Bitcoin Mining Difficulty Drops 9% to January Levels

Bitcoin Statistics

There was a time when you could mine Bitcoins using any CPU, as the difficulty was just 1.
Close to 64% of Bitcoin wallets have not been used (called ghost wallets) since their inception.
It took five years (from 2009 to 2014) for Bitcoin price to reach the $1,000 milestone, while it took only one year (from January 2017 to January 2018) for the price to increase by $13,000.
The US dollar and the Japanese yen are the two leading currencies to be exchanged for Bitcoin.
Bitcoins are so popular that they get a social media post every 3 seconds.
submitted by Herr_Vladimir to u/Herr_Vladimir [link] [comments]

The deepest report: Bitmain's self-help history

The deepest report: Bitmain's self-help history
The original intention of this article is to let readers understand the causes and consequences of Bitmain internal fighting, but after writing it, I found that it is not so much internal fighting as it is a long history of self-help.
The story is very long. Let's adjust the timeline to the eve of December 17, 2018. That was one of Bitmain's most critical moments and the beginning of a series of subsequent stories.
1. Self-immolation In September 2018, Bitmain's financial department warned management that the company's cash flow has become very tight and operating costs must be reduced to allow the company to continue. The blockchain unicorn, which is valued at more than 15 billion U.S. dollars, is crippled in the run and struggling to break the corner.
In 2017, Bitmain made a profit of 1 billion US dollars In the first half of 2018, Bitmain made a profit of 1 billion US dollars Three rounds of financing, a total of 800 million US dollars Net assets should exceed 3 billion U.S. dollars In September 2018, Bitmain had tight cash flow and was on the verge of bankruptcy
A simple comparison, it is not difficult to see that Bitmain's ability to make money is incredible, and its ability to burn money is even more extreme.
How does Bitmain burn money? Do you pour cash into gasoline and burn it, or hire a lot of employees to stuff the banknotes one by one into the shredder? The actual situation is closer to the latter.
The following data can help readers quickly learn Bitmain's money burning skills.
At the beginning of 2018, the entire cryptocurrency market has entered a bear market, but Bitmain's monthly operating costs have been rising wildly. Operating costs have risen from 10 million US dollars at the beginning of the year to 50 million US dollars at the end of the year.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
Operating costs are just the tip of the iceberg. Excessive chip trial production can become a classic case of project management courses. Readers who pay attention to Cryptocurrency mining can easily find that Bitmain is still working hard to clear the inventory of Antminer S9 in 2019. As the co-CEO, Ketuan Zhan did not listen to the advice or even warnings of the Finance Department, insisting on the implementation of Excessive chip trial production, resulting in a large accumulation of inventory and tight capital turnover. Another CEO, Jihan Wu, once revealed that the loss of Excessive chip trial production to the company was approximately US$1.5 billion.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
The BM1393 chip incident is even more incredible. Chip expert Ketuan Zhan invested a lot of money on a failed chip, and finally failed again. From 2017 to 2018, Bitmain has failed Trial production of mining machine chips at least 4 times, including 16nm, 12nm and 10nm chips, of which 16nm Trial production failed twice, thus losing at least US$1.2 billion.
It is rumored that Bitmain still holds a billion U.S. dollars worth of cryptocurrency in a state of floating loss. In view of the rebound in the market in 2020, we will not comment temporarily, waiting for the correct answer from the cryptocurrency market. But the losses pointed out in the previous article are all irreversible.
2. Sole power
In September 2018, Bitmain's management realized the seriousness of the problem. It turned out that the company's money could be squandered. As a result, the management began to discuss self-help plans, and the most reasonable and effective way was obviously to lay off employees.
The probation period for newly hired employees at Bitmain is half a year, and the probationary salary is 100% of the official salary, there is no difference. Once layoffs are made, new employees who have not passed the probationary period will be the main layoff targets. The department managed by Ketuan Zhan will face large-scale layoffs. The layoff plan is strongly opposed by Ketuan Zhan. Bitmain can only temporarily abandon the layoffs and replace it with continuous reductions. For marketing and travel expenses, a budget committee was established to strictly approve every expenditure. At the same time, employee benefits, such as reimbursement of taxi expenses, breakfast supply, snacks and drinks, etc., have also been abolished, and even the tradition of giving employees 400 yuan worth of BTC/BCH every month has been stopped.
In the face of huge cash flow pressure, trivial savings is obviously of no avail. Soon, the management again discussed the layoff plan, and it has reached the point where it has to be laid off.
In December 2018, Jihan Wu began to organize all entrepreneurial veterans and business backbones to persuade Ketuan Zhan to agree to layoffs, but Ketuan Zhan still insisted not to layoffs. The persuasion process was very unsuccessful. After many meetings and intense debates, Bitmain executives were caught in a dilemma of wasting time with Ketuan Zhan.
In this process, the shortcomings of the dual CEO system began to appear, and the relationship between the two CEOs gradually deteriorated.
On the night of December 16th, Ketuan Zhan reconvened the management meeting, and more than 30 managements who were present were asked to hand over their mobile phones. At this time, Jihan Wu was on a business trip in Hong Kong and was busy with listing related work.
In the meeting, Ketuan Zhan's core content was three items:
(1) Bitmain cannot have two CEOs, only one CEO and must be Ketuan Zhan. Ketuan Zhan said that he met an old leader during a business trip. He hadn't seen each other for many years. The old leader suggested that the company can only have one CEO, and it must be him. Ketuan Zhan feels that this is a kind of fate, an opportunity given by God.
(2) Ketuan Zhan believes that the company's cash flow problems, the biggest responsibility is the inability of the financial department. To prove his point, Ketuan Zhan announced Bitmain's financial data at the meeting. In the evening, employees in Taiwan began to post messages on social media, saying that the company's capital chain was broken and the top management was split.
(3) If Ketuan Zhan is not supported, the option will be cancelled and the equity will be voided.
Hearing about this, Jihan Wu, who lives in Hong Kong, sent a WeChat message to the management who are attending the meeting.

