Bitcoin - The Hidden Wiki

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to privacycoins [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to CryptoCurrencies [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethtrader [link] [comments]

Post-Battle Assessments, Future Possibilities, Meta, Mission Creep, Commentary and Ideas

Greetings!
I've been sick for a few days and I'm a little fuzzy right now, so please forgive any typos and so forth. I find when I'm not feeling well and need to occupy my brain with something is the best time to ponder about big ideas and events and the meanings and possibilities thereof, and I actually have the time to put fingers to keys and try to make sense of such things with my typical walls of text. I'd like to address several things here, so let's get started.
First off, is a postmortem of the Wiki Month celebration for #GG's 5th anniversary. I'm proud to say that most of my "big ideas" have lead to success in one degree or another over the past half decade, but this was not one of them. Apart from our resident hero u/Mikisayaka33 and a few others, turnout for the #GG Wiki party was very small. This is mitigated by several factors including:
The deplatforming of 8chan and scattering of the #GG community there The split between KiA and KiA2 absorbing a ton of the Reddit community's creative energy The banning of Mombot and with her the last major central node in the old #GG Twitter network
With so much going on, I couldn't expect that many people were going to take a great deal of time to do the fiddly, exacting work needed to make good articles on a Wiki about troubles in the world of interactive Mongolian flipbook paintings. Nevertheless, good work has been done there. Hopefully it will continue to pay dividends.
Secondly, let's talk about 8chan. As many of you are doubtlessly aware, 8chan was taken offline by Cloudflare around August 10th, as we were in the middle of planning for #GG's anniversary events and shitposting away. Almost simultaneously, the Reddit community 8chan was shut down and a huge schism erupted here over the board staff's behavior, leading to the explosive growth of KiA2. In the month of August, almost on top of the 5th year anniversary, an entire #GG hub community found itself scattered to the wind and another fractured in half. Shortly thereafter, the last BIG #GG voice on social media was suspended. To top it all off 8chan's previous owner, Frederick (Hotwheels) Brennan, pulled a face-heel turn and went on a crusade against 8chan. He went so far as to team up with corrupt journalists on Twitter to put pressure on the site owners, to such an extent as to file paperwork to get the owner's citizenship requests revoked in the Philippines. He has alluded to using the substantial Bitcoin donations that 8chan users once contributed to him to pay for DDoS attacks on the site, threatened to write and release an open source flood script to keep it offline, completely reversed his stances on Internet censorship and free speech, and recently came out as a furry. It's been a rough four months for the goodguys. Maybe by design, as #GG as a whole seemed to suffer a "perfect storm" of events that disrupted us in ways very convenient for certain parties.
All that being said, 8chan is finally back online and recovering at its new address of 8kun.top. /gamergatehq/ has returned as well, addressed in the customary fashion. The site is working out a few minor bugs, but the communities are finally starting to recover, and the site now has its own in-house DDoS prevention software that is keeping the jackals mostly at bay. Our large communities survived in the interim by turning to the darknet as well as a self-healing clearnet Webring of "bunker" sites. The second largest of these bunkers is still online and holding a significant part of 8chan's old userbase, and it remains to be seen if they will be coming home or staying put. For #GG's part we should be recovered enough to get some things done within the coming weeks, probably after the Christmas Stalingrad season. Related to the subject of 8chan and #GG, I think its finally time for me to weigh in a bit on the KiA meta issues in a public manner. Lord knows I don't have to tell anybody here, mods or users, anything about the problems your board is facing. I have my private thoughts on that and I've made them known to the staff already. But what hasn't ever been addressed amounts to a pair of elephants in the room, and I would like to spare some oxygen to talk about them.
The first thing is a brief reminder of who your allies are. When #GamerGate kicked off, the pro-#GG side began as a huge coalition centered around three hubs: The imageboard community, KiA, and Twitter Front. Each served a different purpose: Small and classically nasty, 8chan did most of the planning and think-tank work, and had an informal network of people (including yours truly) carrying information back and forth between the three hubs and helping everyone coordinate. Huge and mild-mannered KiA could throw weight of numbers behind operations and served as a fantastic recruitment ground on the normie Internet. And chaotic Twitter could raise hell, apply social pressure, and grant massive public exposure to our efforts. A great system that we all collectively leveraged to great effect. There's just one problem: KiA seems to have forgotten who the 8chan hub is made up of. 8chan #GG was comprised of three factions. A hidden hub (/v/ #GG), a public "honeypot" hub (/gg/ - /gghq/), and the "Shekel Shoah" operation (/pol/).
Yes, THAT /pol/
Not to put too fine a point on it, but your allies in this thing from day one, including the minds behind Operation Disrespectful Nod, have been /pol/ in all their warts and triumphs, and to this day 8chan #GG remains a joint /pol/-/v/ project. How this was common knowledge in 2014-2015 and has somehow slipped beyond the veil of the obvious here beats me. You already know, in your heart of hearts, why I'm bringing this up. As a moderate lurker with intimate knowledge of the hub communities it has become quite apparent to me that the KiA of today has manifested something beyond the "agree to disagree" deference that signified that branch of the alliance for the first few years. There is a certain visible intolerance of "/pol/-types" on the part of both the mods and the community that has taken root here, that was not here in the first two or three years, and that is (at least in my opinion) fueling a good portion of your community fracture. /pol/, for their part, has never liked Reddit, but have always been happy to work together with this specific community in accomplishing a common goal. It is with high irony that I can state that they are more tolerant than you are, at this point. Those are sharp words, but they're sharp for the sake of honesty and not for the sake of insult. In the beginning we all set our political and cultural differences aside and became one community. Now something has elevated political differences in importance and we are fracturing as a result. From my experience, KiA2 resonates with more of the original "attitude" that once defined KiA. A certain moderated rowdiness and willingness to disregard our differences that I can't quite put to words. And yet it still feels like it is missing something from the absence of respectable viewpoints and personae that remain cloistered here. Pause and give that some thought if you will, before you read into the next paragraph.
Much has been said, including by myself, on the subject of "mission creep." We had no shortage of people pushing for #GG to be about more than just gaming media, even as far back as December of the first year. They were roundly, and loudly, and repeatedly, and rightly told to stuff it by the majority. To paraphrase IA in the Quinnspiracy videos, "if all of us together can't even clean up something as puny as the gaming media, what hope does anyone have of fixing the bigger issues?" Keep focus. Stay on target. Keep digging. Send those emails. And damn if we didn't! Millions in ad revenue up in flames, Gawker torpedoed, enough corporate fear and fury to deluge us in hitpieces and hate articles and we just surfed the wave higher as we watched them sink all the while. Any suggested diversion from that path immediately reeked of shill tactics. An underhanded effort to unfocus the autism laser. Indeed we had a traitor faction within our own ranks create and propagate the "ethics cuck" meme specifically to split our community and drive us toward politics and anti-SJW warfare instead of fighting our war in gaming. I personally fought alongside many others to put a stop to that. That happened in 2015! But whereas our victories are almost universally counted in what we have destroyed, not much gets said about the culture #GamerGate created.
Tech-savvy and Internet savvy meme connoisseurs Wide awake and aware of media propaganda and bias (redpilled) A developed taste for grassroots activism A developed hatred for censorship, whether in art or points of view
One quarter million people, with a reach of over three million. That's how big #GG was at our peak. Smaller forces have toppled governments. Now consider the state of the gaming media today, compared to pre-#GG. Yes, its still trash. But for years now the likes of Kotaku haven't dared to antagonize and demonize gamers the way they did to us in 2014. They learned a very painful lesson. Undisclosed conflicts of interest are much more rare now as well. While they're still pumping out "woke" garbage articles and clickbait, the original cassus belli of #GG has largely gone away since the fight was never about their generic quality but rather their brazen collusion to attack and silence gamer culture. Its only if you're holding out for vindication of #GG, an apology for their past behavior, or engaging (as in my case with Kuchera) a blood vendetta against the few remaining figures in our rogue's gallery that #GG's original conflict really has any gas left in it. We've been in "watchdog mode" for nearly four years, and there has been comparatively little to watch. That isn't a judgement, but I think its a valid (and somewhat welcome) observation. We have no realistic power to make the games media good, but we succeeded in hurting them as payback, and making them more ethical to prevent further big issues. For the main, basic, simplest goal that more or less everyone agreed with in 2014, #GamerGate has apparently won the war. Or at least reduced it to no more than an occasional mopping-up operation. Now all those SJW-aware, redpilled, Internet savvy gamers who hate media bias and censorship and have a taste for activism can just go home.
There is a fly in that ointment, however. Over the long course of #GG we learned something about our opponents in the media. Both in the games media that created the lies about us from whole cloth, and the mainstream media who happily backed their play to spin a narrative: We learned their motivations. Beginning with GamesJournoPros we learned that the major players and gatekeepers in the games media shared certain political sensibilities that justified everything they did. When they colluded behind closed doors, it was with other people who shared their political sensibilities. When they circled the wagons and defended each other from criticism, it was on the basis of their political sensibilities. When they lashed out at gamer culture it was to direct others who shared their political sensibilities to attack us. When we appealed to higher authorities we were denied on the basis of different political sensibilities. When our voices were censored from seemingly the entire Internet, it was on the basis of not having the right political sensibilities. When Wikileaks took notice of us, they warned us that the corruption and bias we were seeing was "mirrored at the very top." And for #GG's culture who is now aware and sensitive to the presence of media bias and corruption and who have knowledge of these motivations, we can now see those same political sensibilities driving enormous problems at every level of life from local politics to Hollywood to Presidential elections. And for people with a taste for activism, it is not something that can be dismissed as "not my problem" while still being true to yourself. There are four lights, afterall. With this state of affairs looming in the foreground, there is a very reasonable appeal in using the downtime resident in "watchdog mode" #GG to think and talk about the bigger problems stemming from the same sources, and perhaps eventually formulating some sort of activist solutions to improve the situation. In 2014, 2015, or in my opinion even 2016 I would argue that this would be "mission creep." Premature and dangerous with so much still up in the air. Today, five years hence and with so little on our plate, it now seems much more like a natural evolution of goals driven by the core culture of #GamerGate itself. The community is changing its goals because it has grown into change, and not because its hand is being forced or manipulated. Take a moment to reflect on this, and then consider the events and attitudes that split your community in light of it, and perhaps things will become more understandable without the animosity. Its better to have strange bedfellows than to fight alone.
Finally I would like to address something that I think is sorely needed. The few of you who know me personally know I already have more project irons in the fire than I can handle on a given day, so I'd like to pitch this as an idea to the more Reddit-savvy technical folks here. I call the concept "Salvation." Imagine a custom fork of Gab's open-source Dissenter application, but tailor-made for Reddit. Allowing anyone to comment and reply to any Reddit thread via a third party overlay that the Reddit admins have no power to enforce against.
Imagine it. You could post whatever you wanted "on Reddit" again. The use of such an app could be integrated into a board's culture. On the surface where normies lurk you would see only the clean, advertiser friendly milquetoast nonsense of the Reddit administrators. Yet then established members of the community could go beneath and say what they really think with no oversight from Reddit's admin staff. Real discussions and activism could happen again, using Reddits infrastructure to build and maintain communities, and yet placing the dedicated members beyond the reach of Reddits Byzantine TOS and redname whimsy. Free speech could be restored sitewide for the cost of a browser app and a sticky telling everyone where to find it.
Thank you as always for reading. Cheers, KiA.
submitted by AcidOverlord to KotakuInAction [link] [comments]

