Golem.de: IT-News für Profis

[Discord Conv] Dynamic IOTA


Disclaimer: This is my editing, so there could be some misunderstandings.
For the general view of 'what's going on?' of this dynamic ride...

2/16
dom어제 오전 5:44
Just FYI: the team is now working on a plan on how to recover from this and get the network back into operations while also allowing anyone who might have been affected to safely transition. there are no guarantees just yet, but we will do our best to get this through ASAP. Hopefully we will have a concrete action plan tomorrow and will then communicate it.
On the vulnerability side, all parties are notified and they are working with law enforcement and external auditors to fully understand how this happened. We will keep you guys posted.

dom어제 오전 5:47
needless to say, that the vulnerability itself was rather sophisticated and required access on multiple levels to be able to execute it on this scale. Hopefully we will be able to share more soon.
[Did the vulnerability existed after or before the audit on trinity?]
after the audit

dom어제 오전 5:51
Currently it looks like this will only be for recent Trinity Desktop users

dom어제 오전 5:56
the entire Trinity team did an amazing job and there is not a single person to blame. The attack itself was very sophisticated and targeted at IOTA and Trinity itself. We are already working on v2 where none of this would be possible. We will share our learnings from this publicly and also share what kind of precautionary measures we are taking.

dom어제 오전 5:58
The community also did an amazing job in helping to guide us through and give assistance to other community members.

dom어제 오전 5:58
we actually were having discussions a few weeks ago to rename Trinity (because of the religious connotation)

Jelle Millenaar [IF]어제 오전 6:37
We didn't really have panic and chaos. We actually worked really well together.

Jelle Millenaar [IF]어제 오전 6:38
[IF members, do you get paid Over Time for all the awesome work or PURE DEDICATION?]
nobody considers this overtime or anything. We just contribute because we know it is needed.

dom어제 오전 7:45
[If dependencies carry this risk, maybe they should've done an official CORE wallet and saved all the fluffy stuff for a third party app.]
that's how the new Trinity will work. Sucks that it happened now especially after we wanted to put it into maintenance mode anyways

dom어제 오전 7:49
[How do we know if the hacker has our seeds?]
this is related to a third party, unrelated to IF or IOTA

dom어제 오전 7:50
we know that this could have only been done through intrusion / collusion of an external source.
[Dom are you fully confident to solve all those problems especially regarding the possibility of even more people getting scammed instantly after coo is back again?]
yes, relatively sure. That is why we are taking the necessary time to plan accordingly.

dom어제 오전 7:55
We will provide more information on how this exploit was done soon. All the involved parties are aware of the situation

dom어제 오전 7:58
[Please give us some time before you start the coo information that we can move to new seed instantly]
don't worry, we will get it all sorted out.

dom어제 오전 8:22
once life is a bit less "tumultuos" I still want to work on that Autonomous Bar concept powered by IOTA (access control, id verification, payment and a bunch of robots)

Eric Hop [IF]어제 오후 2:44
Pretty good. I'd be surprised if we find more theft bundles. Only found one more today, while building a timeline of the theft.

Eric Hop [IF]어제 오후 2:50
We have several separate teams. One is looking at how to resume. One is looking at how to be able to rescue the funds. Others are interacting with law enforcement and third parties. I'm part of DAFT. The Data Analysis Forensics Team. Haha

Eric Hop [IF]어제 오후 3:01
Some if the people in Coordicide team like Hans have been helping out. It was an all hands on deck situation. I actually loved it. We haven't had this much of a team spirit in quite a while. Usually everyone plays in their own sand box. But this time we all played together on the beach.
It's such a joy working with so many extremely smart people. With so many eyes on the ball we did not miss much opportunities to figure things out.

Eric Hop [IF]어제 오후 3:07
And for me personally this was a great time. I am all about puzzle solving. And this was the greatest puzzle of all. With a built-in time limit. Haha

Eric Hop [IF]어제 오후 3:12
I'm not doing official statements. But we have a good overview of what happened and the extent of it. Right now we want to hammer down how to resume without risks and how to safeguard the stuck funds if possible. What is especially funny to me is that the coordinator that everyone was bitching about for years did exactly the thing it was meant to do. It allowed us to halt an exploit that otherwise would have cost everyone dearly.

Eric Hop [IF]어제 오후 3:15
It was meant as safeguard, training wheels, while we mature. And while we need to remove it due to it being a single point of failure and a bottle neck to scaling, I will be kind of sad to see it go.
Yes, IF would have done the same to safeguard funds, if a third party wallet would have been the cause. Just because we can.

Eric Hop [IF]어제 오후 3:37
Yes it was a manual attack. The sophistication was in the exploit. But he seemed to be not too sophisticated iota-wise. Everyone has their specialties I guess.

Eric Hop [IF]어제 오후 3:41
And as an aside I wish people would fuck off about the whole iota not being decentralized because of coordinator, when every block chain token is centralized around a few mining pools that seriously disrupt any possibility for positive software development. They fucking hold back everything that influences their bottom line. Which is why Bitcoin and the rest have pretty much been stagnant for years while we move forward constantly.

dom오늘 오전 7:08
We will release a new Trinity version tomorrow with the fixes implemented. It's not yet the full transition tool, but it's the first step towards fully going back to operations.

dom오늘 오전 7:09
Just wait for the rest. It is important that we get this 100% right and we are still further investigating, so there is a lot of behind the scenes work happening right now.

David Sønstebø오늘 오전 8:52
So... Tangle EE
Quite cool eh?
It's so unfortunate that this asshole managed to distract everything away from one of the biggest steps towards global adoption
Let's not give this fuckface further attention. The cause has been identified, law enforcement is involved and mitigation strategy is being worked on. There will be further official updates, but let's not halt the whole IOTA project due to one idiot.

David Sønstebø오늘 오전 8:56
[Is he identified?]
Let's just say that there's a lot of traces. The attacker does not seem to have been too sophisticated. Official update on Monday will provide details.

David Sønstebø오늘 오전 9:03
[How will this situation affect iotas partners?]
My best guess: further increasing our reputation as an organization that solves hard problems efficiently and doesn't shy away from difficulties. Every company in the world has had issues similar to this. Keep in mind that this does not at all affect the protocol/Tangle/IOTA.

David Sønstebø오늘 오전 9:08
We do have a bounty program. This/these individual/s were not interested in the greater good, pure greed and incompetence

David Sønstebø오늘 오전 9:10
[Any examples of use cases for DID on the tangle?]
Virtually all use cases on Tangle requires a secure identifier and verifiable credentials. What I think will happen is that once Tangle EE ships the first version, all other companies using IOTA will start to implement it
[One more question: How transparent will tangle EE be for the community?]
100%. This is why I/we consider Tangle EE to be such a significant milestone, it's not "just" IF, this is a coalition of major companies, start-ups and leading academic institutions building the solutions

David Sønstebø오늘 오전 9:11
[any ETA for the 1st Version?]
That's another good thing, IF won't issue the ETAs, Tangle EE will :

David Sønstebø오늘 오전 9:12
[What does T(angle)EE do exactly?]
It's a partnership and collaboration between several entities to develop and ship code and blueprints that are relevant for product developers and service providers
That blog post is a good read to get better comprehension

David Sønstebø오늘 오전 9:13
It's incredibly important that IF's role slowly but surely decreases in importance. IOTA has to succeed independent of IF post-Coordicide and multiversial-slicing (advanced sharding equivalent)

David Sønstebø오늘 오전 9:14
I would say that it's an incredible important piece of the puzzle. Naturally Object Management Group (OMG) in Tangle EE will be key here as well, but IOTA is not married to "just" Eclipse. We also work closely with Linux Foundation. However, Tangle EE is very focused

David Sønstebø오늘 오전 9:22
I don't think IF will disappear, however, it will hopefully be purely R&D-driven in 10 years, whereas the other efforts are taken over by the ecosystem (companies, academia, start-ups and enthusiasts). Even post-Coordicide, we already now have theories on how to go way beyond even that. If we achieve our goal of IOTA being equivalent to TCP/IP, there will naturally be continuous development and research in the foreseeable future. I doubt we will reach complete satisfaction, especially now that smart contracts and oracles enter the equation: there's certainly more work to be done for IF, but my goal is for IF to "simply" be R&D

David Sønstebø오늘 오전 9:27
Definitely. This is why I coined the requirement for a "grandma on crack"; this is truly how simply using IOTA should be in 2-5 years. Just like very few even know wtf TCP/IP is

David Sønstebø오늘 오전 9:57
I agree 100% with your assessment, though as would Netflix do with Blockbuster's assessment when they declined to acquire Netflix. At the end of the day it's all about basic economic and human behavioural principles.
Human nature does not change, but our environment does. Disruption will continue forever. Darwinian principles will forever remain true.
A better option = adoption. It doesn't matter how hard the incumbents fight against it, they either adapt or go Kodak/Nokia/AOL
submitted by btlkhs to Iota [link] [comments]

Lisk Highlights Weekly roundup March 9th 2019. The week in which a Lisk Sidechain Project became a Founding Member of a Brussels-based Blockchain Organization.

Hello everybody. The LISK project and it's enthusiasts are always busy, and this week past has certainly been no exception.
Seeing is believing, so here is a recap of the highlights and interesting items from the past week on the LISK subreddit and beyond.....
 

Lisk, Hong Kong Future and Costa Rica Past.

Asia Crypto Week is fast approaching (11-17th March) and blockchain/crypto enthusiasts and industry veterans are preparing to gather together, share their knowledge and nurture mass crypto adoption. Among the events taking place on March 15th will be a meetup at the University of Hong Kong catering to the University's Blockchain Club and anyone else that might be in the area and interested in all things blockchain. Lisk is co-hosting the event in collaboration with 9up.io, who are a group of blockchain enthusiasts based in Hong Kong and who also are a prospective Lisk delegate. Max Kordek, Lisk's Co-Founder and CEO, will be the main speaker at this event on the 15th March, as he will be in town from the 10th to 15th for Asia Crypto Week and Token 2049.
Tickets for the event can be secured HERE. Hong Kong has been a strategic position in the blooming Blockchain industry in recent years, so I will be interested to see what emerges from this meetup and indeed Asia Crypto Week as a whole.
 
Now from the future to the past, and the TicoBlockChain 2019 conference in Costa Rica this past month. Lisk Central America have linked us up with a Stylish Montage Video of the event with interview snippets interspersed within. Software Architect, Jake Simmons, represented LISK Central America with his presentation on 'Scaling blockchain horizontally with Lisk'. Jake's presentation took part in the midst of the conference's speaker collection of lawyers, developers, educators, banking executives, investment professionals, their keynotes, panel talks and fireside chats.
For those of us who could not make the trip we have Lisk community member illuciferium to thank for filming Jake's presentation and uploading it to Youtube HERE. You can also see Jake being interviewed at the conference by Ricardo Barquero, Nimiq Community Manager in this VIDEO. Well done all!
 

Lisk Support Adds a Meetup Map.

LISK support and TonyT908 are back with a new way for Liskers to visualise all the upcoming meetups and events related to the project. The Events Map is a more visually exciting way to discover all the upcoming events around the globe rather than reading through reams and reams of text. When you are ready to delve more into the details of a particular meetup then you can visit the official Lisk Events page to read further details.
Special thanks should be given to Global Delegate Team (GDT) for their guidance to TonyT908 and for providing the funds necessary to license to mapping software. Edward Trosclair AKA StellarDynamic came up with the original concept, so he should take a lot of praise also. Great work all round, folks.
 

Lisk Sidechain Project Knows the Key is to Stand Out from the Crowd.

