Friday, 13 August 2021

Decrypting NFTs



Every generation had their personalised currency. Millennials had Pokémon and wrestling cards, Generation X had baseball cards and mailing stamps and the baby boomers had their magic 8 balls and comic books. While we would like to believe we live in a single paper currency economy, this isn’t true. Children exchange video games for favours, adults offer old wine for reciprocity and retirees trade favours with cigars. It is not just the incarcerated who have parallel economies, we all do!

Why does the original near mint condition 1988 Spider-Man comic fetch thousands at the pawn store? And why not my reprint on glossy paper? Its ‘fungibility’ of the item which complement or moderate values. Since the barter system, we have agreed on the value of different commodities, based on their demand. Demand for consumption, hoarding or fashion-ability. Commodities which are replicated and can be exchanged for the same ‘value’ of the same item are called fungible.



A five-dollar note and 2 kgs Taj Mahal basmati rice bag is fungible. However, a five-dollar bill with Mohammad Ali’s autograph or the first basmati rice ever grown in outer space are ‘non-fungible’. The same applies to digital commodities, 1 cryptocurrency can be exchanged for another, making it fungible, but the first tweet ever is an ‘original’.

 

What is a token?

Non-fungible digital commodities have recently been making headlines for their commercial lucrativeness. Memes, social media posts, sports clips, gifs, images etc are sold for millions of dollars. There is an interesting difference between physical non-fungible items and digital non-fungible tokens. Non-Fungible Tokens (NFT) don’t necessarily have to be intrinsically ‘original’, however the ‘token’ is unique. When you purchase a cat meme, a token is generated against that purchase, which is recorded under your name and identification. This token is unique and non-fungible, hence making your cat meme NFT!



To put it more simply, an NFT is a digital asset, even a digital version of a real-world occurrence, with a receipt which confirms your ownership. NFTs can be recording of ‘real-world’ art-form, soundbites, memes, tweets, painting or video clippings. One can cash on digitizing existing popular culture phenomena or create your own crypto art.

How to make Crypto Art or NFTs?

Making crypto art and putting it out isn’t too complicated nor does it require intricate knowledge about block chain technology. Your fist step will be to decide which blockchain you want to support and issue your NFT. While there are many including WAX, Cosmos Trom, Binaca Smart Chain etc., Ethereum is by far the most popular and robust choice at the moment.

The catch is here, how and where you sell your NFT is dependent on your block chain. It is the block chain which records and confirms your token giving you ownership of an NTF. Each blockchains have their ecosystems which allow you access to marketplaces and digital wallets. In other words, you can’t use the British pound to buy bread in Australia, your access to different platforms and markets is restricted by the blockchain.






Ethereum, which is the most popular blockchain for NFT. The Ethereum wallet gives you access to the thriving markets of OpenSea, Rarible, Mintable and Makersplace. Once your art is ready and you are prepared to sell it as crypto art. You should explore the different market space and decide on your appeal and personal preferences. From here, it’s quite straight forward. However, just as in an arcade you can only trade in their currency. Here the currency is ether! Ether is your cryptocurrency. You will have to link your wallet which has your ethers to your profile on NFT the marketplace. And you are good to buy or sell NFTs!

Mechanics of the crypto art market

So, first of all purchase some ether from Coinbase website and store it in your Metamask wallet. Coinbase and Metamask are the most reliable and popular platforms in the crypto world. However, they are the preferred choice for those who trade in larger volumes on cryptocurrency, hence can justify the higher operating costs. New users can explore alternatives to Coinbase, Liquid, Gemini, Binance, Bitstamp, Kraken, BitMEX. It is imperative to weigh the pros and cons of each of these. While initially a preferred choice for all users due to its user-friendly interface, increasingly Metamask is found to be expensive. Fortmatic, TrustWallet and Portis are other wallets which are compatible with Opensea.



Once your crypto wallet is set up linked with your Opensea profile, you can update your information. The Opensea dashboard is very professionally designed and easy to use. You can ‘create’ your collection and upload your art, name it, add description and detail, and link to the artist’s website. To add more value you can add properties, which demonstrates the uniqueness of the crypto and other details like levels and stats. However, these are popular largely within the gaming community. An important aspect is unlockable content. Which is a message you can deliver to the buyer, it could be pleasantries or contact details or links for more value in addition to the sale.

The money spinner, gas prices!

Now comes the interesting bit of gas price. Before that you will have to choose your selling model, from highest bid, set price and bundle. Affiliate boundaries to increase opportunities of sale. Schedule sale time for a future date and time. And you post a listing. Here comes the gas fee. Gas fees are a steep ask for most amateur content creators. It is the cost you pay for your listing. It does vary depending on your urgency, if you are willing to upload the art over a few more days, your fee reduces. If you want it uploaded immediately, you will have to pay the maximum set price. This cost varies depending on the day of the week and the time of day. It is said, cheaper costs are found during weekends. Further, when you go to buy an NFT you have to pay a smaller gas fee.

