and was once the director of the Strategic Investment Department of Hyundai Group, responsible for investment in Internet, communication, telecommunications and other fields. He is a doctor of Engineering Technology, Sungkyunkwan University, South Korea.
Hirokuni Fujita: originally head of the Japanese subsidiary of Chukong Technologies. He graduated from Graduate School of Arts and Sciences, The University of Tokyo, majoring in Interdisciplinary Cultural Studies.
Jason: preacher of the Cocos-BCX community and meanwhile, senior manager of the Cocos 2d-x global community. He started to program on the Commodore-64 computer when he was 8. In addition to developing the community, he was keen on studying mathematics, finance, C++ and improving his Chinese proficiency.
Qinzhou Wang: Since entering the game industry in 2009, he has worked in the brand market in ZOL. Com. CN, Howell Expo, host of ChinaJoy, and is responsible for the brand market in Chukong Technologies.
u Analysis: The special technological talent construction of the team technicians needs to be further strengthened. At present, there is a blockchain technician. The game background and the advantages of the international architecture building enjoy prominent advantages, and there are sufficient team members on the strategic level and in the aspect of ecological construction. It is worth mentioning that team building is stable, and there is a high level of consensus among team members, which is conducive to the robust development of the project.
One member of the founding team has experience in the blockchain project development, that is, Chief Technical Officer, who is a senior blockchain developer. He has many years of experience in compiling and distributed computing, and is also a technology investor of blockchain.
In the early stage, owing to the demand of the game industry in the Japanese and Korean markets, Japanese and Korean market leaders were specially arranged in the early team structure of Chukong Technologies. In particular, due to the prosperity and popularity of the game industry in the Korean market, two co-leaders were specially arranged for the Korea market, responsible for strategic and investment issues respectively.
Consultant Team | 8 points

https://preview.redd.it/822oiksyj6521.jpg?width=558&format=pjpg&auto=webp&s=620ffe23c556721c0ac3386c1cdf044e6d7d98af
Zhe Wang: Founder of the Cocos engine, and CEO of Xiamen Yaji Software Co., Ltd. He graduated from Department of Electronics, Nanjing University, and later studied a postgraduate program at Department of Management Science, Xiamen University. He created the Cocos engine in 2011, which currently has 1.1 million registered developers worldwide and 300,000 monthly active developers in over 200 countries and regions in the world. The Cocos engine has arrested the attention of platform vendors at home and abroad, and has established a long-term cooperative partnership with Microsoft, Google, ARM, Intel, Qualcomm, Samsung, Huawei and Tencent, etc.
Edith Yeung: One of some "Silicon Valley's Must Meet" investors as covered in Inc magazine. She is the head of 500 Startups, Silicon Valley's famous venture capital company and incubator in Greater China, and meanwhile, manages a Mobile Collective fund worth tens of millions of dollars. She has invested in over 40 mobile Internet, VR, AR and AI start-ups, including Hooked (App store's No. 1 reading App), DayDayCook (one of Asia's largest food communities), Fleksy (acquired by Pinterest), Human (acquired by Mapbox), AISense and so on.
u Analysis: The consultant team has obvious advantages in technological achievements, rich experience in technology innovation investment and incubation experience for startups.
The consultant team consists of a Maker-oriented technical talent and two venture capital managers with a senior venture capital background, among whom, Wang Zhe, technical consultant, graduated from Department of Electronics, Nanjing University and CEO of Xiamen Yaji Software. Wang is the founder of Cocos-BCX engine. At present, the Cocos engine has 1.1 million registered developers and 300,000 monthly active developers in over 200 countries and regions worldwide.