Spreading Crypto: How Protocols Reach Mainstream Adoption

Spreading Crypto: How Protocols Reach Mainstream Adoption
This is the first post of our Spreading Crypto series where we take a deep dive into what it’ll take to help this technology reach broader adoption. We look at some of the obstacles holding it back and what strategies we think will be successful.
Mick Hagen (FoundeCEO) talking about protocols and how they become adopted
Like many others working in crypto, I really want to see this tech reach a larger audience. I’ve been drinking crypto kool-aid for awhile now. I bought my first Bitcoin in 2013 and have been working full-time with decentralized protocols since 2014. I’ve been through the peaks of the bull market down to the depths of the bear market. Multiple times. I would not be all-in on this technology if I wasn’t a true believer.
I obviously hope that Genesis Block will play an important role. But this goes beyond self-interest. I think for most of us in the industry, increasing crypto adoption is not about money.
It’s not about dumping our bags on retail. But rather it’s about the positive impact we believe this technology can have on the lives and societies all around us.
So, how do we bring this to the masses? How do we rid ourselves of the reputational damage that came with Mt Gox and dark markets like Silk Road? How do we make this technology easier for the normals to use? Today we start answering those questions.
---

Protocols 101

Most of the products and services that we all enjoy today use protocols that are under the hood, operating in the background. For example, when you send someone an email you’re using a protocol called SMTP. When you browse the web, you’re using the HTTP protocol.
Protocols allow for applications, computers, and devices to interact with each other. They are similar to a spoken language, where they have their own set of rules and vocabulary. If two people share the same language, they can communicate with each other.
Protocols are usually hard for the common person to understand because they’re very technical and provide no user interface. There are a few rare cases where the protocols themselves have made it into the cultural lingo, like Bluetooth, WiFi, and SMS. But for the most part, protocols are invisible and hidden from end-users.
Other protocols that have reached broad adoption

Protocol Adoption

The world did not embrace the web when the TCP/IP or HTTP protocols were first invented. Nor did they start using email when the POP, SMTP, or IMAP protocols were invented. The masses started browsing the web when AOL and Netscape were launched. They started using email when Hotmail and Gmail went live.
Protocols become adopted when an application makes them more accessible and easier to use.
Protocols become adopted when a strong team abstracts away the complexity, and delivers a compelling product experience that solves a real user pain. This is a pattern that has repeated throughout the history of technology.
Other examples include XMPP (chat), VoIP (internet audio calls), WebRTC (video conferencing), and NFC (close-contact device communication). Those protocols weren’t widely adopted until the launch of applications like AIM, WhatsApp, Skype, Google Hangouts, and Apple Pay.
Protocols become adopted when the killer application arrives.
Screenshots of Netscape and Hotmail

Crypto Protocols

If history is any indication, crypto and blockchain will be no different. Bitcoin is a protocol. Ethereum is a protocol. Decentralized Finance (DeFi) is filled with low-level protocols. What many out there don’t realize — and those within our industry don’t like to acknowledge — is that Crypto today is mostly all protocols.
Decentralized protocols won’t be replacing Robinhood, SoFi, or Venmo anytime soon. They never will. They aren’t meant to!
Crypto protocols are the building blocks, the lego pieces, the primitives that developers can use to build applications on top of.
As with the numerous protocols that came before, these innovative protocols need world-class applications. They need product experiences that can propel this exciting tech to the masses. Crypto needs great product teams that abstract away all the blockchain complexity, and deliver it in a way that is simple, convenient, and powerful.
Decentralized protocols are like lego pieces

Crypto Industry

Protocols usually operate in the background. So it should be no surprise that interacting directly with crypto and decentralized protocols is raw, rough, confusing, and complicated for most “normal” people out there.
Most of the crypto industry today is still focused on protocol development. That’s totally fine — we’re still at the early stages of this entire industry.
But because of that protocol focus, it should be no surprise to any of us that we still haven’t seen mainstream adoption.
But as an industry, we cannot forget or lose sight of what it takes to reach the masses. As Mark Twain said, “history doesn’t repeat itself, but it often rhymes.”
If we want these exciting protocols to be adopted by billions of people around the world, we’re gonna need killer applications. Just like every protocol before.
In our next post, we’ll explore the current state of application development within crypto. Are we getting closer to that killer app? What will it look like? How do we achieve it? Stay tuned, that’s all coming next.
---
Other links related to this episode:
Have you already downloaded the app? We're Genesis Block, a new digital bank that's powered by crypto & decentralized protocols. The app is live in the App Store (iOS & Android). Get the link to download at https://genesisblock.com/download
We have a lot more content coming. Be sure to follow our channels: https://genesisblock.com/follow/
submitted by mickhagen to genesisblockhq [link] [comments]

The Statue of Liberty, Mystery Babylon, Freemasonry and The New Roman Empire / Fourth Reich