Chief R&D Officer and Co-founder of GNY (bringing Machine Learning to Lisk), Richard Jarritt informed the project's followers on the GNY telegram that "only by having a platform that is the first to crack machine learning on chain is how we can differentiate ourselves from the countless projects in our space". He continued, "I look at the whole crypto space and at the moment having working code is key, that is the drive here".
So on to the coding and Machine learning integration, how is that going? Well, this week Leo Liang, Head of Blockchain for GNY will be presenting the coding solution for how information is read by the machine learning off the chain. The GNY team always has tech meetings on Tuesdays to present the work that has been done the week previously, where they update each other on progress and then set the next task. Upcoming shortly for the team will be a demo of how the read function and Machine learning are running together and moving onto the reply function.
The GNY Github is due to go live by the end of this month, following an important GNY staff conference in London. It's going to be an exciting month and I am really looking forward to it.
 

Lisk Sidechain Project becomes a Founding Member of a Brussels-based Blockchain Organization.

On the 6th of March the MADANA project were one of the 105 companies, startups and organizations that came together to found INATBA. The International Association for Trusted Blockchain Applications (INATBA) which will be a Brussels-based organization working to make blockchain more accessible, safe, and usable for everyone. This was an initiative of the EU commission and the Directorate General for Communications Networks, Content and Technology or "DG Connect", whose responsibility is managing the Digital Agenda across Europe. It is hoped that this will now allow projects in the blockchain and distributed ledger technology eco-system have access to a global forum to interact with regulators & policy makers.
 
Next up for the INATBA is its first General Assembly on 3rd April where the 105 founding members will hopfully be joined by fresh additions to the memberlist. The INATBA website is now live at http://inatba.org and they have a "Join" page which is accepting applications for new members to join Madana and the likes of Iota, Cardano, Gnosis, and the Quant Network for the April 3rd launch!
 
That's it for the recap of the weeks highlights. I hope it brought you up to speed with all the weeks good news.
These highlight posts also go out daily on the….
LISK Highlights exclusive Telegram group
LISK Highlights Twitter
The highlights are also included in my weekly roundup on the LISK Highlights Medium account and the Bitcoin talk forum's LISK thread, so keep an eye out for them on these outlets also.
 
Keep the faith Liskers! 👍
submitted by John_Muck to Lisk [link] [comments]

Check out Part 1 of our first Skycoin Official AMA with Synth!

Part 2 of the AMA posted here.
 
What is Skywire? Where does it fit in with Skycoin?
Skycoin is a blockchain application platform. We have multiple coins in the platform (Metallicoin, mdl.life, solarbankers.com, etc). We let people launch their own blockchain applications (including coins).
There are two parts to Skywire. The first part is the Skywire node. The second part is the hardware.
Skywire is one of the first applications we are launching on the Skycoin platform. It is one of our flagship applications that has been in development for several years. Skywire is basically a decentralized ISP on blockchain. It is like Tor, but you are paid to run it. You forward packets for your neighbors and you receive coins You pay coins to other people for forwarding your packets.
So it is like Tor but on blockchain and you are paid for running the network. Also, while Tor is slow, Skywire was designed to be faster than the current internet, instead of slower.
Skywire is a test application for monetizing excess bandwidth. Eventually the software defined networking technology behind Skywire, will allow us to build physical networks (actual mesh nets) that can begin to replace centralized ISPs. However, the current Skywire prototype is still running over the existing internet, but later we will start building out our own hardware.
Skywire is a solution for protecting people’s privacy and is also a solution to net neutrality. If Skycoin can can decentralize the ISPs with blockchain, then we wont have to beg the FCC to protect our rights.
Skywire is just a prototype of a larger system. Eventually we will allow people to sell bandwidth, computational resources and storage.
On the hardware side, the Skywire Miner is a like a personal cloud, for blockchain applications. It has eight computers in it and you plug it in and you can run your blockchain applications on it. You can even earn coins by renting out capacities to other users on the network.
 
How would your everyday, average Joe user access the Skywire network? Let's say from their phone…
We designed Skywire and Skycoin to be as usable as possible. We think you should not have to be a software developer to use blockchain applications.
Skywire is designed to be “zeroconf”, with zero configuration. You just plug in your node and it works. Its plug and play.
Eventually you will be able to buy a Skywire Miner and delegate control of the hardware to a “pool”, who will configure it for you and do all the work, optimize the settings and the pool will just take a small fee for the service and owner of the hardware will receive the rest of the coins their miners are earning.
You will just plug in the Skyminer and start earning coins. It will be plug and play.
Most users will not know their traffic is being carried over Skywire. Just like they do not know if they are using TCP or UDP. They will just connect their computer to the network with wifi or an ethernet cable and it will work exactly like the internet does now.
 
Are you completely anonymous on Skywire, or do you need to add a VPN and go through Tor for extra protection?
Skywire is designed, to protect users privacy much better than the existing internet. Each node only knows the previous hop and the next hop for any packet. The contents of the packet are encrypted (like HTTPS), so no one can spy on the data.
Since Skywire is designed to be faster than the existing internet, you give up a little privacy for the speed. Tor makes packets harder to trace by reshuffling them and slowing them done. While Skywire is designed for pure speed and performance.
 
Will Skywire users be able to access traditional internet resources like Google and Facebook over Skywire?
Yes. Most users will not even know they are using Skywire at all. It will be completely invisible to them.
Skywire has two modes of operation. One mode looks like the normal internet to the user and the other mode is for special applications designed to run completely inside of the Skywire network. Skywire native apps will have increased privacy, speed and performance, but all existing internet apps will still work on the new network.
 
How difficult will it be for a traditional e-service to port their products and services to Skywire / Skycoin? Are there plans in place to facilitate those transitions as companies find the exceeding value in joining the free distributed internet?
We are going to make it very easy. Existing companies run their whole internal networks on MPLS and Skywire is almost identical to MPLS, so they wont have to make any changes in most cases.
 
What is the routing protocol? How are the routes found?
Skywire is source routed. This means that you choose the route your data takes. You can chose routes that offer higher privacy, more bandwidth (for video downloads) or lower latency (for gaming).
Skywire puts control of the data back to the user.
 
I have also understand that the protocols underlying in skywire will be/already are pretty different from the Internet protocols. Taking into account the years of research applied to the current Internet and the several strategies for routing it doesn't seem an easy task to rebuild everything and make it work. Where can be found the information about the routing strategies used in skywire?
The routing strategies are user defined. There is no best routing strategy that is optimal for every user or application. Instead we allow people to choose their routes and policies, based upon the application, time of day, available bandwidth, reliability and other factors.
This is actually the way the original internet worked. However, it was scrapped because of the RAM limitations of early computers which only had 4 KB of memory. So the internet was built upon stateless routing protocols because of the limitations of the available computers at the time, not because the networking protocols were the best or highest performance. Today even a cell phone has 4 GB of ram and 1 million times the memory of a computer in the 1980s, so there is no reason to accept these limitations anymore.
Our implementation is simpler and faster because we are stripping away the layers of junk that have accumulated. The internet was actually built up piecemeal, without any coherence, coordination or planning. The internet today is a mishmash of different ad-hoc protocols that have been duct taped together over decades, without any real design.
Skywire is an re-envisioning of the internet, if it was built today knowing what we know now. This means simplifying the protocols and improving the performance.
 
How will the routing work if someone from Europe wants to access a video from a node in Australia (for example)? How do the nodes know the next hop if they cant read the origin or destiny of any packet?
If you have a route with N hops, then you contact each of the nodes on the route (through a messaging service) and set the route table on each route. Then when you drop a packet in the route, it gets forwarded automatically. You could have 60 or 120 hops between Australia and Europe and its fine.
Each individual node only knows the previous hop and the next hop in the chain. That is all the node needs to know.
 
Could you estimate a timeline for when Skywire will operate independently from the current ISP infrastructure?
I think Skycoin is a very ambitious project and some parts could take ten or twenty years. Even if we started with a network of a few thousand nodes and we were growing the network over 1% per day, it will still take a decade or two to conquer the Earth.
We are going to start with small scale prototypes (neighborhoods), then try cities. I think the first demonstration networks will be working this year.
 
How will bandwidth be priced in terms of coin hours and who determines this rate?
You could have 40 PHDs each do a thesis on this. The short answer is that an auction model has to be used (similar to Google’s Ad Words auction model) and the auction has to be designed in a way so that the bandwidth prices reach a stable equilibrium.
There are parts of Skycoin that are completely open source and public, like the blockchain and consensus algorithm and Skywire. There are secrets like the auction model and pricing, that are designed to protect Skycoin from being forked and to prevent competitors from copying our work.
We estimate that if a competitor was to start today, with 2 million dollars a year in R&D, that it would take them a minimum of eight years to develop a working bandwidth pricing model. And from experience in auction models for advertising networks, 80% of the competitors will fail to develop a working model at all.
A working, fair, decentralized bandwidth pricing model that was competitive with what we have would take even longer. There are very few people (less than 4) on Earth who have the experience in mathematics, economics, game theory and cryptographic protocols to design the required auction and pricing models.
One of Google’s secrets that allows them to dominate the internet advertising industry, is their auction model for ad pricing. That is what allows Google to pay the content producers the most money for their advertising inventory, while charging the advertising buyers the least.
Google’s auction models for pricing AdSense inventory are even more secretive and important than Google’s search algorithm. This is one of the most important and secretive parts of Google’s business. Even companies like Facebook, with billion dollar war chests have been unable to replicate to close the algorithm gap in this area. Expertise in these algorithms and their auction and pricing models is one of the reasons that Google has been able to extract advertising premiums over Facebook.
Even if a competitor raises a billion dollars and hires all the PHDs in the field and they had ten years to do research, I doubt they would be able to develop anything close to what we have now.
The history of bandwidth markets is very interesting and Enron tried to do a trading desk for bandwidth and bandwidth futures and it completely failed. The mathematical stability and predictability of the pricing of bandwidth under adversarial conditions is one of the major problems.
For instance, one of our “competitors” suggests that people will be paid coins if someone accesses their content. So why don’t you just put a website and then have 2000 bots go to it, to get free coins! How are they going to stop that.
Or if they are pricing bandwidth, if the price is fixed and the price is too low, then people will not build capacity and bandwidth will be insufficient and the network will be slow.
Or if the price is variable and adjusts with demands, what will stop someone from buying up the capacity for a link (“Cornering the Market”) to drive the price up 50x on links they control and extort money out of the other people on the network with a fake bandwidth shortage?
The pricing algorithm has to be stable under adversarial conditions. It is a very difficult problem, harder than even consensus algorithm research. Even if a competitor had unlimited funding and unlimited time, it is unlikely that they would find a superior solution to what we have and that alone nearly guarantees that we are going to win this market. It gets even more difficult if you need price stability and you admit any type of bandwidth futures, that allow speculation on future prices. This is a kind of problem like Bitcoin consensus algorithm that can only be solved by an act of genius.
We have a lot of experience in this area. It is hyper specialized and a very difficult area and is one of the areas that will give Skycoin a strong sustainable advantage.
 
Will there be a DNS for Skywire to register .sky domains?
Of course. We will definitely add some kind of DNS and name system eventually.
Remembering and typing public keys is too difficult. We want to make it as easy as possible. We want people to be able to register aliases (like screen names) so that people can send coins to aliases instead of having to type in addresses every time.
This will let people send 5 Skycoin to “@bobcat” instead of sending coins to “23TeSPPJVZ9HvXh6iYiKAaLNQroKg8yCdja”. This will be a revolution in usability.
 
When operating a Skyminer, will people in my surrounding area see it as a Wifi option on their devices?
You can configure it to expose a wifi access point. It depends on what you are trying to do.
 
While I plan on running a DIY miner regardless of the payout, will one of the first 6000 DIY miners built to the same spec as the official miner receive a worthwhile payout in Sky coin? What is the requirement for a DIY miner to get whitelisted (and earning Skycoin) on the Skywire testnet?
The reason we have white-listing on the testnet, is to stop too many nodes from joining the network at once. The network can only support so many nodes until we upgrade certain infrastructure (like the messaging/inter-process communication standard).
Eventually, all DIY miners will be whitelisted, but there will probably be a queue.
 
