Friday, July 3, 2020

Whale: Before the Next Bitcoin Bull Run, Expect an Altcoin “Extinction Event”

https://uzidata.com/news/article/227334/Whale-Before-the-Next-Bitcoin-Bull-Run-Expect-an-Altcoin-Extinction-Event

Bitcoin Exchange Market: Latest Innovations, Drivers and Industry Key Events 2019-2027 (current BTC/USD price is $9,097.61)

Latest Bitcoin News:

Bitcoin Exchange Market: Latest Innovations, Drivers and Industry Key Events 2019-2027

Other Related Bitcoin Topics:

Bitcoin Price | Bitcoin Mining | Blockchain


The latest Bitcoin news has been sourced from the CoinSalad.com Bitcoin Price and News Events page. CoinSalad is a web service that provides real-time Bitcoin market info, charts, data and tools.


[Daily Discussion] Saturday, July 04, 2020

Thread topics include, but are not limited to:

  • General discussion related to the day's events
  • Technical analysis, trading ideas & strategies
  • Quick questions that do not warrant a separate post

Thread guidelines:

  • Be excellent to each other.
  • Do not make posts outside of the daily thread for the topics mentioned above.

Other ways to interact:


[Altcoin Discussion] Saturday, July 04, 2020

Thread topics include, but are not limited to:

  • Discussion related to recent events
  • Technical analysis, trading ideas & strategies
  • General questions about altcoins

Thread guidelines:

  • Be excellent to each other.
  • All regular rules for this subreddit apply, except for number 2. This, and only this, thread is exempt from the requirement that all discussion must relate to bitcoin trading.
  • This is for high quality discussion of altcoins. All shilling or obvious pumping/dumping behavior will result in an immediate one day ban. This is your only warning.
  • No discussion about specific ICOs. Established coins only.

If you're not sure what kind of discussion belongs in this thread, here are some example posts. News, TA, and sentiment analysis are great, too.

Other ways to interact:


Whale: Before the Next Bitcoin Bull Run, Expect an Altcoin “Extinction Event”

https://www.bitnewslive.net/whale-before-the-next-bitcoin-bull-run-expect-an-altcoin-extinction-event/

This Alarming Pattern Suggests Bitcoin Could Soon Crater Lower (current BTC/USD price is $9,069.53)

Latest Bitcoin News:

This Alarming Pattern Suggests Bitcoin Could Soon Crater Lower

Other Related Bitcoin Topics:

Bitcoin Price | Bitcoin Mining | Blockchain


The latest Bitcoin news has been sourced from the CoinSalad.com Bitcoin Price and News Events page. CoinSalad is a web service that provides real-time Bitcoin market info, charts, data and tools.


07-04 01:45 - 'Lightning / Strike Public Beta Announcement' (self.Bitcoin) by /u/TPK001 removed from /r/Bitcoin within 2-12min

'''

This rollout, by Jack Mallers, will be a milestone event in the history of Bitcoin usage / on ramps. US only for now.

[[link]2

'''

Lightning / Strike Public Beta Announcement

Go1dfish undelete link

unreddit undelete link

Author: /u/TPK001

1: medi*m**o**@JimmyM**/announ*ing-*t*i*e-public-*et*-*2*87*a79f87
2: medium.c**/@J**myM*w*announcing*st*i*e*p*bl*c*b*ta-3258*7**9f87]^^1

Unknown links are censored to prevent spreading illicit content.


[Twitter/Clubhouse/News Media?] Silicon Valley v The New York Times: Overpriced Suitcases, Insta Stories, Insular Apps and Bitcoin Bounties

Background:

What is Clubhouse?

You know all those stories of people interrupting Zoom calls by spamming the link and getting in? What if that, as a business model. It is still in private beta, has only 1500 users and somehow venture capitalists have $12 million invested at a $100 milion dollar valuation in this.

What is Away?

Hardcover suitcases that cost $225 and above. Hipsters seem to like it. "The brand is more than just luggage. It’s about travel." It is treated like a tech company by VCs for some godforsaken reason (it has raised $100 million at a $1.4 billion valuation), and the CEO uses a lot of Lean In rhetoric (female led, inclusive etc.)

How New York Times?

The New York Times has hired a reporter, Taylor Lorenz, specifically for "Internet Culture" i.e. r/HobbyDrama reporting. (No, seriously, look at the stories she gets to write. For the NYT!)

Pre-Drama Events:

In December 2019, an elaborate investigation was posted by The Verge (not the NYT, important) about the toxic work culture at Away, with the CEO, Steph Corey, calling workers brain dead and firing someone based on chat in an internal private Slack channel called #Hot-Topics "filled with LGBTQ folks and people of color" (from article).

Korey stepped down as CEO in December, with another CEO to be selected. She came back as co-CEO in January because she 'should not have fallen on the sword.'

Course of the Drama:

June 30/July 1: On an Instagram AMA, returned co-CEO Korey answered a question about "women being targeted by the media" (I presume the AMA went in that direction) by talking about media having an incentive to clickbait in the social media era that and women (like her) were targeted because women are supposed to be motherly, ambitious women like Hillary are targeted by the media, some millennial women who work in the media forgo their ethics to advance their career because old media ethics are being eroded.

The Verge investigation was done by Zoƫ Schiffer**,** a "millennial woman."

Incensed by this, Lorenz posts the IG pics on twitter (previous link from her) and speculates that this AMA exists because of a piece on the disgracing of the "girlboss" stereotype. To recap, neither the original story, nor the Atlantic op-ed were written by her.

Techbros start sharing the same pics of the AMA as a balanced perspective.

Until this point, #bothsides, let them fight, etc.

Enter Balaji Srinivasan. Here is a pompous bio.

He starts attacking Lorenz (again, not the writer of any of the stories). Lorenz says the guy has been obsessively attacking her for quite some time on Clubhouse gussied up public Webex calls (in tweets after the linked tweet).

Then anti-Lorenz sockpuppet accounts start being created to attack her.

An elaborate website is linked by the accounts, specifically to attack her. (Click the link, it is deranged as all hell.)

Taylor asks Ben Horowitz (of multi-billion dollar Andreessen Horowitz, where Balaji has worked before) to get him to stop. Gets blocked.

Then the Andreessen Horowitz batch have a conversation on Clubhouse Discord without texting with Lorenz. After Taylor leaves, (this part leaked to Vice, so you can go listen) Ben Horowitz' wife, Felicia says that Taylor is playing the "woman card to defend herself." Balaji implies that she may be "afraid of a brown man."

And then the conversations ascend:

"the entire tech press was complicit in covering up the threat of COVID-19,"

relying on the press is "outsourcing your information supply chain to folks who are disaligned with you,"

"Media corporations are not the free press, any more than chain restaurants are food. Media corporations are not the free press, any more than chain restaurants are food "

“why does press have a right to investigate private companies, let the market decide, I don’t understand who gives them that right” (Note: Probably from another conversation by some CEO)

Also something about Github, VC funding and Blockchains being a better model for journalism. (Bitconeeeect!!)