Hype or Future?

NFTs could be a bubble as crypto sceptics have claimed. But similar claims had and are being made about crypto currency, the crypto market has seen some recent downturn with dogecoin, but so, did Bitcoin and it has bounced back! Increasingly more and more countries are looking at ways to monetise this technology and users are increasing. Its acceptability moved past a fad.



NFTs future may not be created, but it has opened up a whole new world of content creators and artists. For example, Niio Art has demonstrated how users can rent art without owning it for a time period. Blockchain has used a new age to authentication, and this is set to continue revolutionizing creative business models. NFTs are a manifestation of this revolution, which will keep evolving hence investing in it may not be a bad idea.

 

Monday, 2 August 2021

What is a blockchain oracle?




A blockchain oracle is responsible for sending external data to a blockchain. Essentially, they bring data from the real world and give it to the blockchain to utilize. Oracles fulfill this need because blockchains only have access to data that happens on their network. By expanding the amount of data blockchains have access to, it can significantly increase the number of capabilities of the applications that run on it.

Oracles are extremely beneficial for smart contracts because they are the basis for Dapps and have many potential use cases that couldn’t occur without the use of real-world data. An oracle isn’t the source of the data but it instead acts as a messenger, by relaying information from other sources and confirming the information is correct before sending it to its desired destination on the blockchain. It is important this information is correct, otherwise the oracle would be feeding incorrect information, which can be extremely problematic.

Blockchain Oracle example

Let’s say you wanted to bet on the winner of a football match with your friend. You could create a smart contract with the odds and both you and your friend lock your desired bet into the smart contract with a payout for the winning person. But the smart contract won’t know the winner because it isn’t able to access this data. After all, it doesn’t run natively on the blockchain. Here, an oracle would query its trusted source for the information of the winning football team, verify the information is correct, then feed it back to the smart contract. Now that the smart contract has access to the result of the football match, it can payout the winner accordingly.

Let’s look at another example. A farmer depends on the weather for their crops to grow well, and to make money from those crops. Insurance companies can provide protection to farms, however, farmers can be limited with their choices of only local providers which may give them an unfair deal. The farmer could instead enter into a smart contract with an online insurance company where the criteria are based on the amount of rainfall in the region. By using an oracle, the smart contract can receive accurate rainfall data from national weather bodies, and use it to provide coverage based on the amount of rainfall in the region. Below you can see a visual representation of a smart contract, powered by Chainlink, that demonstrates this example.



The different types of oracles

Software oracles

A software oracle is an oracle that pulls data that originates from online sources. This could include information like weather, crypto prices, or even flight schedules. Since software oracles are connected to the internet, they can feed information in real-time. Because this allows them to provide information that constantly updates as necessary, they are the most common type of oracle used by blockchains.

Hardware oracles

A hardware oracle is an oracle that pulls data from a physical device in the real world. This could include devices like a photocopier or a barcode scanner. For example, a supply chain may be responsible for packing and shipping boxes of electronic parts. At the end of the packaging line, someone may scan the box to mark it’s been packaged. A smart contract can be created where the oracle feeds it information about boxes that have been scanned, which the smart contract can make decisions based on.

Inbound and outbound oracles



Inbound and outbound refer to which way the information is being sent. If an oracle is sending information to a smart contract, then it is inbound. If an oracle is sending information from a smart contract to an external source, then it is outbound. An inbound oracle might supply information to a smart contract about the winner of a football match. An outbound oracle might use a method to unlock a smart contract and send the payout of a bet to the winner’s address.

Centralized and decentralized oracles



A centralized and decentralized oracle refers to the control structure of an oracle. If an oracle is centralized, its information is coming from a single entity and can be considered a single point of failure. There is a risk in using a centralized oracle because if that single entity were to fail then the oracle would be unable to function properly. This single point of failure also poses a security risk because only one entity needs to be attacked for the oracle to be rendered useless.

A decentralized oracle has multiple entities that it uses to provide information. In this instance, the oracle has multiple points of failure and can be considered more trustworthy from an information and security standpoint. Moreover, a smart contract could also utilize multiple oracles to achieve consensus for the necessary information, similar to how blockchains need consensus to confirm transactions — this is an example of consensus-based oracles.

The oracle problem

Since oracles act as the middleman between blockchains and external information, there is an underlying problem that faces them from achieving widespread adoption. Blockchains can’t pull data from external sources so they require oracles to fulfill that. If an oracle is compromised, then this also compromises the smart contract. This is the oracle problem. For the oracle to be trustworthy for a blockchain it needs to be secure from attacks, decentralized to reduce the concentration of failure and provide correct data.