The Sky team is developing antennas by their own instead of buying or using technology already developed, why is such an effort necessary?
You can of course, buy any commercial antenna or wifi system and use it for Skywire.
We are developing our own custom antennas, to push performance limitations and experiment with advanced technology, like FPGAs (Field Programmable Arrays) and SDR (Software Defined Radio).
Existing wifi has a huge latency (15 milliseconds per hop). We need to make several modification to get that down to 0.5 millisecond per hop.
We have several custom PCB boards in development. We have a few secret hardware projects that will be announced when they are ready.
For instance, the Skywire Miner was in development for two years before we publicly announced it. Some of our next hardware projects are focused on payments at the point of sale and improving usability, not just the meshnet.
 
So back in January Steve was asked a question in the skywire group: "Steve, I am not a tech savage, so how can I understand better the safety running a miner if people on the network do DeepWeb stuff? So i will receive and redirect data packets with crazy things and also there is around 128 GB of storage on my miner. How can i have peace of mind of that?" He replied with "If you don’t run an exit node to the open internet it won’t matter you can run relay nodes if you’re worried about it, or proxy specific content." This seems to goes counter to what you mentioned regarding end-to-end encryption with Skywire. Will some people only be relay nodes and some will be exit nodes as well?
I think the question is wrong.
You only store content for public keys that you explicitly subscribe to.
This means if you do not like particular content or do not want it on your hardware, then you can just blacklist those public keys or don’t subscribe to them. Data never goes on your machine unless you requested it.
If you are holding data for a third party such as forwarding packets, it’s always going to be encrypted, so will look like random noise. There will never be anything in the data that causes legal liability. It will look the same as the output of a random number generator.
 
If using the skyminer, how much bandwidth will be necessary to run it at its best? And what about the router? It's true it has only 100mbits output? Is a 1gigbits connection necessary to reach toprates?
Hold on!!!! Let us get the software and test net running first, lol. We will know once we know what works for the testnet.
 
What will the price be for future Skynodes (formerly called Skyminers)?
We are working on ways of reducing the cost, such as by buying our own factory, doing custom PCB boards and using different materials.
The cheapest Skywire Miner node will be about $30 for a single node miner. We will have a very cheap personal Skywire “hardware VPN” node also.
The miners we are shipping now are for powering the network backbone and have 8 computers and are about $800 each. We sold people the miners for 1 BTC each so they can support development, but gave them a Skycoin bonus equal to about 1 BTC worth of Skycoin.
Then that money, went to fund the cost for developing the newer hardware.
submitted by MuSKYteer to skycoin [link] [comments]

Bitcoin Mining: Everything you need to know

Bitcoin mining is a term that everyone in the cryptocurrency and even many outsiders are familiar with. This is a process performed by high-powered computers (also known as nodes), which solve complicated computational math problems.
While distinct, there are certain similarities between bitcoin mining and actual mining for precious metals such as gold, for example. Both processes are carried out with the intention to earn a reward.
Furthermore, bitcoins actually exist in the bitcoin protocol but they haven’t been brought out yet – just as gold exists in the ground but it hasn’t been mined yet.
But the aim of bitcoin mining is, however, twofold. For once, when the above-mentioned high-powered computer or any other type of mining hardware, for that matter, successfully solves the complex math problem on the network of Bitcoin, they produce a new bitcoin.
On the other hand, by solving the computational math problems, bitcoin miners are actually making the payment network a secure through the proof-of-work consensus algorithm.

WHY IS BITCOIN MINING NECESSARY?

In order to break down bitcoin mining, there are a few important considerations that need to be taken into account.
Consumers tend to trust different types of printed fiat currencies because they are backed by central banks. In the US, for instance, this is the Federal Reserve. This is even true for digital payments made with fiat currencies.
Bitcoin, however, is not regulated by any central authority. It can be said that it is ‘backed’ by the computing power, which secures the network. This vast network of computers and mining hardware records transactions and make sure that they are accurate.
Unlike central authorities, however, bitcoin miners are spread throughout the entire world and record the transactional information on a public ledger available to anyone. This ledger can be viewed using a block explorer and there are many different websites that provide this service.
In other words, bitcoin mining is necessary for two different reasons – first, it is needed to create new bitcoin and second, it’s needed to confirm the transactional information. So, in theory, if you don’t want to buy Bitcoin, you can earn it through mining. Whether or not that’s efficient for you as an individual miner, however, is a different story.

HOW DOES BITCOIN MINING WORK?

In order for a bitcoin miner to get block rewards, there are two conditions which need to be met. First, the miner needs to confirm a certain amount of transactions and second, which is the trickiest part, solve a complex computational math problem.
Put simply, if that’s at all possible, each miner is competing with all of the others to come up with a 64-digit hexadecimal number which is referred to as a “hash” which is less than or equal to the hash which is targeted. In other words, the computer will be spitting out different hashes at a certain rate per second guessing all of the possible 64-digit numbers until they reach the correct solution.
Therefore, computational power is essential – the more powerful your mining equipment, the larger hash rate per second you’d be able to achieve. This is why the Bitcoin mining hardware is particularly important. Naturally, the cost of mining would be based on a the operation costs such as electricity, internet connection, hardware maintenance, and so forth.
This is the main reason for which back in 2013 bitcoin miners started to use machines which were specifically designed for mining cryptocurrencies. These are called Application-Specific Integrated Circuits or ASIC mining, for short. ASIC mining devices can cost a serious amount of money but are more efficient than traditional computers.
There are a few important things to be considered when it comes to BTC mining. These are some of its pillar components, so to speak.
  1. Blocks
One of the things to be aware of in the world of Bitcoin mining is blocks. Transaction data is recorded in files which are called blocks. Think of it as a page from your city’s recordbook. Blocks are organized into a chain in chronological order – hence, blockchain. New transactions, as they are being confirmed by miners, go into new blocks, with each new block is being added to the end of the chain. This is why blockchain is also referred to as records of blocks.
  1. Block Rewards
Is Bitcoin mining profitable? This is probably the most commonly asked question. Unfortunately, there is no one answer. Block rewards are what miners compete for. Other cryptocurrencies such as Bitcoin Cash, for instance, also have their own block rewards which differ from those of Bitcoin.
At inception, every single bitcoin block reward was worth 50 BTC. However, the protocol works in a way where the block reward is being halved after 210,000 blocks have been discovered. This takes roughly around four years to complete. As of July 9th, 2016, the reward for discovering one block is 12.5 BTC.
So is Bitcoin mining profitable? It depends. One would have to calculate the current block reward based on the current prices and compare that to the cost of mining, which varies from miner to miner.
It’s worth noting that the reward for successful Bitcoin miners will drop once again in May 2020 and it will decrease to 6.25 BTC per block from the current 12.5.
  1. Hash Rate
To put it in the most basic terms, hash rate represents the speed at which bitcoin mining hardware can guess the correct hash. Therefore, the faster your hash rate is the higher the chances of discovering the new block you have. BTC mining has become highly competitive and, as such, you need to consider getting powerful bitcoin mining hardware. Individual miners, can, on the other hand, take advantage of cloud mining or mine a coin with lower difficulty, but more on that later.
  1. Difficulty
The difficulty of bitcoin mining is adjusted frequently in order to maintain an average time of about 10 minutes to process a block. The rate is recalculated every 2,016 blocks.
In case you wonder why ten minutes – it’s because bitcoin developers have decided that this is the time needed for a steady and diminishing flow of producing new coins.

WHAT IS A MINING POOL

When it comes to cryptocurrency mining, a mining pool is the combined resources by miners who are sharing their overall computational power over a network in order to split the reward equally based on the amount of work that they have contributed to discovering a new block.
A “share” would be awarded to each member of the mining pool who manages to present a valid partial proof of his work. Mining pools became popular as the difficulty of bitcoin mining increased over time and when it became apparent that individual miners could no longer compete with bigger pools and large-scale mining operations.

WHAT IS CLOUD MINING

Cloud mining, on the other hand, is what allows individual miners to participate in the process without having to purchase particularly expensive bitcoin mining hardware.
If you want to take part in BTC mining but you don’t want to spend the time and resources to get powerful machines, you can use shared processing power provided by remote data centers. The only thing you’d need is a home computer. Generally, there are three types of cloud mining that you can take advantage of. These include:
  1. Hosted Mining
You can lease a mining machine which is hosted by the provider.
  1. Virtual Hosted Mining
This is a method which would require you to create a virtual private server and after that install your own mining software.
  1. Lease Hash Power
Cloud mining also allows you to lease a certain amount of hash power without having the best bitcoin mining hardware. This is likely to be the most popular method of all. Most of the providers offer comprehensive calculators that you can take advantage of to determine the current profitability based on the resources you are ready to spend.
However, it’s important to pay special attention when it comes to cloud mining as there are fraudulent service providers. It’s crucial to make proper and in-depth due-diligence, especially if you intend to lease hash power. One of the largest cloud Bitcoin mining companies out there is Genesis Mining.

ENERGY CONSUMPTION: THINGS TO BE AWARE OF

Mining bitcoin is intentionally designed to be energy intensive. The computational power needed to solve the abovementioned complex math problems requires a lot of electricity to power up the specialized mining hardware.
On the flipside, it requires even more resources to attack the network than to defend it, making Bitcoin the most secure blockchain today.
In fact, there is an entire pseudo-environmentalist brigade which aims to have the regular user believe that Bitcoin mining would somehow be the death of the planet. A lot of their arguments revolve around the fact that large data centers used for carrying out the math computations use tremendous amount of electricity. However, Bitcoinist recently outlined three reasons for which this rhetoric is complete nonsense.
According to clean energy researcher Katrina Kelly-Pitou, the entire debate on the overall electricity consumption by bitcoin mining facilities is headed in the wrong direction. The research outlines that electricity consumption can increase while, at the same time, have minimal impact on the environment. This is because those facilities gradually begin to use more efficient, sources of energy which are renewable. Not only does this make mining more profitable, but it also lowers the impact on the environment. The researcher also outlined that banks use three times more electricity than Bitcoin’s network.
What is more, a brand new report concluded that 80 percent of Bitcoin mining is running on renewable energy. This is unsurprising since miners are naturally incentivized to seek the cheapest and cleanest sources of energy, many of which are renewables such as hydroelectricity (e.g. Iceland).
If you’re worried about Bitcoin consuming too much energy, you might want to think twice about lighting up the Christmas lights this year. That’s right – the lights that American consumers alone use to decorate their homes for the occasion make up a gigantic 6.63 billion kilowatt hours of electricity consumption every single year. That’s more than the entire national energy consumptions of a lot of the developing countries every year. For example, both Ethiopia and El Salvador used less electricity per year.
However, if you decide to set up a mining rig in your garage, you can most definitely expect a more expensive electricity bill next month.

BEST BITCOIN MINING HARDWARE: THINGS TO CONSIDER

There are a few key parameters to look out for when it comes to choosing the best bitcoin mining hardware. These include:
Naturally, you want to be aware of how much electricity does your miner consume. The lower this number, the better.
As we explained above, the hash rate is essential for bitcoin mining. The larger this number is, the better the machine is, generally.
This measurement accounts for the efficiency of your machine. If this particular number is low, it means that the machine will consume less power for the same amount of work done by the machine.
There is a range of different devices produced by some of the largest companies in the field such as Bitmain Technologies, Canaan Creative, Halong Mining, Innosilicon Technology, and others of the kind.

WHAT ELSE CAN YOU MINE?

Bitcoin is not the only cryptocurrency which can be mined. It’s worth noting, though, that if you are using a specialized cryptocurrency mining hardware you’d have to check the compatible digital currencies, as some of the devices would only allow you to mine selected cryptocurrencies. However, apart from Bitcoin, other popular choices include Bitcoin Cash, Monero, Dogecoin, Litecoin, and so forth.

