NiceHash Miner.Most profitable and easy to use miner

Large-scale updates of Tkeycoin. What’s next? — listing on the crypto exchange. Are you with us?

Large-scale updates of Tkeycoin. What’s next? — listing on the crypto exchange. Are you with us?
Hello, everyone, It’s been a long time since you heard our team, someone thought we were gone, someone was waiting, and someone disappeared himself.
All this time we have worked hard to bring you good news. We will tell you what we have prepared for you, what events will be soon, what you can use right now and what else will be new in the year. And so, let’s go!

Preparing for listing on the exchange

The pandemic period played into the hands of the entire team and we managed to build beauty in our services. In anticipation of the exchange, the team tidied up the sites and services and connected new tools. First of all, we paid attention to the preparation of all services for a foreign audience, taking into account its mentality.
New sections, localizations, nice things, and much more to ensure the most efficient use of the TKEY resource. In addition to the new tabs, the services that we will talk about in this material, there is a special page for representatives of the exchange with the necessary documentation for listing —

Full localization

Already today the official website available in 5 languages: Russian, English, Korean, Chinese (Simplified), Chinese (Traditional).
We made adjustments to the Russian and English versions of the site, including support for Korean and Chinese for each section of the site. Professionals in their field, native speakers translated and adapted the information as it should be, and we, in turn, structured and framed it properly. So welcome!
We will update language support for the site, and soon it will include support for all languages that are available in the mobile app.

QR Codes for Asian Audience
Our friends and residents of Asian countries actively use QR codes in their lives, both when paying in stores and when working with websites. QR codes are used almost everywhere when renting a car or bike, we just open the phone, scan and the mode of transport becomes available for use, anything is available for rent, even a battery, even an umbrella.
“It was a hot May day. Seven-year-old Wang Jiaozui came out of school and saw his grandfather, who came to pick him up. He was standing in the sun, and his shirt was soaked with sweat. Jiaozui invited the grandfather to buy a cold Cola in the shop, but he forgot her purse at home. It turned out that this is not important — the boy took his grandfather’s smartphone and called the payment app with a QR code on the screen.” ©
What to say if QR codes are used even to identify entire farms. By pasting QR codes on farm buildings and then scanning them, government inspectors can quickly figure out who owns the building and whether its owners are violating any laws.
We must be on the trend! Now a special library generates QR codes for the desired page, any tab on the site in Chinese and Korean-accompanied by a QR code that leads to the requested page: fast, convenient, and simple.
Providing this opportunity to our colleagues and future users of Tkeycoin from Asia is a friendly approach and most importantly, a strategic step on our part. After implementing QR codes, we are undoubtedly drawn into the convenience of this function, which we recommend to You:) If you like it, we will make QR codes on the Russian and English versions of the site.

Buying and withdrawing cryptocurrency to a Bankcard
On the site, you can now buy Bitcoin for pound, dollars, euro, and any other currency. This is a powerful automated service for instant exchange of fiat currencies for cryptocurrencies. The system works around the clock and seven days a week, allowing everyone to conduct exchanges at any time of the day and in the shortest possible time.
Withdrawal to a Bank card will be available until the end of the month, we finish the details, the page is available now, and the withdrawal itself will be activated during this week. You can buy Bitcoin, Ethereum, or any other currency right now.
These features are the future for the function of purchasing any product or service for TKEY at any point of sale, which will form the basis of the mobile app, quickly, conveniently, and most importantly, observing the letter of the law.
All we do is build an Empire that is being built before your eyes. Every service and product is connected, so any update promises the appearance of even more cool and effective features than before.

Buying cryptocurrency for pound, dollars, euros, and other currencies

At the end of February, we told you that we are working on building a payment service that will include the provision of services: buy cryptocurrencies, sell a cryptocurrency, withdraw cryptocurrency to Bank cards, etc.
This day has come, now you can buy Bitcoin (BTC), Ethereum (ETH), Tether USDT, Basic Attention Token (BAT), Algorand (ALGO), Tron (TRX), OKB (Token
The purchase is available in any currency: Russian ruble, US Dollar, Euro, British pound, Ukrainian hryvnia, Indonesian rupiah, South Korean won, Japanese yen, Turkish Lira, Argentine peso.
As you can see, the currency corridors are quite extensive, which allows you to make exchanges fast and at a favorable rate. Just choose the right pair to exchange or buy, available fiat currencies: RUB, USD, EUR, GBP, UAH, IDR, KRW, JPY, TRY, ARS, available cryptocurrencies: BTC, ETH, BAT, USDT, ALGO, TRX, OKB.
Even if this wide list does not include the currency you want to buy, such as Bitcoin or USDT, it’s okay — the service will automatically convert your currency into the payment currency and the Bank will make the exchange. Exchanges take place within 1–3 minutes, it is enough to pass quick verification once, which allows you to work with a volume of > 15,000 euros per month.

Exchange of cryptocurrencies for pound, dollars, euros, and withdrawal of Bankcard

In addition to the fact that you can now easily buy a cryptocurrency for fiat currencies, pound, dollars or any other, during this week we will finish work on the withdrawal to a Bank card and you can easily withdraw your profit to the card, the most important thing is that this is a completely legal method, and all operations pass through banks and jurisdictions where work with digital assets is legalized.
This means that when you buy or make a withdrawal to the card, you get legal funds that are credited to you by the Bank or payment system.
If you are used to working with effective tools that work in a new way, or rather correctly and legally, then this service is for you. Fast crediting, easy exchange, a large selection of currency pairs, that’s what the company is betting on.
We work with the most reliable third-party partners to make your cryptocurrency process easy and convenient, and most importantly safe for You. The service supports plastic and virtual Bank cards VISA, MasterCard, MIR, and other payment systems for fast payment processing.
On the exchange page, you can choose any currency pair to exchange in the opposite direction, for example, GBP to BTC or USD to BTC. Choose a suitable pair for exchange, available fiat currencies: RUB, USD, EUR, GBP, UAH, IDR, KRW, JPY, TRY, ARS, available cryptocurrencies for exchange: BTC, ETH, BAT, USDT, ALGO, TRX, OKB.
How it works
When buying cryptocurrency for the first time, your Bank reserves (holds) the requested amount, then this amount is transferred to the authorization waiting state. As soon as the Bank freezes the fiat funds, the service fixes the exchange rate at the time of creating the application, reserves the cryptocurrency, and provides you with 30–40 minutes to complete verification. After successful verification, the service charges cryptocurrency to the wallet.

Quick verification

Verification takes 2–3 minutes and requires only one time to perform operations every day. The “Know Your Customer” (KYC) procedure is necessary to exchange cryptocurrencies for fiat currencies.
As you understand, you need to pass verification 1 time, regardless of whether you withdraw funds or buy currency, after passing verification, all services are available to You without any further confirmation.

New currency

Support for other currencies, including TKEY, will be added gradually and highlighted through service updates. As for the TKEY exchange, it will become available in exchange services after listing on the exchange. Listing on an exchange allows you to automate the exchange process, link the necessary services, and most importantly, the exchange provides liquidity, which is key when we talk about exchanging for a particular currency.
We will tell you more about the operation of the service and its advantages, chips, in a separate material dedicated to the withdrawal and purchase of cryptocurrencies for fiat currencies, as well as touch on various banking issues and tell you how you can combine the SWAP service for more efficient exchange and withdrawal to the card.

Charitable activity

By making an exchange or purchase of cryptocurrency, you help children and people who need our help. We deduct 0.1% of the profit from each transaction to charity funds.
This is the fastest and most comfortable way of charity, which allows you to bring together people who are not indifferent to other people’s problems. TKEY enables people to do good deeds, and the resulting turnover profit of 0.1% is sent to charity funds every month. Together with You, we create new opportunities for people in need who need help — “Big things have small beginnings”.
How does it work?
You have made an exchange or purchase operation, the company has accumulated the volume of these operations for a month->the company has chosen a charity Fund->sent funds to the charity Fund’s account. Priority charity funds are children’s aid funds. You can always suggest a candidate for a particular Fund by sending a message to [[email protected]](mailto:[email protected]).
Why do we write Funds and not a Fund?
This is the first launch of the service, so depending on the monthly volume, we will focus on distributing funds to one charity or several. For example, if we have accumulated $ 10,000, we can distribute $ 5,000 to 2 funds. if we have accumulated $ 100, it is logical that we will only send this amount to 1 Fund. With the development of the service, we will be able to focus on several funds, which we will actively help due to the received volume.

New sections, improvements for existing services

Menu logic and site structure

The menu logic has been revised. now more items are available on the menu and they are divided into sections. Navigation through the sections has become much easier and more convenient. for some sections, QR codes are available for Russian and English-speaking audiences, and for representatives of Asian countries, all sections are available by QR code.


New blocks were added, the entire page was fully localized and is available in Chinese, Korean, English and Russian, and QR codes were added for easy navigation for the Asian audience.

Documentation for the exchange

We have already mentioned that there is a section for exchanges with the necessary documentation for listing, now it is available in English. In the next updates, it will be translated into Russian, Chinese (Traditional and Simplified), and Korean.

Market Data (Coin Data)

The market data section has been optimized for mobile apps. Charts are expanded and optimized page borders for most mobile devices, and you can search for cryptocurrencies and tokens that interest you.


Added answers to frequently asked questions in various sections of the site, You can find the information directly on the section page, for example, TKEY-QT, SWAP or Core. Right on the page there is a FAQ section, in which we disclose answers to questions, for example: How are You going to solve the scalability problem, or why did you choose Phoenix as the logo and symbol of the project, or how do you exchange cryptocurrency for pound or dollars? As you can see, you can get answers to different questions, depending on the topic of the site section.


For convenience, the site’s footer has been expanded and new sections (quick tabs) are included, which are also available in the QR-code format. In addition to various details, the footer is now accompanied by the company’s coat of arms — the Phoenix, which is the symbol of the entire community, the Phoenix Alliance.

Page 404

Added page 404, which is also an integral part of the site. now when you go to a non-existent site page, all the necessary menu items are fully available to us, which will quickly Orient You and direct you to the desired section.

What is waiting for us in the nearest future?

In addition to various improvements, connecting services, our team has been working every day on other main areas of the Tkeycoin project, which are already being prepared for the next release and we will tell you what updates, what plans, events, and what else will be interesting this year.

Online conference with management

An online conference in question-answer format will be organized. The main task of the conference, in addition to questions and answers, is to discuss plans, talk about new directions, touch on issues of legislation, and analyze current issues of users.
The online meeting format will allow you to get feedback and discuss a large number of issues in a short time. Questions related to technical support and other questions that can be answered through the administration will not be discussed.
The meeting involves the development, constructive, and suggestions from users for further development of the Tkeycoin project. If you are interested in participating in the conference, you can also make business proposals during it, please use the time to your advantage. We work for you.

New content: reports, new categories, useful information

Based on user feedback, we introduce new categories to our content plan:
Reports This section will be accompanied by information about the work done by the team for the month, the format of submission — abstracts, highlights. This format will help establish feedback between users and developers.
In addition to the content that we produce ourselves, users have questions that arise during the process of working with the project’s services, as well as during interaction with the project itself. To avoid making guesses and making up stories, we have introduced the question-answer category.
Users ask questions in comments, and the company prepares answers based on the questions and they are published in the post. Depending on the number of questions, the post generates all the answers, or the post is divided into parts if the number of questions for the past period was the largest. In addition to asking questions, you can make suggestions to the project, for example, about new features or directions.
This format also builds feedback and helps to improve all services. the most important thing is that it can not only help us but also you, as the offer and questions will help you focus on the tasks that the end-user wants to see.

TKEY-POOL (Tkeycoin pool)

We are completing the work and debugging of the official pool for Tkeycoin, this is a completely new approach for mining Tkeycoin. The pool will feature higher performance and stable architecture, a light interface, and objective commissions.
A pool is a highly loaded system that works 24/7/365, it turns out that such a product hides a sufficient number of lines of code and, most importantly, is built on a reliable architecture that can withstand +50000–100000 miners, not to mention the number of connected devices for this number of miners.
A cryptocurrency pool is a combination of the hardware power of many miners at once to increase the probability of finding a block. The reward for a block obtained by the pool is distributed among all participants.
The TKEY pool is developed taking into account the features of the Tkeycoin blockchain, including multi-blockchain, transaction model, hashing, blocks, and other nuances that are an upgrade of the blockchain among others. Together with the pool, the TKEY network is being tested: high loads, attacks, and other tests that show positive results, proving that the TKEY blockchain can work under any loads and is protected from attacks.
Our task was to: 1. Stable system for handling high loads; 2. Adaptation pool for any software; 3. Connecting any hardware for mining cryptocurrency Tkeycoin; 4. Fair remuneration calculation; 5. Security.
The main goal is for any user, regardless of the software and hardware used, to be able to connect to Tkeycoin mining via a pool. The first releases will be accompanied by a simple user-friendly interface, easy connection, instructions for various mining programs that can be connected.
In future releases, we will optimize the operation of the pool, add new features, as well as tracking functions and other nice things. any suggestions from miners and the community are interesting to us and will be implemented, so do not hesitate to send your suggestions after the launch.

Work on the TkeySpace mobile app is also not standing still. We will soon release updates for TkeySpace on Android and iOS.
This release is a complete transition to the most stable version of the mobile wallet. This means that after the update, even with the largest changes, the user will not need to completely reinstall or restore to use the new features, as before, just update the app via the AppStore or GooglePlay.
Between the previous update has been a sufficient amount of time, on average, updates are released once a month. This update will be one of the major ones. We are finishing work on the code to prepare the app for the new features that will be available this year. Besides, we are improving the app’s logic, data processing speed, optimizing the code, restoring order, and preparing for the global market.

Exchange, purchase of cryptocurrency and withdrawal to the Debit/Credit Card
In addition to pleasant optimizations, the app will display the exchange and withdrawal to a Bankcard, tab with an optimized page for exchange, withdrawal, and the purchase will be available directly in the mobile app. This upgrade will also capture the cryptocurrency exchange SWAP page, which can be evaluated after the update. Other features and new features will be announced by the developers immediately after the release.

SWAP Update

The development team is finishing work on optimizing the SWAP service. Regardless of updates, it is available in working mode 24/7/365. The team is working on improving the operation, optimizing the page, changing the interfaces, improving navigation, and speeding up query processing. This update is also among the upcoming ones, along with the pool, mobile wallets, and other news that will excite.