(四) Tech Analysis

1. Tech highlights | 9 points

(1) Smart contract system which can be updated iteratively: The smart contract system, represented by Ethereum, is not subject to modification once its definition is published, making it difficult to meet the volatile demands of market. Therefore, an iterative smart contract system is designed to address this pain spot.
(2) Prop circulation platform: Unlike conventional game transaction platform, Cocos-BCX's decentralized digital asset circulation platform does not have intermediary agencies. Players can complete the transfer and purchase of non-homogeneous assets, including "game gold coins" and prop assets acquired in the game on the prop circulation platform. In the whole process of transfer, the platform will adopt smart contract for automatic matching to help users complete the transfer process more efficiently.
(3) Game interactive operation environment:
Based on the judgment of the operation environment characteristics of blockchain games in the future, Cocos-BCX has designed a set of integrated operation environment that accommodates various types of APPs, as well as the supporting interoperability interface. Combined with COCOS Creator, it simplifies the process of docking game programs and blockchain, making intra-chain interaction transparent to developers, and allowing conventional game developers to develop or migrate blockchain game without a threshold.
(4) Mapping gateway that supports multi-chain and asset riveting:
Cocos-BCX provides a set of mapping gateways used for the automatic mapping of game gold coins and props. Under the unified value measurement system, it realizes the smooth transition of different in-chain game content and different platform content. The content that can be used for mapping includes game gold coins, game equipment data, etc.
(5) Transaction authentication mechanism that prevents BP/developers from cheating:
BP, as the core of transaction processing and communication of the whole network, can know the processing result of the latest transaction prior to general nodes. Therefore, BP enjoys a priority for information with timeliness or confidentiality
, as compared with general nodes, so it has a cheating potential in terms of
information acquisition. To address the drawbacks of this technical link, five modular confrontation mechanisms has been specially designed to hold the likelihood of BP/developer cheating at bay.
(6) Economies Principle Design of Cocos-BCX:
The Cocos-BCX platform carries the game assets value created by developers by providing a complete set of functional components including the underlying public blockchain, digital property management, and exchanges. Its technology and governance structure design, based on the graphene standard, has the economic attributes corresponding to the DPoS consensus mechanism.
u Analysis: There are a multiplicity of technical highlights in that the overall technology construction shows characteristics such as rigid logic and prominent modularity, and various technical solutions and mechanisms with a strong pertinence have been put forward.
Based on the market pain spots of the game industry, and combined with the development opportunities of blockchain technology, the Cocos-BCX project puts forward a vision system to create consistence between the content producer and consumer in the digital world. In view of the initial intention of the project and the relatively profound background of the game industry, the overall technical structure design of the project is highly targeted and has a strong logic, which can be described as closely connected with each other. Based on the large technical framework system, each technical link and organization also has a strong sense of target and logical gene, and on this basis, many modular and modified technical programs or mechanisms have been proposed. However, it is worth noting that the synergy of a series of highlight technologies remains to be verified and examined. Meanwhile, attention should also be paid to the practicability and rationality.

2. Impossible Triangle | 7 points

(1) Decentralization
Ø Low fork risk: Cocos-BCX uses the DPoS consensus mechanism, which does not require miners to use mining machines for mining, and thereby it can effectively avoid the impact of centralized computing on the entire basechain, which in turn reduces a low fork risk. Under the DPoS mechanism, if a witness wants to fork by voting, it is necessary to guarantee that over one third of the witnesses violate this mechanism at the same time.
Ø Improved DPOS consensus mechanism: The consensus layer of the Cocos-BCX test chain adopts the DPoS consensus algorithm. The advantage characteristics of the improved edition DPOS are as follows: all active witnesses have the same block predefined probability as the witnesses' predefined algorithm in the DPoS consensus algorithm, which ensures that the block probability of all witnesses is consistent with the block reward.
Ø Lightweight node: In Cocos-BCX design, lightweight node is essentially an environment with chain interoperability. Unlike the whole node, the lightweight node does not require to synchronize the whole network data. Instead, it needs the contract information and environment data required for synchronous running. This design can greatly reduce the data volume and synchronization time required for node synchronization, enabling the in-chain game terminal software to have a capacity which is actually used and a plausible time cost.
(2) Security
Ø Player autonomy and asset security: Because of the open and transparent characteristics of the blockchain network, the digital asset information obtained by players in the game can be viewed through the blockchain.
Ø Guarantee by modern cryptography: Modern cryptography is a technology based on mathematics. Currently, it has been widely used in many industries in the Internet domain. Common symmetric encryption technologies include AES encryption used for WiFi, and asymmetric encryption algorithms (public and private key cryptography) RSA, ECC, etc., among which, ECC (Elliptic Curves Cryptography) is an encryption algorithm commonly used in the blockchain field.
Ø A transaction verification mechanism that prevents BP/developers from cheating: BP enjoys a priority compared with general nodes, so it has the probability to cheat in terms of information acquisition. Therefore, the BCX program has designed a set of transaction execution, messaging, and operating mechanisms to address the possible links that allow cheating by BP and developers.
Ø Iterative updated smart contract system: It can provide logical updating and loophole repair for the in-chain game smart contract, thus ensuring the security and timeliness of the smart contract.
(3) Expandability:
Ø Strong expandability of the top-level design of the project
The expandability of Cocos-BCX is powerful, which is specifically shown in a decentralized game production and an overall solution to the game economy operation established by means of the game engine, development environment and Cocos-BCX game chain.