https://preview.redd.it/zkj2d44tqid51.jpg?width=1080&format=pjpg&auto=webp&s=9251c1f7308e155d7911d5969e71091a5ad5e14a
On the afternoon of December 17, 2018, Jihan Wu returned to Beijing to negotiate with Ketuan Zhan all night, and finally reached a consensus in the early morning. Bitmain co-founder Yuesheng Ge announced the results of the negotiations. Jihan Wu and Ketuan Zhan ceased to serve as CEOs, and Haichao Wang served as CEO. Jihan Wu voluntarily backed down and Ketuan Zhan served as chairman.
The "12.17 Incident" had a very bad impact on Bitmain, especially the disclosure of Bitmain's financial status, which caused vendors to start dunning. The loan that had just been negotiated with the Bank of Beijing was cancelled the next day. Jihan Wu's resignation as CEO caused an uproar in the industry, and it became a hot topic among Cryptocurrency mining, blockchain practitioners, and investor communities. The media focused their interpretation on Bitmain's series of incidents, and generally looked down upon its ongoing Hong Kong IPO, believing that the high-level changes had already signaled the failure of the IPO in advance.
On Christmas December 24, 2018, Bitmain finally began to implement the layoff plan. This long-delayed “correct decision” was achieved after a stalemate for nearly three months. The AI ​​teams in Beijing, Singapore, Taiwan, and Shanghai have laid off more than 50% of their employees. The Israeli R&D center was closed and Shenzhen New Species Technology Co., Ltd., which had been acquired for only ten months, was dissolved, and all employees were laid off. Copernicus, Bitmain's top blockchain development team, was not spared and was wiped out in this layoff. Copernicus and some of the laid-off employees joined the new company Matrixport co-founded by Jihan Wu and Yuesheng Ge, headquartered in Singapore.
3. Past events when starting a business
After the "12.17 Incident", Jihan Wu gradually faded out of Bitmain's management affairs and turned his attention to the IPO and new company. And this is one of Jihan Wu's major mistakes, he began to let Ketuan Zhan manage Bitmain alone.
In fact, as early as 2013, Jihan Wu planted hidden dangers.
Jihan Wu, an investment banker, was the earliest translator of the Bitcoin white paper. He began to get involved in the cryptocurrency mining industry in 2012. The disappearance of Kaomao and Nangua Zhang's ticket skipping led Jihan Wu to decide to develop his own chip.
In 2013, Jihan Wu established his own mining machine company. Together with Yuesheng Ge, who was only 20 years old, he found Ketuan Zhan, an integrated circuit designer of the Chinese Academy of Sciences, to create the protagonist of this article, and later the digital Cryptocurrency mining giant, Bitmain.
Jihan Wu promised Ketuan Zhan that every time a mining machine chip was successfully developed, he would give some shares to the Ketuan Zhan team. At that time, the company founded by Ketuan Zhan was on the eve of falling apart. In order to regroup the team, Ketuan Zhan promised to share half of his shares with the team members. Unfortunately, this is just a bad check. With the rapid development of Bitmain and higher and higher valuations, the expanding Ketuan Zhan almost monopolized all the shares.
Like many startups, Bitmain encountered many difficulties in its early days, and many jobs had to be done by the boss. For example, in the chip design and production process in the second half of 2013, Bitmain was caught in a dilemma of insufficient funds. Jihan Wu personally raised funds and met with TSMC’s sales to persuade TSMC to accept the production needs of a start-up company. Jihan Wu also participated in the selection of the thermodynamic parameters of the heat sink in the Antminer S1.
In 2014, Jihan Wu discovered that this company was independently operated by Ketuan Zhan, which had huge problems. Forcing Jihan Wu to continue to participate in company management.
At that time, Bitmain's mining machine chips had just achieved a certain lead in the standard design process. Jihan Wu believes that the next step must be to develop full customization technology, but Ketuan Zhan plans to invest resources in the research of mobile payment chips.
Ketuan Zhan met a mysterious person from the Party Central Security Bureau who claimed to be able to manipulate the Party Central Committee’s decision-making process for the next generation of mobile payment cryptography standards, but this direction is likely to lead to the fact that Bitmain has just gained the lead in the mining machine market. Regained.
Jihan Wu said that as a graduate of the School of Economics, with a little memory of his high school stage and the knowledge reserve of a computer technology amateur, he retrieves various materials and papers every day, learns theories related to full customization, and goes to Ketuan Zhan conducts persuasion work there.
Fortunately, in the direction of full customization technology, Ketuan Zhan finally listened to Jihan Wu's opinion. Bitmain quickly integrated the technical experts from the United States and Russia introduced by Jihan Wu, which greatly improved the design level of chips and complete machines.
In 2015, Jihan Wu suggested that Ketuan Zhan consider the direction of artificial intelligence. But Ketuan Zhan is not here, he prefers the CPU direction. After staying asleep at night, coupled with in-depth analysis by the Bitmain investment team, Ketuan Zhan finally agreed with this direction. It is a pity that after the Tianshi Chen brothers made major breakthroughs in theory and practice, Bitmain officially invested in the relevant direction, and it was still a step behind.
In the two years from 2016 to 2017, Bitmain's business performance has achieved rapid development, becoming a unique super unicorn in the blockchain industry. According to Froth & Sullivan, in 2017, Bitmain Technology Holdings was the second largest fabless chip design company in China and the tenth largest fabless chip design company in the world, and the fourth largest fabless ASIC chip design company in the world, accounting for 74.5% of global cryptocurrency market share.
However, the huge crisis has long been buried in the early days of entrepreneurship.
Ketuan Zhan's decision on major directions revealed his weakness of extremely lack of business understanding. But every mistake he made was blocked by the company's core employees. His overconfidence in his management ability led to the gradual intensification of conflicts, and the management differences between the two founders became more serious.
4.The giant gets lost
The contradiction between the two broke out on December 17, 2018. Ketuan Zhan used extreme means to force the management to compromise with him by canceling the option, so as to achieve the goal of sole control of the company. Jihan Wu returned to Beijing from Hong Kong overnight and negotiated with Ketuan Zhan all night. In the end, the two resigned as CEO. Jihan Wu retired. Ketuan Zhan has the exclusive rights of chairman in exchange for the implementation of the layoff plan.
Jihan Wu's voluntary retreat has intensified Ketuan Zhan's management to do whatever he wants.