The Mother of Exiles and the Destruction of Babylon

I've always thought Mystery Babylon in Revelations was America. Lots of signs point to that. Inanna/Ishtar was known as the Whore of Babylon and Mother of Prostitutes because she supposedly started the practice of sacred prostitution. Inanna was the goddess of love, beauty, sex, desire, fertility, war, combat, justice, and political power.
https://en.wikipedia.org/wiki/Sacred_prostitution
Sacred prostitution, temple prostitution, cult prostitution,[1] and religious prostitution are general terms for a sexual rite consisting of sexual intercourse or other sexual activity performed in the context of religious worship, perhaps as a form of fertility rite or divine marriage (hieros gamos). Some scholars prefer the term sacred sex to sacred prostitution in cases where payment for services was not involved.
But some scholars believe that this practice never existed and has been misunderstood.
The practice of sacred prostitution has not been substantiated in any Ancient Near Eastern cultures, despite many popular descriptions of the habit.[7] Through the twentieth century, scholars generally believed that a form of sacred marriage rite or hieros gamos was staged between the king of a Sumerian city-state and the High Priestess of Inanna, the Sumerian goddess of sexual love, fertility, and warfare, but no certain evidence has survived to prove that sexual intercourse was included. Along the Tigris and Euphrates rivers there was a temple of Eanna, meaning house of heaven[8] dedicated to Inanna in the Eanna District of Uruk.This will be relevant in my next post about the source of Yahweh's narcissism but for now, I'm just using this to illustrate part of the reason I think America is Babylon.
http://4.bp.blogspot.com/-KlpGZ9JO_d4/U0P2Y-3kfEI/AAAAAAAAMJs/PEwa9mPU67w/s1600/Lady+Liberty+-+Statue+of+Liberty+-+Inanna+-+Ishtar+-+Anunnaki.jpg
https://2.bp.blogspot.com/-tSRx02UBNgI/U0P3ep3x4TI/AAAAAAAAMJ0/rtpe2JWA2ew/s1600/Roman+statue+goddess+libertas+-+staue+of+liberty.jpg
The Statue of Liberty is a representation of the Roman goddess Libertas. Which is a goddess that derived from many other goddesses: Inanna, Ishtar, Isis, Aphrodite, Venus, etc. Ultimately this goddess was transformed in a personification of America and liberty called Columbia. And just like Inanna, is it any wonder America seems to have 2 split sides to it? One side that is sexually repressed and all about virtue. And another that is obsessed with sex, violence, war
https://en.wikipedia.org/wiki/Columbia_(name)
There's also the fact that the way Babylon is described sounds a lot like America. Getting the whole world drunk on our luxuries and riches, being arrogant and being fools who know nothing. This sounds like America too.
The Sumerians worshipped Inanna as the goddess of both warfare and sexuality. Unlike other gods, whose roles were static and whose domains were limited, the stories of Inanna describe her as moving from conquest to conquest. She was portrayed as young and impetuous, constantly striving for more power than she had been allotted.
Inanna also was depicted as riding a Lion and she associated with the planet Venus.
https://i.pinimg.com/originals/fc/b2/6e/fcb26ee6c838d85f53dada348b1d9863.jpg
http://www.mesopotamiangods.com/wp-content/uploads/2014/08/3a-Anu-Inanna-1.jpg
https://goddessinspired.files.wordpress.com/2012/06/inanna-descent.jpg
Regulus is a part of the constellation Leo and considered "the heart of the lion". Considering Regulus is a very important star in Trump's birth chart apparently, and that star was known as The King in Babylon (known as the little king as well in other places), that would make Trump the King of Babylon.
In 2014, Regulus was eclipsed by an asteroid for 14 seconds right over New York.
https://www.nymetroweather.com/tag/regulus/
An asteroid will pass directly in front of Regulus, one of the brightest stars in our night sky, next Wednesday — briefly blacking out the star in what astronomers are calling a “once in a lifetime” event. Better yet, New York City falls directly within the viewing path which is literally paper-thin on the earths scale. The event is so small, and so brief, that it will only be visible over a sliver of area. And this area happens to encompass millions of people in New York City, Northeast NJ and Long Island.
https://www.space.com/25084-regulus-star-lion-constellation-leo.html
On Thursday, March 20 2014, Regulus will participate in a rare celestial event when an asteroid passes directly in front of the star, as seen from Earth. The asteroid in question is 163 Erigone. Asteroid 163 Erigone is about 45 miles (72 km) wide, but its "shadow" slanting to Earth's surface will be 67 miles (108 km) wide.
Erigone's shadow will move on a southeast-to-northwest trajectory and will extend from New York City as well as western and central Long Island to Oswego in New York State, and then continues northwest, the length of Ontario to the Hudson Bay shore of Manitoba. Those who are within the shadow path and watching at just the right moment with just their eyes will see an amazing sight: Regulus will seem to abruptly disappear as if a switch had been thrown, blotted out by the tiny invisible asteroid.
Regulus will remain invisible for up to 14 seconds (for those situated along the center of the path); an incredible, albeit very brief occurrence.
This "once in a lifetime event" eclipsing right over New York. Where the Statue of Liberty is.
Revelations 17
There I saw a woman sitting on a scarlet beast that was covered with blasphemous names and had seven heads and ten horns. 4 The woman was dressed in purple and scarlet, and was glittering with gold, precious stones and pearls. She held a golden cup in her hand, filled with abominable things and the filth of her adulteries. 5 The name written on her forehead was a mystery:
15 Then the angel said to me, “The waters you saw, where the prostitute sits, are peoples, multitudes, nations and languages. 16 The beast and the ten horns you saw will hate the prostitute. They will bring her to ruin and leave her naked; they will eat her flesh and burn her with fire. 17 For God has put it into their hearts to accomplish his purpose by agreeing to hand over to the beast their royal authority, until God’s words are fulfilled. 18 The woman you saw is the great city that rules over the kings of the earth.”
America's colors are red, white and blue. Red+Blue = Purple. Purple apparently represents royalty as well as vanity. Scarlet represents the blood of Christ and martyrs.
The woman was dressed in purple and scarlet
https://en.wikipedia.org/wiki/Purple
The color purple is also associated with royalty in Christianity, being one of the three traditional offices of Jesus Christ, i. e. king, although such a symbolism was assumed from the earlier Roman association or at least also employed by the ancient Romans.
In Europe and America, purple is the color most associated with vanity, extravagance, and individualism. Among the seven major sins, it represents vanity. It is a color which is used to attract attention
https://en.wikipedia.org/wiki/Scarlet_(color)
In the Roman Catholic Church, scarlet is the color worn by a cardinal, and is associated with the blood of Christ and the Christian martyrs, and with sacrifice.
According to this, the creator wanted the Statue of Liberty to be covered in gold.
and was glittering with gold
https://parade.com/311395/viannguyen/10-things-you-didnt-know-about-the-statue-of-liberty-she-was-almost-gold/
**8.Bartholdi planned for the statue to be covered in gold.**In order to make the statue visible after dark, Bartholdi proposed that Americans raise the money to gild her. However, given how daunting and arduous a task it had been to gather even enough money to place the statue in New York harbor, no one followed through on paying the enormous cost of covering the massive statue in gold.
Not to mention this little interesting fact that brings the 2nd Beasts actions that are spoken of to mind.
:The second beast was given power to give breath to the image of the first beast, so that the image could speak and cause all who refused to worship the image to be killed.
:**9. Thomas Edison once had plans to make the statue talk.**When Edison introduced the phonograph to the public in 1878, he told the newspapers that he was designing a “monster disc” for the interior of the Statue of Liberty that would allow the statue to deliver speeches that could be heard up to the northern part of Manhattan and across the bay. Thankfully, no one pursued that strange promise, which would have led to the odd experience of walking in New York and suddenly hearing the Statue of Liberty “talking.”
precious stones and pearls.
http://justfunfacts.com/interesting-facts-about-the-statue-of-liberty/
There are 25 windows in the crown which symbolize gemstones found on the earth and the heaven’s rays shining over the world.
https://www.theatlantic.com/technology/archive/2016/10/that-time-the-statue-of-liberty-almost-got-a-glowing-wrist-watch/504110/
The sculptor Frédéric Auguste Bartholdi designed the statue to be fully illuminated, a feature that’s suggested in its official name, “La Liberté Eclairant le Monde,” or “Liberty Enlightening the World.” (At first the Statue of Liberty doubled as a lighthouse, given its position in the New York Harbor, but that didn’t last: It was decommissioned as such in 1902.)
Originally the lighting scheme was to be red, white, and blue—with a giant searchlight trained on the statue’s face and shoulders. Officials claimed in 19th-century newspaper accounts that they would make the statue so bright as to cast a glow on the clouds of the night sky 100 miles away. The statue’s face was to be lit by a reflector so bright that newspapers described it as “4 million candle power.” Her diadem was meant to sparkle with electric light. These were lofty goals in the dawn of the electrical age, and they carried symbolism that has lost much of its potency now that electricity is taken for granted.
https://thumbs.dreamstime.com/b/torch-statue-liberty-closeup-isolated-white-background-56181619.jpg
She held a golden cup in her hand, filled with abominable things and the filth of her adulteries.
In the torch, the flames are covered in gold. Looks enough like a cup. Also, in Isaiah 14:12 (another prophecy detailing the fall of Babylon that I didn't bother copying and pasting all of here) it refers to Babylon (or it's king) as "Lucifer, son of the morning". Lucifer means "light bringer" (hence the torch and the statue's original name being Liberty Enlightening the World) or "morning star" which is another name for the planet Venus which is associated with Inanna/Ishtar.
How art thou fallen from heaven, O Lucifer, son of the morning! how art thou cut down to the ground, which didst weaken the nations!
https://twistedsifter.files.wordpress.com/2014/07/statue-of-liberty-from-above-aerial-satellite-photo.jpg
Notice how that star shape has 11 points? Seems like a strange number.
The beast and the ten horns you saw will hate the prostitute. They will bring her to ruin and leave her naked; they will eat her flesh and burn her with fire. 17 For God has put it into their hearts to accomplish his purpose by agreeing to hand over to the beast their royal authority
The 10 kings + the beast = 11.
The seven heads are seven hills on which the woman sits. They are also seven kings.
It has 7 spikes coming out of the head.
https://timedotcom.files.wordpress.com/2013/06/01_00240318.jpg?quality=85
We're a very diverse country and Lady Liberty represents us taking in people from all countries. We pretty much control the world (for now) as the 7 hills represents the 7 continents, which is literally what is said they represent. Plus she's literally sitting on an island in the water.
Then the angel said to me, “The waters you saw, where the prostitute sits, are peoples, multitudes, nations and languages.
The creator of the Statue of Liberty, Frédéric Auguste Bartholdi, was a Freemason and they placed this plaque at the base of the statue.
https://untappedcities-wpengine.netdna-ssl.com/wp-content/uploads/iyftc1oqf704bytwz45ub151.wpengine.netdna-cdn.com/wp-content/uploads/2014/11/Statue-of-Liberty-Freemason-Cornerstone-NYC.jpg
Masonic theories abound about the Statue of Liberty’s connection to the masons. Those who do ascribe to the theory cite Bartholdi’s and Eiffel’s membership in the Freemasons, that many original plans for the statue demonstrate the link and that many elements of the statue carry symbolic meaning.
In addition, the masons presided over the cornerstone laying for the Statue of Liberty, a moment commemorated in a 1984 plaque in dedication to the masons on the 100th anniversary. In 1884, the grand master William A. Brodie laid the cornerstone with grand lodge members present. Brodie is reported to have said, “Why call upon the Masonic Fraternity to lay the cornerstone of such a structure as is here to be erected? No institution has done more to promote liberty and to free men from the trammels and chains of ignorance and tyranny than has Freemasonry.”
Then there's the poem that is inside the base.
The New Colossus
Not like the brazen giant of Greek fame,With conquering limbs astride from land to land;Here at our sea-washed, sunset gates shall standA mighty woman with a torch, whose flameIs the imprisoned lightning, and her nameMOTHER OF EXILES. From her beacon-handGlows world-wide welcome; her mild eyes commandThe air-bridged harbor that twin cities frame.
"Keep, ancient lands, your storied pomp!" cries sheWith silent lips. "Give me your tired, your poor,Your huddled masses yearning to breathe free,The wretched refuse of your teeming shore.Send these, the homeless, tempest-tost to me,I lift my lamp beside the golden door!"
The Mother of exiles.