If you have questions and requests, leave comments below the article.

 

Monday, 26 July 2021

How to Choose a Mining Pool




The purpose of a bitcoin mining pool is for a group of miners to join together and form a pool. By combining resources from all clients in that pool, they increase the odds of discovering the solution to a given block. When a solution is found to the block, it rewards the newly issued coin to the pool owner. The pool owner then divides the coins between the miners based on their contribution.

• Pooled mining produces a constant revenue of smaller values, whereas solo mining tends to be more erratic and could take years to mine one block.

• Pooled mining can generate a 1–2% higher income (before fees, if any) due to long polling provided by the pools. Solo mining wastes time due to only supporting getwork pull.

When looking for the right mining pool to join, your goal is to find a fair pool that you can trust to provide you with optimal payouts in exchange for your time and energy resources. Though, the pool you choose, statistically, will not increase or decrease your odds. Choosing the right pool can greatly increase your overall earnings.

10 things to consider when choosing a pool

Reputation

Join a group and see what others are saying about any pool before joining it. You will get the best information from miners who have already tried the pool themselves.

Pool Fee’s

Most pool’s charge a fee everytime a block is discovered. For the highest payout over time finding a reliable pool with the lowest fees is crucial. When making your decision, start with considering pools with no fee at all.

Uptime Efficiency

Do the research before committing to a pool. Make sure they have an uptime of 99.5% or higher, check to see if the pool supports backup servers in the case an outage.

Support and Feedback

It’s important that a pool has an open line for support and feedback in case you encounter technical issues or notice any discrepancy in your payout.

Location/Latency


Choose a pool running on a server near you. If your computer takes too long to communicate with the pools server you will lose precious shares. Shares received after a block change, intended for the previous block, are considered stale and not counted.

User Interface Panel

When choosing a pool, be sure to check their statistics page and API tools to determine which provides a better user experience.

Difficulty





A pool with a higher difficulty means they either there are more miners in that pool or they are using high-end mining hardware. This shouldn’t be a concern when picking the right pool, as the difficulty will adjust based on the shares your hardware submits.

Payout Threshold



Always check a pools payout threshold, If the pool has a high payment threshold, low-end mining hardware may not be feasible.

Pool Hashrate



Comparing a pools hashrate to the network hashrate is a good way to measure how often the pool will discover a block. Statistically, this will average out over time and should not affect your overall payout over time.

Payout/Reward Method

Proportional — In this method, rewards are determined based on a division of rounds, the round is measured by the time separating one block discovered by the pool to the next.

CPPSRB — Capped Pay Per Share including Recent Backpay.

DGM — Double Geometric Method. A combination of PPLNS and Geometric reward models that allows operators to absorb some of the variance risks. Operators receive a piece of the reward on short rounds and replace it on longer rounds to normalize payments.

ESMPPS — Equalized Shared Maximum Pay Per Share. Like SMPPS, but equalizes payments justly among all those who have contributed.

POT - Pay On Target. A high variance PPS method, that pays based on the difficulty of work delivered to pool instead of the difficulty of work completed by pool

PPLNS - Pay Per Last N Shares. Similar to proportional, but rather than paying by the number of shares in a round, it instead pays via the last N shares, disregarding the round difficulty and length.

PPLNSG - Pay Per Last N Groups (or shifts). Comparable to PPLNS, but shares are grouped into “shifts” which are paid in whole.

PPS - Pay Per Share. Each submitted share is worth set amount BTC. Since finding a block demands shares on average, a PPS method with 0% fee would be 12.5 BTC divided by . It is risky for pool operators, therefore the fee is highest.

RSMPPS - Recent Shared Maximum Pay Per Share. Like SMPPS, but system proposes to prioritize the most recent miners first.

Score - Score based system: a proportional reward, but weighed by time submitted. Each submitted share is worth more over time since the start of the round. Rewards are calculated proportionally to scores and not to shares.

SMPPS - Shared Maximum Pay Per Share, works the same as Pay Per Share, but is capped to never pay more than the pool receives.

FPPS Full Pay Per Share. Similar to PPSbut not only divide regular block reward but includes some of the transaction fees. It Calculates a standard transaction fee based on a previous round and distributes it by hash power contributions. It increases the miners’ earnings by sharing some of the transaction fees

It’s impossible to find a pool that meets every expectation perfectly, but as you see there are many factors to consider while choosing the right mining pool for you. Ideally, the right pool should offer low/no pool fee’s, a great support team, a server near you, flawless uptime and backup server, a great reputation, and a provides a friendly user experience.