Network Statistics

In the network statistics section, there are several sections that will be fixed — this is the hash rate of the network and the volume of Tkeycoin. Now the volume of Tkeycoin is displayed by mTKEY, and the graph itself indicates M TKEY, the user may incorrectly understand the volume of transactions in the network, so, given the current volume, it is advisable to switch the display to TKEY, and in the future switch to mTKEY for large volumes.
TKEY is divided into cryptograms (CryptoGramm, cgr), uTKEY (keys), and mTKEY. 1 TKEY = 100 000 000 cryptograms. 1 mTKEY = 100,000 cryptograms. 1 TKEY contains 1000 mTKEY. 1 mTKEY = 0.00100000 TKEY 1 uTKEY =100 cryptograms 1 TKEY contains 1,000,000 utkeys. 1 uTKEY (keys) = 0.00000100 TKEY 1 cgr = 0.00000001 TKEY

Cryptocurrency Exchange

This issue has become the cause of mass discussions, disputes, investigations, the subject of memes, kitchen, and online conversations, that just did not happen, that TKEY is not taken anywhere, someone made guesses that we are waiting for everyone to run away, or TKEY is a world conspiracy and around some actors, you can write a book or shoot a great series, not worse than Breaking Bad.
Jokes, jokes, but the question is serious. Since the 4th quarter of last year, the company has been actively working on the issue of listing, prepared the necessary platform for this, held several meetings, negotiations, released the necessary products, figured out various transfers of funds to the blockchain, worked out many small things, many major issues that were behind the scenes. Everything is ready, and it’s time to start soon. This will be a surprise, believe it or not, and we will meet you on the stock exchanges :)

What other plans does the company have?

Enabling payment at retail outlets

After entering the exchange, we will actively engage in connecting payments to implement them and link them to TKEY. The plan, strategy, and legal component are ready.

Payment development

This implies the development of payments and services that will expand the use of digital currencies in the commercial sphere. Application on the territory of Russia will depend on the Federal law on the CFA, in any case, we plan to analyze the law, after its release, to find a legal way to implement payments based on blockchain and digital assets. Therefore, until the law is released, we are keeping this initiative in the future, and we will work on other jurisdictions that will support it.
We left some plans behind the scenes, because they will make the greatest impact on the market and the value of our asset, and this — likes silence.

What useful materials will be released soon?

How to effectively use the SWAP service together with the exchange and purchase of cryptocurrency from a Bank card?

We will tell you in detail how to use these 2 services, how to save on payments and purchases, how to exchange tokens that are very difficult to exchange, how to quickly get money for them to the card, and much more.

The law CFA

Our opinion about the law of cryptocurrencies in Russia, what to pay attention to, what to prepare for, how to act if there is a complete ban. Let’s talk about legal nuances and banking practices.

TKEY blockchain

In this material, we will talk about the blockchain, analyze the issues of the system, expand the questions on attacks, payment processing, and touch on the system of multiple chains. The article suggests your suggestions, perhaps someone will have ideas that we will implement in the chain.
At the end,
Don’t forget to ask questions in the comments or send suggestions to [[email protected]](mailto:[email protected]) we will be happy to respond and consider your requests for any of our services. Collaboration, feedback, help us make the whole platform better.
Thank you for being with us! Until new meetings, stay tuned for news, updates, because the most unexpected news comes spontaneously.
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

600K+ HQ Combo list 19.3 mb (netflix,facebook,instagram,coinpot,steam,vpn...)

[ Removed by reddit on account of violating the content policy. ]
submitted by okba29 to u/okba29 [link] [comments]

03-02 20:43 - 'r/Bitcoin recap - February 2019' (self.Bitcoin) by /u/SamWouters removed from /r/Bitcoin within 1840-1850min

Hi Bitcoiners!
I’m back with the 26th monthly Bitcoin news recap.
For those unfamiliar, each day I pick out the most popularelevant/interesting stories in Bitcoin and save them. At the end of the month I release them in one batch, to give you a quick (but not necessarily the best) overview of what happened in bitcoin over the past month.
A recap of Bitcoin in February 2019
Adoption * [bitcoin can now be used to fund your public transport card in 37 cities in Argentina]1 (7 Feb) * [There are as many transactions today as in January 2018 but with all time low fees]2 (7 Feb) * [Bitcoin’s Lightning Network currently has 6000 nodes and $2.4M in capacity]3 (9 Feb) * [A service that lets you buy Domino’s Pizza via the Lightning Network in the US]4 (13 Feb) * [Bitcoin’s average block size is now 1.3MB]5 (14 Feb) * [An Argentinian company settles export deal with a client in Paraguay using bitcoin]6 (15 Feb) * [The Lightning Network reaches 700 btc in capacity]7 (16 Feb) * [A butchery in Kenya accepting bitcoin]8 (17 Feb) * [The ₿ symbol is now a listed currency when you long press the $ sign on a mobile keyboard]9 (19 Feb) * [A Lightning developer’s node is routing more than $10k per month for a 0.25% fee]10 (19 Feb) * [Jack Dorsey, CEO of Twitter and Square, promotes bitcoin tipping on Twitter]11 (20 Feb) * [bitcoin transactions near an all-time high of 3.87 transactions per second]12 (21 Feb) * [, a german finance site, starts lising the EUBTC exchange rate]13 (21 Feb) * [20% of Localbitcoins 4.8M visits come from Venezuela]14 (26 Feb) * [$52M of bitcoin bought on Cash app in Q4 2018]15 (27 Feb)
Development * [The Casa node has been open-sourced]16 (1 Feb) * [A specification for trustless non-pegged sidechains]17 (4 Feb) * [Blockstream creates a new Multisignature standard]18 (18 Feb) * [BTCPay Server now has payment requests]19 (26 Feb)
Security * [A discussion on traditional mixers vs Wasabi wallet]20 (2 Feb) * [Another Electrum wallet phishing attempt]21 (4 Feb) * [Someone gets scammed for $50 worth in bitcoin by a QR code switch]22 (19 Feb) * [Coinomi wallet sends your plain text seed phrase to Google’s remote spellchecker API]23 (27 Feb)
Business * [Kraken exchange CEO on the QuadrigaCX coins]24 (3 Feb) * [People discuss the bitcoins held by bankrupt QuadrigaCX]25 (4 Feb) * [TD Ameritrade is advertising how to invest in Bitcoin on YouTube]26 (10 Feb) * [Lightning integration will eventually come to Square’s Cash app according to its CEO]27 (11 Feb) * [Samsung’s Galaxy S10 will have secure storage for private keys built in]28 (20 Feb) * [A 21-year old couple is working on a hardware wallet]29 (23 Feb)
Research * [Bitcoin’s wealth distribution across addresses increased over the past 2 years]30 (13 Feb)
Education * [Bitcoin’s prehistory]31 (2 Feb) * [People discuss the best real-time bitcoin news feeds]32 (8 Feb) * [Someone discusses their small bitcoin mining operation]33 (9 Feb) * [A new report on financial privacy from Coin Center]34 (11 Feb) * [Andreas Antonopoulos on splicing]35 (25 Feb)
Regulation & Politics * [The SEC thinks some cryptocurrency will match their ETF requirements eventually]36 (7 Feb) * [Government-mandated asset seizure will be limited in the U.S.]37 (23 Feb)
Archeology (Financial Incumbents) * [The British pound is the oldest fiat currency at 317 years and now worth 0.5% of its original value]38 (4 Feb) * [JPMorgan Chase incorrectly analyses that bitcoin miners operate at a 16% loss]39 (12 Feb) * [JPMorgan Chase launches its own centralized JPM stablecoin]40 (14 Feb) * [The IMF comes up with a plan to devalue cash and introduce negative intrest rates]41 (17 Feb) * [Venmo’s KYC when someone paid back a sandwich is a great reminder why we need bitcoin]42 (20 Feb)
Price & Trading * [Bitcoin passes $4k for the first time in a while]43 (19 Feb)
Fun & Other * [A discussion on former Bitcoin developer Mike Hearn]44 (1 Feb) * [Twitter CEO Jack Dorsey says he thinks the currency of the Internet will be bitcoin]45 (2 Feb) * [Twitter and Square CEO Jack Dorsey passes on the Lightning Torch]46 (5 Feb) * [Some instructions on how to send letters using a computer if you think sending bitcoin is difficult]47 (6 Feb) * [Why Bitcoin should succeed]48 (7 Feb) * [Other technologies that died just like Bitcoin]49 (8 Feb) * [Elon Musks compliments cryptocurrency for value transfers]50 (20 Feb) * [Elon Musk says whoever owns the early btc deserves a Nobel prize in delayed gratification]51 (21 Feb) * [A Lightning-powered chicken feeder]52 (22 Feb) * [A Malaysian bookstore with Bitcoin and Blockchain books on top of the finance section]53 (28 Feb)
Bitcoin recap - February 2019
Go1dfish undelete link
unreddit undelete link
Author: SamWouters
1: *ww*r**di*.com/***i*coin*comme*t*/ao4ojn/arg*n*ina*bitc**n_now_a*cepte*_fo*_pub*ic/ 2: www.r***oi*/c*mments/a*1*si**h**number*of*trans*c*io***to***_are*as_high_as/ 3: w*w.reddit.**m*r*Bitcoin/co*me*ts/aow**w/bitcoi*s_lightn*n*_net**rk_h*s**i***_new_r*cord* 4: **/*i*c*in/*omme**s/***gux/y**_*an_now_buy_*omi*os*pizza*via*th*_light*i*g/ 5: *ww**edd**B*t**in/comm**ts/aqj***/bitc*i*_b*ocks_just_h**_*n_a*ltim*_high_o*_a_13m*/ 6: www.r*ddi*.com*Bitc*in/co*ment*/a*zqns/arge*tina***t*le**exp*rt_**al_wi*h*pa*agua*_*s*ng/ 7: **it.*o*/B**c**n/comm*nts*ar78r3/ligh*ning_ne*wo*k*has_*e**hed_*0*_btc*tot*l/ 8: www*re**i*.com/*i*c*in/*omments/arjak9/adop***n_*n_ken*** 9: www.*ed*it.c*m*Bit*o*n*c*mments/asn*hq/*oogl*_introdu*e*_b*tcoi*_*ym**l*o*_ios_*eyboar*s* 10: *w*.r*ddi*.com*Bitc*in/*omm*nts/a*c*0o/im_p*easan*ly*sur*ri**d_that_*her**is*n*w*so_mu*h/ 11: ww*.redd**.co*/***itc**n/****ents/asqi6y/jac*_promotes_bitcoi*_t*ppi** 12: w***r*d*i*.com/r*Bi*c*i*/comments/a**i*v/bitc**n_transac*io*s_h**_387_tx*_p*r_second/ 13: ww*.r*d*it.c*m/Bitcoin/c*m*en**/at39g3/fi*anz*nn**_*_big_*erm*n_***a*ce_*ite*sta*ted/ 14: www.reddit.*o*/*/Bit*o***c*mmen**/av2xd0/localbitco*nscom_ha*_2**of**t*_4*2_**llion**is*ts/ 15: w*w.reddit*c*m/*/Bitc*in/com*ents/avii2q/52*m*l*ion_*f*bi*c*i*_**ug**_on_**sh_ap*_*n_q4/ 16: *w**reddit*com/r**itc**n/*om*ents/alvv**/the_c*sa_hodl**ode_h*s_bee*_open_so**ce*/ 17: **w.reddit*com**/Bit*o*n/c**men*s/an*o*i**pe*s_for**ew_trustles*_*o**egged_si*echains/ 18:**t.*om*B*t**i*/comments/as0*x9*b*o*k*tream_musig_a**ew_mult*sig*atur*_**a*da*d/ 19: **w.*eddi*.com/Bitcoin/***me*ts/a*0c2b/int**ducin*_btc*ay*serv**_pa*m**t_requ**t_i*voic*/ 20: www*redd**i*coin/comme*t**am*i*9**radi*i*n*l_m*xe*s_v*_wasabi**allet/ 21: ww*.*eddit.*om/r*B*t**in/c*mmen*s/an2khh*is_th*s_*_*hish*n*_at*empt*el***rumorg_*oe*_not/ 22: w*w*red**/*it*oin/commen**/as6*vw/im*d*mb_d*nt_g***sc*mmed*like_*e/ 23: w*w.r*d*it.c**/Bitc***/co*ments/av*87*/securit*_vuln*rabil*t*_c*inomi_w*ll*t_s*n**_y*u 24: w**di*.co*/*it*oin**omment*/am**4*/jespow_we_hav*_t*ousan*s_**_wal*et_a*dre*s**/ 25: ww***eddi**com/B*tcoin*c*mme**s*an*17*/bitc**n_investor*_m*y**e_*ut_190_mill*on_aft* 26:**tcoin/*om***ts**p3e*k/td_***ri**a**_116*6bn_in_*sse**_adv*rti*ing_how/ 27: **w.reddi*.co*/r***t*oin*com**n*s/aphq4c****k_dor*ey_lightnin*_com**g*to_square_cash_*pp/ 28: ww*.reddi*.co*/*itcoi*/*omments/astc**/*a*axy_*1*_*ec**e_s*o*a**_*acked_by_*a*dware/ 29: www.r**di***om*Bi*coin/comment*/atswh0/as**_**uple*of_21_year_ol**_w*o_dr**med_*f_u*i*g* 30: **w.reddit.c*m/Bitc*in/com*en*s/aq6*q*/99_*f**ll***tc*in_ow**d_b*_86_*f_wallets_*hi*_*s/ 31: www.r*****coin/com*en*s*am*c0**bi**oin_pre*isto*y/ 32: www.*e*d**.co***itcoin/c*mment*/aoh*ss/b*s*_free*real*i*e_ne*s*an*_a*alyt**s_platf*rm/ 33: *ww****dit*co*/*itc*in/co*ments/a*xg9e/m*_smal*_bitcoin_mini*g*ope*ation*u**at*/ 34: *ww.***Bi*coi*/c**ments/apjk*1*we*m*st_prote*t_ou*_ability_**_*ransac*_p*i**t*ly* 35: www.r*dd***c*m/Bitcoi*/com*ents*a*fd*7*splicing_is_p*o*abl**on**of**he_most_po*e*ful_a**/ 36: ***Bitcoin/commen*s*ao*e*s/bitcoin_e*f**s_in**itable_**y*_s**_c*m*iss*one** 37: www*reddit*c*m**itco*n*commen*s/a*yl*9*loc*l*sta*e**ederal**ove*nments_*a*_no_long* 38: www.r**di**c*m/*/B*t*oi*/*om**nts/an37k6/the_british_po*nd_i***he_oldest_**at*c*r*e*cy_in/ 39: www.***dit.c**/Bi*co**/c*m**nt**a*mns*/pro*ucing_a_sin*l*_bit*o*n_now_c*sts_*060_on/ 40: ***t.**m/B*tcoin/**mment*/aqjtq*/after*cr*t**izing_bitcoin_f*r*years***_*org*n* 41:*dit.*o*/****oi**commen*s/ar*vj*/i*f*comes_up_wi*h_pl*n_to_d*value**hys*cal_*ash* 42: w*w*re**it*com/Bit*oin/c*mmen*s*a**x*b/*y_fri*nd**ought_me_a_s*n*wi*h_at_a_sta**_and_i* 43: **w*re*di*.*o*/r**itcoin/co*ments/a*a*h5/bitc*in*at_4000/ 44: ww*.redd**c*i**comm*nts/am0*7r*1_did_yo**kn*w_be**een*201*_*n*_*013_fo*me*_*ike/ 45: ww*.reddi*.com/Bitcoin/com*ents/a*ep*e/t*it*er**eo_t*_joe_ro**n*i_*h*n*_*urre**y_*f_*he* 46: www.*eddi*.*om/*/*it*o*n/*omme*ts/a*irt9**ack_twitt*rsqu*re_ceo_*ust_took_*h*_lnt*u*****in/ 47: www.**Bi*coin*co*m*nts/a*pk9s*if_*ou_**in*_usi*g**itcoin_*s*di*ficult*here*a*e* 48: ***it.*om/r*Bit*oin/**m**n*s/ao5j*e/old_bu*_good_wh*_b*tco*n_*h**ld_*ucceed/ 49: www*r*****it**in/comments/*o*28e/j*st*rem*mb*r_that_b*t*oin_d**d/ 50: www.***Bitc*i*/c*mm*nts**s*o*0/el**_musk_*all**bitcoin*brilli***_bett**_than/ 51: www*redd**B*tcoin/c**ment*/a**j*5*elon_musk*whoever_owns**he_*arl***tc_deserv****/ 52: *ww*reddit.**m*Bit*o**/c*mments*at*mdd/th*_new_*itcoin_*illerap*_*_*ightning_*o*e**d* 53:*it*c*m/r*Bitcoin/c*mments/a*t*0*/malay*ian_b**k*to*e**ith_*itc***_a*d_c**pto*books/
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