Prophecies of the Destruction of Babylon / America / New York

Jeremiah 51
45 “Come out of her, my people!Run for your lives!Run from the fierce anger of the Lord.46 Do not lose heart or be afraidwhen rumors are heard in the land;one rumor comes this year, another the next,rumors of violence in the landand of ruler against ruler.47 For the time will surely comewhen I will punish the idols of Babylon;her whole land will be disgraced
Well, we're definitely hearing of rumors of violence here in America and if there aren't rumors of ruler against ruler, we're going hear them soon.
The Bible details the destruction of Babylon a few different times. Mystery Babylon seems to be a new Babylon, different than the one in Biblical times, that gets destroyed at the end. Everything described here sounds like America and the King of Babylon being Trump. The capital being New York.
With the eclipse of Regulus in 2014 for 14 seconds right over New York. I think they might get hit with something major. Maybe a hurricane. This season is suppose to be bad and FEMA is saying they are completely unprepared. I'm sure that wasn't on purpose or anything. I think maybe a big earthquake might happen soon too in the next month. Seeing a lot of weird shit. A lot of polarity with the planets and asteroids. I think it's all connected to our polarity as the Trump Delusion continues. You seeing these reports and videos of these racist people just saying mean shit to people all over the place now for no reason? They're lashing out because they're scared their delusion bubble might burst so they're acting out. It's only going to escalate until both sides completely lose their fucking minds.
OLD TESTAMENT, ISAIAH, JERMEMIAH
https://www.biblegateway.com/passage/?search=Isaiah+13&version=NIV
https://www.biblegateway.com/passage/?search=Isaiah+14&version=NIV
https://www.biblegateway.com/passage/?search=Isaiah+21&version=NIV
https://www.biblegateway.com/passage/?search=Jeremiah+50&version=NIV
https://www.biblegateway.com/passage/?search=Jeremiah+51&version=NIV
NEW TESTAMENT, BOOK OF REVELATIONS
https://www.biblegateway.com/passage/?search=Revelation+17&version=NIV
https://www.biblegateway.com/passage/?search=Revelation+18&version=NIV
https://www.biblegateway.com/passage/?search=Revelation+19&version=NIV

The New Roman Empire / Fourth Reich & The Double Headed Eagle of Lagash

http://watchmanscry.com/?p=6230
Welcome to General Election 2016 – The Transition
The Hegelian Dialectic is the transition of things. And the Illuminati loves to use it. We have been expecting it.
We have read about it. And now it is here, in front of our faces. And many are IGNORING it.
Folks, we are witnessing Hegelian logic on display.
How we got here is an aside, but here we are. The disease is Hillary, and the medicine is Trump. For most folks, that’s all that matters. Case closed. What most citizens do not realize is that this is all a ruse. A mirage.
It is being carried by, “they.”
“They” are using the illusion, because America was stationary and stubborn.
“You can’t New World Order me!” Americans said, “…Because we know about you.”
Did the globalists go away and cry in their beer? Nope. They knew this would happen. It was expected. Butsome of the citizens heard a few radio shows that told them, “we’re gonna win.”
Hegel’s dialectic utilizes the “mirage.” And then steers the people through its house of mirrors with scary monsters. In America’s case, the monster is a short woman with a trucker’s voice named Hillary. Their task is simple. Globalism. But how do they get there?
Simple:
Scare them with the Thesis – Hillary / the Enemy of Freedom.
And offset her with the Anti-thesis – Donald the Lion-Hearted / Champion of the People.
…Next stop – the Synthesis. Ashes with a rising phoenix.
It's right there in front of us. Do you see it folks?
This is also known as
Problem > Reaction > Solution
Ultimately this is leading to:
Problem: Trump vs Deep State
Reaction: Global Disaster
Solution: One world government and one world currency
They say this is a double headed eagle, it's not. It's a double headed Phoenix. And it's the symbol of the Scottish Rite of Freemasonary.
http://uscnjpha.org/history/double-headed-eagle/
http://uscnjpha.org/wp-content/uploads/2015/11/F.png
“The Double Headed Eagle of Lagash” is the oldest Royal Crest in the World… No emblematic device of today can boast of such antiquity. Its origin has been traced to the ancient city of Lagash. It was in use a thousand years before the Exodus from Egypt and more than two thousand years before the building of “King Solomon’s Temple.”
“As time rolled on, it passed from the Sumerians to the men of Akkad, from the men of Akkad to the Hittites, from the denizens of Asia Minor to the Seljukian Sultans from whom it was brought by the Crusaders to the Emperors of the East and West, whose successors were the Hapsburgs and the Romanoffs.”
“In recent excavations, the city-emblem of Lagash was disclosed also as a lion headed eagle sinking his claws into the bodies of two lions standing back to back. This is evidently a variant of the other eagle symbol”.
“The city of Lagash is in Sumer in Southern Babylonia, between the Euphrates and the Tigris and near the modern Shatra in Iraq, Lagash had a calendar of twelve lunar months, a system of weights and measures, a banking and accounting system and was a center of art, literature, military and political power, five thousand years before Christ”.
“In 102 B.C. the Roman Consul Marius decreed that the Eagle be displayed as a symbol of Imperial Rome. Later, as a world power, Rome used the Double-Headed Eagle, one head facing the East the other facing the West, symbolizing the universality and unity of the Empire. The Emperors of the Holy Roman Empire continued its use and the symbol was adopted later in Germany during the halcyon days of conquest and imperial power”.
So far as is known, the Double-Headed Eagle was first used in Freemasonry in 1758 by a Masonic Body in Paris – the Emperors of the East and West. During a brief period the Masonic Emperors of the East and West controlled the advanced degrees then in use and became a precursor of the “Ancient Accepted Scottish Rite”.
The Latin caption under the Double-Headed Eagle – “Spes Mea in Deo Est” translated is “My Hope Is In God”.
A part of this sounds familiar
“In recent excavations, the city-emblem of Lagash was disclosed also as a lion headed eagle sinking his claws into the bodies of two lions standing back to back. This is evidently a variant of the other eagle symbol”.
https://i.pinimg.com/originals/6f/a6/cb/6fa6cb2757061c76d7aa6ea211e2868c.jpg
https://goddessinspired.files.wordpress.com/2012/06/inanna-descent.jpg
In 102 B.C. the Roman Consul Marius decreed that the Eagle be displayed as a symbol of Imperial Rome. Later, as a world power, Rome used the Double-Headed Eagle, one head facing the East the other facing the West, symbolizing the universality and unity of the Empire. The Emperors of the Holy Roman Empire continued its use and the symbol was adopted later in Germany during the halcyon days of conquest and imperial power”.
So far as is known, the Double-Headed Eagle was first used in Freemasonry in 1758 by a Masonic Body in Paris – the Emperors of the East and West. During a brief period the Masonic Emperors of the East and West controlled the advanced degrees then in use and became a precursor of the “Ancient Accepted Scottish Rite”
So it represented the universality and unity of the Empire of Rome and was later adopted by Germany during their days of conquest and imperial power. For these Freemasons, it represents two emperors, one from the east and one from the west coming together to create one empire. Hmm.. I wonder if that has any significance to today's world.
https://st2.depositphotos.com/8575830/12480/i/950/depositphotos_124801418-stock-photo-russian-two-headed-eagle-coat.jpg
https://www.rbth.com/history/327634-why-is-double-headed-eagle-a-symbol-of-russia
The imperial bird with two heads simultaneously facing East and West has been Russia’s official coat of arms for centuries, with only a break during the Soviet era. The emblem, however, is far older than the country, with roots dating to ancient civilizations.
An eagle on a country’s coat of arms is quite common – this bird is as popular a national symbol as the lion. “He is the king of birds; just like the lion is believed to rule all animals, and he is associated with the cult of the sun,” Georgy Vilinbakhov, head of Russia’s Heraldic Council, explains.
http://www.deadlinenews.co.uk/2012/01/17/donald-trump-at-last-awarded-the-scottish-coat-of-arms/
https://upload.wikimedia.org/wikipedia/commons/thumb/3/3f/Coat_of_Arms_of_Donald_Trump.svg/2000px-Coat_of_Arms_of_Donald_Trump.svg.png
http://revelationtimelinedecoded.com/wp-content/uploads/2016/11/phoenix3.jpg
So Trump's new coat of arms has the same symbol as Russia which symbolizes 2 empires, one from the east and one from the west, combining into one.
Does the way they dress look familiar to anyone?
http://uscnjpha.org/wp-content/uploads/2014/02/uscnj.png