 

Friday, 23 July 2021

TYPES OF CRYPTO WALLETS


 

A  crypto wallet is an app for generating, managing, and storing cryptographic keys - your public and private key. You can check your balance, receive, and send funds with a wallet.


Your Mnemonic Phrase

 

Your mnemonic phrase is a backup of your private key that is used by most wallets. It is a list of random words given to you when creating a wallet, usually 12 or 24. If you break or lose a device with a wallet - no matter if mobile, desktop or hardware wallet - your mnemonic phrase is usually your last line of defense against a loss of funds.

 

This implies, that any attacker that gets their hands on your recovery phrase will be able to do the same. Therefore, you must protect your mnemonic phrase as well as you would protect your funds themselves.

 

Important Note: You should write the phrase of words down on paper or save them in any analog format you see fit, but do not save them as a text file on your computer or a screenshot. You don’t want to make it too easy for any potential attacker to steal your money.

 

The Different Types of Wallets

 

In this article, we want to give you an overview of what types of wallets there are and help you find the right wallet for you.

 


Hosted Web Wallets

 

We can distinguish between hosted and non-hosted web wallets. With hosted web wallets, your keys are stored online by a trusted third party. These parties are mostly exchanges such as Coinbase, Binance or Bittrex. When you create an account with these entities they will create an entry in their internal database linking your account to a set of key pairs for the different coins they have listed.

 


An advantage with a hosted web wallet is the option to recover your password in case you forget or misplace it. Losing your private keys (together with your mnemonic phrase) leads to a loss of funds in all other cases.

 

While this may sound reassuring, there are some drawbacks with hosted wallets (also called hot wallets/cloud wallets). Remember: if you don’t control your keys, you don’t control your funds. There is always a third party risk, no matter how trustworthy the party might seem. First, they are a more attractive target for hackers than individuals because their honeypot is much bigger. Second, a sudden change in regulation might not allow them to have you withdraw your funds in a worst-case scenario. It is unlikely, but definitely not impossible. Thirdly, there is always a chance of an entity going bankrupt or stealing money. With the major exchanges like the ones mentioned above this risk seems small, but it does exist. Just ask former Mt. Gox customers. For the reasons above we do advise everybody to store the keys to their funds themselves. This means storing them in a wallet where you have control over your private keys. There is a responsibility that comes with being in charge of the safety of your funds yourself, but enabling you to do this is one of the main motivations for the existence of cryptocurrencies!

 

You will need to keep some funds on an exchange permanently if you plan to trade often. If you want to do this right, then your level of expertise should be exceeding this article by far anyways.

 

Non-Hosted Web Wallets

 

Besides hosted web wallets there is also a range of non-hosted web wallets. The most popular non-hosted web wallet is likely MyEtherWallet, which can store Ether (ETH) and all ERC-20 tokens (tokens that are “living” on the Ethereum blockchain). Those wallets provide an interface to check your funds or create transactions in your web browser, but you have to provide the keys with each login.



There is a range of options to access your wallet with MyEtherWallet (often abbreviated as MEW). The first option requires your address but only lets you view your funds.

 

MetaMask is a browser plugin that provides the option to make ETH payments within your browser and the ability to login to MEW. It also provides a function detecting phishing sites and warning you when you are about to open one. The next couple of options, Ledger Wallet, Trezor, Digital Bitbox, and Secalot are hardware wallets. We will get to those later in the article.

 

Accessing your wallet with a keystore /.json file is possible but not recommended. The file contains your private key and when you create your wallet you have the option to download it. If it gets into the wrong hands they will have access to your funds so saving it on your desktop is not the ideal solution. If you want to use this method, you should encrypt the .json file and store it on a separate device like a USB drive. To use it, connect the drive, decrypt the file, then select the file in your browser and voila. After that, you can disconnect your storage medium of choice again.

 

The last two options are more or less the same with regards to safety. You can either enter your private key directly or your mnemonic phrase (which yields your private key when hashed) which is both problematic if your machine is compromised.

 

In conclusion, a non-hosted web wallet is quite convenient and just as secure, as the method, you choose to provide your keys with.

 

Desktop and Mobile Wallets

 

If you start off with the question “where are your keys?” the desktop and mobile wallet will give you the same answer: on the device. Phones and tablets are more powerful than ever, the difference between a desktop and a mobile wallet is marginal. It is also arguable whether one is safer than the other.

 

By now you know the tasks a wallet performs: viewing, receiving and sending. If you want to use crypto for everyday transactions there is almost no way around keeping some funds in a mobile wallet. As mentioned before, when creating your wallet you will get a mnemonic phrase that you should keep safe. Usually, there is a PIN, password or Face-/Touch-ID protection to access the wallet. You should never keep more funds in a mobile wallet than you are willing to lose. It’s the same as with cash: you don’t carry around all your money in a wallet. You withdraw as much as you are comfortable handling in cash and keep the rest in your account (or under the mattress :P).