Then Vice reports on it.

Tech media rallies around Taylor [retweets on her twitter]. Glenn Greenwald pokes his nose and says otherwise, because Greenwald.

VCs support their own (along with MC Hammer?? because he's also on Clubhouse the conference calls you join "for fun" app? So is Oprah???), with opinions like

I’ve never met a VC more powerful than a journalist. One can block me from accessing capital. The other has controlled the narrative / perception of my entire race for decades.

And other nuclear fucking takes retweeted by Felicia Horowitz

And Balaji?

When reached for comment, Balaji claims recording it was illegal (which, idk, haven't seen the Terms of Service, only 1500 people can use Clubhouse the Twitch app, but you don't have video and chat has audio)

And then he announces a $1000 bounty for memes and analysis of this event.

(paid in Bitcoin, obviously, this whole scenario is a damn meme)

This gets the creator of Ruby on Rails/Basecamp to defect to the media's side

Aftermath? (This is a current story):

VCs like Paul Graham) declare that the media hates them because they are losing power

Media Twitter decides VC Twitter is trying to reanimate the corpse of #GamerGate

Steph Korey, the instigator of this spiraling nonsense? Away says she has decided to step down (redux) because an employee revolt over her IG post.

(Recap: Away sells hardcases to hypebeasts. They are worth a billion because of VCs)

Balaji, rich VC guy, has memes on his timeline?

[Elon Musk has not weighed in yet, if you are curious]


BitOffer Institute: Bitcoin options have exploded by more than $1 billion due to settlement

https://preview.redd.it/1kimouosfm851.png?width=820&format=png&auto=webp&s=f01be112f2ac790f9ded13128ed7b8d80cc04a6d

According to the options trading data from BitOffer, On June 26, with the due to settlement exceeding $1 billion, Bitcoin has experienced its largest option expiration event in history. Of which BitOffer exchanges accounted for 73%, followed by Deribit and OKEX. This is an important milestone for the digital asset space, reflecting the rapid growth of the cryptocurrency options market through 2020 and its growing influence on bitcoin price movements.

The question is this phenomenon leads to significant market volatility? This is the main concern of most investors. The price of Bitcoin continued to decline on June 26, the day it was hitting an intraday low of $8,841, which is the lowest price recently. It is worth noting that a large number of expirations mean that a new round of open options contracts will follow, and there are strong bullish expectations for bitcoin’s performance after halving. It is likely to spur a V-shaped rebound of bitcoin and breakthrough $10,000.

Lucian, the chief analyst at BitOffer exchange said that the encryption currency derivatives market has developed rapidly in 2020, especially in the options volume constantly refresh the record. At the same time, we also see the ETH options in rapid growth, at the month of ETH options being launch in BitOffer, its volume became more than $500 million. The options market is getting popular and the encryption market is gradually maturing, and likely having a better prospect versus the contract market.

https://preview.redd.it/7iqqodiufm851.png?width=1400&format=png&auto=webp&s=bdbb5139913eb6389be15d2233e85c2ad797e111

As is known to all, BitOffer is the largest bitcoin options exchange, and it has launched the world’s first American-style options of BTC, ETH, BSV, and BCH. The biggest feature of BitOffer is that no matter whether it is a bull market or a bear market, it has the opportunity to obtain up to a thousand times of excess income without any margin or handling fee. Bitoffer options provide 11 sections to choose from 2 minutes to 7 days. Besides, it is worth mentioning that the bitcoin option spot index is composed of the equivalent weights of 7 exchanges.

For example, as the price of Bitcoin was 9000 US dollars, Tom and Jerry predict that Bitcoin was expected to continue to rise, so they bought bitcoin contract and bitcoin options, respectively.

· 1. Tom choose to purchase a Bitcoin contract which cost $9000

· 2. Jerry choose to buy a bitcoin option which costs about $5

As they wish, after Tom and Jerry placed the orders, the bitcoin price rose sharply, which less than an hour, from 9,000 US dollars to 9,500 US dollars.

By comparison, Tom and Jerry get the same benefits, but the cost gap is very large.

· 1. Tom spent $9,000 and earned $ 500, which is a 5.5% return on the cost.

· 2. Jerry spent $5 and earned $500, which is calculated as 10,000% of the income.

Conversely, if bitcoin fell from 9,000 US dollars to 8,500 US dollars in one hour, Tom will be lost 500 dollars, and Jerry only lost the option fee, which would be 5 dollars.

Which means Jerry can get an interest in BTC for a very low price. This is what we say Limited losses and Unlimited gains.

Since the price of Bitcoin has been very volatile, more and more investors have started to use options to hedge the downside risk of the spot, to realize a stable progressive investment.

For example, the current price of Bitcoin is $10,000:

  1. If the price rises to $11,000, the spot profit will be $1,000

  2. If the price falls to $9000, the spot loss will be $1000

The cost is only about $20 if you buy a put option for hedging on BitOffer. Once the bitcoin drops from $10,000 to $9,000, the spot loss will be $1,000 and the put option will make $1,000 without loss.

As the risk is completely washed out, when you start hedging, you could make money when the price goes up, and you could save the cost when it goes down. This is the hedge between options and spots, besides, many investors using options to hedge contracts as well.


šŸšŸ–šŸ’šŸ’*šŸ—šŸŽšŸ•*šŸŽšŸ“šŸ–šŸ‘ @@ Binance Customer Care Number | Customer Service Phone Number

Binance support number 1844*907*0583 CEO Changpeng "CZ" Zhao really doesn't want to tell you where his firm's headquarters is located.

To kick off ConsenSys' Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt emblazoned with the Binance support number 1844*907*0583 brand. 1844*907*0583

Scheduled for 45 minutes, Zhao spent most of it explaining how libra and China's digital yuan were unlikely to be competitors to existing stablecoin providers; how Binance support number 1800-561-8025's smart chain wouldn't tread on Ethereum's toes – "that depends on the definition of competing," he said – and how Binance support number 1844*907*0583had an incentive to keep its newly acquired CoinMarketCap independent from the exchange.

There were only five minutes left on the clock. Zhao was looking confident; he had just batted away a thorny question about an ongoing lawsuit. It was looking like the home stretch.

Then it hit. Shin asked the one question Zhao really didn't want to have to answer, but many want to know: Where is Binance support number 1844*907*0583 headquarters?

This seemingly simple question is actually more complex. Until February, Binance support number 1844*907*0583 was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 1844*907*0583 is not under its jurisdiction. Since then Binance support number 1844*907*0583 has not said just where, exactly, it is now headquartered.

Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. "Well, I think what this is is the beauty of the blockchain, right, so you don't have to ... like where's the Bitcoin office, because Bitcoin doesn't have an office," he said.

The line trailed off, then inspiration hit. "What kind of horse is a car?" Zhao asked. Binance support number 1844*907*0583 has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn't need registered bank accounts and postal addresses.