Date: 2017-03-24
Author(s): Maria Apostolaki, Aviv Zohar, Laurent Vanbever

Link to Paper

As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) can intercept and manipulate a large fraction of Bitcoin traffic. This paper presents the first taxonomy of routing attacks and their impact on Bitcoin, considering both small-scale attacks, targeting individual nodes, and large-scale attacks, targeting the network as a whole. While challenging, we show that two key properties make routing attacks practical: (i) the efficiency of routing manipulation; and (ii) the significant centralization of Bitcoin in terms of mining and routing. Specifically, we find that any network attacker can hijack few (<100) BGP prefixes to isolate ~50% of the mining power---even when considering that mining pools are heavily multi-homed. We also show that on-path network attackers can considerably slow down block propagation by interfering with few key Bitcoin messages. We demonstrate the feasibility of each attack against the deployed Bitcoin software. We also quantify their effectiveness on the current Bitcoin topology using data collected from a Bitcoin supernode combined with BGP routing data. The potential damage to Bitcoin is worrying. By isolating parts of the network or delaying block propagation, attackers can cause a significant amount of mining power to be wasted, leading to revenue losses and enabling a wide range of exploits such as double spending. To prevent such effects in practice, we provide both short and long-term countermeasures, some of which can be deployed immediately.

[1] “A Next-Generation Smart Contract and Decentralized Application Platform ,”
[2] “Bitcoin Blockchain Statistics,”
[3] “bitnodes,”
[4] “Bitnodes. Estimating the size of Bitcoin network,”
[5] “CAIDA Macroscopic Internet Topology Data Kit.”
[6] “Dyn Research. Pakistan hijacks YouTube.”
[7] “FALCON,”
[8] “FIBRE,”
[9] “Litecoin ,”
[10] “RIPE RIS Raw Data,”
[11] “Routeviews Prefix to AS mappings Dataset (pfx2as) for IPv4 and IPv6.”
[12] “Scapy.”
[13] “The Relay Network,”
[14] “ZCash,”
[15] A. M. Antonopoulos, “The bitcoin network,” in Mastering Bitcoin. O’Reilly Media, Inc., 2013, ch. 6.
[16] H. Ballani, P. Francis, and X. Zhang, “A Study of Prefix Hijacking and Interception in the Internet,” ser. SIGCOMM ’07. New York, NY, USA: ACM, 2007, pp. 265–276.
[17] A. Boldyreva and R. Lychev, “Provable Security of S-BGP and Other Path Vector Protocols: Model, Analysis and Extensions,” ser. CCS ’12. New York, NY, USA: ACM, 2012, pp. 541–552.
[18] J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Sok: Research perspectives and challenges for bitcoin and cryptocurrencies,” in Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 2015, pp. 104–121.
[19] P. Bosshart, D. Daly, G. Gibb, M. Izzard, N. McKeown, J. Rexford, C. Schlesinger, D. Talayco, A. Vahdat, G. Varghese et al., “P4: Programming protocol-independent packet processors,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 87–95, 2014.
[20] C. Decker and R. Wattenhofer, “Information propagation in the bitcoin network,” in Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 2013, pp. 1–10.
[21] ——, Bitcoin Transaction Malleability and MtGox. Cham: Springer International Publishing, 2014, pp. 313–326. [Online]. Available:
[22] M. Edman and P. Syverson, “As-awareness in tor path selection,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS ’09, 2009.
[23] I. Eyal, “The miner’s dilemma,” in 2015 IEEE Symposium on Security and Privacy. IEEE, 2015, pp. 89–103.
[24] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
[25] N. Feamster and R. Dingledine, “Location diversity in anonymity networks,” in WPES, Washington, DC, USA, October 2004.
[26] J. Garay, A. Kiayias, and N. Leonardos, “The bitcoin backbone protocol: Analysis and applications,” in Advances in Cryptology-EUROCRYPT 2015. Springer, 2015, pp. 281–310.
[27] A. Gervais, G. O. Karama, V. Capkun, and S. Capkun, “Is bitcoin a decentralized currency?” IEEE security & privacy, vol. 12, no. 3, pp. 54–60, 2014.
[28] A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun, “Tampering with the delivery of blocks and transactions in bitcoin,” in Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’15. New York, NY, USA: ACM, 2015, pp. 692–705.
[29] P. Gill, M. Schapira, and S. Goldberg, “Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security,” ser. SIGCOMM ’11. New York, NY, USA: ACM, 2011, pp. 14–25.
[30] S. Goldberg, M. Schapira, P. Hummon, and J. Rexford, “How Secure Are Secure Interdomain Routing Protocols,” in SIGCOMM, 2010.
[31] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse attacks on bitcoin’s peer-to-peer network,” in 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 129–144.
[32] Y.-C. Hu, A. Perrig, and M. Sirbu, “SPV: Secure Path Vector Routing for Securing BGP,” ser. SIGCOMM ’04. New York, NY, USA: ACM, 2004, pp. 179–192.
[33] J. Karlin, S. Forrest, and J. Rexford, “Pretty Good BGP: Improving BGP by Cautiously Adopting Routes,” in Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols, ser. ICNP ’06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 290–299.
[34] E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, “Enhancing bitcoin security and performance with strong consistency via collective signing,” in 25th USENIX Security Symposium (USENIX Security 16). Austin, TX: USENIX Association, 2016, pp. 279–296.
[35] J. A. Kroll, I. C. Davey, and E. W. Felten, “The economics of bitcoin mining, or bitcoin in the presence of adversaries.” Citeseer.
[36] A. Miller, J. Litton, A. Pachulski, N. Gupta, D. Levin, N. Spring, and B. Bhattacharjee, “Discovering bitcoin’s public topology and influential nodes.”
[37] S. J. Murdoch and P. Zielinski, “Sampled traffic analysis by Internet- ´ exchange-level adversaries,” in Privacy Enhancing Technologies: 7th International Symposium, PET 2007, N. Borisov and P. Golle, Eds. Springer-Verlag, LNCS 4776, 2007, pp. 167–183.
[38] K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: Generalizing selfish mining and combining with an eclipse attack,” IACR Cryptology ePrint Archive, vol. 2015, p. 796, 2015.
[39] T. Neudecker, P. Andelfinger, and H. Hartenstein, “A simulation model for analysis of attacks on the bitcoin peer-to-peer network,” in IFIP/IEEE International Symposium on Internet Management. IEEE, 2015, pp. 1327–1332.
[40] P. v. Oorschot, T. Wan, and E. Kranakis, “On interdomain routing security and pretty secure bgp (psbgp),” ACM Trans. Inf. Syst. Secur., vol. 10, no. 3, Jul. 2007.
[41] A. Pilosov and T. Kapela, “Stealing The Internet. An Internet-Scale Man In The Middle Attack.” DEFCON 16.
[42] Y. Rekhter and T. Li, A Border Gateway Protocol 4 (BGP-4), IETF, Mar. 1995, rFC 1771.
[43] M. Rosenfeld, “Analysis of hashrate-based double spending,” arXiv preprint arXiv:1402.2009, 2014.
[44] A. Sapirshtein, Y. Sompolinsky, and A. Zohar, “Optimal selfish mining strategies in bitcoin,” CoRR, vol. abs/1507.06183, 2015.
[45] E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in 2014 IEEE Symposium on Security and Privacy. IEEE, 2014, pp. 459–474.
[46] B. Schlinker, K. Zarifis, I. Cunha, N. Feamster, and E. Katz-Bassett, “Peering: An as for us,” in Proceedings of the 13th ACM Workshop on Hot Topics in Networks, ser. HotNets-XIII. New York, NY, USA: ACM, 2014, pp. 18:1–18:7.
[47] J. Schnelli, “BIP 151: Peer-to-Peer Communication Encryption,” Mar. 2016,
[48] X. Shi, Y. Xiang, Z. Wang, X. Yin, and J. Wu, “Detecting prefix hijackings in the Internet with Argus,” ser. IMC ’12. New York, NY, USA: ACM, 2012, pp. 15–28.
[49] Y. Sompolinsky and A. Zohar, “Secure high-rate transaction processing in bitcoin,” in Financial Cryptography and Data Security. Springer, 2015, pp. 507–527.
[50] Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal, “RAPTOR: Routing attacks on privacy in TOR.” in USENIX Security, 2015.
[51] A. Tonk, “Large scale BGP hijack out of India,” 2015,
[52] ——, “Massive route leak causes Internet slowdown,” 2015,
[53] L. Vanbever, O. Li, J. Rexford, and P. Mittal, “Anonymity on quicksand: Using BGP to compromise TOR,” in ACM HotNets, 2014.
[54] Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, “Practical defenses against BGP prefix hijacking,” ser. CoNEXT ’07. New York, NY, USA: ACM, 2007.
[55] Z. Zhang, Y. Zhang, Y. C. Hu, Z. M. Mao, and R. Bush, “iSPY: Detecting IP prefix hijacking on my own,” IEEE/ACM Trans. Netw., vol. 18, no. 6, pp. 1815–1828, Dec. 2010.
submitted by dj-gutz to myrXiv [link] [comments]

Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance

Date: 2017-10-19
Author(s): George Bissias, Brian Neil Levine

Link to Paper

Blockchain systems are designed to produce blocks at a constant average rate. The most popular systems currently employ a Proof of Work (PoW) algorithm as a means of creating these blocks. Bitcoin produces, on average, one block every 10 minutes. An unfortunate limitation of all deployed PoW blockchain systems is that the time between blocks has high variance. For example, 5% of the time, Bitcoin's inter-block time is at least 40 minutes. This variance impedes the consistent flow of validated transactions through the system. We propose an alternative process for PoW-based block discovery that results in an inter-block time with significantly lower variance. Our algorithm, called Bobtail, generalizes the current algorithm by comparing the mean of the k lowest order statistics to a target. We show that the variance of inter-block times decreases as k increases. If our approach were applied to Bitcoin, about 80% of blocks would be found within 7 to 12 minutes, and nearly every block would be found within 5 to 18 minutes; the average inter-block time would remain at 10 minutes. Further, we show that low-variance mining significantly thwarts doublespend and selfish mining attacks. For Bitcoin and Ethereum currently (k=1), an attacker with 40% of the mining power will succeed with 30% probability when the merchant sets up an embargo of 8 blocks; however, when k>=20, the probability of success falls to less than 1%. Similarly, for Bitcoin and Ethereum currently, a selfish miner with 40% of the mining power will claim about 66% of blocks; however, when k>=5, the same miner will find that selfish mining is less successful than honest mining. The cost of our approach is a larger block header.

[1] Bitcoin cash.
[2] Litecoin.
[3] Ethash., Aug 3 2017.
[4] Martin Abadi, Mike Burrows, Mark Manasse, and Ted Wobber. Moderately hard, memory-bound functions. ACM Trans. Internet Technol., 5(2):299–327, May 2005.
[5] Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177, 2001.
[6] Adam Back. Hashcash - Amortizable Publicly Auditable CostFunctions, 2002.
[7] Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. Cryptocurrencies without proof of work. In International Conference on Financial Cryptography and Data Security, pages 142–157. Springer, 2016.
[8] Iddo Bentov, Charles Lee, Alex Mizrahi, and Meni Rosenfeld. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [Extended Abstract] y. ACM SIGMETRICS Performance Evaluation Review, 42(3):34–37, 2014.
[9] Bobtails.
[10] Xavier Boyen, Christopher Carr, and Thomas Haines. BlockchainFree Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions. Cryptology ePrint Archive, Report 2016/871, Sept 2016.
[11] George Casella and Roger L. Berger. Statistical inference. Brooks Cole, Pacific Grove, CA, 2002.
[12] Liqun Chen and Wenbo Mao. An auditable metering scheme for web advertisement applications. Information Security, pages 475–485, 2001.
[13] F. Coelho. An (Almost) Constant-Effort Solution- Verification Proofof-Work Protocol Based on Merkle Trees. In Progress in Cryptology – AFRICACRYPT, pages 80–93, June 2008.
[14] Drew Dean and Adam Stubblefield. Using client puzzles to protect tls. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10, SSYM’01, Berkeley, CA, USA, 2001. USENIX Association.
[15] J. Douceur. The Sybil Attack. In Proc. Intl Wkshp on Peer-to-Peer Systems (IPTPS), March 2002.
[16] Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In In 12th Annual International Cryptology Conference, pages 139–147, 1992.
[17] Ethereum Homestead Documentation.
[18] Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 45–59, Santa Clara, CA, 2016. USENIX Association.
[19] Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security, pages 436–454. Springer, 2014.
[20] M. Franklin and D. Malkhi. Auditable metering with ligthweigth security. In Proc. Financial Cryptography, pages 151–160, 1997.
[21] Arthur Gervais, Ghassan O. Karame, Karl Wust, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. On the Security and Performance of Proof of Work Blockchains., 2016.
[22] Bogdan Groza and Bogdan Warinschi. Cryptographic puzzles and dos resilience, revisited. Des. Codes Cryptography, 73(1):177–207, October 2014.
[23] Markus Jakobsson and Ari Juels. Proofs of Work and Bread Pudding Protocols. In Proc. Conference on Secure Information Networks: Communications and Multimedia Security, pages 258–272, 1999.
[24] A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. Networks and Distributed Security Systems, pages 151–165, 1999.
[25] Ben Laurie and Richard Clayton. “Proof-of-work" proves not to work; version 0.2. In Proc. Workshop on Economics and Information Security, 2004.
[26] Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. Permacoin: Repurposing bitcoin work for data preservation. In Proc. IEEE Security and Privacy, pages 475–490, 2014.
[27] Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, May 2009.
[28] A. Pinar Ozisik and Brian Neil Levine. An Explanation of Nakamoto’s Analysis of Double-spend Attacks. Technical Report arXiv:1701.03977, University of Massachusetts, Amherst, MA, January 2017.
[29] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal Selfish Mining Strategies in Bitcoin., July 2015.
[30] XiaoFeng Wang and Michael K. Reiter. Defending against denial-ofservice attacks with puzzle auctions. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP ’03, pages 78–, Washington, DC, USA, 2003. IEEE Computer Society
submitted by dj-gutz to myrXiv [link] [comments]

Merged Mining: Curse or Cure?