 

With desktop and mobile wallets, there is a choice between single- and multi-currency wallets. Those should be rather self-explanatory terms. The former allows you to store one coin, while the latter supports multiple currencies. Some of the more popular examples for desktop include Electrum and Exodus. For mobile, there are Mycelium or Paytomat to name just a few.

 





If you got your first coins on an exchange, I would recommend you to transfer your funds out of the exchange (hosted web wallet) onto a desktop, paper, or hardware wallet. Send a fraction first to make sure everything works as planned. If your first transaction works then you can send the rest. You are now protected from third-party risk, but have full responsibility for your funds yourself.

 

Paper Wallets

 

Grabbing our golden thread again and asking “where are the keys” give you a simple answer with a paper wallet: in your hand! A paper wallet is your public and private key pair printed on paper. Almost every cryptocurrency offers a paper wallet generator. To create a key pair you generally first have to create some entropy (a term for disorder), in other words: you want your keys to be as random as possible. This is mostly done automatically, but sometimes you will find features were you have to randomly move your mouse or hit keys on your keyboard to create randomness.

 

When printing your paper wallet you shouldn’t use a shared printer like the one in your office. In a best-case scenario, the printer doesn’t even have an internet connection. Printers usually keep a copy of the files they printed last, and an attacker might exploit this. You will end up with something looking like this after printing the wallet.

 


There is only one thing left to do: send your coins to the public key. After that, you have a perfect gift or long term storage for your coins. The main risk with a paper wallet is you actually losing or destroying the wallet by accident. If you don’t have a mnemonic phrase to recover the private key you are at risk of losing all funds on the wallet by accident. So choose wisely where to store your paper wallet. Print several copies if you feel uncomfortable having only one and store all of them in separate, safe places.

 

Hardware Wallets

 

Moving on to everybody’s darling: hardware wallets. With a hardware wallet, your keys are stored on the device in something called the “secure element”. The secure element is a place to store data (here, keys) that cannot be directly accessed by your computer or any other device even when it is connected. Although it does look like a simple USB drive, it can actually do a little more than just providing storage for your keys. To use a hardware wallet you usually have a few options of which interface to use with it. Like MyEtherWallet, a few other wallets offer hardware wallet support. Additionally, you have the native wallet apps provided by the producer. In the case of Ledger, for example, the native App is called Ledger Live.

 

How Does a Hardware Wallet Work?

 

The interface generates an address when you want to receive funds. Using this feature is pretty straightforward: if you click the receive button the process runs in the background and the address is displayed for you to share with the sender. If you want to send money the app creates the raw transaction that needs to be signed. The unsigned transaction is now sent to your hardware wallet, where it gets signed with your private key. The signature is then returned to your computer and the complete transaction including the signature broadcasted to the network.

 


Your private key(s) do not leave the device, so they are not visible to the computer you are using your hardware wallet with at any time. This is why a hardware wallet is considered the most secure way of storing crypto, especially large amounts.

 

If your device ever breaks, you have your mnemonic phrase as a backup. At the risk of being repetitive: your mnemonic phrase, under all circumstances, must stay private and in a secure location. A copy at a trusted family member or in a bank vault might be a good idea in case of a fire, flooding or a playing dog.

 

Summary

 

There are many ways to store your cryptocurrencies. Usually, there is a trade-off between convenience and security. The most important question is: where are the keys? A wallet is only a piece of software, an interface, that helps you perform the basic functions of cryptocurrencies: view your balance, create an address to receive funds, and create transactions to send funds.

 

With a hosted online wallet you are trusting a third party to handle your keys. You have the option to recover your password if misplaced, but there is always a significant third-party risk. If you don’t control your keys, you don’t control your funds!

 

With desktop, mobile, paper or hardware wallets you own the keys and nobody but yourself is responsible for keeping them safe. If your device breaks you have a mnemonic/recovery phrase to recover access to your money. The menmonic phrase is as sensible as your private key itself and if it gets in the wrong hands, your money can be stolen. This is should not scare you, but make you cautious.

 

If you have questions and requests, leave comments below the article.

 

Wednesday, 14 July 2021

CRYPTO WALLETS




Sometimes there is a little confusion about what a wallet can and cannot do, so we will start with what it can’t. Wallets generally don’t allow you to buy cryptocurrencies; that is what exchanges are for. All exchanges provide you with wallets to store your coins in after you buy them, but wallets usually don’t provide you with an exchange service.

