Send Bitcoin By Fax? Morse Code? SMS? Chat? It Could Soon

Spreading Crypto: How Protocols Reach Mainstream Adoption

Spreading Crypto: How Protocols Reach Mainstream Adoption
This is the first post of our Spreading Crypto series where we take a deep dive into what it’ll take to help this technology reach broader adoption. We look at some of the obstacles holding it back and what strategies we think will be successful.
Mick Hagen (FoundeCEO) talking about protocols and how they become adopted
Like many others working in crypto, I really want to see this tech reach a larger audience. I’ve been drinking crypto kool-aid for awhile now. I bought my first Bitcoin in 2013 and have been working full-time with decentralized protocols since 2014. I’ve been through the peaks of the bull market down to the depths of the bear market. Multiple times. I would not be all-in on this technology if I wasn’t a true believer.
I obviously hope that Genesis Block will play an important role. But this goes beyond self-interest. I think for most of us in the industry, increasing crypto adoption is not about money.
It’s not about dumping our bags on retail. But rather it’s about the positive impact we believe this technology can have on the lives and societies all around us.
So, how do we bring this to the masses? How do we rid ourselves of the reputational damage that came with Mt Gox and dark markets like Silk Road? How do we make this technology easier for the normals to use? Today we start answering those questions.
---

Protocols 101

Most of the products and services that we all enjoy today use protocols that are under the hood, operating in the background. For example, when you send someone an email you’re using a protocol called SMTP. When you browse the web, you’re using the HTTP protocol.
Protocols allow for applications, computers, and devices to interact with each other. They are similar to a spoken language, where they have their own set of rules and vocabulary. If two people share the same language, they can communicate with each other.
Protocols are usually hard for the common person to understand because they’re very technical and provide no user interface. There are a few rare cases where the protocols themselves have made it into the cultural lingo, like Bluetooth, WiFi, and SMS. But for the most part, protocols are invisible and hidden from end-users.
Other protocols that have reached broad adoption

Protocol Adoption

The world did not embrace the web when the TCP/IP or HTTP protocols were first invented. Nor did they start using email when the POP, SMTP, or IMAP protocols were invented. The masses started browsing the web when AOL and Netscape were launched. They started using email when Hotmail and Gmail went live.
Protocols become adopted when an application makes them more accessible and easier to use.
Protocols become adopted when a strong team abstracts away the complexity, and delivers a compelling product experience that solves a real user pain. This is a pattern that has repeated throughout the history of technology.
Other examples include XMPP (chat), VoIP (internet audio calls), WebRTC (video conferencing), and NFC (close-contact device communication). Those protocols weren’t widely adopted until the launch of applications like AIM, WhatsApp, Skype, Google Hangouts, and Apple Pay.
Protocols become adopted when the killer application arrives.
Screenshots of Netscape and Hotmail

Crypto Protocols

If history is any indication, crypto and blockchain will be no different. Bitcoin is a protocol. Ethereum is a protocol. Decentralized Finance (DeFi) is filled with low-level protocols. What many out there don’t realize — and those within our industry don’t like to acknowledge — is that Crypto today is mostly all protocols.
Decentralized protocols won’t be replacing Robinhood, SoFi, or Venmo anytime soon. They never will. They aren’t meant to!
Crypto protocols are the building blocks, the lego pieces, the primitives that developers can use to build applications on top of.
As with the numerous protocols that came before, these innovative protocols need world-class applications. They need product experiences that can propel this exciting tech to the masses. Crypto needs great product teams that abstract away all the blockchain complexity, and deliver it in a way that is simple, convenient, and powerful.
Decentralized protocols are like lego pieces

Crypto Industry

Protocols usually operate in the background. So it should be no surprise that interacting directly with crypto and decentralized protocols is raw, rough, confusing, and complicated for most “normal” people out there.
Most of the crypto industry today is still focused on protocol development. That’s totally fine — we’re still at the early stages of this entire industry.
But because of that protocol focus, it should be no surprise to any of us that we still haven’t seen mainstream adoption.
But as an industry, we cannot forget or lose sight of what it takes to reach the masses. As Mark Twain said, “history doesn’t repeat itself, but it often rhymes.”
If we want these exciting protocols to be adopted by billions of people around the world, we’re gonna need killer applications. Just like every protocol before.
In our next post, we’ll explore the current state of application development within crypto. Are we getting closer to that killer app? What will it look like? How do we achieve it? Stay tuned, that’s all coming next.
---
Other links related to this episode:
Have you already downloaded the app? We're Genesis Block, a new digital bank that's powered by crypto & decentralized protocols. The app is live in the App Store (iOS & Android). Get the link to download at https://genesisblock.com/download
We have a lot more content coming. Be sure to follow our channels: https://genesisblock.com/follow/
submitted by mickhagen to genesisblockhq [link] [comments]

Weekly Update: Mini-Parenas, Hydro AMA on Uptrennd, Wibson app update, SelfKey’s $KEY on Hotbit... – 24 Jan - 30 Jan'20

Weekly Update: Mini-Parenas, Hydro AMA on Uptrennd, Wibson app update, SelfKey’s $KEY on Hotbit... – 24 Jan - 30 Jan'20
Hi Parachuters! Here’s part IV of VII as we catch up - your week at Parachute + partners (24 Jan - 30 Jan'20):

In this week’s Parena(s), Cap hosted mini-Parenas (smallest, 2nd smallest, 3rd smallest) this week along with a main Cloodfest which Jeff won to take home 25k $PAR. We also had a special 2nd quick subsequent Parena between Nathan and Foo to determine the 3rd and 4th positions. Alejandro will be hosting a CoD flash game in gun game mode next week in the Parachute War Zone. This week Doc Vic hosted an NBA and Soccer raffle. Bose's History Trivia in TTR was super fun and had 2k $PAR in prizes per question. Gamer Boy’s math trivia had TTR fans reaching for a calculator. Haha. Foo hosted another intense trivia in TTR as well. Afful held another one too for 1k $PAR prize per question with a 10k $PAR prize pot. Cap joined a Y Combinator startup school session to network with other entrepreneurs and gain insights on product growth. Congratulations to Aims1 for winning the #parttrenjraffle (shared in the last update) and becoming the proud owner of two rare collectibles. Gian hosted a rapid round of name-a-tennis-player for $PAR prizes to mark the Australian Open underway. TTR launched a GIF contest this week with a 40k $PAR prize pool. Sweet! Chris announced the restart of the Parachute Super Bowl Squares with a prize pot of 1M $PAR. Whoa! For this week's Two-for-Tuesday we had folks posting songs "featuring bands with amazing guitarists". Great theme GC! For #wholesomewed Jason got Parachuters to talk about pets they wished they had. In the latest #FPL update shared by LordHades, the top 3 spots are still occupied by LH, Alexis and Novel Cloud. Click here for the full update.
Some neat feedback on ParJar from the Y Combinator startup school session
Cap: \"a sneak peak at a one pager we're cooking up\"
The aXpire team was in India this week for a workshop geared towards the release of Bilr. 20k $AXPR burn for the week happened like clockwork. 2gether’s consumer spending report (which was released last week) was covered by Coin Rivet this week. Check out 2gether’s 2019 journey, here. Spanish speakers, you can listen to Founder Salvador Casquero’s thoughts on digital business which he shared with AEFI Fintech Association here. FunOntheRide’s new tutorial video explains how the 2gether card works. This week’s #XIOSocial discussions revolved around high-value-no-profit companies and Citizen’s thoughts on “inverted lending platform”. Read about how to earn to earn crypto and about the SMS industry from Birdchain’s blog. Still waiting to check out the 3 new communities on Uptrennd? Click here to have a peep. If you didn’t know this already, you can now create polls on your posts on Uptrennd. Cool! Click here to read about more updates. Hydro crew sat down for an AMA with the Uptrennd community and gave away 100k $HYDRO tokens for the best questions. Jeff’s interview of Zero Collateral DeFi came out this week. You can read about it here. Congrats to the winners of the Uptrennd Meme Contest. Those were hilarious! For a sneak peek into Uptrennd 2.0’s designs, click here. Steven Aitchison's (CYT Crypto) latest video features the platform. Have a look! The District0x community voted to have industry news in the next DApp Digest stream. For the latest District Weekly, click here. Hydro made it to Crypto Weekly’s list of 250 crypto companies to watch in 2020. The Hydro team wrote about Financial Health Check and Emergency Savings Fund tools to get you prepared for a rainy day. Their article on challenges during digital onboarding processes at banks should be an eye opener for legacy organisations. Epic work Artefe Crypto Art! How will Digital Identity Management play out in the Hydro Pay app? Click here to find out. Silent Notary’s AMA with Quora Inner Circle was last week. Its transcript was released this week. This week they appeared for an AMA with The Block Circle. The Ubikiri app was released this week to the App Stores. Winner of Round 1 of Traders Battle was announced. And just like previous weeks, they posted daily summaries of dev work progress (1, 2, 3, 4, 5, 6, 7, 8, 9).
Uptrennd 2.0 early previews look great!
Sentivate’s $SNTVT token is now supported on the Enjin wallet and does not need to be added as a custom token. Ahead of ETHDenver, where OST’s Pepo app is the official community app, a guide was published. The latest update allows login with a multitude of IDs. CEO Jason Goldberg was interviewed by Jason Nelson (Crypto Insights Journal) where he talked about community building on the blockchain. Check out this blog post by State of the DApps which discusses unique use-cases of Pepo. SelfKey’s $KEY token is now tradable and playable on Play Royal. To celebrate the occasion, competitions were launched with prize pools worth USD 6k in $KEY tokens. The token was also listed on Hotbit and InstaSwap this week. Click here and here for sneak peeks into the SelfKey mobile app under development. Constellation CEO Ben Jorgensen spoke at the Crypto 2020 Summit this week. Community member Constellation LV is currently working on a Ledger app for the project. Click here for a preview. A Russian language section was added to the website. CTO Wyatt Meldman-Floch demonstrated how double spend attacks can be prevented. In Yazom’s January update, founder Sanjé Witter shared that the open beta was on course for release in a couple of months. Pynk’s Rose AI continues to learn and self-improve through advanced algos and inputs from Super Predictors. Read more about it here. Unsure what crowdfunding and seed rounds mean? Pynk will be raising through this mechanism soon. In preparation for it, they released an article to explain what it is and how to pre-register for it. Plus, an article on compounding explains why it is so powerful. A new update for the Wibson app was released this week. The latest version of their protocol paper covers secure data exchange and batch payments. Harmony’s $ONE token swap was covered by Coindesk and BeInCrypto. BitMax launched a BitTreasure event where users earn interest on $ONE deposits. Harmony hosted a dev community meetup in SF in collaboration with Polkadot, Taxa Network and Nervos Network to discuss on Web3. GET Protocol crew appeared for an AMA with Cryptoverse this week. GUTS Tickets got featured on Finnish tech blog Tivi. Crypto Jen (Jenny from the Blockchain) joined Global Crypto Alliance as an advisor this week. $CALL is now supported on Eidoo wallet. The transcript of last week’s COTI AMA with tehMoonwalkeR can be seen here. COTI released incentive plans to reward its TestNet node operators. TxBit exchange announced its support for DoYouTip’s $DYT token swap. ParJar holders will also have their tokens swapped automatically.