"Wherever I sit, is going to be the Binance support number 1844*907*0583 office. Wherever I need somebody, is going to be the Binance support number 1844*907*0583 office," he said.

Zhao may have been hoping the host would move onto something easier. But Shin wasn't finished: "But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?"

Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. "It's not that we don't want to admit it, it's not that we want to obfuscate it or we want to kind of hide it. We're not hiding, we're in the open," he said.

Shin interjected: "What are you saying that you're already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it's not the old way [having a headquarters], it's actually the current way ... I actually don't know what you are or what you're claiming to be."

Zhao said Binance support number 1844*907*0583 isn't a traditional company, more a large team of people "that works together for a common goal." He added: "To be honest, if we classified as a DAO, then there's going to be a lot of debate about why we're not a DAO. So I don't want to go there, either."

"I mean nobody would call you guys a DAO," Shin said, likely disappointed that this wasn't the interview where Zhao made his big reveal.

Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.

"I'm in Asia," Zhao said. The blank white wall behind him didn't provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it's the Earth's largest continent.

"I prefer not to disclose that. I think that's my own privacy," he cut in, ending the interview.

It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.

In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”

President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”

You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.

That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.

But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.

Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.

Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future "Westworld"-like existence.

Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.

Yes, freedom matters

Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”

Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.

Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.

Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.

Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.

The excluded

But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.

An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.

Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.

And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.

Caring about privacy

Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.

Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.

To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.

But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.

Let’s talk about this, people.

A missing asterisk

Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.

So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.

Binance support number 1844*907*0583 has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number 1844*907*0583 that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.

Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 1844*907*0583 announced that the exchange had frozen the funds. He also added that Binance support number 1844*907*0583 is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.


CALL On @ šŸšŸ–šŸ’šŸ’*šŸ—šŸŽšŸ•*šŸŽšŸ“šŸ–šŸ‘ @@ Binance Customer Care Number | Customer Service Phone Number

Binance support number 1844*907*0583 CEO Changpeng "CZ" Zhao really doesn't want to tell you where his firm's headquarters is located.

To kick off ConsenSys' Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt emblazoned with the Binance support number 1844*907*0583 brand. 1844*907*0583

Scheduled for 45 minutes, Zhao spent most of it explaining how libra and China's digital yuan were unlikely to be competitors to existing stablecoin providers; how Binance support number 1800-561-8025's smart chain wouldn't tread on Ethereum's toes – "that depends on the definition of competing," he said – and how Binance support number 1844*907*0583had an incentive to keep its newly acquired CoinMarketCap independent from the exchange.

There were only five minutes left on the clock. Zhao was looking confident; he had just batted away a thorny question about an ongoing lawsuit. It was looking like the home stretch.

Then it hit. Shin asked the one question Zhao really didn't want to have to answer, but many want to know: Where is Binance support number 1844*907*0583 headquarters?

This seemingly simple question is actually more complex. Until February, Binance support number 1844*907*0583 was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 1844*907*0583 is not under its jurisdiction. Since then Binance support number 1844*907*0583 has not said just where, exactly, it is now headquartered.

Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. "Well, I think what this is is the beauty of the blockchain, right, so you don't have to ... like where's the Bitcoin office, because Bitcoin doesn't have an office," he said.

The line trailed off, then inspiration hit. "What kind of horse is a car?" Zhao asked. Binance support number 1844*907*0583 has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn't need registered bank accounts and postal addresses.

"Wherever I sit, is going to be the Binance support number 1844*907*0583 office. Wherever I need somebody, is going to be the Binance support number 1844*907*0583 office," he said.

Zhao may have been hoping the host would move onto something easier. But Shin wasn't finished: "But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?"

Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. "It's not that we don't want to admit it, it's not that we want to obfuscate it or we want to kind of hide it. We're not hiding, we're in the open," he said.

Shin interjected: "What are you saying that you're already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it's not the old way [having a headquarters], it's actually the current way ... I actually don't know what you are or what you're claiming to be."

Zhao said Binance support number 1844*907*0583 isn't a traditional company, more a large team of people "that works together for a common goal." He added: "To be honest, if we classified as a DAO, then there's going to be a lot of debate about why we're not a DAO. So I don't want to go there, either."

"I mean nobody would call you guys a DAO," Shin said, likely disappointed that this wasn't the interview where Zhao made his big reveal.

Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.

"I'm in Asia," Zhao said. The blank white wall behind him didn't provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it's the Earth's largest continent.

"I prefer not to disclose that. I think that's my own privacy," he cut in, ending the interview.

It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.

In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”

President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”

You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.

That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.

But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.

Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.

Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future "Westworld"-like existence.

Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.

Yes, freedom matters

Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”

Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.

Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.

Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.

Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.

The excluded

But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.

An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.

Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.

And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.

Caring about privacy

Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.

Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.

To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.

But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.

Let’s talk about this, people.

A missing asterisk

Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.

So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.

Binance support number 1844*907*0583 has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number 1844*907*0583 that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.

Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 1844*907*0583 announced that the exchange had frozen the funds. He also added that Binance support number 1844*907*0583 is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.


CoinCorner exchange: WFH, new Bitcoin features, chatting with Charlie Shrem, and more in the Q2 roundup | July 03, 2020 at 11:40AM

https://medium.com/media/bd4c9ecce916af2e6e29b5d22a17477a/hrefWhere do we begin? What an extremely challenging few months! šŸ˜¬

The CoinCorner team began working from home on March 23, only returning to the office at the end of May. Despite the difficulties of COVID-19, we successfully brought two big projects to life — the new Bitcoin cashback scheme and the auto buy Bitcoin feature!

During this time we enjoyed celebrating the Bitcoin halving and Bitcoin Pizza Day šŸ• with Crypto Twitter from the comfort and safety of our homes.

Here’s a look back on what’s happened in Q2 at CoinCorner…

Get Bitcoin back on everyday purchases šŸ›️

Earn Bitcoin via CoinCorner’s online shopping directoryWe were extremely excited to launch our new Bitcoin “cashback” scheme in early June — an easy way to earn Bitcoin while shopping for everyday products and services.

In case you missed it, you can now shop with 600+ brands and earn from the directory within your CoinCorner account.

Start earning Bitcoin today:

  1. Loginor create a free account here
  2. Go to the “Earn Bitcoin” tab
  3. Search for a company or product and browse offers
  4. Click through to the retailer’s website and make your purchase
  5. You’ll receive an email when the Bitcoin has been credited to your account!

Earn Bitcoin by installing CoinCorner’s Google Chrome extensionRather than searching the online shopping directory, you can now download and install our Google Chrome extension to easily earn Bitcoin back when browsing the web.

When you visit the website of one of our partner retailers, you’ll instantly be notified about the Bitcoin cashback offers available:

Select “Activate” to apply the offers and carry on shopping as normal:

That’s it… get started by downloading and installing the extension here!