The Rise of The Phoenix and One World Currency

https://socioecohistory.wordpress.co...mist-magazine/
Source: Economist; 01/9/88, Vol. 306, pp 9-10
https://socioecohistory.files.wordpress.com/2014/07/theeconomist-phoenix_get_ready_for_world_currency_by_2018.jpg
Title of article: Get Ready for the Phoenix
THIRTY years from now, Americans, Japanese, Europeans, and people in many other rich countries, and some relatively poor ones will probably be paying for their shopping with the same currency. Prices will be quoted not in dollars, yen or D-marks but in, let’s say, the phoenix. The phoenix will be favoured by companies and shoppers because it will be more convenient than today’s national currencies, which by then will seem a quaint cause of much disruption to economic life in the last twentieth century.At the beginning of 1988 this appears an outlandish prediction. Proposals for eventual monetary union proliferated five and ten years ago, but they hardly envisaged the setbacks of 1987. The governments of the big economies tried to move an inch or two towards a more managed system of exchange rates – a logical preliminary, it might seem, to radical monetary reform. For lack of co-operation in their underlying economic policies they bungled it horribly, and provoked the rise in interest rates that brought on the stock market crash of October. These events have chastened exchange-rate reformers. The market crash taught them that the pretence of policy co-operation can be worse than nothing, and that until real co-operation is feasible (i.e., until governments surrender some economic sovereignty) further attempts to peg currencies will flounder
The new world economyThe biggest change in the world economy since the early 1970’s is that flows of money have replaced trade in goods as the force that drives exchange rates. as a result of the relentless integration of the world’s financial markets, differences in national economic policies can disturb interest rates (or expectations of future interest rates) only slightly, yet still call forth huge transfers of financial assets from one country to another. These transfers swamp the flow of trade revenues in their effect on the demand and supply for different currencies, and hence in their effect on exchange rates. As telecommunications technology continues to advance, these transactions will be cheaper and faster still. With unco-ordinated economic policies, currencies can get only more volatile.
In all these ways national economic boundaries are slowly dissolving. As the trend continues, the appeal of a currency union across at least the main industrial countries will seem irresistible to everybody except foreign-exchange traders and governments. In the phoenix zone, economic adjustment to shifts in relative prices would happen smoothly and automatically, rather as it does today between different regions within large economies (a brief on pages 74-75 explains how.) The absence of all currency risk would spur trade, investment and employment.
The phoenix zone would impose tight constraints on national governments. There would be no such thing, for instance, as a national monetary policy. The world phoenix supply would be fixed by a new central bank, descended perhaps from the IMF. The world inflation rate – and hence, within narrow margins, each national inflation rate- would be in its charge. Each country could use taxes and public spending to offset temporary falls in demand, but it would have to borrow rather than print money to finance its budget deficit. With no recourse to the inflation tax, governments and their creditors would be forced to judge their borrowing and lending plans more carefully than they do today. This means a big loss of economic sovereignty, but the trends that make the phoenix so appealing are taking that sovereignty away in any case. Even in a world of more-or-less floating exchange rates, individual governments have seen their policy independence checked by an unfriendly outside world.
As the next century approaches, the natural forces that are pushing the world towards economic integration will offer governments a broad choice. They can go with the flow, or they can build barricades. Preparing the way for the phoenix will mean fewer pretended agreements on policy and more real ones. It will mean allowing and then actively promoting the private-sector use of an international money alongside existing national monies. That would let people vote with their wallets for the eventual move to full currency union. The phoenix would probably start as a cocktail of national currencies, just as the Special Drawing Right is today. In time, though, its value against national currencies would cease to matter, because people would choose it for its convenience and the stability of its purchasing power.
The alternative – to preserve policymaking autonomy- would involve a new proliferation of truly draconian controls on trade and capital flows. This course offers governments a splendid time. They could manage exchange-rate movements, deploy monetary and fiscal policy without inhibition, and tackle the resulting bursts of inflation with prices and incomes polices. It is a growth-crippling prospect. Pencil in the phoenix for around 2018, and welcome it when it comes.
https://medium.com/@torrmara/1988-crypto-prophesy-from-the-economist-e201ab28aa26
So it was a random Sunday: bed, eat, repeat until I went online and I saw a link by a new user called @limon. There was a small introduction to a YouTube video which at first glance didn’t look interesting, but what the hell? Lets read this.
https://cdn-images-1.medium.com/max/...lLpi-xYDCw.png
He talked about an article from The Economist, year 1988, coin, phoenix and then Zoin… wtf?
Anyways, I opened the link (don’t open links from strangers) and watched the video in Youtube, (it’s in Spanish)
@limon claims in the video (minute 5) that he actually found a not so well know cryptocurrency (yet) by doing some research on an article from 1988 and he is somehow convinced it’s going to be huge. Yes, @limon saw the writing and thought maybe I should check this and find out which is the coin of the future.
As crazy as it seems, finding a cryptocurrency by doing research on a 1988 magazine its quite incredible. Is it a coincidence or is it a prediction? Not even @limon knows, but there’s a few things that can blow up your mind here.
This is the article from 1988. It claims that there will be a currency (referred as “phoenix”) that will be used by everybody in several countries in 2018.
So yes, you all might say “the coin is called the Phoenix”. There’s actually a coin called Phoenixcoin but that didn’t seem to convince @limon once he checked it out in www.coinmarketcap.com (it sucked even for @limon who wanted to believe with all his heart)
But @limon didn’t give up, he thought what if its hidden? So he decided to take a closer look at the magazine cover.
https://cdn-images-1.medium.com/max/...LKufsoJVug.png
He noticed that he could read the letters backward (um…interesting)
https://cdn-images-1.medium.com/max/...Ir1KSVOMbw.png
He got XIN3ONd NET by reading the cover letter backwards and he said well, XIN is Chinese, and found out in google translator that XIN meant NEW.
Then 3ONd he looked at it and thought this is Russian… and it was. That weird word that would not mean anything to someone meant something for @limon so he decided to google translate it.
https://cdn-images-1.medium.com/max/...uui5nS3hFg.png
Well yeah 3ONd is Russian and means ZOI, but wait is this a coin? @Limon decided to search “ZOI” in www.coinmarketcap.com.
https://cdn-images-1.medium.com/max/...LN2UCCLQwg.png
WOW, Zoin existed. He ended up with the sentence NEW ZOI NET, in which Zoi was an actual currency.
He starting searching now all about Zoin (DYOR) and liked everything he saw. The team, the community and development its very much updated.
Got even more carried away when he saw Zoin’s logo:
https://cdn-images-1.medium.com/max/...4CV6Ln5sFQ.png
https://cdn-images-1.medium.com/max/...y75KEGoyHQ.png
And when he researched even deeper, he found out that ZOIN was left by its first developer and got taken over by its community from all over the world.
Yes, Zoin emerged from the ashes. What? wait. Zoin is also a Phoenix.
Anyways, @limon found all the signs of a prophecy from 1988.
He couldn’t wait so he joined Zoin’s community and shared his video.
By the way he bought some Zoin. After finding the last lost prophecy he had no plans on missing out.
Check all about Zoin in the following links.
You can reach out to the team on Discord, website address is www.zoinofficial.com and their twitter @zoinofficial
You better don’t miss it. Its a prophecy.
Thank you limon.
@torrmara
Notice the year on the coin and at the end of the article, 2018. "Pencil in the phoenix for around 2018, and welcome it when it comes". Trump and Russia both have a double headed Phoenix signifying the union of an Empire. This article talks about a one world currency called "Phoenix" coming in 2018. The number 10 upside down is 01. It's a bit on a coin
https://en.wikipedia.org/wiki/Phoenix_(currency))
I posted about an Israeli company that can do things with blockchain and DNA in my previous postings on this topic. I think that this will have something to do with the Mark of the Beast.
https://techstartups.com/2018/05/10/genetic-blockchain-startup-dnatix-releases-first-blockchain-based-open-source-dna-compression-tool/
https://www.dnatix.com/
https://nulltx.com/carverr-wants-to-embed-bitcoin-private-keys-into-strands-of-dna/