CONCLUSION

If you managed to make it thus far, you should have a general understanding of the main principles behind bitcoin mining and why it is essential to its network.
At the same time, bitcoin mining represents an alternative method to acquire the digital currency. Of course, if you don’t feel like investing time and efforts into it, let alone designating specialized bitcoin mining hardware, you can always check our detailed guide on to how to buy cryptocurrencies.
We’ve gone in depth on how to buy Bitcoin with Paypal, credit card, debit card, and even with cash. We’ve also covered some of the most popular platforms where you can buy Bitcoin.
Once you’ve done that, you can hop to our comprehensive guide to Bitcoin wallets and determine whether you want a web-based one or an offline, hardware solution instead.
submitted by SwitchKanun to hashflareinfo [link] [comments]

The Mike Hearn Show: Season Finale (and Bitcoin Classic: Series Premiere)

This post debunks Mike Hearn's conspiracy theories RE Blockstream in his farewell post and points out issues with the behavior of the Bitcoin Classic hard fork and sketchy tactics of its advocates
I used to be torn on how to judge Mike Hearn. On the one hand he has done some good work with BitcoinJ, Lighthouse etc. Certainly his choice of bloom filter has had a net negative effect on the privacy of SPV users, but all in all it works as advertised.* On the other hand, he has single handedly advocated for some of the most alarming behavior changes in the Bitcoin network (e.g. redlists, coinbase reallocation, BIP101 etc...) to date. Not to mention his advocacy in the past year has degraded from any semblance of professionalism into an adversarial us-vs-them propaganda train. I do not believe his long history with the Bitcoin community justifies this adversarial attitude.
As a side note, this post should not be taken as unabated support for Bitcoin Core. Certainly the dev team is made of humans and like all humans mistakes can be made (e.g. March 2013 fork). Some have even engaged in arguably unprofessional behavior but I have not yet witnessed any explicitly malicious activity from their camp (q). If evidence to the contrary can be provided, please share it. Thankfully the development of Bitcoin Core happens more or less completely out in the open; anyone can audit and monitor the goings on. I personally check the repo at least once a day to see what work is being done. I believe that the regular committers are genuinely interested in the overall well being of the Bitcoin network and work towards the common goal of maintaining and improving Core and do their best to juggle the competing interests of the community that depends on them. That is not to say that they are The Only Ones; for the time being they have stepped up to the plate to do the heavy lifting. Until that changes in some way they have my support.
The hard line that some of the developers have drawn in regards to the block size has caused a serious rift and this write up is a direct response to oft-repeated accusations made by Mike Hearn and his supporters about members of the core development team. I have no affiliations or connection with Blockstream, however I have met a handful of the core developers, both affiliated and unaffiliated with Blockstream.
Mike opens his farewell address with his pedigree to prove his opinion's worth. He masterfully washes over the mountain of work put into improving Bitcoin Core over the years by the "small blockians" to paint the picture that Blockstream is stonewalling the development of Bitcoin. The folks who signed Greg's scalability road map have done some of the most important, unsung work in Bitcoin. Performance improvements, privacy enhancements, increased reliability, better sync times, mempool management, bandwidth reductions etc... all those things are thanks to the core devs and the research community (e.g. Christian Decker), many of which will lead to a smoother transition to larger blocks (e.g. libsecp256k1).(1) While ignoring previous work and harping on the block size exclusively, Mike accuses those same people who have spent countless hours working on the protocol of trying to turn Bitcoin into something useless because they remain conservative on a highly contentious issue that has tangible effects on network topology.
The nature of this accusation is characteristic of Mike's attitude over the past year which marked a shift in the block size debate from a technical argument to a personal one (in tandem with DDoS and censorship in /Bitcoin and general toxicity from both sides). For example, Mike claimed that sidechains constitutes a conflict of interest, as Blockstream employees are "strongly incentivized to ensure [bitcoin] works poorly and never improves" despite thousands of commits to the contrary. Many of these commits are top down rewrites of low level Bitcoin functionality, not chump change by any means. I am not just "counting commits" here. Anyways, Blockstream's current client base consists of Bitcoin exchanges whose future hinges on the widespread adoption of Bitcoin. The more people that use Bitcoin the more demand there will be for sidechains to service the Bitcoin economy. Additionally, one could argue that if there was some sidechain that gained significant popularity (hundreds of thousands of users), larger blocks would be necessary to handle users depositing and withdrawing funds into/from the sidechain. Perhaps if they were miners and core devs at the same time then a conflict of interest on small blocks would be a more substantive accusation (create artificial scarcity to increase tx fees). The rational behind pricing out the Bitcoin "base" via capacity constraint to increase their business prospects as a sidechain consultancy is contrived and illogical. If you believe otherwise I implore you to share a detailed scenario in your reply so I can see if I am missing something.
Okay, so back to it. Mike made the right move when Core would not change its position, he forked Core and gave the community XT. The choice was there, most miners took a pass. Clearly there was not consensus on Mike's proposed scaling road map or how big blocks should be rolled out. And even though XT was a failure (mainly because of massive untested capacity increases which were opposed by some of the larger pools whose support was required to activate the 75% fork), it has inspired a wave of implementation competition. It should be noted that the censorship and attacks by members of /Bitcoin is completely unacceptable, there is no excuse for such behavior. While theymos is entitled to run his subreddit as he sees fit, if he continues to alienate users there may be a point of mass exodus following some significant event in the community that he tries to censor. As for the DDoS attackers, they should be ashamed of themselves; it is recommended that alt. nodes mask their user agents.
Although Mike has left the building, his alarmist mindset on the block size debate lives on through Bitcoin Classic, an implementation which is using a more subtle approach to inspire adoption, as jtoomim cozies up with miners to get their support while appealing to the masses with a call for an adherence to Satoshi's "original vision for Bitcoin." That said, it is not clear that he is competent enough to lead the charge on the maintenance/improvement of the Bitcoin protocol. That leaves most of the heavy lifting up to Gavin, as Jeff has historically done very little actual work for Core. We are thus in a potentially more precarious situation then when we were with XT, as some Chinese miners are apparently "on board" for a hard fork block size increase. Jtoomim has expressed a willingness to accept an exceptionally low (60 or 66%) consensus threshold to activate the hard fork if necessary. Why? Because of the lost "opportunity cost" of the threshold not being reached.(c) With variance my guess is that a lucky 55% could activate that 60% threshold. That's basically two Chinese miners. I don't mean to attack him personally, he is just willing to go down a path that requires the support of only two major Chinese mining pools to activate his hard fork. As a side effect of the latency issues of GFW, a block size increase might increase orphan rate outside of GFW, profiting the Chinese pools. With a 60% threshold there is no way for miners outside of China to block that hard fork.
To compound the popularity of this implementation, the efforts of Mike, Gavin and Jeff have further blinded many within the community to the mountain of effort that core devs have put in. And it seems to be working, as they are beginning to successfully ostracize the core devs beyond the network of "true big block-believers." It appears that Chinese miners are getting tired of the debate (and with it Core) and may shift to another implementation over the issue.(d) Some are going around to mining pools and trying to undermine Core's position in the soft vs. hard fork debate. These private appeals to the miner community are a concern because there is no way to know if bad information is being passed on with the intent to disrupt Core's consensus based approach to development in favor of an alternative implementation controlled (i.e. benevolent dictator) by those appealing directly to miners. If the core team is reading this, you need to get out there and start pushing your agenda so the community has a better understanding of what you all do every day and how important the work is. Get some fancy videos up to show the effects of block size increase and work on reading materials that are easy for non technically minded folk to identify with and get behind.
The soft fork debate really highlights the disingenuity of some of these actors. Generally speaking, soft forks are easier on network participants who do not regularly keep up with the network's software updates or have forked the code for personal use and are unable to upgrade in time, while hard forks require timely software upgrades if the user hopes to maintain consensus after a hardfork. The merits of that argument come with heavy debate. However, more concerning is the fact that hard forks require central planning and arguably increase the power developers have over changes to the protocol.(2) In contrast, the 'signal of readiness' behavior of soft forks allows the network to update without any hardcoded flags and developer oversight. Issues with hard forks are further compounded by activation thresholds, as soft forks generally require 95% consensus while Bitcoin Classic only calls for 60-75% consensus, exposing network users to a greater risk of competing chains after the fork. Mike didn't want to give the Chinese any more power, but now the post XT fallout has pushed the Chinese miners right into the Bitcoin Classic drivers seat.
While a net split did happen briefly during the BIP66 soft fork, imagine that scenario amplified by miners who do not agree to hard fork changes while controlling 25-40% of the networks hashing power. Two actively mined chains with competing interests, the Doomsday Scenario. With a 5% miner hold out on a soft fork, the fork will constantly reorg and malicious transactions will rarely have more than one or two confirmations.(b) During a soft fork, nodes can protect themselves from double spends by waiting for extra confirmations when the node alerts the user that a ANYONECANSPEND transaction has been seen. Thus, soft forks give Bitcoin users more control over their software (they can choose to treat a softfork as a soft fork or a soft fork as a hardfork) which allows for greater flexibility on upgrade plans for those actively maintaining nodes and other network critical software. (2) Advocating for a low threshold hard forks is a step in the wrong direction if we are trying to limit the "central planning" of any particular implementation. However I do not believe that is the main concern of the Bitcoin Classic devs.
To switch gears a bit, Mike is ironically concerned China "controls" Bitcoin, but wanted to implement a block size increase that would only increase their relative control (via increased orphans). Until the p2p wire protocol is significantly improved (IBLT, etc...), there is very little room (if any at all) to raise the block size without significantly increasing orphan risk. This can be easily determined by looking at jtoomim's testnet network data that passed through normal p2p network, not the relay network.(3) In the mean time this will only get worse if no one picks up the slack on the relay network that Matt Corallo is no longer maintaining. (4)
Centralization is bad regardless of the block size, but Mike tries to conflate the centralization issues with the Blockstream block size side show for dramatic effect. In retrospect, it would appear that the initial lack of cooperation on a block size increase actually staved off increases in orphan risk. Unfortunately, this centralization metric will likely increase with the cooperation of Chinese miners and Bitcoin Classic if major strides to reduce orphan rates are not made.
Mike also manages to link to a post from the ProHashing guy RE forever-stuck transactions, which has been shown to generally be the result of poorly maintained/improperly implemented wallet software.(6) Ultimately Mike wants fees to be fixed despite the fact you can't enforce fixed fees in a system that is not centrally planned. Miners could decide to raise their minimum fees even when blocks are >1mb, especially when blocks become too big to reliably propagate across the network without being orphaned. What is the marginal cost for a tx that increases orphan risk by some %? That is a question being explored with flexcaps. Even with larger blocks, if miners outside the GFW fear orphans they will not create the bigger blocks without a decent incentive; in other words, even with a larger block size you might still end up with variable fees. Regardless, it is generally understood that variable fees are not preferred from a UX standpoint, but developers of Bitcoin software do not have the luxury of enforcing specific fees beyond basic defaults hardcoded to prevent cheap DoS attacks. We must expose the user to just enough information so they can make an informed decision without being overwhelmed. Hard? Yes. Impossible. No.
Shifting gears, Mike states that current development progress via segwit is an empty ploy, despite the fact that segwit comes with not only a marginal capacity increase, but it also plugs up major malleability vectors, allows pruning blocks for historical data and a bunch of other fun stuff. It's a huge win for unconfirmed transactions (which Mike should love). Even if segwit does require non-negligible changes to wallet software and Bitcoin Core (500 lines LoC), it allows us time to improve block relay (IBLT, weak blocks) so we can start raising the block size without fear of increased orphan rate. Certainly we can rush to increase the block size now and further exacerbate the China problem, or we can focus on the "long play" and limit negative externalities.
And does segwit help the Lightning Network? Yes. Is that something that indicates a Blockstream conspiracy? No. Comically, the big blockians used to criticize Blockstream for advocating for LN when there was no one working on it, but now that it is actively being developed, the tune has changed and everything Blockstream does is a conspiracy to push for Bitcoin's future as a dystopic LN powered settlement network. Is LN "the answer?" Obviously not, most don't actually think that. How it actually works in practice is yet to be seen and there could be unforseen emergent characteristics that make it less useful for the average user than originally thought. But it's a tool that should be developed in unison with other scaling measures if only for its usefulness for instant txs and micropayments.
Regardless, the fundamental divide rests on ideological differences that we all know well. Mike is fine with the miner-only validation model for nodes and is willing to accept some miner centralization so long as he gets the necessary capacity increases to satisfy his personal expectations for the immediate future of Bitcoin. Greg and co believe that a distributed full node landscape helps maintain a balance of decentralization in the face of the miner centralization threat. For example, if you have 10 miners who are the only sources for blockchain data then you run the risk of undetectable censorship, prolific sybil attacks, and no mechanism for individuals to validate the network without trusting a third party. As an analogy, take the tor network: you use it with an expectation of privacy while understanding that the multi-hop nature of the routing will increase latency. Certainly you could improve latency by removing a hop or two, but with it you lose some privacy. Does tor's high latency make it useless? Maybe for watching Netflix, but not for submitting leaked documents to some newspaper. I believe this is the philosophy held by most of the core development team.
Mike does not believe that the Bitcoin network should cater to this philosophy and any activity which stunts the growth of on-chain transactions is a direct attack on the protocol. Ultimately however I believe Greg and co. also want Bitcoin to scale on-chain transactions as much as possible. They believe that in order for Bitcoin to increase its capacity while adhering to acceptable levels of decentralization, much work needs to be done. It's not a matter of if block size will be increased, but when. Mike has confused this adherence to strong principles of decentralization as disingenuous and a cover up for a dystopic future of Bitcoin where sidechains run wild with financial institutions paying $40 per transaction. Again, this does not make any sense to me. If banks are spending millions to co-op this network what advantage does a decentralized node landscape have to them?
There are a few roads that the community can take now: one where we delay a block size increase while improvements to the protocol are made (with the understanding that some users may have to wait a few blocks to have their transaction included, fees will be dependent on transaction volume, and transactions <$1 may be temporarily cost ineffective) so that when we do increase the block size, orphan rate and node drop off are insignificant. Another is the immediate large block size increase which possibly leads to a future Bitcoin which looks nothing like it does today: low numbers of validating nodes, heavy trust in centralized network explorers and thus a more vulnerable network to government coercion/general attack. Certainly there are smaller steps for block size increases which might not be as immediately devastating, and perhaps that is the middle ground which needs to be trodden to appease those who are emotionally invested in a bigger block size. Combined with segwit however, max block sizes could reach unacceptable levels. There are other scenarios which might play out with competing chains etc..., but in that future Bitcoin has effectively failed.
As any technology that requires maintenance and human interaction, Bitcoin will require politicking for decision making. Up until now that has occurred via the "vote download" for software which implements some change to the protocol. I believe this will continue to be the most robust of options available to us. Now that there is competition, the Bitcoin Core community can properly advocate for changes to the protocol that it sees fit without being accused of co-opting the development of Bitcoin. An ironic outcome to the situation at hand. If users want their Bitcoins to remain valuable, they must actively determine which developers are most competent and have their best interests at heart. So far the core dev community has years of substantial and successful contributions under its belt, while the alt implementations have a smattering of developers who have not yet publicly proven (besides perhaps Gavin--although his early mistakes with block size estimates is concerning) they have the skills and endurance necessary to maintain a full node implementation. Perhaps now it is time that we focus on the personalities who many want to trust Bitcoin's future. Let us see if they can improve the speed at which signatures are validated by 7x. Or if they can devise privacy preserving protocols like Confidential Transactions. Or can they figure out ways to improve traversal times across a merkle tree? Can they implement HD functionality into a wallet without any coin-crushing bugs? Can they successfully modularize their implementation without breaking everything? If so, let's welcome them with open arms.
But Mike is at R3 now, which seems like a better fit for him ideologically. He can govern the rules with relative impunity and there is not a huge community of open source developers, researchers and enthusiasts to disagree with. I will admit, his posts are very convincing at first blush, but ultimately they are nothing more than a one sided appeal to the those in the community who have unrealistic or incomplete understandings of the technical challenges faced by developers maintaining a consensus critical, validation-heavy, distributed system that operates within an adversarial environment. Mike always enjoyed attacking Blockstream, but when survey his past behavior it becomes clear that his motives were not always pure. Why else would you leave with such a nasty, public farewell?
To all the XT'ers, btc'ers and so on, I only ask that you show some compassion when you critique the work of Bitcoin Core devs. We understand you have a competing vision for the scaling of Bitcoin over the next few years. They want Bitcoin to scale too, you just disagree on how and when it should be done. Vilifying and attacking the developers only further divides the community and scares away potential future talent who may want to further the Bitcoin cause. Unless you can replace the folks doing all this hard work on the protocol or can pay someone equally as competent, please think twice before you say something nasty.
As for Mike, I wish you the best at R3 and hope that you can one day return to the Bitcoin community with a more open mind. It must hurt having your software out there being used by so many but your voice snuffed. Hopefully one day you can return when many of the hard problems are solved (e.g. reduced propagation delays, better access to cheap bandwidth) and the road to safe block size increases have been paved.
(*) https://eprint.iacr.org/2014/763.pdf
(q) https://github.com/bitcoinclassic/bitcoinclassic/pull/6
(b) https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-Decembe012026.html
(c) https://github.com/bitcoinclassic/bitcoinclassic/pull/1#issuecomment-170299027
(d) http://toom.im/jameshilliard_classic_PR_1.html
(0) http://bitcoinstats.com/irc/bitcoin-dev/logs/2016/01/06
(1) https://github.com/bitcoin/bitcoin/graphs/contributors
(2) https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-Decembe012014.html
(3) https://toom.im/blocktime (beware of heavy website)
(4) https://bitcointalk.org/index.php?topic=766190.msg13510513#msg13510513
(5) https://news.ycombinator.com/item?id=10774773
(6) http://rusty.ozlabs.org/?p=573
edit, fixed some things.
edit 2, tried to clarify some more things and remove some personal bias thanks to astro
submitted by citboins to Bitcoin [link] [comments]