And with that, it’s a wrap for this week at Parachute and partners. See you again soon. Cheers!
submitted by abhijoysarkar to ParachuteToken [link] [comments]

Weekly Update: $BOMB SWOT Analysis, HYDRO dApp store, Silent Notary Consilium, Job Opening at OST... – 20 Sep - 26 Sep'19

Weekly Update: $BOMB SWOT Analysis, HYDRO dApp store, Silent Notary Consilium, Job Opening at OST... – 20 Sep - 26 Sep'19
Hiya folks! Happy Diwali to everyone. Here’s your week at Parachute + partners (20 Sep - 26 Sep'19):

Tons of quizzes and contests this week at Parachute + TTR. Doc Vic hosted a trivia on medicine and another one on WW2 this week in TTR. A total of 50k $PAR given away. Victor hosted another trivia there too for 25k $PAR. Sweet! The Big Brother contest came to a close with the finale this week. The winner of Big Brother was Michie, who sadly no one picked. So all 21 participants won 5K $PAR each! Another 70k $PAR was given out to other winners. Plus, $202,500 PAR have been awarded in the various Big Brother contests earlier. Huge! Thank you Gian for doing all of this. And did you get a chance to partake in Tiproom’s Mememania? 50k $PAR in prizes – 25k for top 10 winners and another 25k for 100 memes. Next week’s update will feature some of the funniest memes from the contest. Richi hosted a Movie Trivia in Tiproom for a 25k $PAR prize pot for 10 questions. Woot!
Looking good Alexis!

Catch up on the latest at aXpire from the weekly update video compiled by Joakim. This week’s 20k $AXPR burn can be tracked here. CEO Gary Markham, who sits on the board of Hedge Fund Association, travelled to an HFA event to spread the word on the project. In the last update, we shared that 2gether was hosting a blockchain and tokenization based contest named Crypto Talent in partnership with IEB Spain for students and professionals. Read more about it here. News of the competition was shared on Cointelegraph as well. You can also listen in to Founder Salvador talk about the contest here and here. Check out the 2gether T-shirt that the team wore to the South Summit next week. Neat! CEO Ramon spoke at the Finnovista Pitch Day about FinTech innovation. Salvador’s interview along with a profile of 2gether was published in The Blockchain Land. The winner of the Birdchain Art Contest was announced this week. Congratulations! Plus, some news updates on the app were shared as well.
Birdchain Art Contest winner. Wicked!
Last week we shared that the $XIO ERC20:BEP2 bridge testnet trials have gone well. Here’s a sneak peek into how it looks. Once activated (condition to the acceptance of the Binance Dex listing application), the bridge will be open for roughly a month*. Dash also talked about 3 marketing mistakes that crypto startups make commonly – paying for PR (earned media > paid media), focus on follower count (organic reach > vanity metrics), airdrops (unless done strategically). If you had questions on how the XIO system will work and help startups scale, then fret not. Zachary wrote an article and video explaining it all. The community also voted this week to opt in for an SMS update option if there were ever one. The $BOMB community survey results are also out. This set the basis for a detailed SWOT analysis of the token. An excerpt from Benjamin’s 4% burn report was published on Coinbeat as well. In this week’s discussion series, Zachary reflects on market movements and the nature of the XIO incubator program.
\*[As of today, the switch to Binance Chain has been shelved. $XIO will stay on Ethereum. But there will still be a token swap. Details will be shared in a later update]
BOMB survey results show that the community is well distributed across the globe
Fantom’s Statheros stablecoin project will be partnering with a South African bank working on a mainnet launch. Initial details of the tie-up were released. The news was covered by CFN as well. CMO Michael travelled to a CFN event in London. Click here for pics. Technical Update #14 came out too. The big exclusive at Uptrennd this week was bagging an interview Andreas Antonopoulos. Awesomeness! Loopring CMO Jay sat down with founder Jeff to talk about the road ahead for the company. In this week’s public vote, the community voted to get TomoChain a free review from Altcoin Buzz. Community member Jackson Jerry took the initiative to deliver a presentation on the platform to thousands of students during a University Blockchain Awareness tour. Writers were in for a treat with the start of an article writing challenge with a 1,750 $1UP prize pool. Say what! Like last week, this week’s Meme Monday event saw some hilarious submissions. Uptrennd also got coverage on Micky News’ PR piece. Noice! Welcome to the Sentivate crew Jack! Learn about domain extensions and universal domain systems in this detailed article and thread by Sentivate founder Thomas. Tech enthusiasts were in for a treat this week with discussion threads on 5G and packet puzzles. The latest District Weekly from District0x covers mostly dev updates from the past week. Classic memes was the theme for this week’s Meme contest :p
Old school memes FTW! Lmao
Hydro got nominated for the Florin Asia Innovation Award. Good Luck! The Hydrogen dApp store was opened up for beta testers. The store is also open source. Great! Click here to read up on the structure of the dApp store and how it was built. A number of third party partners joined the store this week including 3Box, TotleCrypto and Carbon. General Operations Manager Marcco Paez sat down for an AMA with Crypto Nation to talk about Hydro. Hope you got a chance to get your questions answered. The team was at InsureTech Connect to represent the project. Want to check out an awesome spectacle? Hydro’s article on visualising code activity in decentralised projects has some uber cool visualisations. You could create one too using Gource. The latest developer update summarises all work done in the past week on the dev front. Silent Notary announced the launch of a Consilium system which will be using its own blockchain network (IDL) for legal actions on the platform. This was necessary since the Ethereum chain is anonymous and legal proceedings require identifiable actors. The $SNTR token will continue to exist on both chains (Ethereum and IDL). For more titbits on the update click here, here, here and here. For updates on Ubikiri, make sure to join the ann channel on Telegram started recently. Full list of socials can be found here. The $LAW referral bonus started last week has seen 4000+ wallets receiving the tokens so far with more on the way. Plus, the presale details are now available on the IDL site.
Hydro dApp store dev visualisation. Beautiful
Last week, the Arena Match community voted to decide which exchange to pursue for a listing of the $AMGO token. DDEX emerged as the winner of the vote. This week, $AMGO got listed on DDEX. Also, the much awaited review of the project by the Uptrennd team was published in two parts (Part I, Part II). Blockfolio and Delta accepted $AMGO for listing on their platforms. Woohoo! Job opening alert on OST: the team is looking for a Product Lead. Apply if you’re up for it. CEO Jason explained how adding friction in early onboarding process helps achieve product-market fit in this tweet thread. Congratulations to SelfKey for becoming an official member of CryptoUK, a self-regulatory trade association based in UK. If you have considered opening an offshore bank account, check out this article on the best countries to choose from. You can make your first move using the Wallet marketplace as well. Hope you took some time out to vote for SelfKey for the Blockchain Identity Management Use Case Award. Constellation’s partnership with the US Air Force was covered by Forbes this week. The team also announced a partnership with StackPath to make node deployment scalable for enterprise clients. Co-Founder Wyatt travelled to USC, Los Angeles, to a Hyperledger meetup to talk about how blockchain protocols can achieve elasticity. Click here to watch his presentation. Bags token launched a 10k $BAGS giveaway contest for helping spread the word on the project. Sweet! The first promo video is up on the BAGS TV YouTube channel. Check it out! An Upcycle Event in the BAGS Bazaar allows you to exchange some of your tokens for $BAGS. This week, they held their 4th Bazaar Upcycle event.

And with that, it's a wrap for this week at Parachute + partners. Ciao!
submitted by abhijoysarkar to ParachuteToken [link] [comments]

MeWe: A trip report

Among the more frequently mentioned G+ alternatives at the Google+ Mass Migration community, and others, is MeWe with over 250 mentions. The site bills itself as "The Next-Gen Social Network" and the "anti-Facebook": "No Ads, No Political Bias, No Spyware. NO BS. It is headed by professed Libertarian CEO Mark Weinstein.
As the site reveals no public user-generated content to non-members, it's necessary to create an account in order to get a full impression. I thought I'd provide an overview based on recent explorations.
This report leads of with background on the company, though readers may find the report and analysis of specific groups on the site of interest.

Leadership

Founder & CEO Mark Weinstein.
Co-Founder & Chief Scientist, Jonathan Wolfe (no longer with company).
Weinstein previously founded SuperFamily and SuperFriends, "at the turn of the millennium". Weinstein's MeWe biography lists articles published by The Mirror (UK), Huffington Post, USA Today, InfoSecurity Magazine, Dark Reading, and the Nation. His media appearances include MarketWatch, PBS, Fox News, and CNN. He's also the author of several personal-success books.
His Crunchbase bio is a repeat of the MeWe content.

Advisory Board

Ownership & Investment

MeWe is the dba of Sgrouples, a private for-profit early-stage venture company based in Los Angeles, though with a Mountain View HQ and mailing address, 11-50 employees, with $10m in funding over five rounds, and a $20m valuation as of 2016.
Sgrouples, Inc., dba MeWe Trust & Safety - Legal Policy c/o Fenwick West 801 California Street Mountain View, CA 94041
Crunchbase Profile.
Founded: 2012 (source)
Secured $1.2M in seed funding in 2014.
2016 valuation: $20m (source]
Backers:
Despite the business address, the company claims to be based in Los Angeles County, California and is described by the Los Angeles Business Journal as a Culver City, CA, company.

Business

Policy

In an August 6, 2018 Twitter post, Weinstein promotes MeWe writing:
Do you have friends still on Facebook? Share this link with them about Facebook wanting their banking information - tell them to move to MeWe now! No Ads. No Spyware. No Political Agenda. No Bias Algorithms. No Shadow Banning. No Facial Recognition.
MeWe provide several policy-related links on the site:
Highlights of these follow.

Privacy

The privacy policy addresses:

Terms of Service

The ToS addresses:
Effective: November 6, 2018.

FAQ

The FAQ addresses:

Values

This emphasises that people are social cratures and private people by right. The service offers the power of self expression under an umbrella of safety. It notes that our innermost thoughts require privacy.
Under "We aspire...":
MeWe is here to empower and enrich your world. We challenge the status quo by making privacy, respect, and safety the foundations of an innovatively designed, easy-to-use social experience.
Totalling 182 words.

Privacy Bill of Rights

A ten-item statement of principles (possibly inspired by another document, it might appear):
  1. You own your personal information & content. It is explicitly not ours.
  2. You will never receive a targeted advertisement or 3rd party content based on what you do or say online. We think that's creepy.
  3. You see every post in timeline order from your friends, family & groups. We do not manipulate, filter, or change the order of your content or what you see.
  4. Permissions & privacy are your rights. You control them.
  5. You control who can access your content.
  6. You control what, if anything, others can see in member searches.
  7. Your privacy means we do not share your personal information with anyone.
  8. Your emojis are for you and your friends. We do not monitor or mine your data.
  9. Your face is your business. We do not use facial recognition technology.
  10. You have the right to delete your account and take your content with you at any time.

Press

There are a few mentions of MeWe in the press, some listed on the company's website, others via web search.

Self-reported articles

The following articles are linked directly from MeWe's Press page:
The page also lists a "Privacy Revolution Required Reading" list of 20 articles all addressing Facebook privacy gaffes in the mainstream press (Wired, TechCrunch, Fortune, Gizmodo, The Guardian, etc.).
There are further self-reported mentions in several of the company's PR releases over the years.

Other mentions

A DuckDuckGo search produces several other press mentions, including:

Technology

This section is a basic rundown of the user-visible site technology.

Mobile Web

The site is not natively accessible from a mobile Web browser as it is overlayed with a promotion for the mobile application instead. Selecting "Desktop View" in most mobile browsers should allow browser-based access.

Mobile App

There are both Android and iOS apps for MeWe. I've used neither of these, though the App store entries note:
Crunchbase cites 209,220 mobile downloads over the past 30 days (via Apptopia), an 80.78% monthly growth rate, from Google Play.