https://preview.redd.it/9zqpm1zzj6521.jpg?width=1207&format=pjpg&auto=webp&s=97073eb57409e0904da5c11873cc543c3b9f310b
A business ecosystem is constructed based on the above overall solution, with the purpose of connecting the global game ecosystem. The main ecological links include developers, users, creative content, key ecological links and blockchain system, etc.

https://preview.redd.it/l83i3pk0k6521.jpg?width=1276&format=pjpg&auto=webp&s=df7e694a557af1485c840ed44b9bbfba432b1d86
Ø Expanded design of specific technologies and mechanisms
1) Multi-platform game integration running environment: This platform is mainly characterized by four features, consistent and perfect chain interoperability interface, downward transparent accepting mode, encapsulated atomic operation and multi-platform compatibility.
2) Interactive interface of blockchain:
Cocos-BCX provides a chain-interactive development environment so that developers can easily interact with the chain through this set of environment. Meanwhile, its blockchain interactive development environment provides development components compatible with multiple working platforms, including SDK for the Android and iOS system, javascript libraries for front-terminal web applications, and python and PHP libraries for back-terminal applications.
u Analysis: The expandability of the project's "impossible triangle" shows the most prominently, and the decentralized attribute is the weakest, whose security is between the two. However, the project takes the three into consideration in terms of the technical mechanism and program function. Yet, the focus is different.
The project interprets the “impossible triangle” by means of thinking and design that focus on technical aspects and key issues.
The security level first guarantees the assets security and freedom of the ecosystem participants, and meanwhile ensures the rationality and security of the overall framework design, and finally takes its system updating and safe recovery into consideration mainly by means of player autonomy, modern cryptography and transaction verification mechanism that prevents BP/developers from cheating.

3. Development difficulty | 8 points

According to the summary of the project white paper, the blockchain game can be generally divided into four developmental stages.
(1)Using the homogeneous assets for the settlement of the game "gold coins";
(2)Free conversion of the game "gold coins" and props;
(3)In-chain operation of critical rules;
(4)Overall in-chain operation of the game
The game in-chain operation is the final form of the industry. Based on the above summary, Cocos-BCX proposes the future development prospect, mainly represented in seven aspects:
(1)Players having a lightweight full-node environment;
(2)The service stack operating in the blockchain environment;
(3)The game engine as one of the node infrastructures;
(4)Providing a joint development/debugging environment including engine, visual IDE, and chain network interactive interface;
(5)a set of asynchronous consensus tasks between nodes to ensure the trustworthiness of the engine environment. This consensus may be based on the discrimination of feature code of
the engine critical function's target code
(6) The game code (contract) is executed by the secure virtual machine controlled by the engine, and the key numerical calculation of the contract may adopt
the “Trusted Execution Environment” scheme, which is executed independently of the main part of the contract;
(7) The key process of the contract is witnessed by the adjacent or related nodes (like players in a copy).
u Analysis: The project covers a multiplicity of technical characteristics and functional mechanisms. The overall development is rather difficult. However, it is highly practicable in terms of performance.
At the initial stage of the project, four stages of blockchain game development were analyzed. After combing, the highest prospect was proposed, implicating to create a complete multi-platform game running environment, which can provide game developers with convenience in developing blockchain games and a perfect ecological environment to the maximum, while bringing game users a brand-new gaming experience and a game form that transcends the previous ones.
Based on the initial project prospect, numerous technical goals and functional modules are listed, indicating that the technical support for the project vision is rather effective. However, as public blockchain of the industry application basis, it encompasses various technical applications and functional modules. Comparatively speaking, the development difficulty is rather big. Meanwhile, as released by the white paper, the theoretical throughput of the Cocos-BCX test chain can reach up to 100,000 tps. The actual throughput is approximate to 3,500 tps, and the block time is 3 seconds, that is, the information broadcast across the entire network is completed once every 3 seconds. It can be seen from the project technical performance data that it has a relatively strong realistic significance. Therefore, on the whole, the project puts forward a sizeable technical challenge, and in the meantime has a reasonable practicability, therefore, it is worthwhile to look forward to!

(五) Project status

1. Product | 7 points

(1)System-level products
Ø The application development framework that supports multiple operating systems and various blockchain environments.
Ø Completely scripted, componentized and data-driven application development tools;
Ø An improved blockchain system, which is oriented to high performance applications and based on graphene technology framework, and its related functional components.
Ø Supporting non-homogeneous wallets;
Ø A blockchain browser that supports the contract event subscription;
Ø Supporting the third-party non-homogeneous asset exchanges;
Ø Supporting the blockchain game developed by a third party;
Ø Cross-chain asset acceptance gateway.
(2) Functional products
Ø De-intermediary assets (prop) operation interface;
Ø Paradigms of non-homogeneous assets circulation platform;
Ø Supporting player autonomy and blacksmith shop mechanism;
Ø Visual IDE (including visual editing of the game program and contract);
Ø Complete wallet, user system and blockchain browser;
Ø Smart contract system that allows iterative updating.
u Analysis: According to the information released on the official website of the project, the timeline shows that the Cocos-BCX main chain has started the closed beta test in the third quarter of 2018. Based on the obvious characteristics of the project technology module, Cocos-BCX has launched two series of projects, namely, system-level and function-level products, including development frameworks, blacksmith shop mechanisms tailored to various operations and multiple environment.