Staying Anonymous in a High Risk Activity (xpost from /r/ShadowWar)

👀
To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to conspiracy [link] [comments]

BlockChain Enable a Quadrillion-Dollar Derivatives Market?

BlockChain Enable a Quadrillion-Dollar Derivatives Market?
https://preview.redd.it/iwewapkg8mz11.png?width=1024&format=png&auto=webp&s=9b52f51960172844af71917aec191dcfd6031bf9
CAN BLOCKCHAIN ENABLE A QUADRILLION-DOLLAR DERIVATIVES MARKET? IT’S A REAL POSSIBILITY. By 2028, the world economy has exploded with exponential economic growth. BlockChain is now the heart of commerce and trade. Investopedia’s valuation on the Derivatives Market now stands true at $1.2 quadrillion. And you are now very rich with your array of futures, derivatives and cryptocurrencies on hand. Isn’t this a nice possibility?
Now, imagine travelling back to 2018.
You are scrolling your news feed. The headlines show in 2017 alone, BlockChain startups have raised $1.2 billion worth initial coin offering (ICOs). ICOs enable startups, to raise money from the general public by allowing them to buy a stake in their business; which comes in a form of a token or digital currency. It looks like the public are beginning to understand the potential of cryptocurrencies and blockchain technology.
A Facebook notification pops up on your mobile phone. Your friend has posted an article on your Facebook wall. The article is about Ethereum, the hot new BlockChain technology that is creating even bigger ripples in the finance world than its predecessor BitCoin. It seems that Ethereum is now the birthplace of many decentralized platforms, which raise funds via ICOs. As more funds are raised, these platforms get better and this drives up the value of Ethereum. The top platforms are Golem, Augur, Basic Attention Tokens and Gnosis, which collectively ring in $1.27 billion in market value. The amount of money that has been invested into Ethereum based BlockChain technology shows that people see Blockchain as the future of commerce and finance.
This all sounds good and you’re ready to participate in a hot ICO. But as a possible new investor in an ICO based on the Ethereum blockchain, how do you get started? Which platform and ICO should you consider investing in?
  1. YOU WILL NEED TO GET A WALLET. Wallets are like digital bank accounts, they hold your tokens and other cryptocurrencies you plan to buy and hold. Most ICOs are built on Ethereum smart contracts and your Wallet has to support receiving tokens. In an ICO, you send currency (typically ETH or BTC) to the company issuing a new token and receive the amount of tokens based on the given exchange rate by the company. MyEtherWallet is one of the most popular Ethereum Wallets because it is linked to the BlockChain, has excellent security features, and best of all it gives you full control of your Wallet (unlike other online wallets that are controlled by third party companies). You can get MyEtherWallet here.
  2. RESEARCH EXTENSIVELY ON AVAILABLE ICOS As with any form of investment, you need to do your research and due diligence. Unlike the research on conventional investments that look at statistics, company performance, average daily volume and annual yield, ICOs require a different kind of analysis. Often times, millions of dollars are raised in ICOs with no product or company track record. Most traditional investors would not invest as the risk outweigh the gains from the investment. It feels like a gamble.
How then would you know if an ICO is worth investing into?
First of all, you would need to study its platform concept, market potential and sustainability for long-term growth.
Is it easy for users to adopt and understand?
Do the Founders and Developers of the platform have sound knowledge of economics, inflation, block size, fees, administration, security and human behavior?
Does the crypto-economic system have what it takes to be sustainable?
Who is the team behind the platform? Are they knowledgeable and experienced?
Is this a revolutionary or game-changing product that has massive market potential?
Take Level01 as an example. It is the World’s First Brokerless Derivatives Exchange in Partnership with Thomson Reuters. The concept is innovative, more importantly; it has an enticing proposition because it addresses gaps, issues and problems faced by traditional trading markets. This facilitates a stable, robust and potentially profitable investment eco-system. How so?
Remember Investopedia’s valuation of the derivatives market at a thrilling $1.2 quadrillion? This estimate is debatable because it needed to consider, “notional value”, versus actual market value. The lack of certainty on pricing and not having accurate market data can be frustrating. Brokers also charge a fee for both ends; buying and selling, which makes it expensive to participate in trade. In addition, not everyone relishes in the prospect of understanding financial data, terms and conditions. These factors are barriers to entry that reduces the pool of investors in the derivatives market.
The Founders of Level01 saw all these and sought to develop solutions that can make investing easy, transparent, secure and fair, by using the Blockchain and partnership with financial market leader, Thomson Reuters.
AN APP THAT MAKES ANYONE A BETTER INVESTOR Whether you are a first time investor or an experienced investor, the Level01 App will help you make better investment decisions, save time and get better at investing in the Derivatives Market. Its sleek interface, smart data feed and intuitive features are designed to fit all investor types to make the trading experience as easy as 1, 2, 3.
CHANGING THE GAME WITH ARTIFICIAL INTELLIGENCE When you log on, the Level01 platform, you will have FairSenseTM Artificial Intelligence on hand to analyze trade intent patterns of all users on the platform to find the best matches for you. Once a match is found, it employs its proprietary dynamic fair price-balancing algorithm to show fair pricing for both sides of the trade contract. This saves investors time, speeds up trade, and keeps inflation in check with fair pricing.
CREDIBLE AND RELIABLE DATA FEED FROM THOMSON REUTERS Level01 raised the bar further by collaborating with Thomson Reuters. They integrated and enabled live streaming real-time market prices for Forex, Index, Cryptocurrency, Commodities and Stocks directly from Thomson Reuters, a global leader for information and data sources for professional markets. Having a 150-year-old brand name like Thomson Reuters lends tremendous credibility to the data and keeps investors informed of actual value prior to the commencement of the trade.
AUTOMATED SMART CONTRACTS As if that was not enough, the Level01 is designed as an exchange and trading platform with a system of smart contracts that resolves trust, emotion and irresponsibility in an efficient, transparent, automated manner. These automated digital contracts saves time and money for investors so that they can concentrate on analyzing data and deciding on investments.
SUSTAINABLE GROWTH DRIVEN BY USERS You may be thinking by now, that is all well and good, but what are they doing to make this unique Derivatives Exchange sustainable and primed for growth? The designers of Level01 looked towards attracting quality investors by incorporating a fair rating system based on statistics and empowering them with the ability to add value to the network, and derive value for themselves. Level01 rewards users when they participate in the ecosystem. To make it even more enticing, the Level01 platform enables Trade Room Hosting, which allows users to earn commission. These lucrative set points are attractive to users who will jump on board and increase the liquidity base, which of course, benefits everyone.
BETTER FINANCIAL LIQUIDITY Sometimes being able to sell is as important as being able to buy. This means your assets and investments can be easily converted to cash. Level01 gives you full control over your own funds by allowing your deposits and withdrawals to be done instantly. You can also change the native platform LVX tokens between BitCoin and Ethereum for better financial liquidity.
WIDER FINANCIAL PORTFOLIO Level01 allows you to trade both traditional and cryptocurrency market assets to give you greater ease and freedom to plan a diverse portfolio to suit your needs whether you like to play it safe or take profitable risks.
DIVERSE AND EXPERIENCED TEAM An international team with accolades, achievements and awards helms Level01 Derivatives Exchange. There is a mathematician and data analyst, a software engineer and system architect, a highly ranked digital marketing specialist, an expert in corporate operations, a consultant in banking and finance, a key quantitative analyst consultant who over saw $25B AUM, a corporate strategist and brand planning expert and an inventor-CEO with a string of successes under his belt, including founding a successful public listed company in Australia.
GROWING INTEREST Level01 just begun but it is already making waves in the cryptocurrency and investment world. Forums and chat groups are buzzing with conversations as seasoned cryptocurrency investors hop on the bandwagon, eager to sweep up ICOs before the rest of the world notices. Coin Telegraph, which is the top news portal on cryptocurrency, described Level01 partnership with Thomson Reuters as a great game-changer that will allow general public to trade derivatives like a pro using big data previously only available to institutional traders.
Could this be your ticket to making your 2028 the best year ever? As if you invested in Google back in 2004. You can check out more about this upcoming platform here.
submitted by Level01Exchange to u/Level01Exchange [link] [comments]