Trump is the Tip of the Spear for the NWO Plan

Notice the spear tip coming out of the Phoenix's head on the cover of the Economist magazine? Trump. has a spear on top of both of his coat of arm. Trump is the tip of the sphere. I think once he's fulfilled his purpose in wrecking everything and nuking North Korea, I think they might have someone take him out. Then things would get even crazier.
https://i0.wp.com/www.show-notes.info/thisisit4321/gallery3/vaalbums/SPECIAL-PROJECTS/Welcome-to-the-World-of-Good-and-Evil/TRUMP/TRUMP%20-%20D2.jpg
https://i0.wp.com/www.show-notes.info/thisisit4321/gallery3/vaalbums/SPECIAL-PROJECTS/Welcome-to-the-World-of-Good-and-Evil/Album-number-7/Donald%20Trump%20Tip%20of%20the%20Spear.jpg
https://thelightinthedarkplace.files.wordpress.com/2018/03/donald20trump20front20and20center.jpg?w=816
https://thelightinthedarkplace.files.wordpress.com/2017/04/trump20tower201.jpg?w=816

My Other Posts on This Topic

https://www.reddit.com/conspiracy/comments/8tuwr1/what_do_these_2_very_obvious_signs_say_to_you/
https://www.reddit.com/conspiracy/comments/8vth1i/trumps_space_force_nesara_and_the_mark_of_the/
submitted by Oblique9043 to conspiracy [link] [comments]

ColossusXT Q3 AMA Ends!

Thank you for being a part of the ColossusXT Reddit AMA! Below we will summarize the questions and answers. The team responded to 39 questions! If your question was not included, it may have been answered in a previous question. The ColossusXT team will do a Reddit AMA at the end of every quarter.

The winner of the Q3 AMA Contest is: peanutman

Q: Why does your blockchain exist and what makes it unique?
A: ColossusXT exists to provide an energy efficient method of supercomputing. ColossusXT is unique in many ways. Some coins have 1 layer of privacy. ColossusXT and the Colossus Grid will utilize 2 layers of privacy through Obfuscation Zerocoin Protocol, and I2P and these will protect users of the Colossus Grid as they utilize grid resources. There are also Masternodes and Proof of Stake which both can contribute to reducing 51% attacks, along with instant transactions and zero-fee transactions. This protection is paramount as ColossusXT evolves into the Colossus Grid. Grid Computing will have a pivotal role throughout the world, and what this means is that users will begin to experience the Internet as a seamless computational universe. Software applications, databases, sensors, video and audio streams-all will be reborn as services that live in cyberspace, assembling and reassembling themselves on the fly to meet the tasks at hand. Once plugged into the grid, a desktop machine will draw computational horsepower from all the other computers on the grid.

Q: What is the Colossus Grid?
A: ColossusXT is an anonymous blockchain through obfuscation, Zerocoin Protocol, along with utilization of I2P. These features will protect end user privacy as ColossusXT evolves into the Colossus Grid. The Colossus Grid will connect devices in a peer-to-peer network enabling users and applications to rent the cycles and storage of other users’ machines. This marketplace of computing power and storage will exclusively run on COLX currency. These resources will be used to complete tasks requiring any amount of computation time and capacity, or allow end users to store data anonymously across the COLX decentralized network. Today, such resources are supplied by entities such as centralized cloud providers which are constrained by closed networks, proprietary payment systems, and hard-coded provisioning operations. Any user ranging from a single PC owner to a large data center can share resources through Colossus Grid and get paid in COLX for their contributions. Renters of computing power or storage space, on the other hand, may do so at low prices compared to the usual market prices because they are only using resources that already exist.
Q: I love how the COLX team makes improvements to COLX continuously and has stuck to the roadmap which looks very impressive for the future. The coin is starting to get some personality.
However, with the current amount of existing crypto projects these improvements don't mean so much if noone ever hears about COLX. Currently I never see COLX pop up in the crypto news that I follow, and it's as if COLX doesn't even exist. As a developer myself I sometimes fall for the "if the technology is awesome it will automatically become popular" mentality, but sadly it doesn't work that way.
So to summarise my question: What are the plans to bring COLX to the masses and to make sure the average crypto investor knows it exists?
PS: Colossuscoin has existed long before (pre-2014?) the big boom we saw last christmas which is already a major benefit over other projects, but COLX never seems to play that card. Why is this not on the website frontpage and hidden in one line of the whitepaper. Being able to claim that the team has at least 4 years of experience with the project sounds like a pretty convincing argument for investors to me... Especially since most investors never heard of COLX and think it's just another project that popped up to capitalise on the crypto boom.
A: As we get closer to releasing our product our strategic marketing presence will increase. We started this with no developer’s fund, and no pre-mine for the team. We have continued to grow the community and they will play a role in are strategic marketing. Now that governance is being utilized we will be allocating funding for various marketing opportunities. The community recently funded a crowdfund for a PR campaign.
Marketing will increase as we get closer to the Colossus Grid. Having a working product is an important piece of the puzzle for legitimizing a project like ColossusXT.

Q: What experience does anyone on the team have with distributed computing before COLX?
A: The team is comprised of many individuals who have a very diverse technical backgrounds in development, operations and project management. We do have team members with experience in the grid computing industry. At this time, they have not opted to share any information due to their privacy rights.

Q: How would COLX really add value with its 'Collossus Grid' ? What set of existing services will it challenge or disrupt if it came to fruition?
A: We will be reaching out and building relationships with businesses and that can utilize the Colossus Grid, and/or contribute. There are several industries and services that the Colossus Grid will challenge; from medicine to cognitive and behavioral sciences, from supply chain to marketing, from automotive and traffic control to climate science. Many of the existing services are centralized and do not provide any means of transparency through business practices or provide adequate means of privacy for the consumer. The Colossus Grid will provide a solution to these problems along with being energy efficient.
ColossusXT has a clear path to grid computing, the energy consumption alone from a Supercomputer is about $6M in energy costs a year, not to mention $150-250m for assembly and design. The Colossus Grid makes supercomputing available for any consumer or data center, whilst saving energy, upfront costs, and entirely removing the maintenance involved with large data centers.

Q: Is there any special modification done on Zerocoin protocol being used on COLX?
A: Yes, some small design changes were made so that it would work with our product, but the overall functionality of the protocol is the same. The team is looking to make some additional modifications, one of which that has been discussed is adding the ability to stake zCOLX. We are looking at publishing an updated Roadmap soon to reflect more on the vision of 2019.

Q: Will there be more use cases or user stories for IoT and Grid Computing?
A: Yes, these use-cases will evolve as the IoT evolves and the demand for computational power increases. I referenced some use-cases in a previous question.

Q: Could COLX solve some or the problem for an existing IT services industry and if so how? What could they gain by jumping onboard this platform?
A: Yes, some of the existing problems in the IT service industry can be solved by different blockchains. ColossusXT will be solving the problem of ‘Lack of computational power to process DATA’, and by using the Colossus Grid platform users can earn ColossusXT for contributing their computational power, or storage, but all this will serve a great purpose of contributing computing power to solve real world problems to make the world a better and more efficient place.