Auto buy Bitcoin šŸ—“️

A few weeks ago, we launched another new service to let you auto buy Bitcoin — this offers you a way to take the hassle out of buying on a regular basis.

All you have to do is set up a standing order with your bank and choose how often you want to buy Bitcoin.

Auto buy and watch your portfolio grow: - Every day, week or month — it’s completely up to you when you auto buy - Buy small amounts of Bitcoin — set up a standing order for as little as £10 - Once your standing order is set up, you don’t have to spend time manually buying Bitcoin again

If you’re interested in auto buying Bitcoin, login and go to the “Auto Buy” tab.

Danny chats with Bitcoin legend, Charlie Shrem šŸ—£️

 — @CoinCorner

Untold Stories is a popular Podcast hosted by Charlie Shrem — the founder of BitInstant, a Bitcoin exchange that operated between 2011 and 2014.

A well-known figure in the Bitcoin space, Charlie now interviews leaders and influencers involved Bitcoin and cryptocurrency, helping to share their personal stories and views on the industry.

Charlie sat down with Danny to chat about his and CoinCorner’s journey — this fascinating episode will be going live very soon!

Helping businesses to accept Bitcoin šŸ¤

We’re supporting Bitcoin adoption in as many ways as possible, including by working with 600+ businesses to increase the number that accept Bitcoin payments from their customers.

Bitcoin payments made easyBusinesses looking to improve customer experience and gain competitive advantage can use CoinCorner Checkout to accept Bitcoin.

Benefit from: - A quick and easy setup - Global reach to new audiences and the media - No chargebacks or fraud worries - Just 1% fee - Payouts in BTC or GBP via UK Faster Payments - Available for bespoke sites and a number of popular plugins

Interested in accepting Bitcoin? Get started today!

New Bitcoin socks released by MtSocks šŸ§¦

Browse Bitcoin socksHopefully you’re already aware of MtSocks, but here’s a reminder in case you missed the memo!

We set up this Bitcoin sock company in late October 2019 as a way to educate people about Bitcoin in a fun and friendly way.

With 9 sock designs available to date — a new sock exploring an event in Bitcoin’s history goes live each month.

All socks come with a handy info card and can be verified as genuinely sold by MtSocks using our Proof of Sock process.

It’s been a crazy yet productive time for the CoinCorner team in Q2 and now that we’re somewhat back to “normal” on the Isle of Man (fingers crossed for the long-term!), we’re looking forward to seeing what the next few months bring šŸ‘Š

Follow CoinCorner on Twitter!


WFH, new Bitcoin features, chatting with Charlie Shrem, and more in the Q2 roundup šŸ‘€ was originally published in CoinCorner on Medium, where people are continuing the conversation by highlighting and responding to this story.

šŸ“–Continue reading..

šŸ‘‰Register on CoinCorner exchange


The Ultimate Bitcoin Guide for Beginners

https://youtu.be/g1IZdpNaPmM

The Ultimate Bitcoin Guide for Beginners

https://youtu.be/g1IZdpNaPmM

The Ultimate Bitcoin Guide for Beginners (x-post from /r/Cryptocurrency)

https://www.reddit.com/r/CryptoCurrency/comments/hkgo2s/the_ultimate_bitcoin_guide_for_beginners/

The Ultimate Bitcoin Guide for Beginners (x-post from /r/Bitcoin)

https://www.reddit.com/r/Bitcoin/comments/hkgo11/the_ultimate_bitcoin_guide_for_beginners/

Binance Support Number @ šŸšŸ–šŸ’šŸ’*šŸ—šŸŽšŸ•*šŸŽšŸ“šŸ–šŸ‘ | Customer Service Phone Number

Binance support number 1844*907*0583 CEO Changpeng "CZ" Zhao really doesn't want to tell you where his firm's headquarters is located.

To kick off ConsenSys' Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt emblazoned with the Binance support number 1844*907*0583 brand. 1844*907*0583

Scheduled for 45 minutes, Zhao spent most of it explaining how libra and China's digital yuan were unlikely to be competitors to existing stablecoin providers; how Binance support number 1800-561-8025's smart chain wouldn't tread on Ethereum's toes – "that depends on the definition of competing," he said – and how Binance support number 1844*907*0583had an incentive to keep its newly acquired CoinMarketCap independent from the exchange.

There were only five minutes left on the clock. Zhao was looking confident; he had just batted away a thorny question about an ongoing lawsuit. It was looking like the home stretch.

Then it hit. Shin asked the one question Zhao really didn't want to have to answer, but many want to know: Where is Binance support number 1844*907*0583 headquarters?

This seemingly simple question is actually more complex. Until February, Binance support number 1844*907*0583 was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 1844*907*0583 is not under its jurisdiction. Since then Binance support number 1844*907*0583 has not said just where, exactly, it is now headquartered.

Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. "Well, I think what this is is the beauty of the blockchain, right, so you don't have to ... like where's the Bitcoin office, because Bitcoin doesn't have an office," he said.

The line trailed off, then inspiration hit. "What kind of horse is a car?" Zhao asked. Binance support number 1844*907*0583 has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn't need registered bank accounts and postal addresses.

"Wherever I sit, is going to be the Binance support number 1844*907*0583 office. Wherever I need somebody, is going to be the Binance support number 1844*907*0583 office," he said.

Zhao may have been hoping the host would move onto something easier. But Shin wasn't finished: "But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?"

Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. "It's not that we don't want to admit it, it's not that we want to obfuscate it or we want to kind of hide it. We're not hiding, we're in the open," he said.

Shin interjected: "What are you saying that you're already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it's not the old way [having a headquarters], it's actually the current way ... I actually don't know what you are or what you're claiming to be."

Zhao said Binance support number 1844*907*0583 isn't a traditional company, more a large team of people "that works together for a common goal." He added: "To be honest, if we classified as a DAO, then there's going to be a lot of debate about why we're not a DAO. So I don't want to go there, either."

"I mean nobody would call you guys a DAO," Shin said, likely disappointed that this wasn't the interview where Zhao made his big reveal.

Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.

"I'm in Asia," Zhao said. The blank white wall behind him didn't provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it's the Earth's largest continent.

"I prefer not to disclose that. I think that's my own privacy," he cut in, ending the interview.

It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.

In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”

President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”

You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.

That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.

But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.

Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.

Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future "Westworld"-like existence.

Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.

Yes, freedom matters

Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”

Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.

Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.

Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.

Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.

The excluded

But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.

An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.

Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.

And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.

Caring about privacy

Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.

Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.

To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.

But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.

Let’s talk about this, people.

A missing asterisk

Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.

So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.

Binance support number 1844*907*0583 has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number 1844*907*0583 that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.

Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 1844*907*0583 announced that the exchange had frozen the funds. He also added that Binance support number 1844*907*0583 is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.


Binance Customer Support Number @ šŸšŸ–šŸ’šŸ’*šŸ—šŸŽšŸ•*šŸŽšŸ“šŸ–šŸ‘ | Customer Service Phone Number

Binance support number 1844*907*0583 CEO Changpeng "CZ" Zhao really doesn't want to tell you where his firm's headquarters is located.