Cryptology ePrint Archive: Report 2017/791
Date: 2017-08-22
Author(s): Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios Voyiatzis, Edgar Weippl

Link to Paper

Merged mining refers to the concept of mining more than one cryptocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date little is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for extended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining.

  1. M. Ali, J. Nelson, R. Shea, and M. J. Freedman. Blockstack: A global naming and storage system secured by blockchains. In 2016 USENIX Annual Technical Conference (USENIX ATC 16), pages 181–194, Denver, CO, 2016. USENIX Association.
  2. L. Anderson, R. Holz, A. Ponomarev, P. Rimba, and I. Weber. New kids on the block: an analysis of modern blockchains., 2016. Accessed: 2016-11-10.
  3. E. Androulaki, S. Capkun, and G. O. Karame. Two bitcoins at the price of one? doublespending attacks on fast payments in bitcoin. In CCS, 2012.
  4. A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timon, and P. Wuille. Enabling blockchain innovations with pegged ´ sidechains., 2014. Accessed: 2016-11-10.
  5. I. Bentov, R. Pass, and E. Shi. Snow white: Provably secure proofs of stake, 2016.
  6. C. Decker and R. Wattenhofer. Information propagation in the bitcoin network. In Peerto-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pages 1–10. IEEE, 2013.
  7. C. Decker and R. Wattenhofer. Bitcoin transaction malleability and mtgox. In Computer Security-ESORICS 2014, pages 313–326. Springer, 2014.
  8. Dogecoin community. Dogecoin reference implementation. Accessed: 2016-11-10.
  9. I. Eyal. The miner’s dilemma. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 89–103. IEEE, 2015.
  10. I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436–454. Springer, 2014.
  11. P. Franco. Understanding Bitcoin: Cryptography, engineering and economics. John Wiley & Sons, 2014.
  12. A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdorf, and S. Capkun. On the ¨ security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 3–16, New York, NY, USA, 2016. ACM.
  13. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129–144, 2015.
  14. Huntercoin developers. Huntercoin reference implementation. Accessed: 2017-06-05.
  15. M. Jakobsson and A. Juels. Proofs of work and bread pudding protocols. In Secure Information Networks, pages 258–272. Springer, 1999.
  16. H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, and A. Narayanan. An empirical study of namecoin and lessons for decentralized namespace design. In WEIS, 2015.
  17. G. O. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Capkun. Misbehavior in ˇ bitcoin: A study of double-spending and accountability. volume 18, page 2. ACM, 2015.
  18. A. Kiayias, A. Russell, B. David, and R. Oliynykov. Ouroboros: A provably secure proof-of-stake blockchain protocol., 2016. Accessed: 2017-02-20.
  19. Lerner, Sergio D. Rootstock plattform. Accessed: 2017-06-05.
  20. Y. Lewenberg, Y. Bachrach, Y. Sompolinsky, A. Zohar, and J. S. Rosenschein. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pages 919–927. International Foundation for Autonomous Agents and Multiagent Systems, 2015.
  21. Litecoin community. Litecoin reference implementation. Accessed: 2016-11-10.
  22. S. Micali. Algorand: The efficient and democratic ledger., 2016. Accessed: 2017-02-09.
  23. Myriad core developers. Myriadcoin reference implementation. Accessed: 2017-06-05.
  24. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system., Dec 2008. Accessed: 2016-11-10.
  25. S. Nakamoto. Merged mining specification., Apr 2011. Accessed: 2016-11-10.
  26. Namecoin community. Namecoin reference implementation. Accessed: 2016-11-10.
  27. A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton, NJ, USA, 2016.
  28. K. Nayak, S. Kumar, A. Miller, and E. Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016.
  29. R. Pass and E. Shi. Hybrid consensus: Scalable permissionless consensus., Sep 2016. Accessed: 2016-11-10.
  30. M. Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.
  31. M. Rosenfeld. Analysis of hashrate-based double spending., 2014. Accessed: 2016-11-10.
  32. A. Sapirshtein, Y. Sompolinsky, and A. Zohar. Optimal Selfish Mining Strategies in Bitcoin, pages 515–532. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017.
  33. Sathoshi Nakamoto. Comment in ”bitdns and generalizing bitcoin” bitcointalk thread. Accessed: 2017-06-05.
  34. O. Schrijvers, J. Bonneau, D. Boneh, and T. Roughgarden. Incentive compatibility of bitcoin mining pool reward functions. In FC ’16: Proceedings of the the 20th International Conference on Financial Cryptography, February 2016.
  35. M. B. Taylor. Bitcoin and the age of bespoke silicon. In Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, page 16. IEEE Press, 2013.
submitted by dj-gutz to myrXiv [link] [comments]

Security of the Blockchain against Long Delay Attack

Cryptology ePrint Archive: Report 2018/800
Date: 2018-08-31
Author(s): Puwen Wei, Quan Yuan, Yuliang Zheng

Link to Paper

The consensus protocol underlying Bitcoin (the blockchain) works remarkably well in practice. However proving its security in a formal setting has been an elusive goal. A recent analytical result by Pass, Seeman and shelat indicates that an idealized blockchain is indeed secure against attacks in an asynchronous network where messages are maliciously delayed by at most Δ≪1/npΔ≪1/np, with nn being the number of miners and pp the mining hardness. This paper improves upon the result by showing that if appropriate inconsistency tolerance is allowed the blockchain can withstand even more powerful external attacks in the honest miner setting. Specifically we prove that the blockchain is secure against long delay attacks with Δ≥1/npΔ≥1/np in an asynchronous network.

  1. Badertscher, C., Garay, J., Maurer, U., Tschudi, D., Zikas, V.: But why does it work? a rational protocol design treatment of bitcoin. In: Nielsen, J., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 34–65. Springer, Cham (2018)
  2. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payment from bitcoin. IEEE Symposium on Security and Privacy pp. 459–474 (2014)
  3. Carlsten, M., Kalodner, H.A., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: ACM CCS 2016. pp. 154–167. ACM Press, New York (2016)
  4. Daian, P., Pass, R., Shi, E.: Snow white: Provably secure proofs of stake. IACR Cryptology ePrint Archive, Report 2016/919 (2016)
  5. David, B., Gaˇzi, P., Kiayias, A., Russell, A.: Ouroboros Praos: An adaptivelysecure, semi-synchronous proof-of-stake protocol. In: Nielsen, J., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66–98. Springer, Cham (2018)
  6. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 13th IEEE International Conference on Peer-to-Peer Computing. pp. 1–10. IEEE Computer Society Press (2013)
  7. Dubhashi, D.P., Panconesi, A.: Concentration of measure for the analysis of randomized algorithms. Cambridge University Press (2009)
  8. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Berlin, Heidelberg (2014)
  9. Eyal, I., Sirer, E.G.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy. vol. 2015-7, pp. 89–103. IEEE Computer Society Press (2015)
  10. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Berlin, Heidelberg (2015)
  11. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol with chains of variable difficulty. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 291–323. Springer, Cham (2017)
  12. Gervais, A., Karame, G.O., Wust, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM CCS 2016. pp. 3–16. ACM Press (2016)
  13. Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: Scaling byzantine agreements for cryptocurrencies. IACR Cryptology ePrint Archive, Report 2017/454 (2017)
  14. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoins peer-to-peer network. In: Jung, J. (ed.) 24th USENIX Security Symposium. pp. 129–144. USENIX Association (2015)
  15. Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games. In: 2016 ACM Conference on Economics and Computation. pp. 365–382. ACM Press (2016)
  16. Kiayias, A., Panagiotakos, G.: Speed-security tradeoffs in blockchain protocols. IACR Cryptology ePrint Archive: Report 2015/1019 (2016)
  17. Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017) Security of the Blockchain against Long Delay Attack 23
  18. Miller, A., LaViola, J.J.: Anonymous byzantine consensus from moderately-hard puzzles: A model of bitcoin. University of Central Florida. Tech Report, CS-TR14-01 (2014)
  19. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)
  20. Natoli, C., Gramoli, V.: The balance attack against proof-of-work blockchains: The R3 testbed as an example. Computing Research Repository (2016), arXiv:1612.09426
  21. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy. vol. 142, pp. 305–320. IEEE Computer Society Press (2016)
  22. Pass, R., Seeman, L., abhi shelat: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J., Nielsen, J. (eds.) Advances in Cryptology - EUROCRYPT 2017. LNCS, vol. 10211, pp. 643–673. Springer-Verlag, Cham (2017)
  23. Pass, R., Shi, E.: Fruitchains: A fair blockchain. In: ACM Symposium on Principles of Distributed Computing. pp. 315–324. ACM Press (2017)
  24. Pass, R., Shi, E.: The sleepy model of consensus. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10625, pp. 380–409. Springer, Cham (2017)
  25. Pass, R., Shi, E.: Thunderella: Blockchains with optimistic instant confirmation. In: Nielsen., J., Rijmen, V. (eds.) EUROCRYPT 2018. vol. 10821, pp. 3–33. Springer (2018)
  26. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint:1112.4980 (2011), arXiv:1112.4980
  27. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Berlin, Heidelberg (2016)
  28. Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477–498. Springer, Berlin, Heidelberg (2016)
  29. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. IACR Cryptology ePrint Archive: Report 2013/881 (2017)
  30. Teutsch, J., Jain, S., Saxena, P.: When cryptocurrencies mine their own business. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 499–514. Springer, Berlin, Heidelberg (2016)
  31. Zohar, A.: Bitcoin: under the hood. In: Communications of the ACM. vol. 58, pp. 104–113. ACM Press (2015)
submitted by dj-gutz to myrXiv [link] [comments]

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining

Cryptology ePrint Archive: Report 2018/1134
Date: 2018-11-22
Author(s): Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl

Link to Paper

So far, the topic of merged mining has mainly been considered in a security context, covering issues such as mining power centralization or crosschain attack scenarios. In this work we show that key information for determining blockchain metrics such as the fork rate can be recovered through data extracted from merge mined cryptocurrencies. Specifically, we reconstruct a long-ranging view of forks and stale blocks in Bitcoin from its merge mined child chains, and compare our results to previous findings that were derived from live measurements. Thereby, we show that live monitoring alone is not sufficient to capture a large majority of these events, as we are able to identify a non-negligible portion of stale blocks that were previously unaccounted for. Their authenticity is ensured by cryptographic evidence regarding both, their position in the respective blockchain, as well as the Proof-of-Work difficulty.
Furthermore, by applying this new technique to Litecoin and its child cryptocur rencies, we are able to provide the first extensive view and lower bound on the stale block and fork rate in the Litecoin network. Finally, we outline that a recovery of other important metrics and blockchain characteristics through merged mining may also be possible.