A Bitmain employee commented on Ketuan Zhan's management skills, summed up in two letters-SM.
After becoming the sole helm of the company, Ketuan Zhan quickly "rectified" the department in charge of Jihan Wu as the chairman of the board. He guided the sales of mining machines at the dinner, and pointed out that the sales performance is not due to the sales staff. Ability is strong, but the company provides opportunities. Take two sales leaders as examples, saying that if the company hadn't given the opportunity, they would still be losers. In addition, Ketuan Zhan also instructed the sales staff on how to toast and imparted the wine table culture and experience.
After the meal, Ketuan Zhan came to the conclusion that the quality of Bitmain sales staff was too poor, and Huawei’s blood needs to be injected to drive the company’s progress. Soon, the marketing and sales director from Huawei officially took over Bitmain, opening the era of brand premium for Antminer.
In order to further understand and guide the sales work, Ketuan Zhan asked to meet the customers with the sales staff. During the negotiation process, Ketuan Zhan had a heated discussion with customers on the issue of Chinese and Western medicine, and had also forced the sales staff to be able to ship 10,000 machines due to insufficient production capacity.
Although the requirements for sales personnel are strict, Ketuan Zhan has provided a lot of convenience for "Mainland Ark". In addition to selling mining machines at a more favorable price, Bitmain's mining machines are also hosted in Ming Wang at a higher price than the market price. Mine. It is reported that both Ketuan Zhan and Ming Wang are shareholders of Ark.
The new sales strategy of Huawei's executives has also brought very obvious changes to Bitmain. The self-righteous brand premium reduces the price-performance ratio of Antminer, causing competing products to eat away at Bitmain's market share. Later, Bitmain found that the strategy was wrong and started to cut prices, and found that the mining machine market was saturated and the purchase demand of miners had decreased.
More dangerous than the sales strategy is that the technical advantages of Antminer are being chased by competing products, and even overtaken. At the same time, the two mining pools under Bitmain also lost their first and second positions. The AI ​​business, which Jihan Wu placed high hopes and Ketuan Zhan personally supervised, became a laughing stock in the industry. Not only did it fail to make a profit, it almost brought down Bitmain.
Blindly introducing senior executives from Huawei to occupy important positions completely destroys the company's internal cultural foundation. The bureaucracy within Bitmain began to corrode from high-level employees to ordinary employees. Ketuan Zhan is not aware of this. He is still keen on recruiting Huawei employees, imitating Huawei's organizational structure and strategy, letting HR do sales and R&D personnel to do HR.
The organizational structure adjustment in October 2019 was the fuse for Ketuan Zhan to completely anger Bitmain management. This time, Ketuan Zhan completely marginalized Bitmain’s veteran employees, and suddenly promoted some of the “airborne soldiers” who had just joined the company to the position of person in charge, which caused the former person in charge to report to the new employees. The two managers who were originally equal The hierarchy becomes the subordinate relationship, the operation and development of different business lines are merged into a large department, the upward reporting process becomes more cumbersome, and the relationship between employees becomes delicate.
5. Headwind
On October 29, 2019, Jihan Wu urgently held a staff meeting. Prior to this, the legal representative of Beijing Bitmain has been changed to Jihan Wu, including the parent companies Hong Kong Bitmain and Cayman Bitmain. Jihan Wu stood in the lobby of Building 25, B1, announcing that Ketuan Zhan has been relieved of all duties. Any employee in the Bitmain Group shall no longer execute Ketuan Zhan’s instructions and participate in any meetings convened by Ketuan Zhan. If there is any violation, the company will demotion and expel the company based on the severity of the circumstances. If losses are caused to the company, the company will be held accountable.
Jihan Wu's speech is very long, which can be summarized as follows:
(1) Ketuan Zhan has been relieved of all duties. Also expelled from the original Huawei company HR Zhi Wang introduced by Ketuan Zhan at the end of 2018. Zhi Wang’s reputation on Bitmain was extremely poor and was ridiculed by employees as "nine thousand years" (In ancient China, the emperor was called "ten thousand years old", and the prince was "eight thousand years old." However, in the Ming Dynasty, there was an eunuch who caused harm to the country and the people. He called himself "nine thousand years old", meaning that he was only A little lower than the emperor's level).
(2) Ketuan Zhan's ability to control the company's option incentive plan has disappeared, and it is no longer possible to cancel employees' options at will.
(3) The organizational structure adjustment plan led by Ketuan Zhan was suspended.
(4) We are optimistic about the future of AI business, but the premise is that the main business can continue to make profits in order to support the company's continued investment in AI business.
In the speech, Jihan Wu also told employees the whole story of the "12.17 Incident" and bluntly said that the company is not in good condition. If no measures are taken, Bitmain is likely to go bankrupt in three quarters and he must come back to save the company.
At this time, Ketuan Zhan, who was on a business trip in Shenzhen, finally experienced the situation of Jihan Wu in the "12.17 Incident".
After the official return, Jihan Wu began to clearly point out the company's various problems in operation and management, and went deep into each business line to understand the situation. In the mining machine sales department meeting, employees spoke enthusiastically, reflecting on the difficulties and opinions encountered in the work, the marketing and sales director from Huawei asked with a surprised look, "Why didn't these issues be reported to me before?", and soon , The director was interviewed and "voluntarily resigned."
On November 2, 2019, Jihan Wu announced a salary increase for all employees. Bitmain’s last salary increase dates back to 2018. In principle, Bitmain has two salary increases every year.
On November 7, 2019, Ketuan Zhan spoke on social media for the first time, describing his hardship in starting a business, and condemning Jihan Wu for “stabbing a knife in the back”. At the end of the article, he also set himself a KPI for 2020, that is, the mining machine market share will reach 90%, and the AI ​​business will earn 1 billion.
But Ketuan Zhan's majestic plan did not make Bitmain employees feel emotional, but ridiculed him instead. Employees exposed that he insulted employees, advocated Chinese medicine, believed in Buddhism, drank in meetings, practiced Qigong...
However, there is less than half a year before the halving of Bitcoin production, and the cryptocurrency market shows no signs of recovery, which makes Bitmain management very anxious.