Topic 5: Staying Anonymous in a High Risk Activity

To preface this topic, I must state that I am not advocating any immoral activity. Also please note, that just because something is illegal, does not necessary mean that it must be immoral. Remember that the Civil Rights Act was not passed until 1964 - just over 50 years ago. Just because something is enshrined into law, does not mean that it is moral and just.
That said, there may come a time in your life where you decide that you must do something that is going to piss off someone with the means to hurt you. For the purposes of this Topic, let us pretend you have compromising files that detail illegal activity, and you want to release it onto the internet. The pressing question is, how do you release your content without revealing who you are and putting yourself and/or your loved ones in danger?
Let's do our best to come up with as many countermeasures as we can.
Why Become an Anonymous Whistleblower?
The government and/or your workplace will tell you that there is a Whistleblower program in place, and that you should make use of it if you witness any wrongdoing. You will need to use your own judgement, on whether to use this program, or if you should instead become an internet whistleblower. Every situation is different.
What I CAN say, however, is that it is in the nature of government to seek unlimited power. EVERY government in the world would eventually strip their citizens of all rights and control their every move and thought, IF they thought they could get away with it. Similarly, individuals and corporations (and yes, governments) will risk fines and jail time by doing something illegal, if they think that it is worth the risk of getting caught.
You see examples of this everywhere. One of the easiest-to-find examples is when a car manufacturer doesn't bother to fix a fatal defect because the cost of fixing it is greater than the cost of the lawsuits from the inevitable deaths (link). Even when they DO get caught, the penalty isn't even that bad because the fines are for some odd reason TAX DEDUCTIBLE.
When the government does something illegal, they KNOW they're doing something illegal. They just do it anyway because they can get away with it, and because they hide it well enough. When someone steps forward and says "hey, this isn't right!", the government's reaction is NOT to say "oh, that person is right, we should correct things and be sure to follow the law!" Instead, what they think is "oh no, this guy is going to tell on us, and if word gets out, then it will be a setback in our quest for power! we need to make sure our secret stays hidden! how do we go about doing that...?"
The answer is typically to threaten to ruin the potential whistleblower's life in some way. Maybe they get transferred to another department. Maybe they get fired for being 1 minute late. Maybe the whistleblower made the complaint official so they go for a gag order. Or maybe the problem is big enough that they hack their emails and start a smear and discrediation campaign. Sprinkle a little crack on them. Plant child pornography on their hard drive. Use their SSN and credit cards to ruin them financially. Or maybe they just put a couple bullets in them.
The government doesn't want you to right wrongs. The government just wants power. If you uncover illegal activity, you must determine if reporting the violation through official channels will actually fix the problem, or if you must do your best to raise a public stink about it. This also applies to corporations. Be wary of dealing with HR - they exist to protect the company, not you.
"It's Just Metadata"
When solid evidence of mass survillence was revealed, one of the arguments that the government used to try to downplay it is that they were not actually collecting message contents, but instead only collecting the metadata (sender, reciever, date and time, etc). First off, this is bullshit - they are obviously collecting the message contents too. Second off, METADATA IS FUCKING IMPORTANT. You can put together a pretty clear picture of exactly what is happening, just from metadata. Metadata is basically a smoking gun to the message or file contents.
The scary thing is, most tech-savy people - myself included - are not able to guarantee that they can clean ALL of the metadata from a file. And not only is metadata stored on the operating system level (on the "outside" of files), but the program that created the file in the first place probably has its own metadata INSIDE the file. And there's no way you can trust "metadata-cleaner-v0.6.exe" (now with the Ask toolbar!) to keep you out of jail.
You must assume that the original files that you copy and intend to leak, are littered with metadata that very very clearly identifies you as the leaker.
To combat this, there are several steps you can take.
  1. DO NOT leak the original untouched files. Certainly keep a copy of them, but original files might have your digital fingerprints all over it, and will put you at risk. Instead, copy or transcribe the contents, and place it into a new file, and be sure to do it on a computer that cannot be traced back to you or any of your accounts.
  2. Modify the contents of the file. When pasting text, you should strongly consider pasting the contents format-free (control-shift-v) (or use Notepad as an intermediary). Depending on how paranoid you are about this, also consider converting everything to upper-case or lower-case. If images are involved, resize them slightly. Also, especially if the image is a .jpg, save with a slightly reduced quality to introduce noise or to destroy "invisible" markers that the human eye cannot detect. Also be aware that documents might have deliberate variations, depending on the person who accessed them. This could be hidden in typos, punctuation, capitalization, even full words or sentences. The document you plan on leaking might actually be trapped.
  3. You must also consider who had access to the file? Are you the only one? Because if you are, then taking every precaution possible will not help you. Is it a limited group of people? You are going to be placed under a microscope. The more people that "could have" done it, the better. You need to be able to hide in a crowd of suspects - the larger the pool of suspicion, the better.
This is in no way a comprehensive list. The reality is, the offending organization has as many tools at their disposal as they can imagine. You must try to determine the level of risk yourself, and what the most likely countermeasures would be, and adjust your strategy to circumvent them. Be smart, and careful, and paranoid. And honestly, you should seriously consider using a journalist instead of doing this yourself.
There is also one more matter to be careful of... the actual file contents itself. You have to read it, and you have to determine if any innocent person would be put in danger if you leak the information. And then you must determine if leaking the document is still worth it.
Doing the Deed
There are a number of precautions that you can take when you need to remain anonymous for an online activity. Some of these are pretty basic. Others of these are more extreme. It is up to you to determine which measures are appropriate, to protect yourself from the risks you are about to take.
  1. Do not use any computer that is associated with you or anyone else you know. You should buy a laptop off of Craigslist. Do not use your real phone number, or real email address, or your real name, etc. When arranging to buy this laptop, you should ideally not be using your own computer or internet connection to communicate with the seller. Using your laptop with a Tails linux live CD in a coffee shop is typically secure enough though, for this particular activity. Buy the laptop using cash. Try to not give the seller any reason to remember you.
  2. Remove the hard drive from your newly acquired laptop. Only boot up on a Tails live cd. Read up on spoofing your MAC address. Never switch on the laptop at home, or use your home internet connection. Never connect to any of your personal online accounts using this laptop. Never use this laptop to browse the internet - your browsing behaviors could get the laptop/connection "fingerprinted" back to you. This is a "dark" laptop, and you should take every measure to keep it that way.
  3. I do not know if it is even possible to aonymously buy a burner phone in the United States. But if you absolutely need one, try to do it as anonymously as possible, using all of the other tips listed here, and then some. Use cash, avoid cameras, avoid local shops,
  4. Do all of your preparations offline. Only connect to the internet for the amount of time you need to perform your activity, and no longer. Every second you spend online increases your exposure and threat. This is very similar to the concept of military radios that transmit in encrypted bursts, to help prevent enemy interception and triangulation.
  5. Only use public hotspots, when you connect to the internet. And assume that every time you hop online, someone puts a pin in a map where you are. This means, do not use hotspots near your home. Do not use the same hotspot twice. Make sure the "map" of every hotspot you've used doesn't center on your home, or even the town you live in.
  6. Use TOR. It's not perfect, and I have my suspicious about government infiltration of the network. But it's FAR better than nothing. In addition, you should also use a VPN if you can. This is far more difficult though, since VPNs are generally not free. Check /VPN, for assistance in researching this topic though, I think there might be a few, albiet with limited bandwidth. If you need to buy a VPN, use bitcoin (/bitcoin), instead of your credit card. Reasons should be obvious enough.
  7. Avoid cameras, CCTV, and traffic cameras. This is especially difficult this day in age, but try to make an effort to anyway, without appearing suspicious. Maybe call off your upload / activity, if there were too many cameras. If your adversary is strong enough, you must assume that they will pinpoint the location you used, and long after you're gone, they might arrive on the scene to confiscate security footage from the surrounding area.
  8. Consider anti-facial-recognition makeup and clothing. Note, this only fools facial recognition software, and should only be used if circumstances warrant (aka, they already know who you are, and are looking for you). This type of behavior will INSTANTLY cause everyone around you to pay attention to you. A realistic silicon mask and makeup is probably a superior alternative, if you have access to that sort of thing, to make an old-fashioned disguise, but takes a bit more effort.
  9. In extreme cases, consider performing a surreptitious upload. For example, maybe you can leave your laptop in a bag, and have it automatically connect to a coffee shop's WiFi and perform a task and then disconnect, while you pretend to work on a paper, or chat up the cute girl with the glasses. If you are this worried though, you might be better off not even entering the building with the hotspot in the first place. If you need to put even more distance between you and your internet access, consider using a directional WiFi antenna. Naturally, you might want to build it yourself, as opposed to buying one on Amazon.
As you can see, possible methods for avoiding detection start to become increasingly ridiculous. Every measure has a countermeasure. You must determine the likely measures that will be used to find you, and focus on countering those. If you have the spare time, then take it a few steps further. But at some point, a budget for time, alabi windows, and resources avaialble to perform countermeasures start to become stretched thin.
Hitting The Fan
Despite being more careful than you thought humanly possible, there is always the possibility that will get caught. Maybe you leave your fingerprint on a spoon. Maybe a random camera catches your face. Maybe you brag about it on Facebook. Maybe your moment of doing the right thing was witnessed by a 192 megapixel camera with a wide angle lense, mounted on the bottom of a Cessna and flown in lazy circles around the city at an altitude of 8000 feet while recording everything within 30 miles, allowing law enforcement to rewind the footage to locate you at the scene, and then fast forward while tracking your movements to find out where you live.
I guess that last one was oddly specific... (link)
The point is, you need a plan for when things go south. Edward Snowden's plan was to fly to a country that doesn't have an extradition treaty with the United States. Most of us aren't going to need that extreme of a getaway plan, but picking a country you would flee to in such a hypothetical sitaution is amusing by itself. (Relavant Wikipedia Article)
Depending on the severity of your actions, it might be wise to leave the country BEFORE you publish your dirt. Make sure your passport is up-to-date, withdraw as much cash as you can comfortably / legally travel with, and transfer your remaining assets to a safe international bank. I'm not an expert on international finance, if you have enough assets you would likely want to speak to a lawyer to make sure your funds don't get frozen or confiscated.
For the rest of us who are not on the top of the international most wanted list, you may want to pre-plan a legal defense.
Or you could just take up a hobby. I hear handcuffing yourself in a duffel bag in your bath tub and padlocking it from the outside so you can practice escaping is a pretty fun and safe solo activity. (link)
submitted by primo_pastafarian to ShadowWar [link] [comments]