  1. C. Decker and R. Wattenhofer, “Information propagation in the bitcoin network,” in Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 2013, pp. 1–10. [Online]. Available:∼bryan/papers2/bitcoin/Information% 20propagation%20in%20the%20Bitcoin%20network.pdf
  2. A. Gervais, G. O. Karame, K. Wust, V. Glykantzis, H. Ritzdo rf, and S. Capkun, “On the ¨ security and performance of proof of work blockchains,” in Proceedings of the 2016 ACM SIGSAC. ACM, 2016, pp. 3–16.
  3. A. E. Gencer, S. Basu, I. Eyal, R. van Renesse, and E. G. Sirer, “Decentralization in bitcoin and ethereum networks,” in Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. [Online]. Available:
  4. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security. Springer, 2014, pp. 436–454. [Online]. Available:
  5. K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: Generalizing selfish mining and combining with an eclipse attack,” in 1st IEEE European Symposium on Security and Privacy, 2016. IEEE, 2016. [Online]. Available:
  6. A. Sapirshtein, Y. Sompolinsky, and A. Zohar, “Optimal selfish mining strategies in bitcoin,”, 2015, accessed: 2016-08-22. [Online]. Available:
  7. J. Bonneau, “Why buy when you can rent? bribery attacks on bitcoin consensus,” in BITCOIN ’16: Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research, February 2016. [Online]. Available:
  8. K. Liao and J. Katz, “Incentivizing blockchain forks via whale transactions,” in International Conference on Financial Cryptography and Data Security. Springer, 2017, pp. 264–279. [Online]. Available:∼jkatz/papers/whale-txs.pdf
  9. P. McCorry, A. Hicks, and S. Meiklejohn, “Smart contracts for bribing miners,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available:
  10. A. Zamyatin, N. Stifter, A. Judmayer, P. Schindler, E. Weippl, and W. J. Knottebelt, “(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available:
  11., “ orphaned blocks,”,, accessed: 2018-09-25.
  12., “Bitcoinchain bitcoin block explorer,”,, accessed: 2018-09-25.
  13., “A web based interface to the bitcoin api json-rpc,”,, accessed: 2018-09-25.
  14. L. Project, “Litecoin,”, accessed: 2016-03-29.
  15. Y. Sompolinsky and A. Zohar, “Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains,” p. 881, 2013. [Online]. Available:
  16. A. Miller and L. JJ, “Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin,”, 2014, accessed: 2016-03-09. [Online]. Available:
  17. J. Garay, A. Kiayias, and N. Leonardos, “The bitcoin backbone protocol: Analysis and applications,” in Advances in Cryptology-EUROCRYPT 2015. Springer, 2015, pp. 281–310. [Online]. Available:
  18. R. Pass and E. Shi, “Fruitchains: A fair blockchain,”, 2016, accessed: 2016-11-08. [Online]. Available:
  19. R. Pass, L. Seeman, and a. shelat, “Analysis of the blockchain protocol in asynchronous networks,”, 2016, accessed: 2016-08-01. [Online]. Available:
  20. K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, and E. Gun, “On scaling decentralized blockchains,” in ¨ 3rd Workshop on Bitcoin and Blockchain Research, Financial Cryptography 16, 2016. [Online]. Available:
  21. A. Kiayias and G. Panagiotakos, “On trees, chains and fast transactions in the blockchain.”, 2016, accessed: 2017-02-06. [Online]. Available:
  22. Y. Sompolinsky, Y. Lewenberg, and A. Zohar, “Spectre: A fast and scalable cryptocurrency protocol,” Cryptology ePrint Archive, Report 2016/1159, 2016, accessed: 2017-02-20. [Online]. Available:
  23. Y. Sompolinsky and A. Zohar, “Phantom: A scalable blockdag protocol,” Cryptology ePrint Archive, Report 2018/104, 2018, accessed:2018-01-31. [Online]. Available:
  24. Bitcoin community, “Bitcoin-core source code,”, accessed: 2018-09-25.
  25. A. Miller, J. Litton, A. Pachulski, N. Gupta, D. Levin, N. Spring, and B. Bhattacharjee, “Discovering bitcoin’s public topology and influential nodes,”, May 2015, accsessed: 2016-03-09. [Online]. Available:
  26., “Chainz blockchain explorers,”,, accessed: 2018-09-25.
  27. Narayanan, Arvind and Bonneau, Joseph and Felten, Edward and Miller, Andrew and Goldfeder, Steven, “Bitcoin and cryptocurrency technologies,”, 2016, accessed: 2016-03-29. [Online]. Available: bitcoin book.pdf
  28. A. Judmayer, A. Zamyatin, N. Stifter, A. G. Voyiatzis, and E. Weippl, “Merged mining: Curse or cure?” in CBT’17: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2017. [Online]. Available:
  29. M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Secure Information Networks. Springer, 1999, pp. 258–272. [Online]. Available: 18.pdf
  30. A. Judmayer, N. Stifter, K. Krombholz, and E. Weippl, “Blocks and chains: Introduction to bitcoin, cryptocurrencies, and their consensus mechanisms,” Synthesis Lectures on Information Security, Privacy, and Trust, 2017.
  31. A. Kiayias, A. Miller, and D. Zindros, “Non-interactive proofs of proof-of-work,” Cryptology ePrint Archive, Report 2017/963, 2017, accessed:2017-10-03. [Online]. Available:
  32. Namecoin community, “Namecoin source code - chainparams.cpp,”, accessed: 2018-09-25.
  33. ——, “Namecoin source code - auxpow.cpp,”, accessed: 2018-09-25.
  34. I0Coin community, “I0coin source code,”, accessed: 2018-09-25.
  35. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”, Dec 2008, accessed: 2015-07-01. [Online]. Available:
  36. N. T. Courtois and L. Bahack, “On subversive miner strategies and block withholding attack in bitcoin digital currency,” arXiv preprint arXiv:1402.1718, 2014, accessed: 2016-07-04. [Online]. Available:
  37. J. Gobel, P. Keeler, A. E. Krzesinski, and P. G. Taylor, “Bitcoin blockchain dynamics: the ¨ selfish-mine strategy in the presence of propagation delay,”, 2015, accessed: 2015-03-01. [Online]. Available:
  38. N. Developers, “Neo4j,” 2012.
  39. Gavin Andresen, “Bitcoin improvement proposal 34 (bip34): Block v2, height in coinbase,”, accessed: 2018-09-25. [Online]. Available:
  40. Matt Corello, “Fast internet bitcoin relay engine,”, accessed: 2018-09-25. [Online]. Available:
  41. Suhas Daftuar, “sendheaders message,”, accessed: 2018-09-25. [Online]. Available:
  42. R. Bowden, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor, “Block arrivals in the bitcoin blockchain,” 2018. [Online]. Available:
  43. GeistGeld community, “Geistgeld source code,”, accessed: 2018-09-25.
  44. A. P. Ozisik, G. Bissias, and B. Levine, “Estimation of miner hash rates and consensus on blockchains,” arXiv preprint arXiv:1707.00082, 2017, accessed:2017-09-25. [Online]. Available:
  45. E. Duffield and D. Diaz, “Dash: A payments-focused cryptocurrency,”, Aug 2013, accessed: 2018-09-25. [Online]. Available:
  46. N. Van Saberhagen, “Cryptonote v 2.0,”, Oct 2013. [Online]. Available:
  47. G. Hall, “Guide: Merge mining 6 scrypt coins at full hashpower, simultaneously,”, Apr 2014, accessed: 2018-09-25. [Online]. Available:
  48. united-scrypt coin, “[ann][usc] first merged minable scryptcoin unitedscryptcoin,”, Nov 2013, accessed: 2018-09-25. [Online]. Available:
  49. J. A. D. Donet, C. Perez-Sola, and J. Herrera-Joancomart ´ ´ı, “The bitcoin p2p network,” in Financial Cryptography and Data Security. Springer, 2014, pp. 87–102. [Online]. Available: submission 3.pdf
  50. M. Bartoletti and L. Pompianu, “An analysis of bitcoin op return metadata,”, 2017, accessed: 2017-03-09. [Online]. Available:
  51. R. Matzutt, J. Hiller, M. Henze, J. H. Ziegeldorf, D. Mullmann, O. Hohlfeld, and K. Wehrle, ¨ “A quantitative analysis of the impact of arbitrary blockchain content on bitcoin,” in Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. [Online]. Available:
  52. M. Grundmann, T. Neudecker, and H. Hartenstein, “Exploiting transaction accumulation and double spends for topology inference in bitcoin,” in 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer, 2018. [Online]. Available:
  53. A. Judmayer, N. Stifter, P. Schindler, and E. Weippl, “Pitchforks in cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques (short paper),” in CBT’18: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology, Sep 2018. [Online]. Available: 2018-09-05.pdf
submitted by dj-gutz to myrXiv [link] [comments]

Estimation of Miner Hash Rates and Consensus on Blockchains

Date: 2017-07-01
Author(s): A. Pinar Ozisik, George Bissias, Brian Levine

Link to Paper

We make several contributions that quantify the real-time hash rate and therefore the consensus of a blockchain. We show that by using only the hash value of blocks, we can estimate and measure the hash rate of all miners or individual miners, with quanti able accuracy. We apply our techniques to the Ethereum and Bitcoin blockchains; our solution applies to any proof-of-work-based blockchain that relies on a numeric target for the validation of blocks. We also show that if miners regularly broadcast status reports of their partial proof-of- work, the hash rate estimates are signi cantly more accurate at a cost of slightly higher bandwidth. Whether using only the blockchain, or the additional information in status reports, merchants can use our techniques to quantify in real-time the threat of double-spend attacks.

[1] 2015. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. (July 2015).
[2] 2016. Gnosis. (November 2016).
[3] Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman. 2016. "MedRec: Using Blockchain for Medical Data Access and Permission Management. In Proc. Intl. Conf. on Open and Big Data. 25–30.
[4] Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling Blockchain Innovations with Pegged Sidechains. Technical report. (Oct 22 2014).
[5] Simon Barber, Xavier Boyen, Elaine Shi, and Ersin Uzun. 2012. Bitter to better—how to make bitcoin a better currency. In International Conference on Financial Cryptography and Data Security. Springer, 399–414.
[6] Bryan Bishop. 2015. bitcoin-dev mailling list: Weak block thoughts... (Sep 2015).
[7] bitcoin 2015. Confirmation. (February 2015).
[8] Joseph Bonneau. 2015. How long does it take for a Bitcoin transaction to be confirmed? (November 2015).
[9] J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, and E.W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE S&P. 104–121. SP.2015.14
[10] George Casella and Roger L. Berger. 2002. Statistical inference. Brooks Cole, Pacific Grove, CA. http://opac.inria.frecord=b1134456
[11] Kyle Croman et al. 2016. On Scaling Decentralized Blockchains . In Workshop on Bitcoin and Blockchain Research.
[12] Digix. 2017. (Last retrieved June 2017).
[13] DigixDAO. 2017. (Last retrieved June 2017).
[14] J. Douceur. 2002. The Sybil Attack. In Proc. Intl Wkshp on Peer-to-Peer Systems (IPTPS).
[15] Bradley Efron. 1982. The jackknife, the bootstrap and other resampling plans. Society for industrial and applied mathematics (SIAM).
[16] Ethash. 2017. (Last retrieved June 2017).
[17] ethereum. Ethereum Homestead Documentation. (????).
[18] Etheria. 2017. (Last retrieved June 2017).
[19] Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography (2014), 436–454.
[20] William Feller. 1968. An Introduction to Probability Theory and its Applications: Volume I. Vol. 3. John Wiley & Sons London-New YorkSydney-Toronto.
[21] Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 281–310.
[22] Arthur Gervais, Ghassan O. Karame, Karl Wust, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. (2016).
[23] Hashcash. 2017. (Last retrieved June 2017).
[24] Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2017. TumbleBit: An untrusted Bitcoincompatible anonymous payment hub. In Proc. ISOC Network and Distributed System Security Symposium (NDSS).
[25] Svante Janson. 2014. Tail Bounds for Sums of Geometric and Exponential Variable. Technical Report. Uppsala University.
[26] Litecoin. 2017. (Last retrieved June 2017).
[27] Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (May 2009).
[28] A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, and Brian Neil Levine. 2016. A Secure, Efficient, and Transparent Network Architecture for Bitcoin. Technical Report UM-CS-2016-006. University of Massachusetts, Amherst, MA.
[29] Meni Rosenfeld. 2012. Analysis of hashrate-based double-spending. (December 2012).
[30] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2015. Optimal Selfish Mining Strategies in Bitcoin. (July 2015).
[31] Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In IEEE S&P. 459–474.
[32] Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security (2015).
[33] Yonatan Sompolinsky and Aviv Zohar. 2016. Bitcoin’s Security Model Revisited. (May 2016).
[34] F. Tschorsch and B. Scheuermann. 2016. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. IEEE Communications Surveys Tutorials PP, 99 (2016), 1–1. 2016.2535718
[35] Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-ofwork vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112–125.
submitted by dj-gutz to myrXiv [link] [comments]

Countering Selfish Mining in Blockchains

Date: 2018-12-17
Author(s): Muhammad Saad, Laurent Njilla, Charles Kamhoua, Aziz Mohaisen

Link to Paper

Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we highlight a need for new defense strategies to counter this attack, and leverage key system parameters in blockchain applications to propose an algorithm that enforces fair mining. We use the expected transaction confirmation height and block publishing height to detect selfish mining behavior and develop a network-wide defense mechanism to disincentivize selfish miners. Our design involves a simple modifications to transactions' data structure in order to obtain a "truth state" used to catch the selfish miners and prevent honest miners from losing block rewards.

[1] K. Baqer, D. Y. Huang, D. McCoy, and N. Weaver, “Stressing out: Bitcoin "stress testing",” in Financial Cryptography and Data Security - FC, Feb 2016, pp. 3–18. [Online]. Available:
[2] M. Bastiaan, “Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin,” 2015. [Online]. Available:
[3] K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Gollamudi, G. Gonthier, N. Kobeissi, N. Kulatova, A. Rastogi, T. Sibut-Pinote, N. Swamy, and S. Z. Béguelin, “Formal verification of smart contracts: Short paper,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Austria, Oct. 2016, pp. 91–96.
[4] B. Community, “,” Jun 2018. [Online]. Available:
[5] G. Danezis and S. Meiklejohn, “Centrally banked cryptocurrencies,” in Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2016. [Online]. Available:
[6] M. M. Eljazzar, M. A. Amr, S. S. Kassem, and M. Ezzat, “Merging supply chain and blockchain technologies,” Computing Research Repository (CoRR), vol. abs/1804.04149, 2018. [Online]. Available:
[7] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
[8] R. Guo, H. Shi, Q. Zhao, and D. Zheng, “Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,” IEEE Access, vol. 6, pp. 11 676–11 686, 2018. [Online]. Available:
[9] E. Heilman, “One weird trick to stop selfish miners: Fresh bitcoins, A solution for the honest miner (poster abstract),” in Financial Cryptography and Data Security - FC Workshops Christ Church, Barbdos, Mar 2014, pp. 161–162. [Online]. Available:
[10] E. F. Jesus, V. R. L. Chicarino, C. V. N. de Albuquerque, and A. A. de A. Rocha, “A survey of how to use blockchain to secure internet of things and the stalker attack,” Security and Communication Networks, vol. 2018, pp. 9 675 050:1–9 675 050:27, 2018. [Online]. Available:
[11] A. E. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” IACR Cryptology ePrint Archive, vol. 2015, p. 675, 2015. [Online]. Available:
[12] Y. Kwon, D. Kim, Y. Son, E. Vasserman, and Y. Kim, “Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin,” in Proceeding of ACM CCS, Dallas, TX, Oct.–Nov. 2017, pp. 195–209. [Online]. Available:
[13] L. Mauri, S. Cimato, and E. Damiani, “A comparative analysis of current cryptocurrencies,” International Conference on Information Systems Security and Privacy, ICISSP , Funchal, Portugal, Jan. 2018, pp. 127–138. [Online]. Available:
[14] Nicehash, “Largest crypto-mining marketplace.” [Online]. Available:
[15] D. Rakic, “Blockchain technology in healthcare,” in International Conference on Information and Communication Technologies for Ageing Well and e-Health, Funchal, Portugal, March 2018. [Online]. Available:
[16] M. Saad and A. Mohaisen, “Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions,” in IEEE Conference on Computer Communications INFOCOM Workshops, HI, USA, April 2018, pp. 704–709. [Online]. Available:
[17] M. Saad, M. T. Thai, and A. Mohaisen, “POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization,” in Proceedings of Asia Conference on Computer and Communications Security, ASIACCS, Incheon, Republic of Korea, Jun 2018, pp. 809–811. [Online]. Available:
[18] P. K. Sharma, S. Singh, Y. Jeong, and J. H. Park, “Distblocknet: A distributed blockchains-based secure SDN architecture for iot networks,” IEEE Communications Magazine, vol. 55, no. 9, pp. 78–85, 2017. [Online]. Available:
[19] S. Solat and M. Potop-Butucaru, “Zeroblock: Preventing selfish mining in bitcoin,” CoRR, vol. abs/1605.02435, 2016. [Online]. Available:
submitted by dj-gutz to myrXiv [link] [comments]

29 years old bad shape financially. What should I do from this position?