On January 6, 2020, Bitmain ushered in another round of layoffs, with a layoff ratio of about 1/3. This time the layoffs have caused many employees who have just increased their salaries to feel very grieved. On the one hand, they were looking forward to Jihan Wu's return. On the other hand, the compensation for this layoff was less than 18 years.
Ketuan Zhan, who has been unable to enter the Bitmain office area, once again spoke on social media and firmly opposed to layoffs. We do not need to lay off staff and we cannot commit suicide.
During the Spring Festival, Covid-19 broke out. Mainland China has begun to extend the Spring Festival holiday and advocate working from home. Under the chain reaction caused by Covid-19, most companies have chosen to cut salaries or even lay off employees. In the first two months of 2020, China's exports fell by 17%, U.S. stocks were broken four times in a row, Bitcoin plunged 40% in 24 hours on March 12, 2020, and crude oil futures fell by 300% on April 20, 2020...
Obviously, Jihan Wu can't predict, but this layoff seems to be the right decision again. In addition, from January to April 2020, Bitmain's revenue exceeded US$400 million amid the spread of Covid-19 and the collapse of the financial market.
6. Fight to the death
When Jihan Wu tried to get the company back on track, Ketuan Zhan was not helpless. On April 28, 2020, Ketuan Zhan finally rolled back the legal representative of Beijing Bitmain to before October 28, 2019 by repeatedly submitting administrative reconsiderations, and restored his status as a legal representative.
On the morning of May 8, 2020, a piece of news about Bitmain quickly appeared on the real-time hot search rankings, and even dominated the headlines of the day. At window 52 on the second floor of the Haidian District Government Affairs Center, when Ketuan Zhan, the legal person of Beijing Bitmain Company, was receiving the business license, a group of unidentified people snatched the business license from the industrial and commercial administrative staff. A source at the scene said that the number of unidentified people in the group was about 60 people, of which Luyao Liu was directing at the scene.
This is a skillful piece of news. It first leads readers to think that Ketuan Zhan is a victim, using 60 people to grab business licenses as the focus. The masses accused Jihan Wu of lawlessness, but ignored whether the government affairs center could have 60 personnel. As for Hong Kong Bitmain to have the right to appoint a representative to obtain a business license, this is a deeper level of thinking.
The follow-up report restored the real situation at the scene. Only more than ten people were present, and both sides were equipped with security personnel. Bitmain employees also broke the news in the circle of friends, claiming that Ketuan Zhan's bodyguard had injured Bitmain's authorized person, and said in a threatening tone, "Be careful!"
However, the subsequent plot reversal did not have much effect. Jihan Wu's reputation has been greatly affected. From a bloody soldier who rescued the company in trouble to a lawless criminal, it can be said to be a world of war. do not.
Ketuan Zhan, who succeeded in the first battle, began to counterattack Bitmain continuously. On the afternoon of June 3, 2020, Ketuan Zhan led a team to pry open the back door of the Beijing Bitmain office and formally occupied the deserted Beijing headquarters.
On June 4, 2020, Ketuan Zhan called on Bitmain employees to resume work and promised to expand the company's market value to more than US$50 billion within three to five years. After that, Ketuan Zhan began to contact employees by phone, trying to acquire the options in the hands of employees at a valuation of 4 billion US dollars.
Subsequently, Ketuan Zhan recalled Huawei's executives and issued a series of personnel appointments and removals. As of June 9, 2020, Ketuan Zhan has successively eliminated CFO Luyao Liu, and Wenguang Wang, the head of the mining center. Luyao Liu is responsible for controlling Bitmain's IPO plan. He also appointed Yanwu Ma as the HR director, Gang Ren as the head of the mining center, Yonggang Sun as the head of the supply chain, Ling Gu as the financial director, and Bin Zhu as the head of the mining machine business department. Bin Zhu is the senior executive of Huawei who was interviewed and left as mentioned in the previous article. During his tenure, he reduced Antminer’s 90% market share to 50%, and received a large number of complaints from miners. Internal employees once speculated that he might be Compete against the spies sent by the company.
In addition to recalling senior executives of Huawei, Ketuan Zhan also urged employees to return to work. They can receive a bonus of 10,000 yuan when they return to work on the same day, which is only half the next day. Ketuan Zhan showed a very kind side. Every time the elevator door is opened, Ketuan Zhan's hot gaze can be met, shaking hands, taking photos, and receiving money. As there is no personnel information, Ketuan Zhan does not know whether the person receiving the money is a Bitmain employee, and these people did not resume work the next day.
The effect of gentleness was not good, Ketuan Zhan began to force employees to return to work. Seeing that there are still very few respondents, Ketuan Zhan threatened employees through SMS, phone calls, EMS, emails and other harassment, issued multiple threats such as termination of contract, suspension of payment of social insurance, suspension of wages, and even used personal information saved by employees to form a group of employees. Domicile threats, requiring employees to perform "work handover", trying to force employees to return work computers, etc.
On June 10, 2020, the media revealed that Ketuan Zhan had controlled Bitmain's Shenzhen factory and prohibited employees from delivering normal shipments to paid customers, which caused difficulties in the operation of the Bitmain mining machine department.
On June 13, 2020, Hong Kong Bitmain, the parent company of Beijing Bitmain, issued a statement accusing Ketuan Zhan of signing a "Sales Agency Agreement" with the Ark Data Technology Co., Ltd. in which it holds shares, in an attempt to embezzle Beijing Bit's assets.
On June 17, 2020, the media revealed that Ketuan Zhan started selling 14,000 T17+ series mining machines at low prices.
On June 20, 2020, Hong Kong Bitmain officially suspended the supply of chips to the Shenzhen factory.
On July 13, 2020, in the "A Letter to All My colleagues in the Shenzhen Factory" released by Bitmain in Hong Kong, more details were added on the series of Ketuan Zhan's actions in June.
The legal person Feng Zhou of the Shenzhen plant is related to Ketuan Zhan. After being relieved of Ketuan Zhan's post, Jihan Wu flew to Shenzhen to have a long talk with Feng Zhou. Jihan Wu believes that Feng Zhou is the right person to manage the factory and help the company overcome difficulties, and decides to leave Feng Zhou to continue to manage the factory.