Desktop Web

Either selecting "View Desktop" or navigating with a Desktop browser to https://www.mewe.com your are presented with a registration screen, with the "About", "Privacy Bill of Rights", "MeWe Challenge", and a language selector across the top of the page. Information requested are first and last name, phone or email, and a password. Pseudonymous identities are permitted, though this isn't noted on the login screen. Returning members can use the "Member Log In" button.
The uMatrix Firefox extension reveals no third-party content: all page elements are served from mewe.com, img.mewe.com, cdn.mewe.com, or ws.mewe.com. (In subsequent browsing, you may find third-party plugins from, for example, YouTube, for videos, or Giphy, for animated GIFs.)
The web front-end is nginx. The site uses SSL v3, issued by DigiCert Inc. to Sgrouples, Inc.

Onboarding

The onboarding experience is stark. There is no default content presented. A set of unidentified icons spans the top of the screen, these turn out to be Home, Chats, Groups, Pages, and Events. New users have to, somehow, find groups or people to connect with, and there's little guidance as to how to do this.

Interface

Generally there is a three panel view, with left- and right-hand sidebars of largely navigational or status information, and a central panel with main content. There are also pop-up elements for chats, an omnipresent feature of the site.
Controls display labels on some devices and/or resolutions. Controls do not provide tooltips for navigational aid.

Features

Among the touted features of MeWe are:

Community

A key aspect of any social network is its community. Some of the available or ascertained information on this follows.

Size

Weinstein claims a "million+ following inside MeWe.com" on Twitter.
The largest visible groups appear to have a maximum of around 15,000 members , for "Awesome gifs". "Clean Comedy" rates 13,350, and the largest open political groups, 11,000+ members.
This compares to Google+ which has a staggering, though Android-registrations-inflated 3.3 billion profiles, and 7.9 million communities, though the largest of these come in at under 10 million members. It's likely that MeWe's membership is on the whole more more active than Google+'s, where generally-visible posting activity was limited to just over 9% of all profiles, and the active user base was well under 1% of the total nominal population.

Active Users

MeWe do not publish active users (e.g., MUA / monthly active users) statistics.

Groups

MeWe is principally a group-oriented discussion site -- interactions take place either between individuals or within group contexts. Virtually all discovery is group-oriented. The selection and dynamics of groups on the site will likely strongly affect user experience, so exploring the available groups and their characteristics is of interest.
"MeWe has over 60,000 open groups" according to its FAQ.
The Open groups -- visible to any registered MeWe user, though not to the general public Web -- are browsable, though sections and topics must be expanded to view the contents: an overview isn't immediately accessible. We provide a taste here.
A selection of ten featured topics spans the top of the browser. As I view these, they are:
Specific groups may appear in multiple categories.
The top Groups within these topics have, variously, 15,482, 7,738, 15,482 (dupe), 7,745, 8,223, 8,220, 1,713, 9,527, 2,716, and 1,516 members. Listings scroll at length -- the Music topic has 234 Groups, ranging in size from 5 to 5,738 members, with a median of 59, mean of 311.4, and a 90%ile of 743.5.
Below this is a grid of topics, 122 in all, ranging from Activism to Wellness, and including among them. A selected sample of these topics, with top groups listed members in (parens), follows:
To be clear: whilst I've not included every topic, I've sampled a majority of them above, and listed not an arbitrary selection, but the top few Groups under each topic.

Google+ Groups

The Google Plus expats group seems the most active of these by far.

Political Groups

It's curious that MeWe make a specific point in their FAQ that:
At MeWe we have absolutely no political agenda and we have a very straightforward Terms of Service. MeWe is for all law-abiding people everywhere in the world, regardless of political, ethnic, religious, sexual, and other preferences.
There are 403 political groups on MeWe. I won't list them all here, but the first 100 or so give a pretty clear idea of flavour. Again, membership is in (parentheses). Note that half the total political Groups memberships are in the first 21 groups listed here, the first 6 are 25% of the total.
  1. Donald J. Trump 2016 - Present (11486)
  2. The Conservative's Hangout (8345)
  3. Qanon Follow The White Rabbit (5600)
  4. Drain The Swamp (4978)
  5. Libertarians (4528)
  6. United We Stand Trump2020 (4216)
  7. The Right To Self Defense (3757)
  8. Alternative Media (3711)
  9. Hardcore Conservative Patriots for Trump (3192)
  10. Bastket Of Deplorables4Trump! (3032)
  11. Return of the Republic (2509)
  12. Infowars Chat Room Unofficial (2159)
  13. Donald Trump Our President 2017-2025 (2033)
  14. Berners for Progress (1963)
  15. Sean Hannity Fans (1901)
  16. The American Conservative (1839)
  17. I Am The NRA (1704)
  18. Tucker Carlson Fox News (1645)
  19. We Love Donald Trump (1611)
  20. MAGA - Make America Great Again (1512)
  21. Q (1396)
  22. ClashDaily.com (1384)
  23. news from the front (1337)
  24. Basket of Deplorables (1317)
  25. Payton's Park Bench (1283)
  26. Convention of States (1282)
  27. Britons For Brexit (1186)
  28. MoJo 5.0 Radio (1180)
  29. MeWe Free Press (1119)
  30. The Constitutionally Elite (1110)
  31. Libertarian (1097)
  32. WOMEN FOR PRESIDENT TRUMP (1032)
  33. AMERICANS AGAINST ISIS and OTHER ENEMIES (943)
  34. #WalkAway Campaign (894)
  35. ALEX JONES (877)
  36. The Lion Is Awake ! (854)
  37. We Support Donald Trump! (810)
  38. The Stratosphere Lounge (789)
  39. TRUMP-USA-HANDS OFF OUR PRESIDENT (767)
  40. Official Tea Party USA (749)
  41. Mojo50 Jackholes (739)
  42. Yes Scotland (697)
  43. "WE THE DEPLORABLE" - MOVE ON SNOWFLAKE! (688)
  44. Judge Jeanine Pirro Fans (671)
  45. Anarcho-Capitalism (658)
  46. Ted Cruz for President (650)
  47. No Lapdog Media (647)
  48. Q Chatter (647)
  49. Daily Brexit (636)
  50. Tucker Carlson Fox News (601)
  51. The Trumps Storm Group (600)
  52. QAnon-Patriots WWG1WGA (598)
  53. 100% American (569)
  54. Ladies For Donald Trump (566)
  55. Deep State (560)
  56. In the Name of Liberty (557)
  57. Material Planet (555)
  58. WikiUnderground (555)
  59. Trump NRA Free Speech Patriots on MeWe Gab.ai etc (546)
  60. Magna Carta Group (520)
  61. Constitutional Conservatives (506)
  62. Question Everything (503)
  63. Conspiracy Research (500)
  64. Bill O'Reilly Fans (481)
  65. Conservative Misfit's (479)
  66. Canadian politics (478)
  67. Anarchism (464)
  68. HARDCORE DEPLORABLES (454)
  69. Deplorable (450)
  70. Tampa Bay Trump Club (445)
  71. UK Politics (430)
  72. Bongino Fan Page (429)
  73. Radical Conservatives (429)
  74. RESIST THE RESISTANCE (419)
  75. The Deplorables (409)
  76. America's Freedom Fighters (401)
  77. Politically Incorrect & Proud (399)
  78. CONSERVATIVES FOR AMERICA ! (385)
  79. Political satire (383)
  80. RISE OF THE RIGHT (371)
  81. UK Sovereignty,Independence,Democracy -Everlasting (366)
  82. The Patriots Voting Coalition (359)
  83. End The Insanity (349)
  84. Coming American Civil War! (345)
  85. Constitutional Conservatives (343)
  86. United Nations Watch (342)
  87. A Revival Of The Critical Thinking Union (337)
  88. The New Libertarian (335)
  89. Libertarian Party (official ) (333)
  90. DDS United (Duterte Die-hard Supporters) (332)
  91. American Conservative Veterans (331)
  92. Anarchism/Agorism/Voluntaryism (328)
  93. America Needs Donald Trump (326)
  94. The UKIP Debating Society (321)
  95. Coalition For Trump (310)
  96. Egalitarianism (306)
  97. FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
  98. 2nd Amendment (287)
  99. Never Forget #SethRich (286)
  100. Green Party Supporters 2020 (283)
It seems there is relatively little representation from the left wing, or even the centre, of the political spectrum. A case-insensitive match for "liberal" turns up:
Mainstream political parties are little represented, though again, the balance seems skewed searching on "(democrat|republic|gop)":
The terms "left" and "right" provide a few matches, not all strictly political-axis aligned:
Socialism and Communism also warrant a few mentions:
And there are some references to green, laboulabor parties:

Conclusion

Whilst there may not be a political agenda, there does appear to be at least a slight political bias to the site. And a distinctive skew on many other topical subjects.
Those seeking new homes online may wish to take this into account.

Updates

submitted by dredmorbius to plexodus [link] [comments]

Groestlcoin June Development Update & Release!

Another Quarter, Another Release! The Groestlcoin production factory has been working overtime as always in order to deliver even more tech to push Groestlcoin mainstream when the time comes.
There have been many new fantastic wallets and exchanges added to Groestlcoins repertoire over the past 3 months so we will re-cap these before moving on to what is new today.

Recap

What's New

Re-forged: Groestlcoin Samourai

Groestlcoin Samourai is a wallet for the streets. A modern Groestlcoin wallet hand-forged to keep your transactions private, your identity masked, and your funds secure. Its main advantages are its extreme portability and is the most secure Groestlcoin mobile HD wallet.
We've built a wallet that Groestlcoin deserves. If you are looking for a wallet that Silicon Valley will never build, the regulators will never allow, and the VC's will never invest in, this is the perfect wallet for you.
![Groestlcoin Samourai Release Video](http://img.youtube.com/vi/i3WU8Tde8XQ/0.jpg)

Head over to the Groestlcoin Samourai Release Page here for the full release announcement.

New: GroestlImage

Groestlimage turns any file into a mnemonic phrase allowing users to generate Groestlcoin private keys and addresses based on the data URI of the provided file. A picture is worth a thousand Groestls.

Features:

Link

https://groestlcoin.org/groestlimage/

Source Code

https://github.com/Groestlcoin/groestlimage

New: Groestlcoin Core Config Generator

Groestlcoin Core Config Generator is a simple GUI to configure the groestlcoin.conf file – A developers dream tool!
Each configuration option is available via the user interface, grouped by what attributes they affect. For ease of getting started with a new configuration, a variety of preset "node classes" are available on the right-hand-side of the screen. Selecting a preset will load our recommended base configuration for a node fitting that description, at which point you can then tune the configuration at the single option level.

Features

Link

https://config.groestlcoin.org/

Source Code

https://github.com/Groestlcoin/groestlcoin-core-config-generator

New: Groestlcoin Dumb Block Explorer

Dumb Block Explorer is a trivial block explorer written in a single PHP file. Now everybody can run their own block explorer.

Features

Link

https://www.groestlcoin.org/explore

Source Code

https://github.com/Groestlcoin/dumb-block-explorer

New: Groestlcoin SMS Push TX

Groestlcoin Simple Push TX is a server to push Groestlcoin transactions via SMS. Now everybody can send new transactions via SMS if the Internet is not usable (i.e. blocked by government entities or becomes otherwise unavailable).

Features

Source Code

https://github.com/Groestlcoin/smspushtx

Update: Electrum-GRS 3.3.6

Electrum-GRS is Groestlcoins #1 thin-client for Windows, MacOS, Linux and Android, based on a client-server protocol. Supporting multi-sig wallets without the bloat of downloading the entire blockchain.

New Features (Universal)

New Features (Windows, MacOS, Linux)

New Features (Android)

Link

https://github.com/Groestlcoin/electrum-grs/releases/download
https://play.google.com/store/apps/details?id=org.groestlcoin.electrumgrs

Source Code

https://github.com/Groestlcoin/electrum-grs
submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Decred Journal – August 2018

Note: you can read this on GitHub (link), Medium (link) or old Reddit (link) to see all the links.