Hey, 29 years old.
No job, no car.
$0 debt.
Bachelor's in political science. No student loans.
$5000 savings.
Assets worth more than $1000: 1 ar-15 rifle, supplies venison every few months for the last two years.
Ammunition is reloaded by scavaging spent brass from local outdoor shooting area. (Only use about 5 rounds per take, est. Cost per shot is $0.13)
Been unemployed for the better part of two years with no prospects.
Currently: weld (Tig) side jobs (made it it's a converted stick welder from Craigslist free section) , mine Bitcoin and immediatly sell to coinbase ~ $200 every few months , freelance cad since I learned it in college , and 3d print items to put on etsy (monoprice.miniselect printer found labeled as a kitchen appliance sold for $14 at goodwill) , as well as sell thrift store items on ebay (mostly old designer items Hermes ties and a lot of Maison Martin Margiela) . Income is not steady. It is less than $1000 a month.
Additional income: food stamps $200 month Health insurance is low income medi-cal.
What do I do from here?
I use the internet And power from Starbucks (I don't buy anything I just put water in a plastic reusuable cup they sell for a dollar and put it near my laptop while i plug in the Bitcoin miner and hidenit with my.backpack while posting ads for side jobs and sending in applications everyday.
submitted by UnappreciatedMorton to personalfinance [link] [comments]

El dinero es deuda, ¿como evitar la dominación del capitalismo agresivo?(TTIP yFMI)

Decía el otro día un compañero en la plaza que no recuerdo (pero el lo puede decir) no se si exactamente así pero en síntesis :
-Hoy en día las guerras no se hacen con balas, se hacen guerras economicas
Y no puedo estar más de acuerdo, pues estamos viendo con Grecia como se asedia un pais sin el uso de una sola arma, aunque muchos también pensarían como yo que puede ser aún más duro si cabe llevar un pueblo al extremo del hambre y la pobreza y perecer en una larga agonía, y lo más grave de todo es que en el asedio no sufriran daño los ricos, ni tendran que reconstruir lo que las bombas destrozan, y como en un desahucio de los que tantos se intentan parar en España, será el Banco quien se quede los derechos de la soberanía.
Y esto lo sabemos, lo observamos con impotencia, como aquel que ve estallar un volcán y no tiene donde correr.
No hay que ser un chaman para saber en un causa-efecto, que Grecia es solo el inicio hacia una carrera de embargos de paises completos con los cabos y bien atados mediante los tratados que se están maquinado TTIP, las empresas gobernando el mundo en una trampa mortal para el planeta.
¿quien tiene realmente la culpa? ¿el dinero, la ambición, etc ?
porque para encontrar la solución a cualquier problema tienes que ver el fallo en el mecanismo, adjunto un video, donde vereis las claves del TTIp como una manera de generar una deuda constante de forma que garantice la perpetuidad de la deuda y por consiguiente de forma planetaria consiga la soberanía de los pueblos mediante la Deuda.
Los bancos como vinculo de poder.
Cómo los bancos crean dinero (y poder)
Insisto es realmente el dinero el causante?, creo que más bien es como se aplica el dinero la cuestion.
Doy por hecho que es un debate y que yo exponga algo no quiere decir que sea la solución, si no desde mi punto de vista basado en el porque y como se genera la deuda exponer en mi imaginación el freno de dicha deuda. En esta guerra levantar trincheras ya no es cavar tampoco, tal vez requiere defenderse con la misma arma que esta "matando"
como escapar de la deuda - la criptomoneda
Una criptomoneda o criptodivisa (del inglés cryptocurrency) es un medio digital de intercambio. La primera criptomoneda que empezó a operar fue Bitcoin en 2009, y desde entonces han aparecido muchas otras
fuente --
.Al comparar una criptomoneda con el dinero fiduciario la diferencia más notable es la forma en que ningún grupo o particular puede acelerar la producción de dinero y usar éste ilegal o abusivamente de manera significativa, ya que sólo se genera una cierta cantidad de unidades colectivamente, a una velocidad que está limitada por un valor definido con anterioridad y conocido públicamente. Han aparecido ya docenas de criptomonedas con diferentes especificaciones, pero la mayoría de ellas son similares o derivadas de la primera que ha sido totalmente implementada; el Bitcoin. En los sistemas de criptomonedas se garantiza la seguridad, integridad y equilibrio de sus estados de cuentas (contabilidad) por medio de un entramado de agentes (transferencia de archivo segmentada o transferencia de archivo multifuente) que se verifican (desconfían) mutuamente llamados , que son, en su mayoría, público en general y protegen activamente la red (el entramado) al mantener una alta tasa de procesamiento de algoritmos, con la finalidad de tener la oportunidad de recibir una pequeña propina, que se reparte de manera aleatoria.
::::::::::::::::::::::::::::::::::el rescate de chipre
  1. 2013 Bitcoins - La moneda sin Estado mantenida por una red de PCs resolver matemáticas en problemas-- se ha incrementado su valor desde la crisis financiera golpeó Chipre. Pero son Bitcoins realmente vale todo eso? ¿O es que simplemente ofrecen una lección de cómo confiar rápidamente en el sistema económico de un país puede ir y venir?
  4. retos futuros de la criptomoneda
  5. McCaleb describe OpenCoin como un intento de construir una red bitcoin que no dependen de la minería para procesar transacciones.
  1. Página de la FairCoop:fair coin (aportado por Krapocho)
Supongo que Pablo echenique podría apotar mucha información al respecto, pues en su perfil de cuentas de transparencia figura esta moneda , ¿será la criptomoneda una formula de escape a la deuda y el poder?
la moneda social como metodo de defensa en los pequeños nucleos.
Si bien es cierto que la criptomoneda pudiera salvar en cierta forma, y cada vez hay más avances al respecto no es menos cierto que la moneda social puede hacer de salvavidas en momentos especialmente críticos.
fuente---------- ¿Qué es una moneda social?
Una moneda social es una herramienta creada y utilizada por comunidades, colectivos y particulares al objeto de poder facilitar intercambios tanto de productos como de servicios o de conocimientos. Otra definición, en este caso de Bernard Lietaer, considera al dinero local como “Un acuerdo dentro de una comunidad de usar algo como medio de intercambio”.
Las monedas sociales se caracterizan por lo siguiente:
Son sistemas monetarios de vecindad basados en la confianza y la reciprocidad, Se diferencian del dinero de curso legal pues en ocasiones pueden perder valor con el tiempo (fenómeno denominado “oxidación” o interés negativo) con el objetivo de que no se pueda acumular, Pueden ser tan variados en su forma y en su funcionamiento como lo son las monedas nacionales de curso legal. Denominándose monedas complementarias, se refieren a que algunas de estas monedas pretenden complementar las deficiencias del dinero legal con las ventajas que tiene este recursos como dinamizador del comercio local de proximidad, del autoempleo y de optimización de los recursos locales.
Con monedas “alternativas”, se refieren entonces a que algunas monedas pretenden crear un sistema alternativo y diferente al actual utilizando la moneda social como una herramienta más.
¿Por qué utilizar las monedas sociales?
Los recursos – productos, servicios y saberes – son en muchos casos ignorados por la economía formal. De la misma manera le sucede al trabajo doméstico, a la reutilización y el reciclaje de todo tipo de enseres o al trabajo que puede denominarse voluntario o de ayuda mutua. Estos recursos, una vez convertidos en moneda social, crean riqueza y bienestar social en las comunidades donde se implementan.
¿Cómo funciona?
Existen diferentes formas de crear dinero social:
Desde los bancos de tiempo y las redes de trueque: Se crea a partir de los propios intercambios de servicios (bancos de tiempo) o de productos (redes de trueque). Los bancos de tiempo usan la divisa tiempo y las redes de trueque una moneda social propia y característica. En ambos casos se denominan monedas de “crédito mutuo”, O las monedas soportadas por euros que se “compran” con moneda de curso legal y cuyo objetivo principal es el apoyo del comercio local de proximidad. Estas últimas son más conocidas y populares. Se puede utilizar de diferentes maneras, según:
¿Qué ventajas tienen?
Las principales ventajas son las siguientes:
  1. Fomenta la economía local: Como herramienta económica local, como se ha visto en el video del Sol-Violette en Francia, una moneda social no es un fin en sí mismo, sino que sirve para generar más riqueza y acelerar el consumo y la producción locales.
  2. Impide las burbujas económicas: Contrariamente a una divisa internacional, una moneda social no se puede acumular ni funcionar fuera de una zona determinada. Además tiene una cantidad limitada según su número de usuarios. No hay especulación, ni inflación, deflación, etc...
  3. Impulsa las relaciones entre "vecinos": Permite dinamizar el barrio, conocerse y generar dignidad en esta zona. Con una moneda social, comprar en una tienda con esta herramienta significa apostar por lo local, aparte de crear una identidad propia como la moneda de tu barrio o localidad.
  4. Genera participación ciudadana: Una moneda social existe a base de la riqueza que crea la gente con sus bienes y servicios. Asimismo permite empoderar a la gente quién lo utiliza, permitiéndole autoorganizarse hasta involucrarse en la política local.
Monedas sociales: qué son y cuántas funcionan en España 1. Hay más de 70 en España, pero en todo el mundo se estima que superan las 5.000. No están admitidas por los bancos convencionales, pero se han convertido en una alternativa para adquirir bienes y servicios en redes comerciales locales.
Ver más en:
  1. monedas sociales (aportado por kzlove)
recursos energeticos sostenibles.
En este ultimo punto podemos poner el mundo jjaaj pero si regresamos al video del principio, que nos explica porque el dinero es deuda, entenderemos que poner un impuesto al sol es eliminar una de las "trincheras" del pueblo para la liberación de este asedio hacia la soberanía de los pueblos.
Y no me queda en este punto más que decir que nadie debería cumplir la tasa de peaje de impuesto al sol, debería negarse rotundame a los pagos de este tipo pese a las consecuencias que supone la desobediencia, pues el mal como consecuencia de aceptar este pago es rídiculo frente a las consecuencias y cesión de libertadas que afiancen el poder.
obviamente es mi opinión al respecto
Teniendo en cuenta que es lo que genera deuda, las respuestas deberían venir dadas como métodos que impidan el crecimiento de ésta. sin embargo las deudas adquiridas están ahi y los pagos son inminentes, pero esto no quiere decir que sea imposible la recuperación del pueblos, donde escapar de las trampas del poder es una guerra.
Impidamos el TTIP, y cerremos la espita a los bancos, muchas cosas están en nuestra mano.
submitted by anarxy_XXX to podemos [link] [comments]

Transcript of George Webb Video Series Part 302 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatline]