Q: Who do you anticipate will be the end user base of both colx and the grid? B2B or everyday folk?
A: It’s difficult to anticipate the blockchain world, as we increase our marketing strategies for the Colossus Grid I would like to see a healthy balance here.

Q: Is there any competition from other coins that you think are developing similar concepts and what makes COLX superior to them and what other coins you could see yourself helping and interacting with in a positive way? (Camhole)
A: Yes, there are other blockchain projects in the Grid Computing sector. Golem being the more prominent competition. The main difference is that we are focused on the end users privacy, and the types of users that we will be targeting will be those that need more discretion / anonymity in their work. We are building framework that will continue to push the boundaries of user privacy as it relates to grid computing. I’m more than happy to talk with other blockchain team members about anything relating to our projects. The free expression of thoughts and ideas is what makes the ColossusXT community so amazing.

Q: What is the best way as a new user to support the grid, does staking do enough or is running a Masternode the best way to participate?
A: I think there is some confusion here on how you support the Colossus Grid. There best way to support the Colossus Grid is to contribute as much computing power available. Spread awareness to your friends, family and co-workers when the Colossus Grid is live so that they can contribute. Running a Masternode can also support the network, but in a very different way. As the Masternode verifies blocks on the blockchain.

Q: Will there be a extra incentive to owning a masternode? When the colossus grid comes.
I remember reading that masternodes possibly will help the Blockchain overall by reducing it footprint.
As sharenodes become inhouse which increases overall masternodes total and the slight increase for those staking now since 500k block. Is it a concern that there might not be enough incentive to keep those running nodes to stay?
A: Fees and revenue structure for the Colossus Grid is still in ongoing discussion and will not be revealing information at this time. What a masternode does for the network is likely to change of the course of the project development. This could lead to additional incentives for masternode holders. Having said that, ColossusXT has one of the more reserved MN ROIs / Inflation strategies in the business with a goal of retaining the long-term health of the currency.

Q: Once the grid succeeds in 2019 will colx still push for opportunities as a privacy currency aswell.
Obviously main focus is armis and the grid but diversification helps too once the big goal is acheived?
A: Privacy will always be the foundation of ColossusXT. We will not shy aware from our advocacy towards privacy.

Q: Colossusxt being its own blockchain, is there opportunities for dapps or other company's that maybe arent or are in the computing sector be allowed to build there network on colx?
A: Yes, this is possible if the community shows interests in this. What we want to avoid is a situation like what happened with ETH; where their network was bogged down by the countless other projects utilizing the network. One of the reasons ColossusXT opted for its own blockchain was to avoid situations like this.

Q: Will zColx also be able to used at places like Crypto Emporium?
A: Yes, if you spent zCOLX on the address provided by a 3rd party, 3rd party will receive it as COLX and will not be able to trace it back. However, profiling on 3rd party sites may link tx with yourself (considering you will have an account on this 3rd party site and some transaction will be requested from this account).

Q: Has colx thought of a vision beyond the Colossus grid? Where does it want to go and how does it want to keep itself relevant as an innovator in latest technology?
A: The need for computing power is increasing every day, as well as the amount of DATA that needs to be processed and interpreted. As technology continues to evolve, we expect this need to further increase. The Colossus Grid end goal would be to come preinstalled on devices that use a CPU, when this CPU is not being actively used it will contribute to the Colossus Grid and reward the owner in ColossusXT (COLX). As technology evolves, privacy will always be an important security feature and part of the framework of the Colossus Grid. We will continuously evolve with technology to offer the highest privacy protections.
Q: Is the shared market place still on agenda?
A: The marketplace is still planned. This is a feature that will be released after the Colossus Grid. The Colossus Grid will have a marketplace for sharing computing power and storage, this will be further expanded upon after the Colossus Grid vision is realized.
Q: What does hardware wallet support mean in 2019 roadmap?
A: This means that we will become allocating budget and development towards integrating with a hardware wallet. We will more than likely begin discussing which hardware wallet the community is interested in as we get closer to this item on the roadmap.

Q: Will the team be attending any cloud/computing conferences next year theres a few decent ones uk singpore us.
A: I (PioyPioyPioy) would love to attend some conferences. If any are near my location I will attend, and while I cannot speak specifically on any conferences at this time for cloud/computing. I would like the opportunity to have the Colossus Grid live so that we can not only attend, but also be a speaker and present the Colossus Grid, maybe something can line up for Alpha or Beta launches.

Q: Where do you see crypto going next year? And which role does COLX fullfill in this?
Keep up the good work!
A: It’s impossible for me to speculate on where “crypto” in general could be next year. I don’t think this would be ethical either. The role ColossusXT will fill in this industry and our vision outlined in the roadmap will grow to encompass many different aspects. There are more huge data sources contributing to our view of the world. Potentially, we can analyze and predict more of the characteristics of the world around us than ever before, across all disciplines and industries from medicine to cognitive and behavioral sciences, from supply chain to marketing, from automotive and traffic control to climate science. As the Colossus Grid grows and spreads, so does our reach into providing privacy to the consumer, and transparent business practices.

Q: Looking forward to the grid, and be able to use distributed computing and storage. Will the grid also be able to provide distributed openCL or Cuda resources, or will it be cpu only?
A: Having users being capable of distributing the power of GPUs is something we have seen a lot of interest in from the public, and we can see where it may add to a good consumer business model as it relates to “mining” of other crypto currencies etc. Powerful GPUs also excel at cyber security related tasks that our team is very interested in marketing to clients. So the short answer is yes, our goal is to be able to distribute all computing resources as an end product.

Q: Will Colx have one click masternode feature on Mobile App platforms such as iOS and Android ?
A: For mobile app, this is possible through our partner Linda mobile wallets which allows you to stake and create masternodes without you having to leave your phone or PC on 24/7, and it won't drain your phone battery:
Q: If colx has a hard time establishing itself onto new exchanges due the leadership using anonymity. Would the Colx team consider unveiling themselves to expand the Colx community even though privacy is the main pillar of COLX?
A: Team members may disclose information themselves as they see fit. There is no requirement for team members to provide any private information online. The team has no problem completing KYC documents, or providing more information about ourselves during business agreements, or discussions.

Q: Will there be Colx merchandise in the future? I would definitely buy a hoodie to support my favorite project!
A: There is already a merchandise store. You can purchase with ColossusXT, or other crypto currencies and fiat.
ColossusXT Merchandise Store

Q: Is implementing grid computing just a shiny new gimmick to draw attention, like the 'eco-friendly coin' a year ago? Or will this become the main focus of colx?
Is there any prior experience in the team with regards to grid computing?
A: The Colossus Grid has been the focus, and the ‘eco-friendly’ is not a gimmick. The Colossus Grid is eco-friendly, will reduce energy consumption, and will efficiently process large amounts of DATA for substantially less than operating a supercomputer in today’s standards. Yes, there are team members with experience in the grid computing industry.

Q: What is the biggest plan of COLX for it to be known to the whole world and become one of the biggest crypto in the history?
A: One of our biggest goals is to continue to complete our objectives and release the Colossus Grid to provide a private and efficient method of processing and distributing computing power, and storage. Growing the community and business relationships, as well as continuing to achieve our vision outlined in the whitepaper and roadmap will all provide the foundations we are laying to provide the operational success of ColossusXT.

Q: Will have minimum requirements to be part of the colossus grid in terms of computational power or storage capacity and what online availability should the equipment that provides its services have?
A: We are not announcing any definitive details on fees or requirements attributed to the Colossus Grid as this time, as these are still ongoing discussions.
Q: In order to become a grid computing coin ColossusXT would have to shift from PoS to PoW. Customers would submit a work package to the network and the various connected nodes do the calculations and receive some kind of payment. So in this case the correctness and speed of the calculations is the metric that decides if a node is a good node or not, and how much reward it gets (PoW, much like bitcoin mining). This is in contrast with the current PoS approach where corrupt nodes are discouraged by forcing masternodes to put significant collateral on the line. Current masternodes don't have to do much work and network/hardware requirements are minimal.
What does the switch to PoW mean for the current owners of masternodes that bought into ColossusXT as a PoS investment? Does this mean that current masternodes will lose their value? Will expensive high-performance computers become the new way of becoming a masternode and earning money with ColossusXT?
A: ColossusXT will not be switching to PoW. The PoS system we have in place is not meant to be changed to PoW. The PoS system has been created as a privacy currency/network and this is the currency being used as a bartering tool. The Colossus Grid is an additional layer of the network and will not rely on PoW to function.