Development

dcrd: Version 1.3.0 RC1 (Release Candidate 1) is out! The main features of this release are significant performance improvements, including some that benefit SPV clients. Full release notes and downloads are on GitHub.
The default minimum transaction fee rate was reduced from 0.001 to 0.0001 DCkB. Do not try to send such small fee transactions just yet, until the majority of the network upgrades.
Release process was changed to use release branches and bump version on the master branch at the beginning of a release cycle. Discussed in this chat.
The codebase is ready for the new Go 1.11 version. Migration to vgo module system is complete and the 1.4.0 release will be built using modules. The list of versioned modules and a hierarchy diagram are available here.
The testnet was reset and bumped to version 3.
Comments are welcome for the proposal to implement smart fee estimation, which is important for Lightning Network.
@matheusd recorded a code review video for new Decred developers that explains how tickets are selected for voting.
dcrwallet: Version 1.3.0 RC1 features new SPV sync mode, new ticket buyer, new APIs for Decrediton and a host of bug fixes. On the dev side, dcrwallet also migrated to the new module system.
Decrediton: Version 1.3.0 RC1 adds the new SPV sync mode that syncs roughly 5x faster. The feature is off by default while it receives more testing from experienced users. Other notable changes include a design polish and experimental Politeia integration.
Politeia: Proposal editing is being developed and has a short demo. This will allow proposal owners to edit their proposal in response to community feedback before voting begins. The challenges associated with this feature relate to updating censorship tokens and maintaining a clear history of which version comments were made on. @fernandoabolafio produced this architecture diagram which may be of interest to developers.
@degeri joined to perform security testing of Politeia and found several issues.
dcrdata: mainnet explorer upgraded to v2.1 with several new features. For users: credit/debit tx filter on address page, showing miner fees on coinbase transaction page, estimate yearly ticket rewards on main page, cool new hamburger menu and keyboard navigation. For developers: new chain parameters page, experimental Insight API support, endpoints for coin supply and block rewards, testnet3 support. Lots of minor API changes and frontend tweaks, many bug fixes and robustness improvements.
The upcoming v3.0 entered beta and is deployed on beta.dcrdata.org. Check out the new charts page. Feedback and bug reports are appreciated. Finally, the development version v3.1.0-pre is on alpha.dcrdata.org.
Android: updated to be compatible with the latest SPV code and is syncing, several performance issues are worked on. Details were posted in chat. Alpha testing has started, to participate please join #dev and ask for the APK.
iOS: backend is mostly complete, as well as the front end. Support for devices with smaller screens was improved. What works now: creating and recovering wallets, listing of transactions, receiving DCR, displaying and scanning QR codes, browsing account information, SPV connection to peers, downloading headers. Some bugs need fixing before making testable builds.
Ticket splitting: v0.6.0 beta released with improved fee calculation and multiple bug fixes.
docs: introduced new Governance section that grouped some old articles as well as the new Politeia page.
@Richard-Red created a concept repository sandbox with policy documents, to illustrate the kind of policies that could be approved and amended by Politeia proposals.
decred.org: 8 contributors added and 4 removed, including 2 advisors (discussion here).
decredmarketcap.com is a brand new website that shows the most accurate DCR market data. Clean design, mobile friendly, no javascript required.
Dev activity stats for August: 239 active PRs, 219 commits, 25k added and 11k deleted lines spread across 8 repositories. Contributions came from 2-10 developers per repository. (chart)

Network

Hashrate: went from 54 to 76 PH/s, the low was 50 and the new all-time high is 100 PH/s. BeePool share rose to ~50% while F2Pool shrank to 30%, followed by coinmine.pl at 5% and Luxor at 3%.
Staking: 30-day average ticket price is 95.6 DCR (+3.0) as of Sep 3. During the month, ticket price fluctuated between a low of 92.2 and high of 100.5 DCR. Locked DCR represented between 3.8 and 3.9 million or 46.3-46.9% of the supply.
Nodes: there are 217 public listening and 281 normal nodes per dcred.eu. Version distribution: 2% at v1.4.0(pre) (dev builds), 5% on v1.3.0 (RC1), 62% on v1.2.0 (-5%), 22% on v1.1.2 (-2%), 6% on v1.1.0 (-1%). Almost 69% of nodes are v.1.2.0 and higher and support client filters. Data snapshot of Aug 31.

ASICs

Obelisk posted 3 email updates in August. DCR1 units are reportedly shipping with 1 TH/s hashrate and will be upgraded with firmware to 1.5 TH/s. Batch 1 customers will receive compensation for missed shipment dates, but only after Batch 5 ships. Batch 2-5 customers will be receiving the updated slim design.
Innosilicon announced the new D9+ DecredMaster: 2.8 TH/s at 1,230 W priced $1,499. Specified shipping date was Aug 10-15.
FFMiner DS19 claims 3.1 TH/s for Blake256R14 at 680 W and simultaneously 1.55 TH/s for Blake2B at 410 W, the price is $1,299. Shipping Aug 20-25.
Another newly noticed miner offer is this unit that does 46 TH/s at 2,150 W at the price of $4,720. It is shipping Nov 2018 and the stats look very close to Pangolin Whatsminer DCR (which has now a page on asicminervalue).

Integrations

www.d1pool.com joined the list of stakepools for a total of 16.
Australian CoinTree added DCR trading. The platform supports fiat, there are some limitations during the upgrade to a new system but also no fees in the "Early access mode". On a related note, CoinTree is working on a feature to pay household bills with cryptocurrencies it supports.
Three new OTC desks were added to exchanges page at decred.org.
Two mobile wallets integrated Decred:
Reminder: do your best to understand the security and privacy model before using any wallet software. Points to consider: who controls the seed, does the wallet talk to the nodes directly or via middlemen, is it open source or not?

Adoption

Merchants:

Marketing

Targeted advertising report for August was posted by @timhebel. Facebook appeal is pending, some Google and Twitter campaigns were paused and some updated. Read more here.
Contribution to the @decredproject Twitter account has evolved over the past few months. A #twitter_ops channel is being used on Matrix to collaboratively draft and execute project account tweets (including retweets). Anyone with an interest in contributing to the Twitter account can ask for an invitation to the channel and can start contributing content and ideas there for evaluation by the Twitter group. As a result, no minority or unilateral veto over tweets is possible. (from GitHub)

Events

Attended:
For those willing to help with the events:
BAB: Hey all, we are gearing up for conference season. I have a list of places we hope to attend but need to know who besides @joshuam and @Haon are willing to do public speaking, willing to work booths, or help out at them? You will need to be well versed on not just what is Decred, but the history of Decred etc... DM me if you are interested. (#event_planning)
The Decred project is looking for ambassadors. If you are looking for a fun cryptocurrency to get involved in send me a DM or come talk to me on Decred slack. (@marco_peereboom, longer version here)

Media

Decred Assembly episode 21 is available. @jy-p and lead dcrwallet developer @jrick discussed SPV from Satoshi's whitepaper, how it can be improved upon and what's coming in Decred.
Decred Assembly episodes 1-21 are available in audio only format here.
New instructional articles on stakey.club: Decrediton setup, Deleting the wallet, Installing Go, Installing dcrd, dcrd as a Linux service. Available in both English and Portuguese.
Decred scored #32 in the August issue of Chinese CCID ratings. The evaluation model was explained in this interview.
Satis Group rated Decred highly in their cryptoasset valuation research report (PDF). This was featured by several large media outlets, but some did not link to or omitted Decred entirely, citing low market cap.
Featured articles:
Articles:
Videos:

Community Discussions

Community stats:
Comm systems news:
After another debate about chat systems more people began testing and using Matrix, leading to some gardening on that platform:
Highlights:
Reddit: substantive discussion about Decred cons; ecosystem fund; a thread about voter engagement, Politeia UX and trolling; idea of a social media system for Decred by @michae2xl; how profitable is the Obelisk DCR1.
Chats: cross-chain trading via LN; plans for contractor management system, lower-level decision making and contractor privacy vs transparency for stakeholders; measuring dev activity; what if the network stalls, multiple implementations of Decred for more resilience, long term vision behind those extensive tests and accurate comments in the codebase; ideas for process for policy documents, hosting them in Pi and approving with ticket voting; about SPV wallet disk size, how compact filters work; odds of a wallet fetching a wrong block in SPV; new module system in Go; security of allowing Android app backups; why PoW algo change proposal must be specified in great detail; thoughts about NIPoPoWs and SPV; prerequisites for shipping SPV by default (continued); Decred vs Dash treasury and marketing expenses, spending other people's money; why Decred should not invade a country, DAO and nation states, entangling with nation state is poor resource allocation; how winning tickets are determined and attack vectors; Politeia proposal moderation, contractor clearance, the scale of proposals and decision delegation, initial Politeia vote to approve Politeia itself; chat systems, Matrix/Slack/Discord/RocketChat/Keybase (continued); overview of Korean exchanges; no breaking changes in vgo; why project fund burn rate must keep low; asymptotic behavior of Decred and other ccs, tail emission; count of full nodes and incentives to run them; Politeia proposal translations and multilingual environment.
An unusual event was the chat about double negatives and other oddities in languages in #trading.

Markets

DCR started the month at USD 56 / BTC 0.0073 and had a two week decline. On Aug 14 the whole market took a huge drop and briefly went below USD 200 billion. Bitcoin went below USD 6,000 and top 100 cryptos lost 5-30%. The lowest point coincided with Bitcoin dominance peak at 54.5%. On that day Decred dived -17% and reached the bottom of USD 32 / BTC 0.00537. Since then it went sideways in the USD 35-45 / BTC 0.0054-0.0064 range. Around Aug 24, Huobi showed DCR trading volume above USD 5M and this coincided with a minor recovery.
@ImacallyouJawdy posted some creative analysis based on ticket data.

Relevant External

StopAndDecrypt published an extensive article "ASIC Resistance is Nothing but a Blockchain Buzzword" that is much in line with Decred's stance on ASICs.
The ongoing debates about the possible Sia fork yet again demonstrate the importance of a robust dispute resolution mechanism. Also, we are lucky to have the treasury.
Mark B Lundeberg, who found a vulnerability in atomicswap earlier, published a concept of more private peer-to-peer atomic swaps. (missed in July issue)
Medium took a cautious stance on cryptocurrencies and triggered at least one project to migrate to Ghost (that same project previously migrated away from Slack).
Regulation: Vietnam bans mining equipment imports, China halts crypto events and tightens control of crypto chat groups.
Reddit was hacked by intercepting 2FA codes sent via SMS. The announcement explains the impact. Yet another data breach suggests to think twice before sharing any data with any company and shift to more secure authentication systems.
Intel and x86 dumpsterfire keeps burning brighter. Seek more secure hardware and operating systems for your coins.
Finally, unrelated to Decred but good for a laugh: yetanotherico.com.