What a Wallet Does

A wallet is a program that has three main functions:

·       Generating, storing and handling your keys and addresses

·       Showing you your balance

·       Creating and signing transactions to send funds

 


The first function is the main function and main differentiator of all wallets: generating, storing, and handling your keys,having access to your private keys means to be able to spend your money.

Where you store your keys determines the safety of your funds and, at the same time, the convenience of using them. With wallets, there is usually a trade-off between security and convenience: Having some funds on your mobile wallet (your smartphone) makes them easy to spend, but not very secure. Keeping larger amounts of money on a hardware wallet is very secure, but not as convenient when you want to spend it.

 

A Wallet Acts as a Keychain

We would like to introduce an abstraction, that might help you wrap your head around the concept of your keys and the importance of their safety. Although the term wallet might be more intuitive, the function of a wallet is closer to that of a keychain rather than an actual wallet. To make it crystal clear:

 

You don’t actually store any cryptocurrency in your wallet. You just store the keys to access them on the blockchain.

 

The blockchain records the amount of coins associated with a key pair (your identity on the blockchain). It calculates the amount of money the keys have access to based on all the transactions on the blockchain. Remember: the main function of a blockchain is to store all transactions in the correct order. Say you receive 10 ZEN in a first transaction and receive another 10 ZEN later on. It is clear that you, the owner of the key pair, owns 20 ZEN.



To spend your money, you need the private key stored in your wallet. This is why a keychain feels like a good analogy for what a wallet does. If you don’t control your keys, you don’t control your funds. You don’t need to understand how public-key cryptography works in detail in order to use cryptocurrencies, but the concept of your keys, giving you access to your funds, is still important to remember.

 

Wallets create a layer of abstraction and are becoming more and more user-friendly. Wallets show you your balance, generate an address to receive funds by just clicking “deposit” or “receive”, and provide you with a simple interface to send funds. All you need to do is enter the address that you would like to send money to and the amount you want to transfer. The signing procedure using your private key will happen in the background when you click send.

 

What if I Lose My Keys?

You don’t have to ask anybody to join the network, and you don’t have to register with a central authority to create a wallet. Being able to do this comes at the cost of you being responsible for the safety of your coins. There is nobody that can help you recover your keys if you lose them. If anybody were able to recover your keys for you, they would also be able to steal your funds. This would eliminate the trustless aspect of blockchains. You may have heard stories about people searching for old hard drives because they have “lost their bitcoins”. More accurately, they lost the keys to access their bitcoin.

 

But there is a sort of recovery mechanism with many wallets called a mnemonic phrase or backup phrase. A mnemonic phrase usually consists of 12 or 24 words. With these words, you can recover your keys. You receive your mnemonic phrase when you install and set up your wallet. Be sure to write it down on a piece of paper and keep it in a safe place. You should have at least two versions of your backup phrase stored in different locations.

 

It’s essential to understand that your backup phrase is just as important as your private key itself. If anybody gets their hands on your backup phrase, they can access your money. Saving it as a screenshot or text file on your computer is not a good idea!

 

Summary

A wallet is a program that helps you manage your keys and create transactions easily. Your wallet looks at the blockchain to determine how much money you own by reviewing the transaction history. To send funds, it writes a transaction and signs it, meaning the wallet encrypts it with your private key.

 

 

Monday, 5 July 2021

PoS, PoW, and 11 Other Blockchain Protocols You Didn’t Know About




What is consensus? If broadly defined, a consensus is an agreement that satisfies each of the parties involved. This is the key to democracy and decentralization in general, as well as distributed registry technology in particular. Look at BTC: although Satoshi Nakamoto is his mysterious founder, he (or she!) has no power over the community. Bitcoin, like the blockchain, is completely transparent and open, and each node is equal in this network.

In the narrow sense, we use in cryptography, a consensus is a decision-making procedure. Its goal is to ensure that all network participants agree on their current status after adding new information, a data block or a transaction batch. In other words, the consensus protocol ensures the chain is correct and provides incentives to remain honest participants. This is an important structure to prevent a situation where someone alone controls the entire system, and it ensures everyone abides by the rules of the network.

A short review of a blockchain protocol

A protocol is a set of rules.

It helps:

ensure the viability of online transactions;

eliminate the possibility of double waste;

make sure participants do not cheat.

Blockchain protocol is the amount:

deterministic logical rules;

cryptography and encryption as a basis for security;

social encouragement to support the network protocol.

Let’s review what blockchain protocols exist today, where they are used, and what are their pros and cons.

Disclaimer: the article will be supplemented and edited to provide the most accurate information.

We will start with the mastodons of the industry. Proof of Work (PoW) and Proof of Stake (PoS) are the pioneering protocols that often serve as the prototypes for other modern consensus protocols.