This wrong decision staged a story of a farmer and a snake. When Ketuan Zhan began to counterattack Bitmain, Feng Zhou was also quickly instigated and began to assist Ketuan Zhan in seizing customer machines and transferring 17,000 T17 mining machines in the warehouse. Hainan Continental Ark Data Technology Co., Ltd., which is held by Ketuan Zhan, sold them at a low price.
In order to protect the interests of customers, Jihan Wu had to make a compromise and paid the payment for some goods to a bank account controlled by Ketuan Zhan in exchange for delivery. However, after the other party received a payment of 109 million, the delivery stopped. On July 8, 2020, 5600 mining machines have been overdue.
At the same time, the factory defaulted on suppliers’ accounts payable as much as 200 million yuan. Bank acceptance bills issued by the factory, exceeding 36 million yuan, will expire on July 17, and more than 34 million yuan will expire on July 23. It is understood that Ketuan Zhan, after receiving the bank's dunning call, made it clear that he would not repay the loan, which would destroy the company and the entire group's credit in financial institutions.
7、 This is not the end
So far, the power struggle between the founders of Bitmain has been more than half a year. The office building already occupied by Ketuan Zhan is still empty, and most employees choose to work from home. Some chip developers returned to the office with the acquiescence of Jihan Wu and continued to maintain research and development to reduce the impact of infighting on technological iteration and competitiveness.
This giant ship that once stood on top of the supercomputer chip is crashing into the iceberg due to the madness of the former helm. Ketuan Zhan's madness and Jihan Wu's compromise made mistakes again and again. Bitmain tried to save himself many times, but was unable to get out of the black hole.
If the time goes back to that day in 2013, would Jihan Wu and Yuesheng Ge still choose to dial Ketuan Zhan?
submitted by paulcheung1990 to Bitcoincash [link] [comments]

The deepest report: Bitmain's self-help history

The deepest report: Bitmain's self-help history
The original intention of this article is to let readers understand the causes and consequences of Bitmain internal fighting, but after writing it, I found that it is not so much internal fighting as it is a long history of self-help.
The story is very long. Let's adjust the timeline to the eve of December 17, 2018. That was one of Bitmain's most critical moments and the beginning of a series of subsequent stories.
1. Self-immolation In September 2018, Bitmain's financial department warned management that the company's cash flow has become very tight and operating costs must be reduced to allow the company to continue. The blockchain unicorn, which is valued at more than 15 billion U.S. dollars, is crippled in the run and struggling to break the corner.
In 2017, Bitmain made a profit of 1 billion US dollars In the first half of 2018, Bitmain made a profit of 1 billion US dollars Three rounds of financing, a total of 800 million US dollars Net assets should exceed 3 billion U.S. dollars In September 2018, Bitmain had tight cash flow and was on the verge of bankruptcy
A simple comparison, it is not difficult to see that Bitmain's ability to make money is incredible, and its ability to burn money is even more extreme.
How does Bitmain burn money? Do you pour cash into gasoline and burn it, or hire a lot of employees to stuff the banknotes one by one into the shredder? The actual situation is closer to the latter.
The following data can help readers quickly learn Bitmain's money burning skills.
At the beginning of 2018, the entire cryptocurrency market has entered a bear market, but Bitmain's monthly operating costs have been rising wildly. Operating costs have risen from 10 million US dollars at the beginning of the year to 50 million US dollars at the end of the year.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
Operating costs are just the tip of the iceberg. Excessive chip trial production can become a classic case of project management courses. Readers who pay attention to Cryptocurrency mining can easily find that Bitmain is still working hard to clear the inventory of Antminer S9 in 2019. As the co-CEO, Ketuan Zhan did not listen to the advice or even warnings of the Finance Department, insisting on the implementation of Excessive chip trial production, resulting in a large accumulation of inventory and tight capital turnover. Another CEO, Jihan Wu, once revealed that the loss of Excessive chip trial production to the company was approximately US$1.5 billion.
Large-scale expansion of the R&D team is one of the main reasons. The HR who once worked at Bitmain revealed that the company once hired more than 50 employees a day and nearly 500 employees a month. Even so, it was criticized for its slow recruitment speed. The cash consumption in this area is approximately $250 million.
The BM1393 chip incident is even more incredible. Chip expert Ketuan Zhan invested a lot of money on a failed chip, and finally failed again. From 2017 to 2018, Bitmain has failed Trial production of mining machine chips at least 4 times, including 16nm, 12nm and 10nm chips, of which 16nm Trial production failed twice, thus losing at least US$1.2 billion.
It is rumored that Bitmain still holds a billion U.S. dollars worth of cryptocurrency in a state of floating loss. In view of the rebound in the market in 2020, we will not comment temporarily, waiting for the correct answer from the cryptocurrency market. But the losses pointed out in the previous article are all irreversible.
2. Sole power
In September 2018, Bitmain's management realized the seriousness of the problem. It turned out that the company's money could be squandered. As a result, the management began to discuss self-help plans, and the most reasonable and effective way was obviously to lay off employees.
The probation period for newly hired employees at Bitmain is half a year, and the probationary salary is 100% of the official salary, there is no difference. Once layoffs are made, new employees who have not passed the probationary period will be the main layoff targets. The department managed by Ketuan Zhan will face large-scale layoffs. The layoff plan is strongly opposed by Ketuan Zhan. Bitmain can only temporarily abandon the layoffs and replace it with continuous reductions. For marketing and travel expenses, a budget committee was established to strictly approve every expenditure. At the same time, employee benefits, such as reimbursement of taxi expenses, breakfast supply, snacks and drinks, etc., have also been abolished, and even the tradition of giving employees 400 yuan worth of BTC/BCH every month has been stopped.
In the face of huge cash flow pressure, trivial savings is obviously of no avail. Soon, the management again discussed the layoff plan, and it has reached the point where it has to be laid off.
In December 2018, Jihan Wu began to organize all entrepreneurial veterans and business backbones to persuade Ketuan Zhan to agree to layoffs, but Ketuan Zhan still insisted not to layoffs. The persuasion process was very unsuccessful. After many meetings and intense debates, Bitmain executives were caught in a dilemma of wasting time with Ketuan Zhan.
In this process, the shortcomings of the dual CEO system began to appear, and the relationship between the two CEOs gradually deteriorated.