About This Issue

This is the 5th issue of Decred Journal. It is mirrored on GitHub, Medium and Reddit. Past issues are available here.
Most information from third parties is relayed directly from source after a minimal sanity check. The authors of Decred Journal have no ability to verify all claims. Please beware of scams and do your own research.
Feedback is appreciated: please comment on Reddit, GitHub or #writers_room on Matrix or Slack.
Contributions are welcome too. Some areas are collecting content, pre-release review or translations to other languages. Check out @Richard-Red's guide how to contribute to Decred using GitHub without writing code.
Credits (Slack names, alphabetical order): bee, Haon, jazzah, Richard-Red and thedecreddigest.
submitted by jet_user to decred [link] [comments]

Aegees Messenger: Development Status and Plans

Aegees Messenger: Development Status and Plans


What is being tested, what is planned and some new ideas
Here we are again, to tell you more about Aegees Messenger and our plans to make it the most protected and convenient messenger on the market. This time, we’ll talk in more detail about the new functions we are working on and the project timeline, including testing and release plans. We’ll also share some of our ideas for the future.
Completed Development and Work in Progress
When it comes to core functions, we have already completed the development of text messaging, file exchange, audio calling, group chat and desktop versions of the app as well as a syncing solution and multiple device support – and of course, stickers!
There’s one more detail we are particularly proud to report – it was tough, but we’ve done it! The crypto container that will serve the app’s revolutionary data security component is ready too. Also, in the first half of 2018, we successfully implemented ARGON2i, a KDF algorithm that protects passwords from hacking and hashes all data that’s transferred to servers. We have also established a global server infrastructure to support our app.
The main super-task we have set for ourselves can be summed up as, “no data stored on servers and no non-encrypted data transfers”. It’s a worthy goal, but it sure did make the development process much more challenging, time-consuming and resource intensive. Even the most basic details are much harder to develop with those preconditions taken into consideration – like syncing chats on multiple devices or drafting a plain text message.
Part of our team is now focused on testing; this week, it’s audio-conferencing. This is our current priority, because even the current market leaders only say that this function is ‘coming soon’, whereas we have already developed ours and all data flows in our app will be encrypted.
https://preview.redd.it/8ul7ucpk80k11.jpg?width=826&format=pjpg&auto=webp&s=613ebc34e07e87f49ddddf15ba542e4782e58f85
Among other things, we are now trying out our ‘weak password’ testing tool and working on many system components that we are checking for iPad compatibility issues. We are also working on overall app stability and performance based on performance logs and error reports extracted from Google Play and App Store.
In other words, we are very close to the soft launch phase, and we are planning our first global product release at the end of the year. It will feature all of the functions and features that have been developed so far.
Coming Soon
We plan to use the remaining time before the end of the year to finish very many tasks, including developing a quick ‘user invite’ function and video calling. We also plan to build a file manager for the crypto container, implement support for user stickers and make sure the system is operating in at least five languages in our first release or, if time allows - twenty. Our ultimate goal is for messenger app to support 40 different languages.
As if that wasn’t enough, we’ll be working hard on our cryptocurrency tools for the app. We aim to complete the cryptocurrency transfer and exchange function, at least partially, in time for the global launch.
We have already developed the server-side element of Bitcoin transactions and by the year’s end, we plan to implement fully functional mechanisms for transfers and currency exchange operations with Bitcoin, DASH, Ether and NEM. Another item on our ‘to-do’ list is to develop a blockchain-based recording system for user transactions, because we see blockchain technology as the new standard for electronic validation.
We also plan to add more security mechanisms on top of the core security functionality we have already developed. In August, we intend to implement timed message deletion to boost privacy and user data protection. We will also design and develop facial recognition and voice biometrics authentication solutions to go with our innovative “intruder’s eye on the screen” detection system.
Because of possible crackdowns in countries where official policies will not permit products and services that guarantee its users complete anonymity, we’ve decided to develop a solution for that too. To make our app ‘block-proof’, we’re going to implement a decentralised transport infrastructure that is also on track to be completed this year.
What’s Next?
These are the four main points we will implement in the development of our product:
• Migration to the Aegees.DCI fully decentralised infrastructure;
• Boosting communication security while maintaining a user-friendly UI;
• Further development of a cryptocurrency transaction kits and the launch of our own cryptocurrency;
• Identifying and pursuing additional system integration opportunities.
We plan to complete migration to the decentralised infrastructure called, Aegees.DCI, in 2019. We will have to set up a P2P transport layer consisting of one thousand nodes and we plan to use the cjdns communication protocol.
We intend to improve our app’s primary function as a communication tool through enhancing its existing functionality and adding new options. For example, we plan to implement video conferencing and hidden chats. We are also considering an integration solution with SMS and Email messaging. Screen and theme customisation tools will also be made available in 2019.
https://preview.redd.it/7a20mfgp80k11.jpg?width=4000&format=pjpg&auto=webp&s=91aa99f267269a1468fe2644e00f5a393435311b
We will continue to work on our cryptocurrency transaction kit by expanding the list of supported currencies with a view to implementing support for thirteen cryptocurrencies by the start of 2019:
1. Bitcoin 2. Etherium 3. DASH 4. NEM 5. Monero 6. Ripple 7. Bitcoin Cash 8. EOS 9. Litecoin 10. Stelar 11. TRON 12. IOTA 13. zCash
https://preview.redd.it/l79v4lrr80k11.jpg?width=3508&format=pjpg&auto=webp&s=7cf6fd5dc0f56949d371ca65ba9f7ccca80e8c3a
Following this, we intend on developing a proprietary cryptocurrency exchange platform, launching AEGT, our own cryptocurrency and making a cryptocurrency wallet within the app available for all supported currencies.
Also in our development pipeline right now are solutions for integration with communication and trading bots and a system to equip our messenger with a media file playback applet and document viewer.
The Bottom Line
We are working every day to bring all of these plans to fruition and we’ve already completed the groundwork for many of the solutions. But now its time to step up the pace and really make things happen. So we’ll be burning the midnight oil as you stay tuned for more info!
Until next time!
submitted by AegeesMessenger to u/AegeesMessenger [link] [comments]

Blindspot Whitepaper: Specialized Threat Assessment and Protection (STAP) for the Blockchain