Proof of Work (PoW)

Principle: it is difficult to find a solution, but it is easy to check the result.

Performance: low.

DLT environment: public blockchain.

Completion: probabilistic.

Example of use: Bitcoin, Ethereum, Litecoin.

The bitcoin blockchain is probably the most copied blockchain protocol. Numerous nodes confirm transactions in accordance with the PoW consensus algorithm. To add a new block, the participant must prove he/she has done a certain job. To be precise, it solves a very difficult task of finding a hash that complies with certain rules. The first who was lucky to find the right combination gets the opportunity to add a block to the chain.

As a result, participation in PoW implies the cost of computing resources, but the advantage is that it can be implemented in an environment where participants absolutely do not trust each other. Anyone can join the network, as it is a blockchain, which does not require permission (it’s permissionless). And although the peer-to-peer scalability is high, the transaction rate remains low.

Another problem is the motivation of network members — they usually join in to get rich, and not to maintain justice. Reducing mining fees over time and lower commissions in the future can greatly affect network security.



Proof of Stake (PoS)

Principle: the network trusts the validator, who puts his own resources as a pledge for the ability to create blocks: the larger the share, the higher the probability that the network will allow the creation of a block.

Performance: high.

DLT environment: public / private blockchain.

Completion: probabilistic.

Example of use: NXT, Tezos, soon Ethereum.

The technical feature of PoS is the absence of complex and unnecessary calculations. Instead of competing with others, network participants pledge their crypto actives, such as ether (Ethereum) in Ethereum, and wait for them to be selected to create a new unit.

Here participants are interested in security, as they themselves own the coins of the system. The algorithm selects one validator, based on the share belonging to it. Therefore, if the participant owns a 5% share, then 5% of transactions will be checked. The idea is that the higher the proportion of validator underlying cryptocurrency, the less interest he/she has in manipulating the validation process.

As in the case of the PoW algorithm, the completion of a transaction in PoS is probabilistic. Although transactions are relatively fast compared to transactions on the Bitcoin network, tokens are still required for this. Moreover, skeptics point to the fact that validators with large stakes will be chosen more often and, therefore, will receive even more tokens: the rich are getting richer.



Delegated Proof of Stake (DPoS)

Principle: Participants delegate the production of new blocks to a small and fixed number of elected validators. High competition, but very profitable.

Performance: high.

DLT environment: public/private blockchain.

Completion: probabilistic.

Usage example: EOS, BitShares.

Delegated Proof of Stake (DPoS) enables creating blocks at high speed and process more transactions per second by reducing the number of validators. During the voting, coin holders choose validators to form the blocks. The weight of each vote is defined by the sum of the assets of the voter. Coin holders can vote for validators at any time. This determines the high flexibility of the network: if the majority of performers fail, the community will instantly vote to replace them.

The production of new blocks occurs every 1–2 seconds. This protocol is faster and fairer compared to PoS since the “delegated” validator later shares tokens with its voters. Although, the confirmation of the finished blocks still lies on the shoulders of all the other members of the network.



Proof of Activity (PoA)

Principle: a hybrid of PoW and PoS.

Performance: low.

DLT environment: public.

Completion: probabilistic.

Usage example: Decred.

Proof-of-Activity (PoA) combines the PoW and PoS protocols, which means that participants can mine or lay down a share to validate the blocks. So, the PoA protocol provides a balance between miners and ordinary members of the network.



Proof-of-Location (PoL)

Principle: beacons are used to notice a node in a synchronized state, and then to mark its presence with a temporary stamp.

Performance: average.

DLT environment: public.

Completion: immediate.

Usage example: FOAM, Platin.

Proof-of-Location (PoL) allows users to secure a specific GPS location and thus authenticate themselves on the network. Interestingly, this blockchain protocol relies on BFT beacons, which record geolocation and time markers in the blockchain, which prevents disruptions and fraud in the system.



Proof-of-Importance (PoI)

Principle: like PoS, but with additional properties that affect your ranking.

Performance: high.

DLT environment: public.

Completion: probabilistic.

Usage example: NEM.

The algorithm acts almost like PoS, but includes three components:

the number of tokens in the account;

account operations activity;

the time spent by the account holder on the network.

The first parameter plays an essential role in the rating for verifying transactions; the second and third parameters just help to establish the “value” of the account. The smaller the sum of tokens, the stronger the influence of other parameters.

Consequently, an account that lays hundreds of thousands of tokens can increase the coefficient of importance by almost 3 times due to its activity and constant presence in the network. On the other hand, it does not matter for those who own hundreds of millions of tokens.



Proof-of-Elapsed-Time (PoET)

Principle: blocks are created in a trusted environment with equal periods.

Performance: average.

DLT environment: private blockchain, with and without permissions.