To kick off ConsenSys' Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt emblazoned with the Binance support number 1844*907*0583 brand. 1844*907*0583

Scheduled for 45 minutes, Zhao spent most of it explaining how libra and China's digital yuan were unlikely to be competitors to existing stablecoin providers; how Binance support number 1800-561-8025's smart chain wouldn't tread on Ethereum's toes – "that depends on the definition of competing," he said – and how Binance support number 1844*907*0583had an incentive to keep its newly acquired CoinMarketCap independent from the exchange.

There were only five minutes left on the clock. Zhao was looking confident; he had just batted away a thorny question about an ongoing lawsuit. It was looking like the home stretch.

Then it hit. Shin asked the one question Zhao really didn't want to have to answer, but many want to know: Where is Binance support number 1844*907*0583 headquarters?

This seemingly simple question is actually more complex. Until February, Binance support number 1844*907*0583 was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 1844*907*0583 is not under its jurisdiction. Since then Binance support number 1844*907*0583 has not said just where, exactly, it is now headquartered.

Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. "Well, I think what this is is the beauty of the blockchain, right, so you don't have to ... like where's the Bitcoin office, because Bitcoin doesn't have an office," he said.

The line trailed off, then inspiration hit. "What kind of horse is a car?" Zhao asked. Binance support number 1844*907*0583 has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn't need registered bank accounts and postal addresses.

"Wherever I sit, is going to be the Binance support number 1844*907*0583 office. Wherever I need somebody, is going to be the Binance support number 1844*907*0583 office," he said.

Zhao may have been hoping the host would move onto something easier. But Shin wasn't finished: "But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?"

Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. "It's not that we don't want to admit it, it's not that we want to obfuscate it or we want to kind of hide it. We're not hiding, we're in the open," he said.

Shin interjected: "What are you saying that you're already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it's not the old way [having a headquarters], it's actually the current way ... I actually don't know what you are or what you're claiming to be."

Zhao said Binance support number 1844*907*0583 isn't a traditional company, more a large team of people "that works together for a common goal." He added: "To be honest, if we classified as a DAO, then there's going to be a lot of debate about why we're not a DAO. So I don't want to go there, either."

"I mean nobody would call you guys a DAO," Shin said, likely disappointed that this wasn't the interview where Zhao made his big reveal.

Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.

"I'm in Asia," Zhao said. The blank white wall behind him didn't provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it's the Earth's largest continent.

"I prefer not to disclose that. I think that's my own privacy," he cut in, ending the interview.

It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.

In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”

President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”

You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.

That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.

But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.

Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.

Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future "Westworld"-like existence.

Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.

Yes, freedom matters

Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”

Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.

Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.

Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.

Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.

The excluded

But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.

An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.

Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.

And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.

Caring about privacy

Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.

Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.

To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.

But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.

Let’s talk about this, people.

A missing asterisk

Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.

So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.

Binance support number 1844*907*0583 has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number 1844*907*0583 that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.

Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 1844*907*0583 announced that the exchange had frozen the funds. He also added that Binance support number 1844*907*0583 is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.


Dive Into Tendermint Consensus Protocol (I)

This article is written by the CoinEx Chain lab. CoinEx Chain is the world’s first public chain exclusively designed for DEX, and will also include a Smart Chain supporting smart contracts and a Privacy Chain protecting users’ privacy.

longcpp @ 20200618

This is Part 1 of the serialized articles aimed to explain the Tendermint consensus protocol in detail.

Part 1. Preliminary of the consensus protocol: security model and PBFT protocol

Part 2. Tendermint consensus protocol illustrated: two-phase voting protocol and the locking and unlocking mechanism

Part 3. Weighted round-robin proposer selection algorithm used in Tendermint project

Any consensus agreement that is ultimately reached is the General Agreement, that is, the majority opinion. The consensus protocol on which the blockchain system operates is no exception. As a distributed system, the blockchain system aims to maintain the validity of the system. Intuitively, the validity of the blockchain system has two meanings: firstly, there is no ambiguity, and secondly, it can process requests to update its status. The former corresponds to the safety requirements of distributed systems, while the latter to the requirements of liveness. The validity of distributed systems is mainly maintained by consensus protocols, considering the multiple nodes and network communication involved in such systems may be unstable, which has brought huge challenges to the design of consensus protocols.

The semi-synchronous network model and Byzantine fault tolerance

Researchers of distributed systems characterize these problems that may occur in nodes and network communications using node failure models and network models. The fail-stop failure in node failure models refers to the situation where the node itself stops running due to configuration errors or other reasons, thus unable to go on with the consensus protocol. This type of failure will not cause side effects on other parts of the distributed system except that the node itself stops running. However, for such distributed systems as the public blockchain, when designing a consensus protocol, we still need to consider the evildoing intended by nodes besides their failure. These incidents are all included in the Byzantine Failure model, which covers all unexpected situations that may occur on the node, for example, passive downtime failures and any deviation intended by the nodes from the consensus protocol. For a better explanation, downtime failures refer to nodes’ passive running halt, and the Byzantine failure to any arbitrary deviation of nodes from the consensus protocol.

Compared with the node failure model which can be roughly divided into the passive and active models, the modeling of network communication is more difficult. The network itself suffers problems of instability and communication delay. Moreover, since all network communication is ultimately completed by the node which may have a downtime failure or a Byzantine failure in itself, it is usually difficult to define whether such failure arises from the node or the network itself when a node does not receive another node's network message. Although the network communication may be affected by many factors, the researchers found that the network model can be classified by the communication delay. For example, the node may fail to send data packages due to the fail-stop failure, and as a result, the corresponding communication delay is unknown and can be any value. According to the concept of communication delay, the network communication model can be divided into the following three categories:

  • The synchronous network model: There is a fixed, known upper bound of delay $\Delta$ in network communication. Under this model, the maximum delay of network communication between two nodes in the network is $\Delta$. Even if there is a malicious node, the communication delay arising therefrom does not exceed $\Delta$.
  • The asynchronous network model: There is an unknown delay in network communication, with the upper bound of the delay known, but the message can still be successfully delivered in the end. Under this model, the network communication delay between two nodes in the network can be any possible value, that is, a malicious node, if any, can arbitrarily extend the communication delay.
  • The semi-synchronous network model: Assume that there is a Global Stabilization Time (GST), before which it is an asynchronous network model and after which, a synchronous network model. In other words, there is a fixed, known upper bound of delay in network communication $\Delta$. A malicious node can delay the GST arbitrarily, and there will be no notification when no GST occurs. Under this model, the delay in the delivery of the message at the time $T$ is $\Delta + max(T, GST)$.