BlindSpot™
Stop attacks before ”zero day” and stop the Advanced Persistent Threat (APT)
We live in a dangerous world — our information technology systems face that danger every single day. Hackers are constantly attempting to infiltrate systems, steal information, damage government and corporate reputations, and take control of systems and processes.
Hackers share and use a variety of tools and techniques to gain access to, and
maintain access to, IT systems, including groups and techniques so dangerous
they have their own category - the Advanced Persistent Threat (APT). At the
center of the APT are sophisticated techniques using malware to exploit vulnerabilities in systems. Traditional cyber security technologies use file signatures to locate these tools and hacker malware, but hackers are now actively camouflaging their tools by changing, customizing, and “morphing” them into new files that do not match any known signatures (‘Polymorphic Malware’). This introduces a massive gap in malicious file detection which leaves the enterprise open to exploitation — and it’s just not possible for traditional signature-based systems to keep up. In fact, signature-based anti-virus and anti-malware systems are only around 25% effective today. BlindSpot™ sees through it all, even as the files morph and change in a futile attempt to remain camouflaged.
Digital File Fingerprints
Any File Type, Any Language, Partial Matches, Exact Matches
BlindSpot™, the adaptive security solution from BlindSpot™, can see through the
Polymorphic camouflage used by the worlds most advanced hackers by utilizing
digital file fingerprints and our proprietary adaptive BlindSpot™ ‘brain’ that constantly analyzes the fingerprints of known malicious files and tools to locate partial matches within the files on your systems - servers, laptops, desktops, USB drives, and even mobile devices. BlindSpot™ can cut right through the Polymorphic files, revealing the true hacking tools underneath, even if they are only fragments or pieces of a more complete set of hacking tools and technologies.
Most cyber attacks happen weeks or even months after their initial penetration and access to a network or system, and even the simplest attacks tend to have a fuse that is typically several days. It takes them time to map out a system, probe for the information they want, and obtain or forge credentials with the type of access they need. But from the moment their tools first land on your network and systems, BlindSpot™ sees them. If fact, BlindSpot™ can see them sitting on a newly inserted USB drive even if the files are not copied to your systems. This means BlindSpot™ can identify and alert you to malicious files and potential illicit activities before the attack happens - before zero day!
How does BlindSpot™ work? BlindSpot™ sits on the endpoint and continuously monitors file activity. Digital fingerprints, which can be used to find partial matches of any file type in any language, are reported back where they are kept forever in a temporal repository.
BlindSpot™ looks through all of the digital fingerprints — both those from files on your systems and those in a constantly updated database of known malicious files and hacking tools, to locate and alert you to any indication of hacking, malicious files, or illicit activity. BlindSpot™ is a disruptive technology that can see polymorphic malware and stop attacks before zero day.
Digital File Fingerprints are created from a file or a piece of digital data/information by using advanced mathematics to look at all of the small pieces of data that make up the file to create a very small, unique piece of mathematical data — a digital file fingerprint. Files may be of any file type and in any language - digital fingerprints can find partial and exact matches regardless of what is in the file itself.
Just like with humans, once a fingerprint has been taken, you no longer need the
person to identify them. The fingerprint is enough. Even a partial fingerprint is
enough, and sometimes a smudge will do. Digital fingerprints work on the same
principle. Once BlindSpot™ has taken a digital fingerprint of a file, the file is no longer needed to identify it or to compare it with other files. And because digital fingerprints are tiny, they are easy to store. Even a multi-gigabyte file has a digital fingerprint that is no larger than 10k bytes.
Once you have two sets of digital fingerprints, you can compare them. Because BlindSpot™ starts with full fingerprints of known malicious files, it can identify matching files even when the digital fingerprint is only partially there. And with BlindSpot™’s advanced processing capabilities, file fragments, recovered data from a hard drive, partially downloaded documents, damaged files (both intentional and accidental) and other incomplete file structures can be properly fingerprinted in a way that still allows matches to be found.
Other technologies and software use static signatures, which do not work if any part of a file, regardless of how small, is different from another, or if the file is damaged in any way. BlindSpot™ and digital fingerprints enable partial matching, and can see through the camouflage that has become the industry standard for hackers across the globe. Static signature based solutions simply cannot do this.
Imagine your favorite detective drama on TV. The prosecutor says “This partial
fingerprint was found at the crime scene and the video camera across the
street recorded a perfect image of the person’s face.” The jury deliberates and
compares the picture and fingerprints of the defendant that were taken the day
before. They conclude, because the fingerprint was not all there and was not 100% identical, and because one picture showed a mustache that looked identical but was one millimeter longer than the other picture, that the two people were not identical - and set the criminal free. Well, that show wouldn’t be on TV long because crime would run rampant. Now imagine they had BlindSpot™. Criminals would be caught, the town would be a much safer place, and the show would be on for years to come.
Now imagine your network and systems without BlindSpot™, where traditional
exact match signature software is on your front line of defense. All kinds of
malicious files could walk right through and sit down on your hard drives, just
waiting for hackers to activate them. But you don’t have to imagine what your
systems would be like with BlindSpot™ — instead, simply contact us, get BlindSpot™ in place, and we’ll work with you to show you what’s really on your systems and help you keep those systems safe.
Ensuring System Compliance
Take the guesswork out of compliance assessment
All Government systems go through Certification and Accreditation. BlindSpot™ can help you with malicious code protection, for both security considerations and required compliance. Guidelines found in NIST 800-53 Revisions 3+ Security Requirements for System Integrity, SI-3 Malicious Code Protection, state that malicious code protection mechanisms must be employed at information system entry and exit points, including workstations, notebook computers, and mobile devices, to detect and eradicate malicious code.
BlindSpot™, with its continuous monitoring of the files on your endpoints and its
continuous updating of its known malicious file repository, will provide the
required real-time and full monthly re-scans of your files, will alert your
administrative staff when malicious code is found, will provide reports on
potential malicious files, illicit activity, and follow-up with very short false positive reports. BlindSpot™’s false positive rate is less than 0.01%. BlindSpot™ helps organizations meet the security requirements set forth and ensure compliance.
Intellectual Property Protection
Track sensitive information as it changes and moves around the enterprise
BlindSpot™ uses digital file fingerprints to identify partial and exact matches between files, regardless of file type or language. This ability can be used to track movements of and changes to files on a network of computers.
Government entities and corporations need to addresses the issue of monitoring
documents and files that contain sensitive information intellectual property, and it
is no longer sufficient to simply store them on a secure server and require specific credentials to access the information. People, both unintentionally and sometimes with malicious intent, copy and paste parts of documents, move files to USB drives, and otherwise edit and transfer files in order to get them on to a laptop, share them with a co-worker, or exfiltrate confidential information to outside networks and systems. BlindSpot™ carefully watches all of the files on your network, including what’s going with USB drives. If someone copies part of a file that has sensitive data to another file, BlindSpot™ sees it. Furthermore, BlindSpot™ can alert you when it sees questionable activity with certain documents/files or with specific computers/individuals.
Your sensitive files now have a watchdog that catches both unintentional and
malicious exposure to non-secure systems. Use BlindSpot™ to set up a custom
database of the locations where your sensitive files are stored, and BlindSpot™ will create a set of digital file fingerprints that can be used to track those files across your network and systems. This ensures that an organization can know where its proprietary and sensitive information is 365/7/24, in real-time.
Supervisory Control and Data Acquisition (SCADA) Systems
Supervisory Control and Data Acquisition (SCADA) is a system for remote monitoring and control that operates with coded signals over communication channels (using typically one communication channel per remote station).
SCADA networks contain computers and applications that perform key functions in providing essential services and commodities (e.g. electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. They are part of the nation’s critical infrastructure, provide great efficiency, are widely used, and require protection from a variety of cyber threats.
One of the most significant threats is benign files residing on the computers on
the network that morph into tools that hackers can use to gain access to the
network and the equipment it monitors and/or controls. These files might be part
of the operating system (binary files), might be a normal file that includes
scripting, or can even be a general data file moved onto the computer through a
network or a USB drive. By morphing, these files circumvent detection and
countermeasures. This is just one example of how a hacker can compromise and
exploit the system and the worst part is that you will never know until it is too late!
The recent Department of Justice announcement charging Iranian hackers
believed to be tied to the 2013 hacking of a New York dam illustrates this threat
clearly.
Enter BlindSpot™’s BlindSpot™ Adaptive Security — BlindSpot™ monitors all files of all types (any format or language) without the requirement of a translator or human operator. BlindSpot™ can see right through the hacker’s camouflage of
morphing files to quickly identify problems and threats before hackers have the
opportunity to active and use their tools. For U.S. and foreign based systems,
BlindSpot™ is a must have cyber security solution.
The BlindSpot™ team has extensive experience with SCADA systems and critical infrastructure. Our BlindSpot™ solution is critical to the overall security framework of such systems as it was designed to find the morphing, malicious files and associated illicit file activity that can lead to compromise of the integrity, confidentiality and/or availability of the system. Threats loom on both the inside and outside, and the dynamic nature of these systems require continuous, temporal monitoring to stop cyber attacks before they happen.
Stop Ransomware
Identify and remove Ransomware before it encrypts your files
Ransomware attacks are on the rise and affect Fortune 500 companies, Federal
organizations, and consumers. This vicious type of attack affects your user’s ability to get their work done and prevents users from accessing files on a device or network by making the device or network unusable, by encrypting the files your users need to access, and/or by stopping certain applications from running (e.g. the web browser). A ransom is then demanded (an electronic payment of currency or bitcoins) with the promise that your data will be unencrypted and accessible again following the payment.
If the ransom payment is made, there is no guarantee that the data will be
unencrypted or returned to a state of integrity and/or availability. Furthermore,
there is also no guarantee that the people behind the ransom will not re-infect
your systems again with a variant of what was initially used. Payment encourages future attacks because they know you cannot detect it and will pay again next time. Surprisingly, there are only a handful of known ransomware files in use today (e.g. Crowti, Fakebsod). Safeguards exist that use static signatures to find exact matches for these known files, but the moment these files morph or are changed in any way they become undetectable by these solutions. BlindSpot™ digs deeper with digital file fingerprints and can find the new files, enabling you to analyze, quarantine, or delete them before they activate. This pro-active approach can be the difference between a system being protected and a system being made completely unavailable with encrypted data being held hostage for a ransom. The image below is an actual Fakebsod notification message.
BlindSpot™ uses digital file fingerprints to detect the ransomware by looking at
both partial and exact matches and can report the problem before it happens.
Ransomeware of the past attacked your personal computer and today’s variant
attacks the servers — BlindSpot™ can detect both.
Case Study: March 2016 - Two more healthcare networks are hit by ransomware targeting servers. Advice from law enforcement — pay the ransom! (They did). File backups are insufficient. Paying ransoms is costly and only encourages repeat attacks.
BlindSpot™ is the most comprehensive solution available to detect and root out
ransomware. Take charge of the situation and put BlindSpot™ to work continuously monitoring your systems.
Get BlindSpot™ Now
Commercial or Government, with multiple contract vehicles available
How Can I Get BlindSpot™?
CYBR develops and sells its adaptive enterprise cyber security software product, BlindSpot™, and provides professional services and support for BlindSpot™ implementations.
Product
BlindSpot™ Adaptive Security is a continuous monitoring enterprise solution that tracks file-based activity on the endpoint using digital file fingerprints, can identify problems and cyber threats before zero day, and can see through morphing, camouflaged (polymorphic) files to make accurate determinations of malicious files and illicit activity.
Deployment Options
BlindSpot™ can deployed as a secure cloud application for maximum flexibility, a standalone Enterprise implementation for maximum security, or the two combined in an Enterprise implementation augmented through a secure cloud gateway.
Professional Services and Training
BlindSpot™’s team of cyber security experts have the expertise to support
you by creating a holistic, enterprise security framework that consists of people,
policy, procedures and technology that will ensure a security posture that implements the best risk management strategies, tactics and operations available.
Email us at [[email protected]](mailto:[email protected]) for more information.
BlindSpot Solution Brief
June 29, 2018
POC: Shawn R. Key CEO, President
[[email protected]](mailto:[email protected])
Executive Summary and Estimated Pricing
CYBR’s BlindSpot is an enterprise cyber security solution that pro-actively identifies unknown and known malicious files and circumventive activity on endpoint devices. It is designed to interact with the CYBR Ecosystem and associated Web Portal. Distributed clients serve as the connection to the various BlindSpot server tiers.
BlindSpot identifies Illicit File Activity (IFA) and associated hacker activity via perceptive, industry standard algorithms. BlindSpot identifies exact AND similar files regardless of file type and/or language. This applies to ALL file types (e.g. documents, images, audio and video, carrier, etc.). Currently implemented safeguards and counter measures (such as anti-virus (AV), content filters and malware analysis tools) cannot address polymorphic/adaptive files and emerging threats. This introduces a massive gap in illicit file detection and leaves the enterprise open to exploitation. BlindSpot fills that void.
Additionally, corporations and government entities have a need to address known files and associated activity with regards to content and data management. The uncertainty of Intellectual Property (IP) location and propagation poses significant risk to the organization. The ability to identify the life cycle of a file (origin, source, destination, attributes and proliferation) ensures an organization knows where its proprietary, sensitive and privacy information is 365/24/7, in near real-time.