2. Code updating | 2 points

u Analysis: It is learned from official communication that the source code of the project has not been made public for the purpose of keeping the project's trade secret confidential. It is planned that the project will be open source in the future after the ecological and system products become gradually stabilized.

3. Completion status | 8 points

u Analysis: The project has formulated an overall development plan and recent work tasks, and at the same time it has demonstrated its strong vitality through weekly report, timeline and development broadcast.
According to the official channel inquiry, the project has formulated the Roadmap for the 2018 key milestone quarter and the recent detailed work task breakdown plan, and the project has a very complete display system featuring three major development progresses:
(1) Weekly reporting system
(2) Project timeline
(3) Development broadcast
Through the Roadmap+ work breakdown + 3 major system model, the project's development trajectory and dynamics have been display in a basically three-dimensional, spatial, meticulous and detailed manner, and in the meantime, the powerful execution and self-vitality of the project have been also displayed.

(六) Institution enabling (Investors)

1. Cooperative institutions | 9 points


https://preview.redd.it/9qmh4jj1k6521.jpg?width=1036&format=pjpg&auto=webp&s=25c7cb77d5196fc861750064b43b8ba8e83c71a9
u Analysis: Cocos-BCX has a wide margin for cooperation, and its cooperation institutions are not only numerous, but also mainly of leading and quality enterprises in the industry.
The cooperative institutions include HelloEOS, NEO, NEBULAS (chain), Loom, IMEOS.ONE, Kingsoft Cloud and SlowMist Technology, etc.
NEO is one of the earliest blockchain projects in China. It was officially created in 2014 and was open sourced in real time in Github in June 2015. Since its establishment, the NEO team has experienced ups and downs of the blockchain industry. This project can be said to be a veteran project in the industry. NEO combines with a series of technologies, such as point-to-point network, Byzantine fault tolerance, digital certificate, smart contract, superconducting transactions, and cross-chain interoperability protocols, to perform rapid, efficient, secure, and legitimate smart management of assets.

2. Investment institutions | 9 points


https://preview.redd.it/xd5u9w62k6521.jpg?width=1273&format=pjpg&auto=webp&s=c8729f585a57c8239c717ef8b58229fe7f98a6eb
u Analysis: There are numerous investment institutions, many of which are Class I institutions, with a strong institutional strength.
Investment institutions include NGC, Binance, INB Capital, Dfund, 500 Startups, BlockVC, OK Blockchain Capital, Yisu Capital, Xiong'an Capital, ONTology, FreeS FUND, NODE Capital, Consensus Capital, Hash Capital, NEO Capital, Ticker Capital , ContractVC, Junwu Capital, Candy Capital, Hofan VC, BMETA Capital, BYTE Capital, Nimble Capital, InsurFun, BA Capital, Consensus Lab, TOKENMANIA, Byzantium Capital, etc.
The rest investment institutions are also well-known. For example, DFUND was founded by Zhao Dong, a well-known figure in the digital currency domain in July 2017. Yisu Capital is engaged in the early investment and project cooperation, focusing on blockchain technology and big data intelligence analysis, and other domains.

(七) Drawing attention | 6 points

https://preview.redd.it/78rnnt96k6521.png?width=605&format=png&auto=webp&s=b60d1de55e93642a174730fbee394c9fe5f7166f


Project content description

https://preview.redd.it/cgps19x6k6521.png?width=796&format=png&auto=webp&s=141a8ce79539d70bb8ee15f31ed0786db2524e2b
u Analysis: The game user and developer group are highly active, and meanwhile the publicity of the media and news client are enhanced. The overall heat and operation and maintenance thinking are well-balanced. However, the current community operation link is relatively weak, and requires improvement in the follow-up.
Presently, the number of community fans is small. Therefore, the operation link of project content is rather weak. However, media communication and news broadcasting, two links of propaganda and promotion efforts, are quite effective, basically realizing a timely and real-time posting of the latest developments of the project. Although the media and news client are widely disseminated, their social interaction is relatively weak. The social platform has its own communication limitations. However, it is highly involved in interaction.