Q: What is the status of the Marketplace announced in the whitepaper?
A: The marketplace is still planned. This is a feature that will be released after the Colossus Grid. The Colossus Grid will have a marketplace for sharing computing power and storage, this will be further expanded upon after the Colossus Grid vision is realized.

Q: What’s the difference in COLX and zerocoin....I’m confused
A: We have created some Wiki entries and a Medium article to provide more information. I will provide the links below, if you have any questions please join us in discord.
What is Zerocoin?
What is zCOLX?

Q: Whats the status of the PR campaign for which crowdfunding was recently done for?
A: The PR campaign is in progress. I provided them with some information, and we have finalized the payment. I would expect to see it come into effect soon, but I don’t have an estimate date to provide.

Q: Collosus has a huge and helping community. I've seen the things they can achieve together, usually under the leadership of pete. Will colossus ever have a donation division. Or maybe a separate project run by and on colossus which is used for donations?
A: There is already rain in the Discord server daily, different tasks often come up throughout the community to earn COLX as well, the team’s will maintain focus on our current tasks, and when available there will always be events, tasks or goals that can activate rewards.

Q: How much emphasis is being placed on targeting mobile users via a Colossus Grid app? This seems like an enormous market to target with many of them not even interested in crypto per se. Maybe an app that allows the users to purchase colx so they can back up their pictures to free up space or even perform whole phone backups?
A: The team’s first focus will be delivering the Colossus Grid for desktop/laptop computers. We are watching the mobile device market, and as the power of mobile devices continues to grow, we will also allocate resources for the Colossus Grid on mobile.

Q: How does COLX plan to take on some existing grid compute coins like 'Golem'? How different or advanced are we aiming to build in comparison?
A: There will be some similarities between ColossusXT and Golem. We have very similar visions, and I participated in their Beta. There will also be very noticeable privacy features that ColossusXT will provide for the consumer that are not a part of ‘Golem’ at this time.

Q: Besides having privacy/I2P, in what other ways would the Colossus Grid be different from Golem/iExec/etc?
A: I participated in the Golem Beta, so without giving too much away. We aim to make ColossusXT a more user-friendly experience. This will include the process of installing, setting up, and contributing or participating without sacrificing any personal information.

Q: COLX seems to have a lot of stuff in the pipeline. With its focus on privacy and anonymity, does the development of COLX and its use have any plans to make a difference in charitable, environmental or medical spaces or industries?
A: Sure, we currently contribute to the World Grid. If you have any charities, you would like to recommend we can look at them. Send me an email [[email protected]](mailto:[email protected])
Q: Since 2017 I have been fully invested in this project; the ambitious idea of The Grid and the commitment of your team to the Roadmap presented Q1 of this year has made me a Colx cheerleader. Now I see a lot of technology related questions in this thread, which is always helpfull! However, most of them can be easily answered, some of them even with a simple "Yes" or "No" reply. I would like to shift my question(s) to you to a different topic, the way the project will move forward by the use of PR marketing and business partnerships. My question to you is therefor the following;
Colx has had no ICO, therefor seems to be missing some liquidity. Not perse a problem, this is the reason the Colx project is deemed to be a community effort, which has been proven correct over the course of this year. Another solution would be having business partnerships to level out the missing knowlege or opportunities to reach certain markets/audience. This latter solution provides the following question;
"On a Strategic business level, what moves can we Expect to ensure usage of the Grid and Its Marketplace, expanding into reallife usecases after the launch? Can we expect partnerships to reach certain markets? A collaboration with organisations in medicinal research for example? And How will your team see contribution of community in this?"
Curious how you guys see the exciting future for Colx AFTER the launch. Of course, still a bit far ahead, but sure enough something to evaluate and prepare for!
J GBD
A: We will build a quality product to offer to investors without an ICO, and without private funding. Our relationship and partnership building is already underway for the Colossus Grid. The community is the biggest part of this project, and as our available computing power increases and becomes available on the Colossus Grid we will be able to offer more to businesses.
These use cases are expansive, and can be utilized by many different businesses to reduce energy, overhead costs, and upfront costs for many industries to include medical research.
Q: I am just new in cryptocurrency and I am looking for good coins that worthy for my funds investment. Some coins was already introduced to me but only COLX catch my attention. Honestly I don't still have the full knowledge about it, how can COLX makes me full attached with it? what COLX can do to gain my full trust and love? How can COLX give me the assurance of gaining?. Thats all :) Hope COLX can get my full trust to it.
A: The only thing the ColossusXT team can do is continue to develop and meet or goals on the roadmap. I can assure you that the team is working everyday to complete their tasks, and we are active within the community so that we can better represent the community. There are very few projects that provide live support daily, ColossusXT is one of them. Ultimately the choice to invest in a project is yours. Read our Whitepaper if you haven’t yet and join us in discord.

Q: Is the GRID already on beta testing stage?
A: No, Alpha testing will begin in 2019. Ensuring that the privacy features are working as intended. Active community members, partners, and contributors will be invited to participate in the Beta.

Q: Has a proposed tariff been documented yet for people to use the new Colossus Grid and what percentage of the fees will go to the Colossus members for sharing their resorces..? Pete009
A: Fees associated with the Colossus Grid have not been defined at this time. This is an ongoing discussion as it needs to be a sustainable ecosystem.

Q: What is Colossus Grid really going to enable to the 'common-man' and 'enterprise' user? Any examples of a simple to advanced application? ex. Can the grid be used to store Media (Photos/Videos) in blockchain privacy for common-man?
A: The ‘common-man’ can contribute data, or storage from his computer(s) and be rewarded when someone purchases that computing power on the marketplace. Yes, you will be able to store media on the distributed storage portion of the Colossus Grid.
Important Information:

Website
Whitepaper
Roadmap
Wiki
Governance
Partners

Follow ColossusXT on:

Twitter
Facebook
Telegram
Discord
Forums

Interested in joining the ColossusXT team?
Contribute an Idea!


AMA History:
2018 Q1
2018 Q2
submitted by PioyPioyPioy to ColossuscoinX [link] [comments]

Potzblitz! - The weekly Lightning talk #1 with Maxim Orlovsky and Ben Arc BROWSING THE HIDDEN WIKI ON THE DEEP WEB! - DeepWebMonday ... Learn How To Buy Bitcoin And Trade With BTC  Make Money ... Bitcoin: Beyond The Bubble - Full Documentary - YouTube Bitcoin Talk Show #35 -- Bitcoin Giving Tuesday, Talking TipBots and the Bitcoin News LIVE!

Unlike the other cryptocurrency start-ups that began during the Bitcoin valuation frenzy, WankCoin is the oldest and most trusted crypto token in adult already. That’s because WankCoin began in 2014 and over the last 5 years the coin has become a valid form of payment at hundreds of the most popular adult sites online. This is a currency that is already in use, with a history of fair use and ... From The Hidden Wiki. Jump to navigation Jump to search. Bitcoin is a payment system invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open-source software in 2009. The system is peer-to-peer; users can transact directly without needing an intermediary. Transactions are verified by network nodes and recorded in a public distributed ledger called the block ... The principle of hidden mining have existed for a long time, however until recently there have been no attempts of mass introduction of such programs through web browsers. In September 2017, users of the PirateBay torrent tracker noticed that their computers were overloaded when loading certain pages. The Hidden Wiki is a censorship-resistant wiki operating as a Tor hidden service that anyone can anonymously edit. The main page serves as a directory of links to other .onion sites.. Background []. As a hidden service, The Hidden Wiki operates through the .onion pseudo top-level domain which can be accessed only by using Tor Browser or a Tor gateway. Its main page provides a community ... r/TOR: News and discussion about the Tor anonymity software. New to Tor? Please read the Tor FAQ!

[index] [24822] [8207] [51367] [1008] [46291] [42098] [2506] [21353] [49209] [12172]

Potzblitz! - The weekly Lightning talk #1 with Maxim Orlovsky and Ben Arc

Bitcoin Talk Show #35 -- Bitcoin Giving Tuesday, Talking TipBots and the Bitcoin News LIVE! World Crypto Network. Loading... Unsubscribe from World Crypto Network? Cancel Unsubscribe. Working ... Bitcoin in hindi ... Episode 1 Finding the hidden wiki (In Hindi ) - Duration: 16:36. Glorious Frog 34,498 views. 16:36. What is Bitcoin ? How Bitcoin Work in Details (HINDI) Bitcoin Future ... They became famous as the privileged pair of Harvard athletes who believe Mark Zuckerberg stole their idea for Facebook. Now, entrepreneurs Cameron and Tyler... This video is unavailable. Watch Queue Queue http://tinyurl.com/Bitcoin-Trade-2014 = Make Money Trading Bitcoins Learn How To Buy Bitcoin And Trade With BTC Make Money Trading Bitcoins 2014 - Just fo...

#