BlindSpot, is significantly different from solutions in the emerging Specialized Threat Assessment and Protection (STAP) marketplace, as it scales to meet the needs of enterprise organizations and the commercial marketplace. BlindSpot’s proprietary database consists of millions of unique, digital identifiers (hash values) that identify exact AND similar, modified files. This ensures that files existing in their original state or those which have been intentionally modified, do not circumvent detection. Our algorithms ensure near zero false positive return rates. The combinatory effect and the rare expertise of our executives and development thwarts potential competition as BlindSpot is an enterprise solution; not a tool.
The enterprise solution is provide as a license per IP address with associated appliance and/or server hardware requirements.
CYBR BlindSpot Technical Deep Dive
CYBR’s BlindSpot product is currently available as a Software as a Service) (SaaS) deployment blockchain solution and will be available as a full enterprise-install by Q2 2019. In both implementations, end-point agent software monitors the hard drive(s) of a computer or server, analyses any files that change, and reports [multiple] file hashes back to the main system. This enables the main system to effectively monitor which files could be malicious or represent intellectual property on the computers and servers within the customer’s network. By using fuzzy hashing algorithms, the system can detect polymorphic malware and intellectual property that has been partially hidden or obfuscated.
Applications
End-point (client) agent: native to each major OS as a fat client. Currently we have end-point agents for Microsoft Windows-based systems using MS .NET c# 2.0/4.5 and C++, although the c# portion will be replaced with all c++ code to increase scalability, efficiency, and security, in Q1 2016. End-point agents for Mac OS (written in Objective-C) and popular Linux platforms (written in c++) will ship in Q1/Q2 2016. Development work on the CentOS linux agent will begin in December 2015.
The Control Application enables system administrators to configure each end-point agent, the system itself, and to actively monitor and access reports on files that have been identified by the system as problematic or of interest. At this time the Control Application is able to provide configuration and monitoring services but is not yet ready for customer on-site deployment and is therefore only available in a SaaS model.
The middle-tier of the system, the Portal sever, currently runs in MS .NET and is written in c#. This tier will be upgraded to a full c++ implementation to increase scalability, efficiency, and security, in Q1 2016, and will run as a standard web server extension on a Linux platform (CentOS/Apache).
The data-tier of the system currently is running in MS SQL Server 2008/2012 and uses transact-SQL tables, but does not use any stored procedures or transactions. Although this tier is sufficient for scalability through mid to late 2016, a no-SQL version of the data tier will be developed in 2016.
The Crush server (hashing services) currently runs on MS Server 2008/2012, is written in c#/c++ and is a) being ported to run as a (c++) daemon on a standard Linux (CentOS) server, and b) being re-engineered to function as a massively parallel application (c/c++) running on NVIDIA Tesla GPU accelerated systems. The Crush server communicates with the data-tier directly and the C2 server indirectly. Multiple Crush servers can run simultaneously and are horizontally scalable and fault-tolerant.
The C2 (Command and Control) server, written in c# and being moved to c++, communicates with the data-tier directly and the Crush server and Control Application indirectly to provide scheduling, system health and integrity, and prioritization services, as well redirecting jobs to maintain fault tolerance of the back-end server components. Multiple C2 servers can run simultaneously and are horizontally scalable.
Hardware and Network:
The basic architecture of the system has two different stacks of software. First, a typical 3-tier approach isolates data storage from end-point and Control Application access with a middle-man protocol altering Portal server. In the SaaS model, the end-point and Control Application software reside on-site with the customer, and the remaining stack components reside at the SaaS hosting datacenter. The second stack consists of multiple horizontally-scalable server components that run entirely in the backend as daemons and interact primarily through the data area to provide the services that are being marketed and sold to the customers. The two stacks are kept somewhat separate from each other in order to buffer one against the other in times of extreme load and for enhanced security.
Following is a description of each software module in the system and how it relates to the others:
The system has one component for data collection (the end-point agent software, which resides on the desktop computers and servers within a deployed customer site), one component for system administration (the Control Application, which resides on a desktop computer that the customer has access to or that an analyst can access through the SaaS system), and a collection of software processes/daemons and a data storage area that comprise the back-end.
The end-point agent collects data from the end-point computer, passes it to the Portal server, which in turn stores it in the data area.
The C2 server monitors the in-flow of data from the end-points, and tasks the Crush server(s) to analyze the data and compare it to databases of known good, known bad, and watch list files, in an efficient manner.
The C2 server also provides notification to the customer of any problematic or watch-list files following the completion of the Crush server tasks.
The Crush server monitors the data area, and performs batch or real-time processing of data as instructed to by the C2 server.
Technology
CYBR’s BlindSpot software is a commercially available product that combines a small footprint end-point agent with a centralized monitoring and management system to track files and file changes on the end-point using partial-match digital fingerprints rather than rigid full-match-only file signatures. As files and data buffers are created, edited/altered, and moved either through the network or via removable media devices including USB drives, the product uses its unique and proprietary technologies in combination with industry standard technologies to identify and locate both known malware and unknown [polymorphic] malware on end-points that are continuously monitored by the product. Staff is notified, depending on the urgency or type of digital fingerprint identified, through integrations with 3rd party SIEM solutions, email/SMS transmissions, and reports that are available using the central management system. A false positive rate of partial digital fingerprint matching of ~1 in 10-12 means staff will not be bombarded with unnecessary alerts, maintaining staff efficiency.
Overview: Traditional anti-malware products use static file signatures to locate known malware but have no means of detecting unknown malware, CYBR’s product uses digital file fingerprints that can identify both partial file matches as well as full file signature matches and in doing so can locate and identify both known and unknown malware within the deployed enterprise. A combination of industry standard and publicly available algorithms and CYBR’s own proprietary algorithms, trade secrets, methods, optimizations, and intellectual property for which a patent is currently pending (which is owned solely by CYBR) are combined to form a comprehensive anti-malware platform and continuous end-point monitoring product that is completely unique in the marketplace. Through the use of our proprietary algorithms and optimizations, the product has the ability to scale to the enterprise level and can track desktops/servers as well as mobile/phone/tablet/Internet of Things (IoTs) devices.
Project Implementation: The implementation of this product would include both the commercially available BlindSpot product as well as prototypes of integration packages to connect with the on-site Security Information and Event Management (SIEM) and other systems and prototypes of end-point agents running on operating systems that are not yet available in the currently available version of the product. Both the integration and end-point agent prototypes would be based on existing modular code/functionality and would extend functionality past the currently available modules to ensure the full needs and requirements of the project are met. A full version of BlindSpot would be deployed on servers at/on the enterprise site, and prototypes of both SIEM integrations and new end-point agents would be deployed to augment the full production system. Information flow between all areas of the full system and prototypes would be tested and verified with increasing scale to ensure the level of performance required is available prior to the completion of the project.
End-point Agents: Each end-point is installed with native low-profile proprietary agent software that minimizes both its file system footprint and CPU use. The current product has a native end-point available for Microsoft Windows OSs (both desktops/tablets and servers) in production, and has native end-point agents in development/prototype stage for iOS, Android, MacOS, and RHEL/CentOS, with additional popular Linux derivatives to follow. The main job of the end-point agent is to communicate with the OS and monitor the file system for any changes in files that occur. When changes are detected, a digital file fingerprint of the file is taken and reported to the centralized data store, or cached until a later time if the centralized data store is unreachable (e,g, no cell coverage, laptop not connected to internet). The agent normally runs in “stealth-mode” and uses minimal CPU, RAM, and file system footprint so as not to disrupt the end-user’s workflow or impact system performance. Taking a digital fingerprint of a file and reporting it is very fast and thus the main job of the end-point agent is not system resource intensive. The “heavy lifting” is done on the back-end and does not burden the users or the end-point devices. Configuration of each end-point agent is conducted through the centralized management system, and changes in configuration are transmitted to the end-point agent within a few seconds (provided there is network connectivity).
Central Data Store: A collection of databases on the back end store file watch lists, known good and known bad digital file fingerprints (whitelists and blacklists containing digital file fingerprints of known malware), priority lists and configurations, end-point configurations, last-seen lists, and the full temporal accounting of all digital file fingerprints reported by end-point agents. As new threats are identified they are added to the central data store. As files on end-points change or are edited, their new digital fingerprints are added to the central data store as well. As new threats are identified though polymorphic partial matching, they are added to the known bad list as well.
Identification of Known and Unknown Malware: By comparing the databases of digital file fingerprints of known malware and digital file fingerprints of files on end-points, the product’s Crush server(s) use sophisticated algorithms to compare the partial digital file fingerprints, regardless of content of the files themselves. The product looks at the raw data (bytes) in the files when creating the digital file fingerprints and as such all file types/formats/languages are handled. This means that all file types and data in any and all languages can be compared with similar files. Binary DLLs, MS Word documents and spreadsheets (MS Excel, csv, …), JPEG images, Javascript, HTML, Executable files (.exe) — all of these files are handled by the product and known/unknown malware within them can be located using the digital file fingerprints in the centralized data store and Crush server’s analysis.
Scale, System Throughput, and Priority: A single Crush server can serve a small enterprise (100s or 1,000s of end-points), and a horizontally scalable array of Crush servers can be used to provide identification of malware for large enterprises. Similarly, databases in the central data store can be split and maintained/mirrored on several servers or run in a monolithic configuration. This makes the system highly scalable and able to be adapted to enterprises of varying sizes/scales while maintaining a good price/performance ratio. Priority lists can be designated for Crush servers such that high-priority end-points and/or high-priority malware fingerprints can be compared and identified in real-time, and similarly, low-priority lists (e.g. malware fingerprints that have not been seen in months or years) can be run in the evenings or when the system is running below normal load to ensure both immediate analysis of high-priority threats and comprehensive analysis of low-priority threats.
Integration: Several modular integration points within the product enable the straight-forward integration with 3rd party SIEM software and other reporting/management tools and systems. Distinct “notification channels” within the product are used based on the type of threat detected, the priority level of the specific threat detected, the confidence of the match (low percentage match of digital fingerprint vs high), and the location of the match (specific end-point list). Each notification channel has integration points that can be linked in with 3rd party systems so that staff are notified using software and procedures they are already familiar with and trained on (i.e., through a SIEM solution that is already begin monitored by dedicated, trained staff). Prototypes of each specific integration would need to be developed as a part of this project to match/communicate with the exact SIEM (or other) system that is in use at the deployment site in the mannemethod desired. Such a prototype would be developed for the purpose of evaluating the technical interconnectivity between systems to meet the requirements of the deployment, and following the prototype testing period, would be load-tested and stress-tested to ensure it’s performance meets the demands of a highly scalable environment, leading to a mature integration over a period of 3-6 months following the initial prototype period of 1-3 months.
Technology Section Summary: With end-points being continuously monitored by the product, both known and unknown malware threats delivered by the network and removable media will be detected and reported through SIEM system integration and direct email/SMS messages with minimal impact to the end-point (on all major OSs, including desktop and mobile). Centralized management and temporal monitoring of digital fingerprints enables the system to proactively locate and identify malware threats before zero day as well as enabling the staff to conduct their own investigations of systems either in the present or the past for forensic investigations. This makes CYBR’s BlindSpot a complete product that reaches all of the end-point devices to ensure safety and security from all types of malware threats.
Defense Utility
The blockchain’s cyber security posture will be greatly enhanced by BlindSpot. CYBR’s executive team works with various military and federal organizations and has a deep understanding of the cyber security challenges that face the enterprise today including advanced persistent threat (APT), polymorphic and pleomorphic malware, zero day attacks and the need to locate white and black files in real time. These threats have now permeated to the blockchain and must be secured.
Company and Customers
The proposed team includes CYBR, Inc. executive management and staff. The company is a works closely with its sister company, 21st Century Technologies, Inc. (21CT), which is a HUBZone certified, Small Business entity. 21CT serves as a value added reseller (VAR) for CYBR, Inc. and is currently a teammate on the DOMino classified DHS contract as a subcontractor to Raytheon.
Existing, paying customers include Stratford University, Test Pros and Devitas. The company also has integrator and VAR partner relationships with Anomali (formerly Threatstream), Lockheed Martin (Cyber and Space) and various commercial entities, which the company believes will become paying customers in 2019.
Transition and Commercialization
Our technology is a commercially available product and commercial sales have been made. The company is actively working to scale this solution to hundreds of thousands of users, which the company has deemed do-able and is in the process of horizontally scaling.
Data Rights Assertions
CYBR, Inc. currently holds a provisional patent and incorporates other trade secrets into the solution. No unreasonable restrictions (including ITAR) are placed upon the use of this intellectual property with regards to global sales.
submitted by CYBRToken to u/CYBRToken [link] [comments]