On the night of December 16th, Ketuan Zhan reconvened the management meeting, and more than 30 managements who were present were asked to hand over their mobile phones. At this time, Jihan Wu was on a business trip in Hong Kong and was busy with listing related work.
In the meeting, Ketuan Zhan's core content was three items:
(1) Bitmain cannot have two CEOs, only one CEO and must be Ketuan Zhan. Ketuan Zhan said that he met an old leader during a business trip. He hadn't seen each other for many years. The old leader suggested that the company can only have one CEO, and it must be him. Ketuan Zhan feels that this is a kind of fate, an opportunity given by God.
(2) Ketuan Zhan believes that the company's cash flow problems, the biggest responsibility is the inability of the financial department. To prove his point, Ketuan Zhan announced Bitmain's financial data at the meeting. In the evening, employees in Taiwan began to post messages on social media, saying that the company's capital chain was broken and the top management was split.
(3) If Ketuan Zhan is not supported, the option will be cancelled and the equity will be voided.
Hearing about this, Jihan Wu, who lives in Hong Kong, sent a WeChat message to the management who are attending the meeting.

https://preview.redd.it/c5cxea2lqid51.jpg?width=1080&format=pjpg&auto=webp&s=3d6a0388408f6b8abe10648e5e4b7a3a5434c821
On the afternoon of December 17, 2018, Jihan Wu returned to Beijing to negotiate with Ketuan Zhan all night, and finally reached a consensus in the early morning. Bitmain co-founder Yuesheng Ge announced the results of the negotiations. Jihan Wu and Ketuan Zhan ceased to serve as CEOs, and Haichao Wang served as CEO. Jihan Wu voluntarily backed down and Ketuan Zhan served as chairman.
The "12.17 Incident" had a very bad impact on Bitmain, especially the disclosure of Bitmain's financial status, which caused vendors to start dunning. The loan that had just been negotiated with the Bank of Beijing was cancelled the next day. Jihan Wu's resignation as CEO caused an uproar in the industry, and it became a hot topic among Cryptocurrency mining, blockchain practitioners, and investor communities. The media focused their interpretation on Bitmain's series of incidents, and generally looked down upon its ongoing Hong Kong IPO, believing that the high-level changes had already signaled the failure of the IPO in advance.
On Christmas December 24, 2018, Bitmain finally began to implement the layoff plan. This long-delayed “correct decision” was achieved after a stalemate for nearly three months. The AI ​​teams in Beijing, Singapore, Taiwan, and Shanghai have laid off more than 50% of their employees. The Israeli R&D center was closed and Shenzhen New Species Technology Co., Ltd., which had been acquired for only ten months, was dissolved, and all employees were laid off. Copernicus, Bitmain's top blockchain development team, was not spared and was wiped out in this layoff. Copernicus and some of the laid-off employees joined the new company Matrixport co-founded by Jihan Wu and Yuesheng Ge, headquartered in Singapore.
3. Past events when starting a business
After the "12.17 Incident", Jihan Wu gradually faded out of Bitmain's management affairs and turned his attention to the IPO and new company. And this is one of Jihan Wu's major mistakes, he began to let Ketuan Zhan manage Bitmain alone.
In fact, as early as 2013, Jihan Wu planted hidden dangers.
Jihan Wu, an investment banker, was the earliest translator of the Bitcoin white paper. He began to get involved in the cryptocurrency mining industry in 2012. The disappearance of Kaomao and Nangua Zhang's ticket skipping led Jihan Wu to decide to develop his own chip.
In 2013, Jihan Wu established his own mining machine company. Together with Yuesheng Ge, who was only 20 years old, he found Ketuan Zhan, an integrated circuit designer of the Chinese Academy of Sciences, to create the protagonist of this article, and later the digital Cryptocurrency mining giant, Bitmain.
Jihan Wu promised Ketuan Zhan that every time a mining machine chip was successfully developed, he would give some shares to the Ketuan Zhan team. At that time, the company founded by Ketuan Zhan was on the eve of falling apart. In order to regroup the team, Ketuan Zhan promised to share half of his shares with the team members. Unfortunately, this is just a bad check. With the rapid development of Bitmain and higher and higher valuations, the expanding Ketuan Zhan almost monopolized all the shares.
Like many startups, Bitmain encountered many difficulties in its early days, and many jobs had to be done by the boss. For example, in the chip design and production process in the second half of 2013, Bitmain was caught in a dilemma of insufficient funds. Jihan Wu personally raised funds and met with TSMC’s sales to persuade TSMC to accept the production needs of a start-up company. Jihan Wu also participated in the selection of the thermodynamic parameters of the heat sink in the Antminer S1.
In 2014, Jihan Wu discovered that this company was independently operated by Ketuan Zhan, which had huge problems. Forcing Jihan Wu to continue to participate in company management.
At that time, Bitmain's mining machine chips had just achieved a certain lead in the standard design process. Jihan Wu believes that the next step must be to develop full customization technology, but Ketuan Zhan plans to invest resources in the research of mobile payment chips.
Ketuan Zhan met a mysterious person from the Party Central Security Bureau who claimed to be able to manipulate the Party Central Committee’s decision-making process for the next generation of mobile payment cryptography standards, but this direction is likely to lead to the fact that Bitmain has just gained the lead in the mining machine market. Regained.
Jihan Wu said that as a graduate of the School of Economics, with a little memory of his high school stage and the knowledge reserve of a computer technology amateur, he retrieves various materials and papers every day, learns theories related to full customization, and goes to Ketuan Zhan conducts persuasion work there.
Fortunately, in the direction of full customization technology, Ketuan Zhan finally listened to Jihan Wu's opinion. Bitmain quickly integrated the technical experts from the United States and Russia introduced by Jihan Wu, which greatly improved the design level of chips and complete machines.
In 2015, Jihan Wu suggested that Ketuan Zhan consider the direction of artificial intelligence. But Ketuan Zhan is not here, he prefers the CPU direction. After staying asleep at night, coupled with in-depth analysis by the Bitmain investment team, Ketuan Zhan finally agreed with this direction. It is a pity that after the Tianshi Chen brothers made major breakthroughs in theory and practice, Bitmain officially invested in the relevant direction, and it was still a step behind.