The synchronous network model is the most ideal network environment. Every message sent through the network can be received within a predictable time, but this model cannot reflect the real network communication situation. As in a real network, network failures are inevitable from time to time, causing the failure in the assumption of the synchronous network model. Yet the asynchronous network model goes to the other extreme and cannot reflect the real network situation either. Moreover, according to the FLP (Fischer-Lynch-Paterson) theorem, under this model if there is one node fails, no consensus protocol will reach consensus in a limited time. In contrast, the semi-synchronous network model can better describe the real-world network communication situation: network communication is usually synchronous or may return to normal after a short time. Such an experience must be no stranger to everyone: the web page, which usually gets loaded quite fast, opens slowly every now and then, and you need to try before you know the network is back to normal since there is usually no notification. The peer-to-peer (P2P) network communication, which is widely used in blockchain projects, also makes it possible for a node to send and receive information from multiple network channels. It is unrealistic to keep blocking the network information transmission of a node for a long time. Therefore, all the discussion below is under the semi-synchronous network model.

The design and selection of consensus protocols for public chain networks that allow nodes to dynamically join and leave need to consider possible Byzantine failures. Therefore, the consensus protocol of a public chain network is designed to guarantee the security and liveness of the network under the semi-synchronous network model on the premise of possible Byzantine failure. Researchers of distributed systems point out that to ensure the security and liveness of the system, the consensus protocol itself needs to meet three requirements:

  • Validity: The value reached by honest nodes must be the value proposed by one of them
  • Agreement: All honest nodes must reach consensus on the same value
  • Termination: The honest nodes must eventually reach consensus on a certain value

Validity and agreement can guarantee the security of the distributed system, that is, the honest nodes will never reach a consensus on a random value, and once the consensus is reached, all honest nodes agree on this value. Termination guarantees the liveness of distributed systems. A distributed system unable to reach consensus is useless.

The CAP theorem and Byzantine Generals Problem

In a semi-synchronous network, is it possible to design a Byzantine fault-tolerant consensus protocol that satisfies validity, agreement, and termination? How many Byzantine nodes can a system tolerance? The CAP theorem and Byzantine Generals Problem provide an answer for these two questions and have thus become the basic guidelines for the design of Byzantine fault-tolerant consensus protocols.

Lamport, Shostak, and Pease abstracted the design of the consensus mechanism in the distributed system in 1982 as the Byzantine Generals Problem, which refers to such a situation as described below: several generals each lead the army to fight in the war, and their troops are stationed in different places. The generals must formulate a unified action plan for the victory. However, since the camps are far away from each other, they can only communicate with each other through the communication soldiers, or, in other words, they cannot appear on the same occasion at the same time to reach a consensus. Unfortunately, among the generals, there is a traitor or two who intend to undermine the unified actions of the loyal generals by sending the wrong information, and the communication soldiers cannot send the message to the destination by themselves. It is assumed that each communication soldier can prove the information he has brought comes from a certain general, just as in the case of a real BFT consensus protocol, each node has its public and private keys to establish an encrypted communication channel for each other to ensure that its messages will not be tampered with in the network communication, and the message receiver can also verify the sender of the message based thereon. As already mentioned, any consensus agreement ultimately reached represents the consensus of the majority. In the process of generals communicating with each other for an offensive or retreat, a general also makes decisions based on the majority opinion from the information collected by himself.

According to the research of Lamport et al, if there are 1/3 or more traitors in the node, the generals cannot reach a unified decision. For example, in the following figure, assume there are 3 generals and only 1 traitor. In the figure on the left, suppose that General C is the traitor, and A and B are loyal. If A wants to launch an attack and informs B and C of such intention, yet the traitor C sends a message to B, suggesting what he has received from A is a retreat. In this case, B can't decide as he doesn't know who the traitor is, and the information received is insufficient for him to decide. If A is a traitor, he can send different messages to B and C. Then C faithfully reports to B the information he received. At this moment as B receives conflicting information, he cannot make any decisions. In both cases, even if B had received consistent information, it would be impossible for him to spot the traitor between A and C. Therefore, it is obvious that in both situations shown in the figure below, the honest General B cannot make a choice.

According to this conclusion, when there are $n$ generals with at most $f$ traitors (n≤3f), the generals cannot reach a consensus if $n \leq 3f$; and with $n > 3f$, a consensus can be reached. This conclusion also suggests that when the number of Byzantine failures $f$ exceeds 1/3 of the total number of nodes $n$ in the system $f \ge n/3$ , no consensus will be reached on any consensus protocol among all honest nodes. Only when $f < n/3$, such condition is likely to happen, without loss of generality, and for the subsequent discussion on the consensus protocol, $ n \ge 3f + 1$ by default.

The conclusion reached by Lamport et al. on the Byzantine Generals Problem draws a line between the possible and the impossible in the design of the Byzantine fault tolerance consensus protocol. Within the possible range, how will the consensus protocol be designed? Can both the security and liveness of distributed systems be fully guaranteed? Brewer provided the answer in his CAP theorem in 2000. It indicated that a distributed system requires the following three basic attributes, but any distributed system can only meet two of the three at the same time.

  1. Consistency: When any node responds to the request, it must either provide the latest status information or provide no status information
  2. Availability: Any node in the system must be able to continue reading and writing
  3. Partition Tolerance: The system can tolerate the loss of any number of messages between two nodes and still function normally

https://preview.redd.it/1ozfwk7u7m851.png?width=1400&format=png&auto=webp&s=fdee6318de2cf1c021e636654766a7a0fe7b38b4

A distributed system aims to provide consistent services. Therefore, the consistency attribute requires that the two nodes in the system cannot provide conflicting status information or expired information, which can ensure the security of the distributed system. The availability attribute is to ensure that the system can continuously update its status and guarantee the availability of distributed systems. The partition tolerance attribute is related to the network communication delay, and, under the semi-synchronous network model, it can be the status before GST when the network is in an asynchronous status with an unknown delay in the network communication. In this condition, communicating nodes may not receive information from each other, and the network is thus considered to be in a partitioned status. Partition tolerance requires the distributed system to function normally even in network partitions.

The proof of the CAP theorem can be demonstrated with the following diagram. The curve represents the network partition, and each network has four nodes, distinguished by the numbers 1, 2, 3, and 4. The distributed system stores color information, and all the status information stored by all nodes is blue at first.