(VIII) Social Response | 7.78

User A | Point: 7.9
Comment: From the perspective of production mode and commercialization, this game is the most sophisticated. So I think this project has a very extensive application scenario, especially for developers and users.
User B | Point: 7.0
Comment: Currently, it seems that the game industry is greatly influenced by macro policies. Tencent's recent performance is a case in point. However, the project orientation is quite good.
User C | Point: 8.0
Comment: The technical advantages of the project are particularly prominent, and it also seizes the development opportunities of the blockchain. However, ultimately it needs to undergo the test of the market.
User D | Point: 9.0
Comment: First of all, COCOS has a large number of developers, solid underlying technology and reliable team work, which is worth looking forward to. Of course, great "undertaking" calls for enormous input, especially in technology. The way is arduous and long. Come on.
User E | Point: 7.0
Comment:
As a game practitioner, I would talk something about Cocos-BCX project: when the concept of blockchain game is put forward for everyone to consider, at this stage, it is no doubt that the dimension (type) of the game is developed from the perspective of "inheritance" and "tracing its very origin". If the Cocos-BCX project can be applied by game developers in terms of "development kit", is easy to learn and use, and allows the mobile game developers to shift to the development of blockchain games without a threshold, then the game dimensions and users can be further expanded. In a word, phenomenal games of blockchain games need the support of Cocos-BCX and the efforts of developers, both of which are indispensable. It is hoped that the team will make great efforts in development and publicity. "Coin friends" may not need to know how the game is developed, but they will certainly care about its future space. Such evaluation can only be called prospects and expectations. It remains to be determined whether the project adopts capital operation or the mode as solid as the old engine of COCOS till the project is landed.

III. Evaluation Summary

The project orientation is accurate, and the team has a strong lineup. It merits pointing out that its technical strength and model architecture design are particularly prominent, and there are an array of investment and cooperation institutions with strong strength. However, at present, the code has not been open sourced and the community operation and maintenance is deficient. The information disclosure of the Token link is not particularly perfect, and individual investors may care much about it. The Roadmap of the project development is all too simple. These are the deficiencies of the project development at the current moment.
submitted by ONETOPGlobal to u/ONETOPGlobal [link] [comments]

Bitcoin Generator 2020 Mining Pool injector First vid in ages Easiest Way to Buy Bitcoin Post-Halving Before $50K How to create bitcoin wallet in 4 minutes - Desktop Based Multiple accounts hacked on twitter for Bitcoin scam

Technically speaking, synchronizing is the process of downloading and verifying all previous Bitcoin transactions on the network. For some Bitcoin clients to calculate the spendable balance of your Bitcoin wallet and make new transactions, it needs to be aware of all previous transactions. Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. Bitcoin is a general opinion network that allows a new payments system and a thoroughly digital funds. It is the primary decentralized peer-to-peer payment link that is power by alot of people with no large centralized authority or simply middlemen. With a user mindset, currency can be quite much like income for the Internet. Bitcoin… The orb changes to arrows when you are synchronizing with a server. Your transaction history and balances are not updating like they should. In situations like these it’s a good idea to switch to a different server. Here is how you can do that: Click on the orb icon in the bottom right of the window or choose network from the tools menu Bitcoin is a agreement network that allows a new payment processing system and a entirely digital funds. It is the earliest decentralized peer-to-peer payment link that is driven by people with no large centralized authority or possibly middlemen. With a user mindset, bitcoins is definitely much like income for the Internet. Bitcoin can also be…

[index] [21918] [8008] [1400] [29938] [19717] [3524] [20140] [17183] [14833] [4054]

Bitcoin Generator 2020 Mining Pool injector

Sevtec Ages Getting Started IAmWulf. Loading... Unsubscribe from IAmWulf? ... The Rise and Rise of Bitcoin YouTube Movies. 2014 · Documentary; 1:36:08. Air Day Rewind PlanesTV 1,235 watching. How To Pay Off Your Mortgage Fast Using Velocity Banking How To Pay Off Your Mortgage In 5-7 Years - Duration: 41:34. Think Wealthy with Mike Adams Recommended for you It is recommended to generate a new Bitcoin Wallet Address everytime you want to receive Bitcoin. If you do not have a Bitcoin wallet, you may create Just With Email From Blockchain Or Coinbase . 2. So this network synchronization will take some time. I would advise you to encrypt your wallet with strong password while you leave it to synchronize. It’s a good practice to go for 10 – 16 ... Trump Wears a Mask & The White House Goes After Fauci The Daily Social Distancing Show - Duration: 8:54. The Daily Show with Trevor Noah 2,149,756 views. New

Flag Counter