In the two years from 2016 to 2017, Bitmain's business performance has achieved rapid development, becoming a unique super unicorn in the blockchain industry. According to Froth & Sullivan, in 2017, Bitmain Technology Holdings was the second largest fabless chip design company in China and the tenth largest fabless chip design company in the world, and the fourth largest fabless ASIC chip design company in the world, accounting for 74.5% of global cryptocurrency market share.
However, the huge crisis has long been buried in the early days of entrepreneurship.
Ketuan Zhan's decision on major directions revealed his weakness of extremely lack of business understanding. But every mistake he made was blocked by the company's core employees. His overconfidence in his management ability led to the gradual intensification of conflicts, and the management differences between the two founders became more serious.
4.The giant gets lost
The contradiction between the two broke out on December 17, 2018. Ketuan Zhan used extreme means to force the management to compromise with him by canceling the option, so as to achieve the goal of sole control of the company. Jihan Wu returned to Beijing from Hong Kong overnight and negotiated with Ketuan Zhan all night. In the end, the two resigned as CEO. Jihan Wu retired. Ketuan Zhan has the exclusive rights of chairman in exchange for the implementation of the layoff plan.
Jihan Wu's voluntary retreat has intensified Ketuan Zhan's management to do whatever he wants.
A Bitmain employee commented on Ketuan Zhan's management skills, summed up in two letters-SM.
After becoming the sole helm of the company, Ketuan Zhan quickly "rectified" the department in charge of Jihan Wu as the chairman of the board. He guided the sales of mining machines at the dinner, and pointed out that the sales performance is not due to the sales staff. Ability is strong, but the company provides opportunities. Take two sales leaders as examples, saying that if the company hadn't given the opportunity, they would still be losers. In addition, Ketuan Zhan also instructed the sales staff on how to toast and imparted the wine table culture and experience.
After the meal, Ketuan Zhan came to the conclusion that the quality of Bitmain sales staff was too poor, and Huawei’s blood needs to be injected to drive the company’s progress. Soon, the marketing and sales director from Huawei officially took over Bitmain, opening the era of brand premium for Antminer.
In order to further understand and guide the sales work, Ketuan Zhan asked to meet the customers with the sales staff. During the negotiation process, Ketuan Zhan had a heated discussion with customers on the issue of Chinese and Western medicine, and had also forced the sales staff to be able to ship 10,000 machines due to insufficient production capacity.
Although the requirements for sales personnel are strict, Ketuan Zhan has provided a lot of convenience for "Mainland Ark". In addition to selling mining machines at a more favorable price, Bitmain's mining machines are also hosted in Ming Wang at a higher price than the market price. Mine. It is reported that both Ketuan Zhan and Ming Wang are shareholders of Ark.
The new sales strategy of Huawei's executives has also brought very obvious changes to Bitmain. The self-righteous brand premium reduces the price-performance ratio of Antminer, causing competing products to eat away at Bitmain's market share. Later, Bitmain found that the strategy was wrong and started to cut prices, and found that the mining machine market was saturated and the purchase demand of miners had decreased.
More dangerous than the sales strategy is that the technical advantages of Antminer are being chased by competing products, and even overtaken. At the same time, the two mining pools under Bitmain also lost their first and second positions. The AI ​​business, which Jihan Wu placed high hopes and Ketuan Zhan personally supervised, became a laughing stock in the industry. Not only did it fail to make a profit, it almost brought down Bitmain.
Blindly introducing senior executives from Huawei to occupy important positions completely destroys the company's internal cultural foundation. The bureaucracy within Bitmain began to corrode from high-level employees to ordinary employees. Ketuan Zhan is not aware of this. He is still keen on recruiting Huawei employees, imitating Huawei's organizational structure and strategy, letting HR do sales and R&D personnel to do HR.
The organizational structure adjustment in October 2019 was the fuse for Ketuan Zhan to completely anger Bitmain management. This time, Ketuan Zhan completely marginalized Bitmain’s veteran employees, and suddenly promoted some of the “airborne soldiers” who had just joined the company to the position of person in charge, which caused the former person in charge to report to the new employees. The two managers who were originally equal The hierarchy becomes the subordinate relationship, the operation and development of different business lines are merged into a large department, the upward reporting process becomes more cumbersome, and the relationship between employees becomes delicate.
5. Headwind
On October 29, 2019, Jihan Wu urgently held a staff meeting. Prior to this, the legal representative of Beijing Bitmain has been changed to Jihan Wu, including the parent companies Hong Kong Bitmain and Cayman Bitmain. Jihan Wu stood in the lobby of Building 25, B1, announcing that Ketuan Zhan has been relieved of all duties. Any employee in the Bitmain Group shall no longer execute Ketuan Zhan’s instructions and participate in any meetings convened by Ketuan Zhan. If there is any violation, the company will demotion and expel the company based on the severity of the circumstances. If losses are caused to the company, the company will be held accountable.
Jihan Wu's speech is very long, which can be summarized as follows:
(1) Ketuan Zhan has been relieved of all duties. Also expelled from the original Huawei company HR Zhi Wang introduced by Ketuan Zhan at the end of 2018. Zhi Wang’s reputation on Bitmain was extremely poor and was ridiculed by employees as "nine thousand years" (In ancient China, the emperor was called "ten thousand years old", and the prince was "eight thousand years old." However, in the Ming Dynasty, there was an eunuch who caused harm to the country and the people. He called himself "nine thousand years old", meaning that he was only A little lower than the emperor's level).
(2) Ketuan Zhan's ability to control the company's option incentive plan has disappeared, and it is no longer possible to cancel employees' options at will.
(3) The organizational structure adjustment plan led by Ketuan Zhan was suspended.
(4) We are optimistic about the future of AI business, but the premise is that the main business can continue to make profits in order to support the company's continued investment in AI business.
In the speech, Jihan Wu also told employees the whole story of the "12.17 Incident" and bluntly said that the company is not in good condition. If no measures are taken, Bitmain is likely to go bankrupt in three quarters and he must come back to save the company.
At this time, Ketuan Zhan, who was on a business trip in Shenzhen, finally experienced the situation of Jihan Wu in the "12.17 Incident".