  1. Partition tolerance and availability mean the loss of consistency: When node 1 receives a new request in the leftmost image, the status changes to red, the status transition information of node 1 is passed to node 3, and node 3 also updates the status information to red. However, since node 3 and node 4 did not receive the corresponding information due to the network partition, the status information is still blue. At this moment, if the status information is queried through node 2, the blue returned by node 2 is not the latest status of the system, thus losing consistency.
  2. Partition tolerance and consistency mean the loss of availability: In the middle figure, the initial status information of all nodes is blue. When node 1 and node 3 update the status information to red, node 2 and node 4 maintain the outdated information as blue due to network partition. Also when querying status information through node 2, you need to first ask other nodes to make sure you’re in the latest status before returning status information as node 2 needs to follow consistency, but because of the network partition, node 2 cannot receive any information from node 1 or node 3. Then node 2 cannot determine whether it is in the latest status, so it chooses not to return any information, thus depriving the system of availability.
  3. Consistency and availability mean the loss of the partition tolerance: In the right-most figure, the system does not have a network partition at first, and both status updates and queries can go smoothly. However, once a network partition occurs, it degenerates into one of the previous two conditions. It is thus proved that any distributed system cannot have consistency, availability, and partition tolerance all at the same time.

https://preview.redd.it/456x2blv7m851.png?width=1400&format=png&auto=webp&s=550797373145b8fc1471bdde68ed5f8d45adb52b

The discovery of the CAP theorem seems to declare that the aforementioned goals of the consensus protocol is impossible. However, if you’re careful enough, you may find from the above that those are all extreme cases, such as network partitions that cause the failure of information transmission, which could be rare, especially in P2P network. In the second case, the system rarely returns the same information with node 2, and the general practice is to query other nodes and return the latest status as believed after a while, regardless of whether it has received the request information of other nodes. Therefore, although the CAP theorem points out that any distributed system cannot satisfy the three attributes at the same time, it is not a binary choice, as the designer of the consensus protocol can weigh up all the three attributes according to the needs of the distributed system. However, as the communication delay is always involved in the distributed system, one always needs to choose between availability and consistency while ensuring a certain degree of partition tolerance. Specifically, in the second case, it is about the value that node 2 returns: a probably outdated value or no value. Returning the possibly outdated value may violate consistency but guarantees availability; yet returning no value deprives the system of availability but guarantees its consistency. Tendermint consensus protocol to be introduced is consistent in this trade-off. In other words, it will lose availability in some cases.

The genius of Satoshi Nakamoto is that with constraints of the CAP theorem, he managed to reach a reliable Byzantine consensus in a distributed network by combining PoW mechanism, Satoshi Nakamoto consensus, and economic incentives with appropriate parameter configuration. Whether Bitcoin's mechanism design solves the Byzantine Generals Problem has remained a dispute among academicians. Garay, Kiayias, and Leonardos analyzed the link between Bitcoin mechanism design and the Byzantine consensus in detail in their paper The Bitcoin Backbone Protocol: Analysis and Applications. In simple terms, the Satoshi Consensus is a probabilistic Byzantine fault-tolerant consensus protocol that depends on such conditions as the network communication environment and the proportion of malicious nodes' hashrate. When the proportion of malicious nodes’ hashrate does not exceed 1/2 in a good network communication environment, the Satoshi Consensus can reliably solve the Byzantine consensus problem in a distributed environment. However, when the environment turns bad, even with the proportion within 1/2, the Satoshi Consensus may still fail to reach a reliable conclusion on the Byzantine consensus problem. It is worth noting that the quality of the network environment is relative to Bitcoin's block interval. The 10-minute block generation interval of the Bitcoin can ensure that the system is in a good network communication environment in most cases, given the fact that the broadcast time of a block in the distributed network is usually just several seconds. In addition, economic incentives can motivate most nodes to actively comply with the agreement. It is thus considered that with the current Bitcoin network parameter configuration and mechanism design, the Bitcoin mechanism design has reliably solved the Byzantine Consensus problem in the current network environment.

Practical Byzantine Fault Tolerance, PBFT

It is not an easy task to design the Byzantine fault-tolerant consensus protocol in a semi-synchronous network. The first practically usable Byzantine fault-tolerant consensus protocol is the Practical Byzantine Fault Tolerance (PBFT) designed by Castro and Liskov in 1999, the first of its kind with polynomial complexity. For a distributed system with $n$ nodes, the communication complexity is $O(n2$.) Castro and Liskov showed in the paper that by transforming centralized file system into a distributed one using the PBFT protocol, the overwall performance was only slowed down by 3%. In this section we will briefly introduce the PBFT protocol, paving the way for further detailed explanations of the Tendermint protocol and the improvements of the Tendermint protocol.

The PBFT protocol that includes $n=3f+1$ nodes can tolerate up to $f$ Byzantine nodes. In the original paper of PBFT, full connection is required among all the $n$ nodes, that is, any two of the n nodes must be connected. All the nodes of the network jointly maintain the system status through network communication. In the Bitcoin network, a node can participate in or exit the consensus process through hashrate mining at any time, which is managed by the administrator, and the PFBT protocol needs to determine all the participating nodes before the protocol starts. All nodes in the PBFT protocol are divided into two categories, master nodes, and slave nodes. There is only one master node at any time, and all nodes take turns to be the master node. All nodes run in a rotation process called View, in each of which the master node will be reelected. The master node selection algorithm in PBFT is very simple: all nodes become the master node in turn by the index number. In each view, all nodes try to reach a consensus on the system status. It is worth mentioning that in the PBFT protocol, each node has its own digital signature key pair. All sent messages (including request messages from the client) need to be signed to ensure the integrity of the message in the network and the traceability of the message itself. (You can determine who sent a message based on the digital signature).

The following figure shows the basic flow of the PBFT consensus protocol. Assume that the current view’s master node is node 0. Client C initiates a request to the master node 0. After the master node receives the request, it broadcasts the request to all slave nodes that process the request of client C and return the result to the client. After the client receives f+1 identical results from different nodes (based on the signature value), the result can be taken as the final result of the entire operation. Since the system can have at most f Byzantine nodes, at least one of the f+1 results received by the client comes from an honest node, and the security of the consensus protocol guarantees that all honest nodes will reach consensus on the same status. So, the feedback from 1 honest node is enough to confirm that the corresponding request has been processed by the system.

https://preview.redd.it/sz8so5ly7m851.png?width=1400&format=png&auto=webp&s=d472810e76bbc202e91a25ef29a51e109a576554

For the status synchronization of all honest nodes, the PBFT protocol has two constraints on each node: on one hand, all nodes must start from the same status, and on the other, the status transition of all nodes must be definite, that is, given the same status and request, the results after the operation must be the same. Under these two constraints, as long as the entire system agrees on the processing order of all transactions, the status of all honest nodes will be consistent. This is also the main purpose of the PBFT protocol: to reach a consensus on the order of transactions between all nodes, thereby ensuring the security of the entire distributed system. In terms of availability, the PBFT consensus protocol relies on a timeout mechanism to find anomalies in the consensus process and start the View Change protocol in time to try to reach a consensus again.