Completion: probabilistic.

Usage example: Intel.

Intel did not lag behind and developed its own blockchain protocol called IntelLedger.

This system is similar to Proof of Work but utilizes less electricity. Instead of participants solving a cryptographic puzzle, the algorithm works in a Trusted Execution Environment (TEE) environment, such as Intel Software Guard Extensions (SGX). The PoET protocol guarantees that the blocks are generated randomly and without any necessary efforts.



Proof of authority (PoA)

Principle: semi-centralized blockchain for banks and insurance companies

Performance: high

DLT environment: Public, private or consortium.

Completion: probabilistic

Example of use: Kovan, Rinkeby, Giveth, TomoChain, Rublix, Swarm City, Colony, Go Chain.

Similar to PoS and DPoS, in PoA validators secure the blockchain and are able to produce new blocks. New blocks on the blockchain are created only when a supermajority is reached by the validators.

By identifying pre-selected authorities, PoA consensus becomes centralized. Therefore, it’s suited for private blockchains and consortiums, such as a group of banks or insurance companies for better scalability. The identities of all validators are public and verifiable by any third party. Having their identity at stake, validators act in the best interest of the network.

Proof of Burn (PoB)

Principle: burning a mined PoW cryptocurrencies in exchange for mining privileges or the coins/tokens of an alternative currency

Performance: medium

DLT environment: Public

Example of use: Slimcoin and Counterparty

Miners send coins to an unspendable address (an eater address) in such a way burning them (coins can no longer be accessed and spent again). As PoB transactions are recorded on the blockchain, there’s undeniable proof that the coins are inaccessible, and the user is rewarded.

The idea is that a user demonstrates a willingness to undergo a short-term loss for long-term investment — a lifetime privilege to mine on the system. The more coins a user burns, the higher the chance to mine the next block.


Proof of Capacity (PoC)

Principle: The amount of “work” a miner will perform depends on the amount of free disk space to devote to the plotting process.

Performance: high and efficient

DLT environment: public

Example of use: Burstcoin and Bitcoin Ore

PoC is similar to PoW with a considerable difference — in PoC, rather than doing a large amount of work to verify each block, the work is done in advance in the process called “plotting”; the results from this process are used later to verify each block.

Plotting is the process of producing special files called “plot files” which store a large number of precomputed hashes. The shortest solution to the mining algorithm grants the rights to mine the next block. PoC is efficient, cheap, and distributed.

Proof-of-Brain (PoB)

 

Principle: the protocol enables smart, a social currency for publishers and content businesses

Performance: fast and efficient

DLT environment: public

Example of use: Steemit

PoB is a scalable blockchain protocol for openly accessible and immutable content accompanying a fast and fee-less digital token — STEEM — which helps people earn money by using their brains thus the name. STEEM is a means for creating unceasingly growing communities with members adding value through the built-in rewards structure.

PoB is a public publishing platform called Steemit from which any Internet application can share data in such a way rewarding those who contributed this valuable content.



Proof-of-Physical-Address (PoPA)

Principle: identity verification DApp

Performance: high

DLT environment: private

Example of use: ConsenSys and POA Network

Proof of Physical Address (PoPA) is a DApp which connects a real-life physical element with blockchain technology. This helps in verifying an individual’s identity. PoPA connects a person’s physical address with a wallet address in which they control the respective private key.

Every time a user verifies his/her card in the DApp, the PoPA protocol refreshes its own record and calls the ERC780 congenial contract to store the user/address connection.



Proof-of-concept (PoC)

Principle: demonstrates the feasibility of any blockchain project

Performance: unknown

DLT environment: private

Example of use: unknown

A Proof of Concept (POC) can be used in any field such including Voting trackers, Record storage, Legal documents, etc. A POC can either be a prototype without any supporting code or a Minimum Viable Product (MVP) with a base feature set. A POC is a model used for an internal organization to have a better understanding of a particular project.

Consensus protocols are an integral part of distributed systems. They help to achieve justice, to avoid system failures when one of the participants — the node — fails. Secondly, a decentralized environment requires solutions which will help move forward and change the general state, even in an environment where no one trusts anyone. Certain rules help to reach “consensus”.

We reviewed the most popular protocols which are already used in dozens of projects. Still, there are also Cross-resiliency (XFT), Paxos, Sieve, Raft protocol, Byzantine resiliency (BFT), direct acyclic graphs (DAG), and even non-blockchains conducted through a mental experiment which we’ll describe later.

If you have questions and requests (for instance, to review a certain blockchain protocol), leave comments below the article.


What Is The Metaverse?

  The Metaverse is the sum of all shared, persistent virtual spaces. It is the totality of all the digital and virtual worlds as well as d...