[Table] IAmA: I am Matt Mullenweg, co-founder of WordPress (18% of web!) and Automattic, ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2013-07-31
Link to submission (Has self-text)
Questions Answers
Hey Matt, I was at your State of the Word in SF and you talked about moving WordPress more towards being an application framework rather than a CMS or blog platform. What specifically do you have in mind for this (better settings API, developer features, etc)? And then if you could break backwards compatibility (which really isn't a option for WP), what would you really like to completely redo or add to WordPress? Thanks! First and foremost the most important things for a platform are stability, speed, and security. To do those well you need the ability to push updates and fixes as close to real-time as possible. And it needs to work in every language. User authentication, data and caching abstraction.
A lot of what people think of as platform stuff is actually at the CMS layer -- custom post types, taxonomy meta,
If backwards compatibility wasn't a concern I would rename all the inconsistent column names and variables to match our style guide, drop TinyMCE, simplify the user roles and capabilities system, replace widgets with page blocks, redo the admin menu system, denormalize the DB, flatten dependencies and deep hierarchy in function execution, and completely reorganize the code so the bare minimum of files are included with any given request.
After reading questions from all of the nice, well-meaning people writing WordPress as "Wordpress", do you wish reddit would implement capital_P_dangit(\)? ;) Yes! If anyone from Reddit sees this, would super-duper appreciate if we could get /WordPress capitalized properly. I can send copious amounts of swag, bourbon, and BBQ if bribes are needed.
Looks like that already happened. My link works, but if you click the link in the header it takes you back to the lowercase P. Probably just a field in a database somewhere.
How is it going with Bitcoin ? Haven't looked recently, will see if I can pull some numbers. I wish I had bought some Bitcoins before we introduced it, though. :)
Any stats ? 94 successful transactions so far, pretty low. I think it's more important philosophically to support it than it's been beneficial from a business point of view.
If you could wave a magic wand and instantly rewrite WordPress in any programming language, which would it be? Go. :)
Do you ever think "I could have been tumblr" ? Just the opposite, I'm very glad we're not Tumblr.
Hi Matt, I'm a long time WordPress dev (since day 1 moreorless) so thanks very much for starting it. Just wondering what your opinion of Ghost is? Link to www.tryghost.org. Link to www.fastcolabs.com
They say or imply lots of things about WordPress that aren't true. They've also done things like had a quote from me looking like I was endorsing Ghost on their Kickstarter page even after I asked them to remove it several times. (Lots of people were confused or thought it was a plugin for WP.)
What do you think of Drupal 8 ? :) Some cool stuff in there! I also keep an eye on Joomla and Concrete5. I find it really fascinating to watch other open source projects especially because we share much of the same background and philosophy, but make radically different decisions around things like backward compatibility and release schedule.
It's like watching birds that evolved from the same ancestor but on isolated islands and environments. I'm sure we do things that look completely crazy to Drupal folks, and vice versa.
Along those lines I was asked to keynote at the Joomla World Conference in November and it looks like I'm going to be able to make it.
Why is hello dolly still a default plugin? Do you have any statistics about how many people actually activate/use it? Have you personally written any other plugins? Hello Dolly is actually the 13th most active plugin, with an active userbase of about 16% of Akismet (the most-activated plugin), and about a third as popular as Jetpack. It's ahead of W3 Total Cache! Again this is not just installations, it's currently active.
Some of the other plugins I've been involved with are here on my profile: Link to profiles.wordpress.org
They're obsolete but at the time I was proud of Advanced Caching, Staticize Reloaded, and Cache Images and the early and since-rewritten work on bbPress, HyperDB, and Akismet.
How directly involved are you in ongoing development of core? Are you relatively hands on, do you ever drive decision making or do you leave it to the community? Would love a wooden WP logo, as long as it's not a fauxgo. :)
On a completely different subject. I'm as involved in WordPress development as I was 10 years ago, it just manifests itself in ways that tend to be a lot more behind the scenes and less visible, which I don't mind as I'm way more interested in things moving forward and the results than credit or recognition for any specific thing. (I get plenty of recognition regardless, don't need more.) The only downside is that folks who I don't work with on a day-to-day basis assume that my role at Automattic or WP is more as a traveling figurehead or "evangelist" which can rub me the wrong way sometimes.
I met you at WordCamp Chicago this year (I told you about a widget plugin that turns them into a post type and such). For 3.8 I'm going to take a swing at the release lead role again, which should be fun.
I created these wooden WordPress logos with my 3D Printer, I meant to give you one but I forgot about it. You still want one? The most important thing I've done since WP started, though, isn't in a line of code or a feature people use, it's getting the right people involved and creating an environment for them to thrive. It's the single most important thing any founder can do, whether of an OS project, a non-profit, or a for-profit company even though there's not a single thing you can point to as the result of it other than the overall success and movement of the project.
What are your favorite/most powerful/most surprising implementations of WordPress? My favorite are when people I admire use it, from Jay Z to Zeldman. In many ways what we do like a canvas, and it's a huge honor to see the creativity and beauty people bring to it.
Of all the WordCamp's you've been to around the globe, what was the most unusual location for the event itself and, separately, the after party? Oh by far and away the strangest location was Davao in the Philippines. I can't find any pictures at the moment, but my talk was essentially at a restaurant with a swimming pool courtyard -- the audience was on the other side of the pool from me, and the food buffet was behind me so when the Q&A got slow people would grab food. The PA system had an echo because I think it was normally used for karaoke. And then the bats came out!
Best after-party is hard to pick, but I had a great time after WordCamp Las Vegas which aligned with my 25th birthday a few years ago.
The Philippines is a wacky place. Oh, my people :-) I loved it and had a great time, including at the one mentioned above. :)
Of all the WordPress community memes, which one is your favorite? Link to twitter.com is pretty funny, and some days I miss WP Wank.
Recently I enjoyed #thingswpdailywouldpost and the response: Link to torquemag.io
Pretty much anything Mike Adams (mdawaffe) sneaks into the code, be it easter eggs or Ghostbuster references.
Mark Jaquith had some pretty hilarious ones but I can't find them at the moment, maybe other folks could post their favorites too. :)
Automattic has a lot of side projects (Gravatar, PollDaddy, etc) - What's next? There's always a struggle between doing new things or experiments under a new brand -- like VaultPress -- vs putting it under an existing brand. A lot of the things I've been thinking about we're going to put under the Jetpack brand, for example Jetpack Photon (CDN + dynamic image resizing and filtering) could be a standalone product, but decided to bundle it. So keep an eye on some big things coming to Jetpack, especially for Code Poets, people who use WordPress professionally.
What would you like to see us do next?
What individual do you think is the most under recognized contributor to the WordPress community at large? That's a tough one... I'm going to say the volunteers on the support forums. There are 2M+ posts there, and it's easy to forget that a huge number of WP users end up in the forums and get help that allows them to use the software when they wouldn't otherwise be able to.
I remember seeing a WordPress yearly theme of "WordCamps and WordPress Meetups". What should be the next year's area of focus for the Community? What areas would you like to see beefed up in the Community? Some themes that I thought might be good are "Women in WordPress", "Contribution and Documentation", "WordPress Evangelism", "Adopt an old plugin" to name a few. How do you feel about these? Those are all good, if I had to pick one it'd be getting the documentation going better on WordPress.org -- handbooks, function reference, training materials / syllabuses, and doing it all in every language and for every plugin/theme.
Hey Matt, what was the most difficult thing for you in starting your business and what do you think is the most important thing you have to know and/or to learn when you found a startup? The hardest thing for me was taking responsibility for the lives and families of others, those first few hires especially. It's why I originally raised funding even though we had revenue already, and why since then we've always focused on making the business sustainable over decades, not just the next tech hype cycle.
What's the best meal you have ever eaten (and photographed)? Hands down: Eleven Madison Park in NYC.
Recently I had a really special libation tasting menu at The Aviary in Chicago, which is from Grant Achatz the chef of Alinea, it was a cool experience at a table in the kitchen.
I'm constantly amazed by the coordination and efficiency of professional kitchens, I'm mesmerized when I watch.
PHP has matured a lot in the last few years, with new tools such as Composer and new frameworks such as Laravel. The relationship between this side of the PHP community and WordPress seems to be pretty strained. Are there plans to address this relationship, particularly with the new focus on WordPress as a web app framework? I think the PHP and WP community are coming closer together, I know it's something that Nacin has been spending time on and we've had more presence at PHP-focused conferences.
Thoughts on forking WordPress, a la jQuery? (Link to eamann.com. I don't think forking as described there is a good idea.
Multiple content areas - probably the most important CMS feature not baked into core. Will it ever happen? There's something around multiple content areas that could be really interesting we're going to start working on this year, hopefully ready by early 2014.
What do you see as the biggest challenge facing WordPress (in the context of competitive software or just un-met customer needs) for the next year? By far and away it's the high attrition rate of new users. We look at posting a lot in that context but I think it's far more important to look at customization -- theme discovery and tweaking, widgets, menus.
Hello Matt, what is your opinion about current state of PHP in general? Do you like any particular framework? Templating engine? Thanks. I think it's pretty great, would just love to see continuing development around performance. Nothing really in the language that's holding us back. Wish it was trendier with younger devs.
Hey Matt, why did you force the rest of us to suffer through images defaulting to a link in our posts (I understand that was your doing)? Youthful indiscretion!
What is your development setup (software)? Most of my time these days is spent with people instead of code. (For better or worse. :)) I love lists, and live on Link to simplenote.com .
When I code since I switched to Mac in 2011 I use Coda 2 and SFTP to a remote server rather than a local dev environment. nano on the server.
Apache or nginx? Nginx!
I find WP so much more user-friendly than the competition. Was that a conscious decision from the outset? Was it hard work to make it that way or was it just the way you guys did things? Do you have a warehouse full of useability testers or does it just come naturally to you guys? The first few users were friends of mine who weren't into technology at all, so from the start we needed to make it work for regular people. As we grow it's mostly just a matter of reminding ourselves of that, sitting down with them to see how they use the software, and anticipating their needs.
If something in the future interests you enough to make WordPress/Automattic part-time for you, so you can take on something else or contribute to another cause, what might it be? I'm really fascinated by micro-electronics, hardware, and the "internet of things" for lack of a better term. It's surreal to be approaching an age that resembles the sci-fi I loved as a child.
That said, I can't imagine not working full-time on WordPress/Automattic, I feel too strongly about our mission, impact, and potential.
What's your favorite beer? Link to imgur.com. Link to cloudup.com
I see a lot of desperate web development companies locally that try to stress that Wordpress is insecure and shouldn't be used. What would be the best thing to say to people like that to shut them up? Some of the largest and most important publishers in the world rely on WordPress. (Show them the showcase.) If WordPress was insecure we'd see it on the front page of nytimes.com, wired.com, and cnn.com. :)
Hi Matt, have you read Chris Lema's blog post. What is your response? I have. It's also funny because I think Gartner is about to come out with a "magic quadrant" that puts us in the crappy quadrant (low vision and ability to execute). Their leaders? Adobe, Sitecore, SDL, Oracle, HP, Opentext...
I completely agree with Chris on all the ways that enterprise currently works, and their concerns. (People assume because we choose to do things differently that we don't understand the other side.) But I'm not willing to compromise getting better software into the hands of users as quickly as possible, if that means Gartner thinks we're a visionless niche player so be it.
We've done long-term support branches before, it was a big development burden and almost no one used it or cared. There will be businesses that embrace keeping their technology moving at the speed the web does, and there will be those that go out of business and become irrelevant.
•Will you ever support multiple languages in the WordPress core? No plans for multiple languages in core, sorry.
•What do you think of new writing platforms like Quip and Editorially? Will the WordPress post editor ever have any of those 'team' features? I really dig the new writing platforms, I do think we'll get some of those team features if not in core than in Jetpack.
I heard a rumor Matt switched back to QWERTY. True? Not true, still typing Dvorak, though last year I was beat on speed for the first time by Helen Hou-Sandi, who types QWERTY. She's speedy, and if she switched to Dvorak she could probably win world champs. :)
Hey Matt, where do you think the future of the independent WordPress news community lies, with your recent purchase of WPTavern and the recent sale of WP Daily to WP Engine? Do you think there is a space for an impartial WordPress news website? *edited for correct spelling! I'm glad that new ones are being started as fast as old ones are shutting down. There is some really interesting stuff going on in the community and I think there's space for real journalism and strong commentary.
What one major thing would you like to see changed/fixed/updated in WordPress core? The fact it doesn't work well on mobile devices.
How do I convince my boyfriend, who wants me to keep his site in ASP.NET (he's a programmer, I'm a designecoder), to install WordPress? I'm not even allowed to use PHP! :( The best way I've found to convince people, even as the founder, is just showing examples. That's why we created the showcase: Link to wordpress.org
Find out which musicians, celebs, authors, etc he writes and see which of them are on WordPress and bring it up casually in conversation. (We have huge adoption from creative folks.)
Best BBQ of all time? I hope I haven't had it yet. :)
Are open source contributions a prerequisite to work at Automattic? No, but they get you to the top of the list when we're reviewing applications. (I know, I look at every incoming resume.)
Would you consider Automattic the "Redhat of WordPress"? Without a doubt. ;)
Do you think an app store for plugin and themes built with high quality standards and framework, could be a good solution for WordPress end users? The plugin directory is an app store where everything is free.
Would having paid stuff there make it better? I don't think so.
Why do you feel thats different for themes - premium themes are available via the themes directory. (I've never bought one of those so I don't know if the comparison is valid) Design is inherently valuable in its scarcity, functionality is valuable in ubiquity.
It's unlikely that we'll ever want to put a popular theme into core, but fairly likely it'll happen for a popular plugin.
Collaboration is more important for plugins than themes, and money from scarcity balkanizes development.
Did you ever feel like you couldn't continue with your project? Is there any advice you have for small business startups? Covered advice here -- Link to www.reddit.com
There have absolutely been times I felt like I couldn't continue, both with Automattic and WordPress. You have to take the lows with the highs and stick with what you believe in.
Hi Matt, I have been using WordPress for 10 years, make most of my living from it, and will always love it. Thank you for that! It is by far the easiest way I have found to build websites that my clients find easy to use. I see the reasons why WordPress does not use more modern coding practices and tools and appreciate the need for backward compatibility, but wonder if you ever see the code base moving forward to a time when developers can use the newest features of PHP, best coding practices (i.e. testing), and the great tools that are available these days, like Composer. Do you think there will ever be some kind of fork or offshoot of WordPress that functions as an application development framework, since so many developers are using it for that these days? Thanks :) I disagree with the premise -- WordPress does use modern coding practices. People assume that supporting say an older version of PHP or MySQL holds us back far, far more than it actually causes any trouble. Supporting older browsers is a way bigger deal.
Our biggest challenge is figuring out the user side of things, the front-end code. How things should work for a user rather than how they should work for a computer.
What does your average day look like and how do you manage so many different projects? I spend more time on Skype (text chat with colleagues) than I would care to admit. Between that and P2s ( Link to p2theme.com ) I can easily fill eight hours in a day. As the company has grown to over 180 people there is a huge amount of content and activity to keep up with.
Hey Matt, how many hours you work on an average day? It's hard to say because I don't really consider what I do work, the hours just melt away.
I find I'm most productive first thing in the morning when I wake up, usually around 7am but a bit later if it's a cloudy morning, and I generally run out of steam around 11:30pm that night.
Some days I'm traveling though I might only have 4-5 hours at a computer and can get a similar amount done.
I find I'm generally more creatively charged the following day if I'm able to unplug at night, which is one reason I like jazz festivals (I try to go to Montreal every year) because I can work during the day and check out shows at night.
Any chance of a comment-spam filter being built into core? Akismet is great but has a lot of hurdles for a new user (Activation of the plugin, Registration on Wordpress.com, Registration for API key) and most just don't do it, contributing to the problem. I agree with Viper007Bond -- anything we did in core like Cookies for Comments would become completely ineffective within a day. Those only stop dumb bots who have easier places to spam.
Link to markjaquith.wordpress.com
off, love you, your ethos, your company. If you figure it out, let me know. :)
My question: how do you plan to get "normal" people to update their blogs as often as they do their Twitter and Tumblrs? But seriously, I think it's all about removing friction (every second loading and extraneous click) and becoming part of people's habits, which is one of the reason I spent a fair amount of time on triggers and habits at the State of the Word this year.
any plans to launch a Premium paid version of Photon service with more features? Not on features, we'll make anything new there free to everybody, but might have a paid tier for top 1% of users by bandwidth/usage. But probably a few years from that, plenty of bandwidth and CPU here in the meantime, and it's just getting cheaper and faster.
Find a new boyfriend maybe? His judgement is clearly lacking. Ha!
Which features are available on other CMS that you would like to see in WordPress? I really like some of the drag and drop layout things folks like Squarespace and Weebly do. I think we have so much we can do to improve customization.
Hi Matt ! I know you've advocated for water causes in the past. Do you have plans for future charitable/philanthropic projects? Thanks for doing this. My big contribution this year has been to the Bay Lights project: Link to thebaylights.org
Haven't decided about next year yet...
What do you think about App websites/themes that seem to be using WordPress as the choice of CMS, do you think WordPress is a good platform for these types of sites? Scaling, Performance issues considering? Examples, Dating sites, Crowdfunding sites, Job board, etc. I think it's a great framework for anything content-driven. For things like messaging that don't map well to WP's data model, you can still do it just make some new tables, don't try to shoehorn it in the standard ones.
Which verticals will you be tackling next with WordPress.com? Please share your sensitive corporate information ;) Putting a hold on new verticals at the moment, going to try and go deeper on some of the existing ones first.
Hi Matt, now as most people know, you are very much a fan of open source and the GPL license. However, is there anything you do NOT like about open source? Also besides Wordpress (or its themes/plugins), are there any open source projects you like that aren't related to Wordpress or Automattic? I think the things that make open source incredibly collaborative and ultimately eat the world can also make design and big shifts difficult. WordPress has made some major shifts over its decade of life and grew as a result, but those pivots are harder to do the more successful we are because sometimes it means doing the opposite of what we did to become successful in the first place.
Automattic's been tweeting a bunch of new hires lately, and quite frankly doing a great job of making me jealous. Has the 90% of employees being remote ever caused real problems or friction? And how do Happiness Engineers work: do they help people out over the phone, or is it strictly a text over the Internet thing? Remote distributed working has been working great and we plan to continue it for the foreseeable future. HEs mostly work with email, but we're introducing a ton more live chat and phone work.
Say you retired your involvement from WordPress, what other projects stimulate your interest and challenge you? I think for many of us, all good things come to an end and considering your success of WordPress, what other projects (offline or online) would benefit from your involvement? I think I got this one here -- Link to www.reddit.com
Have any companies ever tried sueing you over silly software patents? Yes.
Hey Matt, you talked about profitability on TWiST. How do you plan on increasing revenue at Automattic? (I'm especially interested in how open source projects like Wordpress could lead to profitable companies) Edit: (changed "profit" to "revenue") I think it largely looks like the things we're doing today, just executed better and with a wider audience aware of them.
Hi Matt, besides traveling and photography, what are some of your other non-WordPress interests? Pretty tame: Music, especially jazz and hip-hop (J Cole, Childish Gambino, Kendrick Lamar, Weeknd). Wearable tech. Vinyl records. Food (trying to cut down on this). Reading.
With growing popularity Wordpress has, in the past few years, become increasingly prone to hack attempts, brute force attacks, etc. Is there anything being done to address security concerns? I think we're a lot more secure than we were a few years ago, to be honest.
Hey Matt, I watched the live stream of your State of the Word on the weekend and you talked about leading development of WordPress 3.8 and that it would be "experimental". What kind of features do you have in mind? New interface with MP6, new theme with 2014, and hopefully some work on the editor and widgets.
As someone who's making a living thanks to the WordPress, this might be the only occasion for me to say Thank you Matt. You've truly changed my life. Thank you. :) Hug a WP contributor next time you meet one, there are hundreds of people active every day that are even more crucial to WordPress than me.
This is my personal favorite. ;) Edit: Whoops, imgur mirror so we don't kill ipstenu's site. That is indeed amazing. :)
Contribute. Agreed!
Sup Matt, Hit me with some Akismet stats. We're blocking 40-50 million more spam every day than we were last year. The volume of spam has been growing unusually fast.
Hi Matt, what do you think about this 400,000 Euro Site - :D. Link to www.carlabrunisarkozy.org. Link to www.connexionfrance.com. WordPress is priceless, so 400k euros isn't a bad deal, but they could shop around for a better consultant. :)
Last updated: 2013-08-04 23:08 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