General info and list of exchanges for BUBBLETONE

We directly connect mobile network operators and end users globally on our blockchain-based marketplace. With Bubble Tone Blockchain, travelers can swiftly become legitimate local customers of any foreign operator in the country they are traveling to. They dont need to replace their SIM card, and they retain their home number. Travelers - Make calls and use data during travel worldwide at great local rates with direct connection to local operators - No need to change your SIM-card or phone number - Next generation messenger packed with amazing communication features User’s Interface part A brief demonstration how subscribers can be connected with local rates and LTE quality around the world. Operators and service providers - Any operator can become global without complex network integrations - Direct access to international telecom market with millions of new customers - Increase in revenue through distribution of value-added services Blockchain Telecom part Live demonstration of mobile carriers' interconnection via Blockchain. New Offers and Requests are created and broadcasted in real-time mode, and a new mobile profile was downloaded onto SIM-card of a subscriber. Bubbletone project consists of two main parts: Blockchain and Mobile App Bubbletone Blockchain Bubbletone replaces old-fashioned and costly roaming technology by implementing smart contracts into mobile operators' interactions. 1 Visited operator 1 Visited operator Any mobile operator can publish its own tariff plans as smart contracts ("Offers"). These Offers are visible to all operators and their subscribers Blockchain Subscriber 2 Request for mobile services abroad Home operator 3 Smart-contract ("Request") with Digital Identity hash and Financial Transaction Blockchain 4 It's enough to execute the smart-contract to receive money and identify a visitor 5 Servicing the subscriber directly by downloading its own mobile profile onto a SIM-card "over-the-air” Any mobile carrier can publish prepaid plans as smart contracts on Bubbletone Blockchain. These offers are visible to all other operators and their subscribers. When subscriber selects offer, a new smart contract is created with the subscribers digital identity and payment transaction directly to foreign operator. Sim card registered in the local mobile network Subscriber is authorized Payment is processed Service is provided Billing is transparent Tariffs are local Zero costs for operator Quality LTE / LTE+ Quick launch for operator Bubbletone GitHub Bubbletone Yellow pager Blockchain in Telecom Wiki Why big operators will join Bubbletone? Read on Medium Bubbletone App Direct connection to a local operator provides low rates and high LTE quality, with easy management using Bubbletone mobile app BETA version is already availabe in: Google PlayApp Store Marketplace connecting subscribers and local network operators globally Keeping domestic phone number during foreign trips Conference video and audio calls SMS in future - send a date and text for your SMS Burning messages Buy, keep and use domestic phone numbers in different countries 100+ other communication features Who we are: 20 years of experience in Telecom Industry Allo Incognito - our own medium-sized mobile operator in Russia since 2002 Allo Incognito Website 240k+ Premium Subscribers 42m USD Annual revenue 10k POS Bubbletone is trending
UMT Tokens 22% Network Development Fund 220 000 000 UMT 50% Crowdsale 500 000 000 UMT 20% Founders 200 000 000 UMT 7.8% Team & Community Development Fund 78 000 000 UMT 0.2% Bounty fund 2 000 000 UMT Name: UMT Type: ERC-20 Function: Used in smart contracts to perform transactions. Can be used to top up user balance to pay for telecom services Total Supply: 1 000 000 000 tokens For sale: 50% All unsold tokens will be burnt and additional release of tokens will not be possible! Checked by clearify Bubbletone ICO 01.02 10.02 Stage 1 10.02 01.03 Stage 2 02.03 10.03 Stage 3 20.04 15.06 ICO Stage ICO ETH/UMT 1 ETH = 4000 UMT Vesting No vesting Minimum 0.1 ETH ICO starts: 20.04.18, 10AM (London time) Token price: 1 ETH = 4000 UMT Hard cap: 15 000 000 USD Accepted currencies: ETH, BTC Join White List to reserve your UMT Tokens JOIN WHITE LIST Our Team Key Team
Yury Morozov CEO and Founder Co-founder of 4 active telecom companies
Oleg Pravdin CTO Telecom visionary, founder of 3 start-ups in the USA, China and Russia.
Irina Chertok Co-founder and Major Chief Board Director
Sergei Ivanov CEO of "Allo Incognito" (mobile virtual network operator)
Sergey Malcev Lead Blockchain Software Engineer
Sergey Baloyan CMO and Head of IR
Fedor Rozhnov CBDO Strategic Developer for Telco, Realized 2 MVNO-projects for Russian mobile market
Kirill Maskaev CCO and Head of PR
Maria Voronova Project Manager
Stepan Gershuni Blockchain expert, co-founder @Block Notary
Sergey Sevantsyan Blockchain expert, public speaker Developers and IT engineers team
Michael Nazarenko Lead security and fault tolerance developer
Sergey Prilutskiy Security expert, Blockchain architecture development
Sergey Lepenkov Development of payment services and high-load applications in the telecommunication field
Oleg Vintovkin Development of IT project Yandex Telephony; development BSS & OSS for mobile carriers
Yury Vasilchikov Blockchain consultant, smart contracts developer
Alexander Artemiev Bubbletone messenger architecture development, integration with mobile carriers
Jackov Mayurov Bubbletone messenger project manager
Ajmat Iqbal Bubbletone messenger software development leader
Mir Monsoor Hossain Senior software developer
Momi Monjil Ara Senior software developer
Khandaker Raihan Hossain Senior software developer
Md. Shafiqul Islam Front-end software developer
Md Maniruzzaman Back-end software developer
Alexey Makeev Smart contracts software engineer
Varun Reddy Community Relations
Mariana Bugaeva Head of design group
Advisors
Keith Teare Successful serial technology entrepreneur; Executive Chair at Accelerated Digital Ventures; TechCrunch founding shareholder and EasyNet, Europe’s first consumer Internet Service Provider
Dr. Norman Lewis Telecom expert Norman was running PWC’s innovation programme, He also worked in Orange UK as a Director of Technology Research, Founding Director of Future-Diagnosis, Executive board member of the MIT Communications Futures Programme.
Anders Larsson Anders worked in Ericsson Group for two decades to create the emerging technologies of 2G, 3G, 4G, 5G and IOT in 10 different countries Held various CTO roles and the role of Vice President for Mobile Broadband in Southeast Asia & Oceania AllcoinWiki Co-founder Top-5 Blockchain Advisor in the world
Samson Lee Founder & CEO of CoinStreet; Executive Chairman of China (Guangdong, Hong Kong, Macau) Greater Bay Area TechFin Association; Co-founder of Hong Kong Blockchain Centre; Co-Founder of Ethereum south China and south Asia communities; Chief Crypto-economic Advisor of Gibraltar Blockchain Exchange; Advisor of Universa.io; Asia President of Next.TV Inc. and Chairman of STM Digital Group.
Joakim Holmer Joakim is a telecom expert, who had experience in AT&T and Ericsson Group. 15 years in various technical leadership positions around the world. Joakim has also worked with Software System Sales. With hunger to develop that included everything from Mobile App start-ups to RedHat, SAP and Cisco. AllcoinWiki co-founder
John Mun Co-Founder of Linker Coin; John obtained his MFE at UC Berkeley, then became a Market Maker, HFT trader and General Manager at one of South Korea's leading investment institutions Woori Investments and Securities. John’s finance and engineering background supported him strongly in the blockchain industry and now is also an expert in Smart Contract development.
Gabriel Zanko Fintech entrepreneur-Advisor. Founder of MobileyourLife and involved in the AI-Fintech space providing solutions in the B2B space. ICO advisory in Fundraising Capital and International Business Development.
Professor Jin Song Dong Director of the Institute for Integrated Intelligent System, Griffith University, Australia
Gilbert A. Darrell Gilbert is founder of Horizon Communications, the innovative provider of decentralized wireless infrastructure. He has 18 years of experience in IT and Telecoms and led multiple projects for Fortune 500 companies, such as Microsoft, Energizer and Siemens.
Vladimir Sirotinskiy CEO of Lingualeo, the market leader in online English language learning. Serial entrepreneur and business consultant
Oleg Khokhlov Adviser & Legal Counsel of ICO
Oleg Khokhlov is Partner with international law firm Goltsblat BLP, the Russian practice of Berwin Leighton Paisner (BLP), headquartered in London.
Oleg was selected by peers for inclusion in The Best Lawyers in Russia 2013-2018 Editions in the field of Banking & Finance Law. He has been also highly recommended for Banking & Finance by IFLR1000 and Legal 500.
Oleg has advised leading ICOs and venture fiat/cryptofunds.
Maria Agranovskaya Blockchain and ICO Legal Expert. Managing Partner of GRAD Attorney Bar (30+ lawyers). Attorney at Law with 20+ years of experience. Working with cryptocurrency since 2010: ICO, trading, funds setup, etc. Over eight years running a multifamily office. Cross-border transactions, investments, asset management, deal and corporate structuring in various jurisdictions. M&A, international taxation Tech and Telecom leaders about Bubbletone Blockchain Roadmap Q1’2018 Initial version of smart contracts is ready.
The first “Offer” and “Request” are on the Blockchain platform. Demonstration of the platform at Mobile World Congress in Barcelona (February’18). Integration with major eSIM platforms to download mobile profiles onto SIM cards
Q2’2018 Web-API for integration of mobile operators and service providers.
Integration of Digital Identity into Bubbletone app. Commercial launch, with “Offers” from 10+ mobile operators are on Blockchain, low rates in 80+ countries.
Q3’2018 Global Mobile Profile approval by International Telecommunication Union.
Update Mini Nodes to participate in processing smart contracts. BubbleTone Blockchain – White Paper Page 25 of 31 New features in the Bubbletone app: Voting platform based on Blockchain, 4K videoconferences, transfer of fiat money and crypto currencies
Q4’2018 Expanding list of mobile operators and service providers connected to Bubbletone Blockchain Ecosystem.
The first 1 million transactions are processed
Q1-Q4’2019 Signing agreements with mobile operators worldwide to activate the Global Mobile Profile.
First prototype of a global SIM-chip to be embedded into mobile devices. Expanding list of mobile operators and service providers connected to the Bubbletone Blockchain Ecosystem. 10 million transactions are processed
Partners
Bubbletone Community around the world Bubbletone Worldwide Tour Past Events May 14-16 TMForum, Nice, France May 14-16 Coindesk Consensus 2018, New York, USA May 2-3 Future Blockchain Summit, Dubai May 1-3 IOTX 2018, Dubai April 26-27 World Blockchain Summit, Moscow, Russia April 23-26 MVNO World Congress, Madrid, Spain April 18-19 Blockchain Expo, London, UK April 17-18 Blockchain Conference, Moscow, Russia April 16-17 World Blockchain Forum, Dubai April 8 Blockchain Tomorrow 21, Seoul, Korea April 4 Blockchain Conference, Berlin, Germany March 28 Blockchain Conference, Tel Aviv, Israel March 22 Tallinn Blockchain Conference, Tallinn, Estonia March 21-22 Cryprocurrency World Expo, Berlin, Germany 26 February - 01 March Mobile World Congress in Barcelona March 10 Crypto Investor Show, London, UK March 7-8 Blockchain Summit Zurich 2018, Zurich, Switzerland March 3-6 D10E Fintech Conference, Seoul, Korea March 2 Bubbletone Meet-Up, Singapore March 1 Blockchain & Bitcoin Conference, Istanbul, Turkey February 23 7th Korea Blockchain Symposium, Seoul February 27-28 Singapore Blockchain Summit 2018, Singapore 25-26 January Cryptoeconomy ICO London 22-24 January London Blockchain Week 2018 14 December Big ICO Roadshow, Moscow, Russia 8 December Crypto Space, Moscow, Russia 29-30 November Blockchain Expo in Santa Clara, California (booth 419) 29-30 November Block Show Asia in Singapore 14-15 November Telecom Conference in London 24-25 October World Blockchain Summit in Dubai 8-12 October GITEX Technology Week in Dubai, Stand E3-6 3-5 October Blockchain Solution Forum in Barcelona, Stand №100 26-27 September Telecom Conference in Singapore 25-26 September World Blockchain Forum in London FAQ How can I buy your tokens? Which cryptocurrencies are accepted? Which wallet should I use to receive tokens? What is the goal of your project? Is your product already working? Do you have a prototype or a beta version? Why do you have a blockchain in your project? How is your system going to expand? What are advantages for Node owners? What are the advantages of BubbleTone messenger? How do I operate all these other Sims on my phone? JOIN US
Kucoin
Binance
Bit-Z
Bibox
Linkcoin
Qryptos
submitted by cryptoinvestor2020 to BUBBLETONE [link] [comments]

BTC BITCOIN MINER V.3.2.1 BY RH 2020 Legit Proof Withdraw 0.5 BTC Full Registered July 19, 2020 Beginner’s Guide #12: Bitcoin Privacy & OpSec with Jameson Lopp BLOCKCHAIN HACK 100% WORKING! Bitcoins Hack Instantly! How To Hack Bitcoin Wallet 2020! GoTenna Mesh Review: How To Send Messages Without Data (and BTC ) NEW RECORD Set on the Bitcoin SV blockchain & WARNING about XRP

Amazon.in - Buy Mastering Bitcoin: Programming the Open Blockchain book online at best prices in India on Amazon.in. Read Mastering Bitcoin: Programming the Open Blockchain book reviews & author details and more at Amazon.in. Free delivery on qualified orders. Since bitcoin conversions are processed on a blockchain, security analysts can trace transactions to determine the root cause of a ransomware attack. SMS or social media. security analysts The blockstream satellite is an ambitious project streaming radio broadcasts from space to help those without internet access to benefit and use the Bitcoin blockchain. The company Blockstream have so far leased out bandwidth on 3 satellites in a move which may sound far-fetched but it simply means blockchain data is being broadcasted in the 1. Introduction. Blockchain Access UK Ltd is a company incorporated in England & Wales under registered number 11337627. Blockchain.com operates the website www.blockchain.com (the Site) and the Blockchain.com Platform (defined below) and provides related services (the Services).. By accepting this Agreement, you agree with and accept all of the policies published on the Site from time to time Blockchain is ``an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way”. 4 Although virtual currencies such as Bitcoin are the typical examples of its application, blockchain has started to have an impact on the legal system and particularly rules of evidence. 5 In theory

[index] [3546] [9870] [14255] [16690] [24142] [4614] [30375] [739] [30319] [29781]

BTC BITCOIN MINER V.3.2.1 BY RH 2020 Legit Proof Withdraw 0.5 BTC Full Registered July 19, 2020

Coinpedia Podcast is a Blockchain and Cryptocurrency news channel. Enjoy audio news on latest Bitcoin, Ethereum, Ripple, Blockchain events, Interviews and everything that is happening in the ... Bitcoin SV miner Mempool has mined first 103.8 MB block (block 563638) containing 460,400 transactions. This celebrates 10yr anniversary of the Bitcoin syste... How does a blockchain work - Simply Explained by Simply Explained. 6:00. What Is Bitcoin and How Does It Work? Mashable Explains ... (OFFICIAL VIDEO) sms skiza 7301072 to 811 by Otile Brown ... Gives audio flash alerts, color coded candles, sms alerts also available when signal triggers. ... Blockchain Backer 1,101 views. ... Bitcoin explained and made simple ... In Part 12 of the Beginner's Guide to Bitcoin, I talk to Jameson Lopp, co-founder and CTO at Casa, and renowned Bitcoin privacy expert. We discuss Bitcoin privacy, best practices and operational ...

Flag Counter