  • Day 163.3. Old Guard vs New Guard at Tewksbury, MA - YouTube
    • Day 163 this is part 3
    • And it's too cold outside, so I have to do this inside
    • Here with Task Force, here with Deep Milwaukee
    • And we're just talking about this Frank enzyme Bradley right now
    • And we're trying to see if that's the same person that was in the global Intelligence files there WikiLeaks in 2012
    • And if people don't remember those leaks, they came out, and there are several embarrassing leaks about numerous companies around the world
    • Now, what I put forward to the group was that these were targets
    • These were Andrew McCabe type targets
    • The way infiltration works is you put your person in--kind of like Amy Dacey at Sony--you put your person in right below them, and then you come out with some thing about Amy Dacey telling--Obama jokes--that are off-color and get her fired
    • And then your person goes up, and then becomes a Sony director
    • That is Andrew McCabe's MO throughout his whole career
    • So that's why I say that's probably what he was doing with the Global Intelligence Files
    • I know it's an FBI operation because it was this guy named Sabu who was the handler, who was running around recruiting people to to hack the Global Intelligence files at Stratfor
    • Now, that's the deniability: they're not really hacking, but they say if they get caught oh it's that 20 year old guy that got--recruited by that 30 year old guy, not this team of hackers
    • So having said that the Task Force did a lot of research on this on this Bradley guy
    • And this ENSYM company that's mentioned prominently
    • Now, it's it's not enzyme with a Z it's enzyme turn the Z around to an S
    • And I think its SYMA
    • TF: YMA
    • I think it's actually [ENSYMA (ENSYMA ENGINEERING)] yeah
    • Now, give me some of the background on this guy he's he's a graduate at George Washington
    • TF: yeah master's degree George Washington in public administration
    • G: Well his business is in he worked for CERN
    • TF: a DoD gun license in Texas
    • G: He said he worked for a secret Intelligence agency
    • TF: Yes Secret Government company
    • And I'm gonna guess that's gonna be like a DynCorp or Leidos or Conceras or something like that
    • TF: And he said that he was working on viruses--admitted to that, but he will not go into the details of that
    • G: And his wife has a company called Global Logistics
    • So is she running stuff all around the world to CERN, like Californium, as well as bioweapons?
    • It's kind of although the whole ratline thing that we've been talking about through the whole series, potentially
    • TF: Right, [google redacted] AND HIS WIFE WAS A PART OF THE AIR FORCE NATIONAL GUARD AND SHE HAS A LOGISTICAL BACKGROUND, [/google redacted] she has a degree from Harvard, she does a lot of it a lot of Education behind her, a lot of different companies that she's involved in, a lot of logistics, it's kind of similar stuff that we've seen many many times
    • G: Throughout the whole seriously
    • So--this and the reason why I say Tewksbury, Massachusetts it could be that that's a wink
    • If you have this new guard an old guard--the whole War of the Roses in England was new guarda nd old guard
    • Richard the third, I always think of as Dick Cheney, you know, "Now, as winter of our discontent, made ready by the summer of York"
    • If that's the old guard, if Cheney--Bush all those guys Rumsfeld, and then on the left side Podesta and Manafort etc are the old guard,
    • The new guard could be--Pompeo, Mattis, Dunford, potentially Kelly, potentially the DIA guys like Flynn and Tony Shaffer are the new guard
    • If you wanted to really embarrass the old guard, and say, "hey we know your tricks. By the way, this guy was an expert (or not an expert)...But he was carrying around a lot of Blackberry enterprise servers as well as BlackBerries. Is he the replacement for Imran Awan, for secure encrypted communications?"
    • Again, anytime I see that it's kind of like, "well why do you have a burner phone--why do you have 18 burner phones in your backseat?", sir? --That kind of thing
    • It's kind of another signature, that says, "hey this person could be involved in illegal activity"
    • The best way for the old guard to catch the new guard to embarrass the old guard is to catch them in a city about ready to do something--
    • The Boston Marathon is coming up on the 17th in Boston: is this another repeat of the Boston Marathon?
    • Remember Graham Fuller yeah I did the Gladio plan Gladio B, now, is this Gladio C
    • Again, the Clockwork Orange thing--let's let's make a lot of terrorist incidents to get funding and keep our power--is that what's happening?
    • And the fact it's in Tewksbury was one of the key battles of that War of the Roses, where the new guard won and made our current Queen
    • So any last thoughts on?
    • TF: the only other thought was he called the police saying that he thought someone was breaking into his room at the hotel--they had guns in this hotel, which makes absolutely no sense to me if you have a--a storage full of AR-15s and weapons and gas masks and stuff like that, you call the police on yourself
    • TF: Especially if you're part of some secret Government program
    • G: Unless the new guard was trying to embarrass you
    • TF: Right, or the new guard made the call
    • G: the new guard made the call that was embarrassing you
    • {{ 911: just an observation: Maybe Agent Pettiworth et al thought YOU and Jason were part of the new guard and not just concerned citizens? }}
    • {{ 911: youtube is very incapable of transcribing TF, its annoying as f }}
    • TF: They said [that/not?] for the police to go into the house. It was coming out in the paper is that he made the phone call and that seems kind of ridiculous to me. Maybe the new guard made the phone call
    • G: Unless he had a remote camera, where he could see people going in to
    • TF: even then he would go back himself. I mean you wouldn't call the local cops
    • G: Right. So it looks like maybe that may be Andy's coming in to cover for him or something
    • But it looks like it we could have averted something happening
    • I think of Claude D'estre every time I think of the Boston Marathon
    • And [thinking] "Claude you would look at awful lot like that guy who was six feet away from the bomb, and is this another Colorado CIA School of Mines operation?"
    • So we'll see we'll see what happens
    • But I think people are going to connect the dots on this one
    • And certainly there's a very active Q, would you say Deep Milwaukee?
    • There's a an active Q discussion on this right now?
    • DM: Not Q but the anons
    • G: Ok not Q but the Anons
    • So there you have it
  • Day 164.4. SAIC’s Sam Visner Did NSA, MdA, and MITRE - YouTube
    • It's day 164 part 4
    • So here is where I met Deep Florida, this boarding officer for the Coast Guard the other night
    • He kind of confirmed the things that we had said about maritime data awareness packages
    • And how that they could call off interdiction people like The Stzroks family in Corpus Christi, or The Strokes family in San Diego can say at the Coast Guard level uh-uh from DIA can send a message down saying
    • No interdiction guide that boat to the target or I could bring a yacht into Port of Miami or port of Jacksonville or Port of Tampa or all the way up and down the coast--Charleston, South Carolina, Virginia Beach, all the Navy ports all the way up to where Joe Crowley is with his Wackenhut boat
    • So that's good
    • I want to talk to Deep Florida again, and we probably need to talk to him more, because that's real on the line, on the front lines Intelligence, where he was--seeing these same drug dealers over and over and over again at the 24 mile marker, and the nautical mile marker
    • The other thing about the first story we did today which was Bill Binney
    • It kind of dovetailed into that because SAIC, is the one who wrote the maritime data awareness package for all this
    • SAIC is also the company that wrote trailblazer, the program that took the place of thinthread--Bill Benny's thinthread
    • And the guy who bought it is a guy by the name of well there was one guy by the name of Ben Black, who was SAIC
    • And then he hired a guy named Sam VISNER who was also SAIC
    • So a lot of these NSA guys end up being SAIC guys
    • And that's the revolving door as far as the Navy's concerned
    • And you might have seen us cover that when we went up to Laurel racetrack
    • We talked to all the SAIC guys ex-Admirals who were--parlaying their horses around the Laurel Park
    • The second story we did today on Frank Bradley, Frank enzyme Bradley, was also interesting because he's in these global Intelligence files of the WikiLeaks
    • And I looked at the files there's 29 of them
    • And they're mostly spreadsheets
    • And there's it's kind of the same kind of audit coded spreadsheet
    • It goes from 2004 to 2011 there's 29 spreadsheets
    • And his emails in there
    • And it's for like 1995 a month
    • And there's all these Army guys
    • So that unlike--Bill Binney, and the Navy, and SAIC, and NSA
    • This was the second story we did today which is Frank enzyme Bradley, with the Bradley Fighting Vehicle right, turns out its Army--is that a fake name, because he's Army
    • And he's dispersing Army--gas masks and flashbang grenades and all sorts of things to JTTF units all over the country to these dog teams that that we've got?
    • Who knows--we don't know that
    • But it is interesting he is in this kind of list
    • And does that list get compromised in 2011?
    • ...And that's why the Fusion GPS is created?
    • Still, we don't know the answer to that either
    • But meeting you had another whistleblower here, so we're gonna stay in Milwaukee a little bit longer
  • Day 164.6 Meet Leah Vukmir - Next Senator From Wisconsin - YouTube
    • It's day 164 I think this is six
    • So we met the Senate candidate here that's going up against Tammy Baldwin
    • I wanted to--make a political statement, helping Paul Nealon against Paul Ryan here
    • Now, he lost by 50 points
    • So--Paul Ryan's gonna win
    • But it's probably more important that Leah Vukmir win as the candidate in the Senate seat, because the weight Wisconsin's organized is they have one Republican Senator and they have one Democratic Senator
    • Ron Johnson, as you probably know as the Republican Senator, he's in the Intelligence Committee...and been a good supporter of transparency
    • And then there of course is Johnson Wax in Milwaukee
    • And then there's Johnson Controls in Milwaukee the--the building controls
    • And then there's also Johnson & Johnson and Racine
    • So there's a lot of Johnson's going on here--I'm gonna stay away from that {{LOL}}
    • But Tammy Baldwin the Democrat is coming up for reelection
    • And the III I talked to her quite a bit
    • Leah is a very nice person, and she gave me about a half an hour of her time
    • And what I like about her she's a nurse
    • So she's got--she's just a nurse who wants to do the right thing
    • But she's very involved with manufacturing
    • And very involved with the police unions, the fire unions, the emergency services, all the people that are first responders
    • So I really wanted to give a strong statement of support
    • And again, a candidate that comes out says "hey I saw you, I want to come out, I want to meet you I want to introduce myself"
    • And I think these are the important people
    • She said I wasn't on the Trump train at first--she's a big Scott Walker person
    • She was part of that whole kind of hey you can't hold the--Government and the people, SEIU, you can't hold everybody hostage
    • But she said hey as as I got to know Trump better I got on the Trump train, and I'm a really strong Trump supporter
    • Again, I think Trump of I sat with all slew of of Trump supporters
    • Democrat and Republican tonight
    • And the key thing I keep hearing is: he's a businessman. He wants to bring jobs back to Wisconsin, and Michigan, and Ohio, I'm from Ohio--Indiana, I'm from Indiana
    • I want they want to bring jobs back I don't care if it's Mugwump or whatever, your party is, Trump wants to bring jobs back
    • So I want to support her I want to tweet her out
    • Again, it's Leah VUKMIR V U K M I R
    • And I think it's just a strong candidate
    • I think it's it's a person who it didn't necessarily doesn't have Paul Neilins background in manufacturing
    • But she know she's making an active effort--she's been in 66 of the 72 counties
    • And I just wanted to make a strong statement, because I just believe that she comes out, everyone I introduced her to tonight she's listened to and interacted with and listened
    • And as is kind of a person of the people
    • So I don't normally do political things
    • But this is a candidate I felt very strongly about, and her platform
    • And she needs to of course when the primary--it's a late primary here in Wisconsin--it's an April primary
    • So it's important that we do a lot of meet and greets
    • And a lot of fundraisers early to make sure that these kind of candidates get a chance to win in November against a kind of a very globalist
    • And I hate the word 'globalist'
    • I like the word 'carpetbagger' -- I've seen the destruction of towns in my hometown in Fort Wayne Indiana International Harvester plant left when I was in--teenager
    • And I've seen the destruction in Ohio, firsthand
    • And I've seen the destruction in Michigan
    • So I'm not as familiar with Wisconsin
    • But--you got Harley Davison
    • And we had this trade discussion--let's just take all the names
    • And brand names out of it
    • If it was Brand X over here
    • And that's your trade representative
    • And brand Y over there take China out of it take take the U.S. out of it
    • If your guy came back, and said hey I got a great deal we pay 35% tariff over there
    • And we get 1.2 percent tariff on their stuff coming--isn't that a great deal?
    • Everyone would say you're no longer our trade representative--get out
    • That's what we have right now,
    • And I think it's a hundred percent tariff on harley-davidson products in in Japan
    • And at least to 35% in China--I'd like to check those facts
    • So anyway lots of trade discussions
    • I know everybody's watching Final Four, but I just wanted to throw that out that we have a US Senate can adhere tonight that came out to me, and she wanted to tell her story, so there you have it
  • Day 165.1. The Good America - Binney, Wormwood - Olson Part 1 - YouTube
    • It's day 165
    • And this is part one Happy Easter everyone
    • Still bloody cold here somebody from Tewksbury--Gloucester, actually--about five miles from Tewksbury
    • Said they reenact the Battle of Tewkesbury every year
    • So I thought that was interesting
    • So maybe we'll reenact the old guard and the new guard with the Tony Schaefer and the Cyber Command boys
    • I expect Tony Schaefer to be getting a position with the Trump administration here pretty quickly in the Intelligence area
    • And maybe these Army guys--these Army Intel guys will push through a split with NSA and the Navy Intel guys
    • So we'll have a check on the Navy Intel boys
    • So anyway that's Tewksbury
    • So that's this battle reenactment they have in Tewksbury, where this guy was caught with these enzymes Frank enzyme Bradley
    • Riding around and his Bradley Fighting Vehicle throwing out bill swing enzymes on the population flu and flu viruses on the population it
    • Was he doing that? Who knows
    • But we can go look to Tewksbury now, every year to reenact our battle between this Navy
    • And Intel Command
    • And these new Army cyber boys that's that battle is developing one two great documentaries out
    • And it almost tells our story in terms of what a format of this story might look like
    • One is the "Good American", which tells a Bill Binney story about how he had Thinthread how this guy named a SAM Visner came in said oh my gosh this is great we're gonna do trailblazer instead collected all
    • Then when 9/11 happens, Sam Visner is the guy who says, "this is a cow we can milk for 15 years at SAIC"
    • So he leaves NSA, the Sam Visner, and goes to SAIC
    • And these are direct quotes--that this is the--opportunity of a lifetime
    • That same Sam visitor is in this Q discussion now, with this MITRE group in this this Highland Forum in this kind of public-private, pay-to-play partnerships
    • So, interesting to follow these things "full flight of the arrow" as I call that, all the way from 9/11 pre 9/11 all the way till now,
    • Sam Visner still doing--and SAIC--does the maritime data awareness program, said that ZIPZORP was talking about SAIC
    • SAIC formulates themselves with a new name called LEIDOS it's kind of a shuffle giving us a little "lead" LEIDOS shuffle--it's still SAIC, psst STILL SAIC
    • So a little Leidos shuffle there
    • So anyway the good American talks about how 9/11 could have been avoided with Bill Benny's Thinthread
    • And a lot of the folks I've talked to Diane Roark at length
    • I've talked to Curt Wiebe
    • And interacted with him on Twitter talked with Bill Binney
    • So a lot of the people in the series I recognized
    • And I've never never talked to a Thomas Drake, though, Tom Drake
    • But I would like to
    • But I think it's a great series to watch for the first part of our series, before the Awans got involved which is surveillance
    • And the misuse of surveillance
    • And maybe the Awan's are a part of that too, because you use a third-party Intelligence service like PAC ISI to have deniability on surveillance
    • But then there's a second part, which is not just surveillance, but now disruption we're actually gonna go out and try to make you--your life miserable
    • And that's really the second documentary
    • And it's a six-part 40-minute a shot documentary called Wormwood
    • But it is the dirty tricks part of the CIA, getting rid of you once you become a problem, once you start saying hey this isn't good
    • And we're using these truth serums and scopolamine to do--parties it--late at night in Montreal with--our good doctor up there, Dr. Gottlieb, where we did a series at the <
  • Day 165.2. Wormwood Part 2 - Bill Swing’s Ft Derrick - YouTube
    • This is part 2 of day 165
    • And this is following up on wormwood
    • Great movie, because it it's kind of also William Kobe versus Sy Hersh in terms of getting the story about out about Frank Frank Olson
    • This guy who was worked at MKULTRA, Sidney Gottlieb, at the McGill University in Montreal where we were in this series
    • So a lot of the places
    • And things that we've mentioned the series Fort Detrick and the bio weapons program in Maryland...are you go around to these different places and it connects all the dots in a long format, which is really nice
    • And here's Sy Hersh at the end saying, "hey this story's too big for me"
    • And we're we heard that before I feel like he was just recording our ending, and just said well let's just slap it on the end of this documentary
    • But anyway you'll see Sy Hersh say this is story's too big for me at the end, in that in that story
    • But this guy Frank Enzyme Bradley--being caught: was that just so they could double down the amount of spending on the Boston Marathon on the 17th?