BestChange Site  Get Unlimited Click Trick  Earn Free Bitcoin 0.050 BTC minimum $300 USD Per Day Eobot Mining Gpu (2018) Unsere finanzielle Zukunft. Bargeld, digitales Geld, Crypto, JPM Coin vs. Bitcoin. Súbete a la Ola de las Cryptomonedas Best Bitcoin Mining Software That Work in 2020 🍓 - YouTube

Password requirements: 6 to 30 characters long; ASCII characters only (characters found on a standard US keyboard); must contain at least 4 different symbols; Welcome to the Web application of Telegram messenger. See https://github.com/zhukov/webogram for more info. Securely download free software and free-trials of paid software. You can filter software by operating system, licenses and categories. Tim Pool. 10 hours ago. IRR1-Is4USc. 1654 3:04. Cyclists cop WHOPPER FINE for being hungry at the wrong time in Melbourne. Rebel News. 10 hours ago. e3WZO7sJ3iE. SHOW MORE . This is where the latest videos from your subscribed channels will appear. To subscribe to a channel you will need a registered account. If you would like to create an account and join the BitChute community then click on ... Статьи по разделам. Рубрики: 100x100 px, 128x128 px красивые и гламурные анимированные и статичные аватары девушек, аниме аватары, мультфильм-аватары, эмо аватарки и аватары знаменитостей Рубрики: 100x100 px, 128x128 px, 64x64 px красивые и ...

[index] [8616] [16365] [19377] [24321] [42340] [18280] [48423] [23926] [6793] [7275]

BestChange Site Get Unlimited Click Trick Earn Free Bitcoin 0.050 BTC minimum $300 USD Per Day

18- year-old Erik Finman made his own rules when he invested in Bitcoin and left high school to start his own business free btc - bitcoin price increasing - earn free bitcoin (up to 1 free btc) Get Free Satoshi every 15 minutes https://bit.ly/3bonxny free btc - you can earn free btc by using the cash app lolli ... free litecoin,free litecoin app,free litecoin hack,free litecoin app hack,litecoin hack,free litecoin earning app,earning app hack,bangla,app hack,earn hack,earn money ,coinbase earning app 2020 ... Es ist gut, dass die JP Morgan Chase Bank ein eigenes Crypto Asset, den JPM Coin herausbringt. Bestätigt es doch, dass zumindest in deren Augen Blockchain und Crypto eine Zukunft haben. Das der ... How to Use Simple Mining OS SMOS GPU Miner Software - Duration: 18:00. ... how to mine bitcoin using computer/laptop cpu and gpu (paano kumita ng pera (bitcoin) - Duration: 11:17. Trending Videos ...

#