The figure above shows a simplified workflow of the PBFT protocol. Where C is the client, 0, 1, 2, and 3 represent 4 nodes respectively. Specifically, 0 is the master node of the current view, 1, 2, 3 are slave nodes, and node 3 is faulty. Under normal circumstances, the PBFT consensus protocol reaches consensus on the order of transactions between nodes through a three-phase protocol. These three phases are respectively: Pre-Prepare, Prepare, and Commit:

  • The master node of the pre-preparation node is responsible for assigning the sequence number to the received client request, and broadcasting the <PRE-PREPARE, v, n, d, sig> message to the slave node. The message contains the hash value of the client request d, the sequence number of the current viewv, the sequence number n assigned by the master node to the request, and the signature information of the master nodesig. The scheme design of the PBFT protocol separates the request transmission from the request sequencing process, and the request transmission is not to be discussed here. The slave node that receives the message accepts the message after confirming the message is legitimate and enter preparation phase. The message in this step checks the basic signature, hash value, current view, and, most importantly, whether the master node has given the same sequence number to other request from the client in the current view.
  • In preparation, the slave node broadcasts the message <PREPARE, v, n, d, sig> to all nodes (including itself), indicating that it assigns the sequence number n to the client request with the hash value d under the current view v, with its signaturesig as proof. The node receiving the message will check the correctness of the signature, the matching of the view sequence number, etc., and accept the legitimate message. When the PRE-PREPARE message about a client request (from the main node) received by a node matches with the PREPARE from 2f slave nodes, the system has agreed on the sequence number requested by the client in the current view. This means that 2f+1 nodes in the current view agree with the request sequence number. Since it contains information from at most fmalicious nodes, there are a total of f+1 honest nodes that have agreed with the allocation of the request sequence number. With f malicious nodes, there are a total of 2f+1 honest nodes, so f+1represents the majority of the honest nodes, which is the consensus of the majority mentioned before.
  • After the node (including the master node and the slave node) receives a PRE-PREPARE message requested by the client and 2f PREPARE messages, the message <COMMIT, v, n, d, sig> is broadcast across the network and enters the submission phase. This message is used to indicate that the node has observed that the whole network has reached a consensus on the sequence number allocation of the request message from the client. When the node receives 2f+1 COMMIT messages, there are at least f+1 honest nodes, that is, most of the honest nodes have observed that the entire network has reached consensus on the arrangement of sequence numbers of the request message from the client. The node can process the client request and return the execution result to the client at this moment.

Roughly speaking, in the pre-preparation phase, the master node assigns a sequence number to all new client requests. During preparation, all nodes reach consensus on the client request sequence number in this view, while in submission the consistency of the request sequence number of the client in different views is to be guaranteed. In addition, the design of the PBFT protocol itself does not require the request message to be submitted by the assigned sequence number, but out of order. That can improve the efficiency of the implementation of the consensus protocol. Yet, the messages are still processed by the sequence number assigned by the consensus protocol for the consistency of the distributed system.

In the three-phase protocol execution of the PBFT protocol, in addition to maintaining the status information of the distributed system, the node itself also needs to log all kinds of consensus information it receives. The gradual accumulation of logs will consume considerable system resources. Therefore, the PBFT protocol additionally defines checkpoints to help the node deal with garbage collection. You can set a checkpoint every 100 or 1000 sequence numbers according to the request sequence number. After the client request at the checkpoint is executed, the node broadcasts <CHEKPOINT, n, d, sig>messages throughout the network, indicating that after the node executes the client request with sequence number n, the hash value of the system status is d, and it is vouched by its own signature sig. After 2f+1 matching CHECKPOINT messages (one of which can come from the node itself) are received, most of the honest nodes in the entire network have reached a consensus on the system status after the execution of the client request with the sequence numbern, and then you can clear all relevant log records of client requests with the sequence number less than n. The node needs to save these2f+1 CHECKPOINTmessages as proof of the legitimate status at this moment, and the corresponding checkpoint is called a stable checkpoint.

The three-phase protocol of the PBFT protocol can ensure the consistency of the processing order of the client request, and the checkpoint mechanism is set to help nodes perform garbage collection and further ensures the status consistency of the distributed system, both of which can guarantee the security of the distributed system aforementioned. How is the availability of the distributed system guaranteed? In the semi-synchronous network model, a timeout mechanism is usually introduced, which is related to delays in the network environment. It is assumed that the network delay has a known upper bound after GST. In such condition, an initial value is usually set according to the network condition of the system deployed. In case of a timeout event, besides the corresponding processing flow triggered, additional mechanisms will be activated to readjust the waiting time. For example, an algorithm like TCP's exponential back off can be adopted to adjust the waiting time after a timeout event.

To ensure the availability of the system in the PBFT protocol, a timeout mechanism is also introduced. In addition, due to the potential the Byzantine failure in the master node itself, the PBFT protocol also needs to ensure the security and availability of the system in this case. When the Byzantine failure occurs in the master node, for example, when the slave node does not receive the PRE-PREPARE message or the PRE-PREPARE message sent by the master node from the master node within the time window and is thus determined to be illegitimate, the slave node can broadcast <VIEW-CHANGE, v+1, n, C, P, sig> to the entire network, indicating that the node requests to switch to the new view with sequence number v+1. n indicates the request sequence number corresponding to the latest stable checkpoint local to the node, and C is to prove the stable checkpoint 2f+1 legitimate CHECKPOINT messages as aforementioned. After the latest stable checkpoint and before initiating the VIEWCHANGE message, the system may have reached a consensus on the sequence numbers of some request messages in the previous view. To ensure the consistency of these request sequence numbers to be switched in the view, the VIEWCHANGE message needs to carry this kind of the information to the new view, which is also the meaning of the P field in the message. P contains all the client request messages collected at the node with a request sequence number greater than n and the proof that a consensus has been reached on the sequence number in the node: the legitimate PRE-PREPARE message of the request and 2f matching PREPARE messages. When the master node in view v+1 collects 2f+1 VIEWCHANGE messages, it can broadcast the NEW-VIEW message and take the entire system into a new view. For the security of the system in combination with the three-phase protocol of the PBFT protocol, the construction rules of the NEW-VIEW information are designed in a quite complicated way. You can refer to the original paper of PBFT for more details.

https://preview.redd.it/x5efdc908m851.png?width=1400&format=png&auto=webp&s=97b4fd879d0ec668ee0990ea4cadf476167a2948

VIEWCHANGE contains a lot of information. For example, C contains 2f+1 signature information, P contains several signature sets, and each set has 2f+1 signature. At least 2f+1 nodes need to send a VIEWCHANGE message before prompting the system to enter the next new view, and that means, in addition to the complex logic of constructing the information of VIEWCHANGE and NEW-VIEW, the communication complexity of the view conversion protocol is $O(n2$.) Such complexity also limits the PBFT protocol to support only a few nodes, and when there are 100 nodes, it is usually too complex to practically deploy PBFT. It is worth noting that in some materials the communication complexity of the PBFT protocol is inappropriately attributed to the full connection between n nodes. By changing the fully connected network topology to the P2P network topology based on distributed hash tables commonly used in blockchain projects, high communication complexity caused by full connection can be conveniently solved, yet still, it is difficult to improve the communication complexity during the view conversion process. In recent years, researchers have proposed to reduce the amount of communication in this step by adopting aggregate signature scheme. With this technology, 2f+1 signature information can be compressed into one, thereby reducing the communication volume during view change.