    • So was that kind of an inside job the old guard kind of their little clockwork orange' Games?
    • Fear
    • Or was it the new guard was it kind of the new US Cyber Command--kids was with with Flynn and Tony Shafer who I expect to be named to position Intelligence position with Trump here pretty quick?
    • Was it this new split?
    • This new separation of powers were gonna have between the Army guys--the US Cyber Command, and the Navy guys that the NSA?
    • Who knows? We'll see what happens
    • But it was interesting tie into this guy who was at the CDC, who went disappearing
    • Is that why all these flu viruses are being disseminated in these different places?
    • Who knows
    • And also we have the NRA event coming up in March May 3rd 4th and 5th
    • Did Krylova and Bogacheva go to that before? Yes of course they did
    • That was in Dallas this year
    • But where was it before?
    • Where where was Ted Cruz? Where with all those events?
    • We still don't know--none of that's come out
    • And one of the other things I've noticed about the Q phenomenon is I much I have a much greater understanding of how unknowns with Q and being on boards
    • And talking with all these people last night that follow Q
    • And the creation of these memes
    • And I think that's something that our series needs to do is create memes from the series
    • And so I'm gonna continue to create these playlists
    • So that people can go through
    • And say here's all the Navy Intel--from beginning to end in the whole series
    • And then create a Navy Intel meme with the old ones because I think the ones are extension of Navy Intel
    • And then do the same thing for the other significant memes in the in the series
    • So even though Q took a lot of my viewers away
    • And a lot of my researchers away, in a way it's good, because they show you a more effective way of doing open sourcing, creating these memes...
    • So I look forward to a good day of reporting
    • We won't say where all the places we're going, but have a happy easter everyone
  • Day 165.3. Preview of Andre Taggart Reveal - NNSA - YouTube
    • OK It's day 165 and this is part three
    • And this is sort of a sneak peak to the solution to the whole series
    • And I've said before we're kind of going from a pay-to-play world where things were doing below the table
    • And I the three initials there are MBZ the crown prince of Abu Dhabi
    • And sort of Hillary Clinton moving into the Trump world which is MBS, which is above the board--crown prince of Saudi Arabia or just do everything aboveboard
    • And the people who are doing the below the board business are pissed
    • So this series really has been looking at how that below the board business was done
    • So collecting metadata on how that was done--David Petraeus--the create the creation of this rogue NSA which is NNSA
    • Which is Not so Nice NSA
    • Basically created a Uranium cover for the last 20 years
    • And everything basically below that was this weapons for drugs or weapons for minerals or weapons for human resources kind of business
    • And that's the story of the last 20 years in Hillary Clinton and the whole crew,
    • And Navy Intel and her kind of unholy creation of this alliance with with NCIS or or this just rotten core inside a Navy Intel
    • So I just created a list about Navy Intel if you want to review the Navy Intel list if you haven't been following this series
    • But basically you have to find the server: where are they doing this?
    • You have to physically find it
    • So we go to Washington DC we we find--we collect a lot of metadata
    • We find the Lorton address where all this business is being conducted
    • Now, I do I think that's the real address?
    • No, that's the parallel construction if they ever get caught
    • They say there's deniability--it's just a just a group of people that are doing--find a bank fraud there's a small deal--it's not a big deal
    • The real action is at the Navy Yard
    • And that building 213 an old DIA building which was called a Threat Analysis Center
    • And this we've said this in the series for almost a year
    • So this isn't any surprise to anyone
    • The part I'm gonna let out today is I knew Taggart was a fake from the beginning
    • And I knew Tane Taggart was a fake from the beginning
    • I knew that I mean they weren't--just renting the property
    • But there was a reason why I had to go with that deception, because you let people who are in the business
    • (And they're just doing their jobs, right?)
    • You let people who are doing the business let the let the charade play out let the school play play out because you get valuable data although all along the way
    • I had to make Taggart the hero in order so other people would come forward and so he would continue talking
    • That was the key part
    • Keep giving us more metadata
    • It's too bad we couldn't have had a couple of more interviews with Taggart a couple of more interviews with Laurel Everly
    • All the people that are kind of either knowingly or unknowingly involved
    • An Tane Taggart would have been a good interview
    • Jacquayla would have been a good interview
    • But that's fine we still solve a puzzle now
    • Which is basically the drives were the takeaways for going to Pakistan--that those were the real drives--the ones that went in March, not the ones that were the decoys in April, that were left in the Rayburn office building
    • And that was the server's--that's how the trade occurred
    • It was on that caucus server--the drugs for weapons trade
    • The next thing was once got the servers--and the Sprayer home could have also been a place where people were were compromised
    • But then the next piece in in the whole thing is actually how do they do it?
    • And it was with these containers and
    • So we got down to the containers
    • And then how what goes into container?
    • So we really really got to a granular level with the cars--Alpha Jalloh ring to do all that
    • And everything else since that has been proving who with in Navy Intel have been the key people to put this whole thing together?
    • So I'll just leave it right there Taggarts a good guy
    • I think in Bethesda I remember I was in Bethesda, Maryland
    • And I almost said Taggarts role
    • And I held off, because I wanted to find out more about the people that were inside Navy Intel they we're actually running this
    • But I think you may know who who those people are already
    • But I'll just leave that for a more non XSTAR general logistics pay-sized version
  • Day 165.4. Saipov’s Mt Prospect Trucking - Near Blues Brothers Auto Auction - YouTube
    • It's day 165 here we are at beautiful Bussy Road
    • Go down to the end of this road on Bussy Road here in beautiful Mount Prospect
    • And you have the Mount Prospect auto auction of Blues Brothers Fame
    • Remember that Jake said we are on a mission from God
    • So the interesting thing about this is Saipov
    • Saipov truckers
    • They have a Saipov--the guy who ran down did the run down in Chelsea--ran over those five Argentinians
    • I think one of them was a nuclear scientist
    • The other one was that woman from Belgium the Belle from Belgium
    • We also have though sighs I've had a trucking company in Cincinnati trucking company
    • And car company in Cleveland car company here in Mount Prospect, Illinois close to Rahm Emanuel, close to Schneider, we're jan Schakowsky's district now
    • And of course one in Tampa
    • So the key here is chain migration and lottery: not such a good plan
    • The Saipov truckers? Not such a good plan
    • The Uzbekis--drugs going one way, weapons going the other, Uranium cover: not such a good idea
  • Day 166.1 Naugty NSA School Play Falling Apart - YouTube
    • It's day 166 part 1
    • And yesterday I revealed Andre Taggart is sort of a player in a Shakespearean play, if you will, covering the Awans, and the state support of the Awans spy ring in Congress, as well as Awan-Contra: the trading scheme for weapons and drugs in the Congress
    • Did they also have a sex ring in Congress, with all of the Awans beatings?
    • Well that's for another day
    • But certainly Taggart would have nothing to do with that
    • But the I am dubbing NNSA or the naught NSA as the key conspirator behind this, in much the same way we can say the revolt from the West at Tewkesbury 500 years ago was led by Richard the 3rd, I'm pinning this on Andrew McCabe, Hillary Clinton, and the NNSA
    • This is going to be a kind of a as we've said before kind of a power elite move
    • Its gonna be SAIC, key contractors like Lockheed, Northrop Grumman, doing major projects like Trailblazer at NSA Bill Binney Fame versus Thinthread, as well as Maritime Data Awareness applications like the application we singled out which was the Pandas, which which lines up well with Seth Rich in the Congress
    • You don't remember yesterday or the symbol first of all for NNSA
    • Here's I dubbed this this morning about four hours ago
    • And I talked about the different contractors involved in the NNSA
    • Now, I also created a playlist
    • So if you're not familiar with all the eleven or twelve different videos I've done on NSA
    • But the key here is Uranium under color-of-law with Uranium, now, I can trade anything below
    • And it provides me kind of the same sort of drayage that it provided the British Navy
    • Don't tell me what's of below decks just tell me how much it weighs and give me my commission for transporting it
    • And I do believe that Navy Jack has kind of I'm not going to say manipulated Crowdsource the Truth
    • But I do believe it has been sort of an information operation since the beginning to put the lid on this NNSA activity
    • I think the folks there knew that this would eventually come out if the crowd dug in on it
    • And there's been all kinds of diversionary tactics
    • But I think yesterday, Navy Jack threw the towel in
    • And now, he's trying to do anonymous strikes
    • So I won't say who Navy jack is specifically, but there are a few Navy Jack's out there
    • And specifically I think what they want to bury as this Andre Taggart interview in this Laurel Everly interview
    • Because it flies directly in the face it flies directly in the face of the truth and
    • But they give away key facts that unravel this whole NNSA pay-to-play scheme
    • I think also all of the anywhere you see those routers that at the Sprayer house that Jason filmed are going to be important as well
    • So I do believe the NNSA is trying to shut it down
    • Whether that's a Navy Jack or not we don't know for sure
    • But here's another article that came out that said, "oh by the way we all signed a slip a paper that advocated our rights of checking out and vetting The Awans in this scheme"
    • It's obvious that once a spy ringin Congress and also arms for drugs trading ring in Congress has state support and
    • So after the fact these 44 different Democrats are gonna say, "oh, but there was a piece of paper that we could sign that have been abdicated all our responsibilities in terms of vetting, because Debbie Wasserman-Schultz said so"
    • And I think we're hot on the trail of all the pieces of this network
    • They brought in these Uzbeki truckers to ship this stuff around here in Chicago--where I am in Mount prospect--was just one of the many trucking companies two in Ohio, one in New Jersey, in Paterson, New Jersey; one in Tampa, Florida as you can see here
    • So eventually with research this will all come to light
    • And that's why I think they want NNSA wants to bury these buried these films of Andre Taggart
    • So that's where we are today
    • I just want to say that I think we're hot on the trail
    • The metadata leads me to believe more than ever that we will put the pieces of the puzzle together even if we don't get certain documents from the court
  • Rosemont Casino - Bring Out Your Hawala and Your Dead - YouTube
    • Beautiful day 166 this is part two here at the Rosemont casino
    • And I just want to show you if you just recently had a sniper incident where an unfortunate person died at your hands you could bring the body here
    • And I'll show you how far you have to go to turn the body in to get five thousand dollars in chips here at the Rosemont casino
    • And I'm not kidding
    • If you look up Bioresource Center
    • And this is a show we did a long time ago I think it might have been over a year ago
    • We talked about there was prisoners at Holman square down south of Chicago down by the United Center where the Bulls used to play
    • That was a key place for bringing in--just as Christopher Steele does liaison operations, Intelligence operations in the United States for the FBI, we do liaison operations for other countries here in the United States for them
    • So we torture prisoners here for other countries
    • Again, that eludes their rules about informing their oversight bodies about operations
    • So if you don't remember what a liaison operation was: it's a way of avoiding the reporting that's in our Constitution about talking to the gang of eight, which is four people from the Congress on the Senate side, four people in the Congress on the on the side of the Senate
    • Two Senators from each party, two Congressmen from each party
    • But literally right there village of Rosemont is where BioResource Recovery Center was
    • Now, I'd only have to walk a little bit further down under that bridge to actually go to the USDA facility
    • Now, the USDA facility--if you recall--is where what we had right next to our our Gülen schools
    • I can't remember--they usually give a a name like Wisdom schools or Affinity schools or--Great Clocks by Kids Schools--they give them some kind of lofty name which is fine
    • But if you remember my visit there we basically had a lot of great teachers
    • So that they can farm the money through, and launder the money through
    • It's always great it's like a union you can always farm the money through gangsters love unions lots of workers lots of paychecks
    • But then you have one guy who can sue who's an English teacher from Turkey or some country like that: usually Turkey
    • And he is the interpreter
    • And then you got one guy in the back that cannot speak a word of English
    • And I call him the Halal money changer
    • So right behind me is O'Hare Airport
    • And literally all day he does is just count out Halal
    • Now, what comes into this you a facility here?
    • Well fruits and vegetables and also meat perishables things that could carry insects etc or food borne viruses
    • So they need to be irradiated
    • They need to make a trip to Ames, Iowa
    • So if you don't remember that part of our trip, you can go back and look at that
    • USDA
    • Now, I did
    • (I hope I don't get a copyright strike on the parking lot music)
    • I did interview a USDA person, and it turns out they loan a lot of money now to women farmers and also minority farmers
    • They want to get women started in farming and minority farmers
    • This turns out to be extremely difficult to get an American a loan
    • But very simple if you're from a different country
    • I know that's gonna us I know how hard that is gonna be for people to believe
    • Again, ninety nine point five percent of the people in USDA doing a great job
    • I only need to compromise 0.5%
  • Day 166.3. Delivering Imran’s Bitcoin To Rahm From O’Hare - YouTube
    • Day 166 part 3
    • I've now, made it from the airport with all the Halal cash
    • And the hawala you can see the armored car here I'm bout ready to take it in to Rahm Emanuel here at City Hall behind me
    • But before I do that because it's all Bitcoin now, it's all on hard drives, it's all on Imran's hard drive
    • So there's literally terabytes worth of Bitcoin
    • So makes it easier than the old days where you needed a big Brinks truck I still like to ride in the Brinks truck
    • But as you remember from the movie The Blues Brothers
    • You've got the Picasso here looks like it's a different color
    • Maybe this isn't the Picasso? Maybe--the I thought the Picasso was across the street from City Hall anyway
    • Well we'll go over there and find out if it's a Picasso or not
    • Maybe they replaced the Picasso
    • This is the scene where all the police cars pile up the Chicago police cars the Chicago's finest over there as you can see I do believe this is Richard Mary Daly square if it's not that I've just made a mistake
    • But as you can see now, all I need is hard drives to take Bitcoin to Pakistan
    • And I'm saying that probably happened on the 7th of March
    • And I picked up where I found the decoy about a month later with Andre Taggart
    • And now, of course I've exposed Taggart, because I see them shutting down the channel
    • I see I think there's foul play--in the runs--rotten in the state of Denmark, something rotten in the state of Denmark as Hamlet would say
    • So if that isn't Picasso then I don't know what is
    • But I do think there's something rotten in the state of Denmark
    • And they're shutting down Jason's channel we have to get all those interviews
    • And phone calls from Taggart before they go away as--44 different Democrats, maybe up to 50 waved, doing a background check on Imran Awan
    • And all the conspirators Lisa Maria Bartiromo says it's the biggest story of the year that's not been covered
    • The biggest uncover story of the year the story is breaking now and you're live to see it here in Chicago
    • And just I want to say hi to Rahm
    • Bole di Juggies is doing great, Rahm
    • I got all the Bitcoin: we got it all!
    • We got it all baby, nobody stopped us: Andy didn't stop us at the airport: we got it all
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments] is a scam / Do not give it time Bitcoin Mining Tools - 5 BTC Generate Information Video BEST BITCOIN CLOUD MINING  0.1 BTC FOR 15 MINUTES  BITCOIN GENERATOR Bitcoin Mining Software Cracked Withdraw 100% No Mining Fees 2019 Claim FREE bitcoins every 15 MINUTES!

The miner will start, run the setx commands to set those environment variables, initialize each of your GPU’s, build the DAG file on each of your GPU’s and start hashing away. Let it run for about 20 seconds and then click “s” to display your Hashing speed. If you’ve followed the steps above you should see this screen. At the time of this writing, the price of a single Bitcoin is more than $10,700. While the price of Bitcoin can fluctuate wildly up and down, many financial experts are very bullish on its long-term outlook. Wall Street legend, Tim Draper, expects that one Bitcoin will be worth $250,000 sometime in the future. Staff at bitcoin miner manufacturer Bitmain are being forced to choose between its two co-founders as their long 2020 at 14:35 UTC Updated Jun 22, 2020 at 15:54 UTC. Micree Zhan, co-founder of Bitcoin mining is the process by which transactions are verified and added to the public ledger, known as the block chain, and also the means through which new bitcoin are released. Anyone with Bitcoin attempted to recover from a price dip on Friday as global stock indexes end the week lower. This entry was posted in Uncategorized on May 15, 2020 by adminbtc . Where Bitcoin Fits in the New Monetary Order