After the official return, Jihan Wu began to clearly point out the company's various problems in operation and management, and went deep into each business line to understand the situation. In the mining machine sales department meeting, employees spoke enthusiastically, reflecting on the difficulties and opinions encountered in the work, the marketing and sales director from Huawei asked with a surprised look, "Why didn't these issues be reported to me before?", and soon , The director was interviewed and "voluntarily resigned."
On November 2, 2019, Jihan Wu announced a salary increase for all employees. Bitmain’s last salary increase dates back to 2018. In principle, Bitmain has two salary increases every year.
On November 7, 2019, Ketuan Zhan spoke on social media for the first time, describing his hardship in starting a business, and condemning Jihan Wu for “stabbing a knife in the back”. At the end of the article, he also set himself a KPI for 2020, that is, the mining machine market share will reach 90%, and the AI ​​business will earn 1 billion.
But Ketuan Zhan's majestic plan did not make Bitmain employees feel emotional, but ridiculed him instead. Employees exposed that he insulted employees, advocated Chinese medicine, believed in Buddhism, drank in meetings, practiced Qigong...
However, there is less than half a year before the halving of Bitcoin production, and the cryptocurrency market shows no signs of recovery, which makes Bitmain management very anxious.
On January 6, 2020, Bitmain ushered in another round of layoffs, with a layoff ratio of about 1/3. This time the layoffs have caused many employees who have just increased their salaries to feel very grieved. On the one hand, they were looking forward to Jihan Wu's return. On the other hand, the compensation for this layoff was less than 18 years.
Ketuan Zhan, who has been unable to enter the Bitmain office area, once again spoke on social media and firmly opposed to layoffs. We do not need to lay off staff and we cannot commit suicide.
During the Spring Festival, Covid-19 broke out. Mainland China has begun to extend the Spring Festival holiday and advocate working from home. Under the chain reaction caused by Covid-19, most companies have chosen to cut salaries or even lay off employees. In the first two months of 2020, China's exports fell by 17%, U.S. stocks were broken four times in a row, Bitcoin plunged 40% in 24 hours on March 12, 2020, and crude oil futures fell by 300% on April 20, 2020...
Obviously, Jihan Wu can't predict, but this layoff seems to be the right decision again. In addition, from January to April 2020, Bitmain's revenue exceeded US$400 million amid the spread of Covid-19 and the collapse of the financial market.
6. Fight to the death
When Jihan Wu tried to get the company back on track, Ketuan Zhan was not helpless. On April 28, 2020, Ketuan Zhan finally rolled back the legal representative of Beijing Bitmain to before October 28, 2019 by repeatedly submitting administrative reconsiderations, and restored his status as a legal representative.
On the morning of May 8, 2020, a piece of news about Bitmain quickly appeared on the real-time hot search rankings, and even dominated the headlines of the day. At window 52 on the second floor of the Haidian District Government Affairs Center, when Ketuan Zhan, the legal person of Beijing Bitmain Company, was receiving the business license, a group of unidentified people snatched the business license from the industrial and commercial administrative staff. A source at the scene said that the number of unidentified people in the group was about 60 people, of which Luyao Liu was directing at the scene.
This is a skillful piece of news. It first leads readers to think that Ketuan Zhan is a victim, using 60 people to grab business licenses as the focus. The masses accused Jihan Wu of lawlessness, but ignored whether the government affairs center could have 60 personnel. As for Hong Kong Bitmain to have the right to appoint a representative to obtain a business license, this is a deeper level of thinking.
The follow-up report restored the real situation at the scene. Only more than ten people were present, and both sides were equipped with security personnel. Bitmain employees also broke the news in the circle of friends, claiming that Ketuan Zhan's bodyguard had injured Bitmain's authorized person, and said in a threatening tone, "Be careful!"
However, the subsequent plot reversal did not have much effect. Jihan Wu's reputation has been greatly affected. From a bloody soldier who rescued the company in trouble to a lawless criminal, it can be said to be a world of war. do not.
Ketuan Zhan, who succeeded in the first battle, began to counterattack Bitmain continuously. On the afternoon of June 3, 2020, Ketuan Zhan led a team to pry open the back door of the Beijing Bitmain office and formally occupied the deserted Beijing headquarters.
On June 4, 2020, Ketuan Zhan called on Bitmain employees to resume work and promised to expand the company's market value to more than US$50 billion within three to five years. After that, Ketuan Zhan began to contact employees by phone, trying to acquire the options in the hands of employees at a valuation of 4 billion US dollars.
Subsequently, Ketuan Zhan recalled Huawei's executives and issued a series of personnel appointments and removals. As of June 9, 2020, Ketuan Zhan has successively eliminated CFO Luyao Liu, and Wenguang Wang, the head of the mining center. Luyao Liu is responsible for controlling Bitmain's IPO plan. He also appointed Yanwu Ma as the HR director, Gang Ren as the head of the mining center, Yonggang Sun as the head of the supply chain, Ling Gu as the financial director, and Bin Zhu as the head of the mining machine business department. Bin Zhu is the senior executive of Huawei who was interviewed and left as mentioned in the previous article. During his tenure, he reduced Antminer’s 90% market share to 50%, and received a large number of complaints from miners. Internal employees once speculated that he might be Compete against the spies sent by the company.
In addition to recalling senior executives of Huawei, Ketuan Zhan also urged employees to return to work. They can receive a bonus of 10,000 yuan when they return to work on the same day, which is only half the next day. Ketuan Zhan showed a very kind side. Every time the elevator door is opened, Ketuan Zhan's hot gaze can be met, shaking hands, taking photos, and receiving money. As there is no personnel information, Ketuan Zhan does not know whether the person receiving the money is a Bitmain employee, and these people did not resume work the next day.
The effect of gentleness was not good, Ketuan Zhan began to force employees to return to work. Seeing that there are still very few respondents, Ketuan Zhan threatened employees through SMS, phone calls, EMS, emails and other harassment, issued multiple threats such as termination of contract, suspension of payment of social insurance, suspension of wages, and even used personal information saved by employees to form a group of employees. Domicile threats, requiring employees to perform "work handover", trying to force employees to return work computers, etc.
On June 10, 2020, the media revealed that Ketuan Zhan had controlled Bitmain's Shenzhen factory and prohibited employees from delivering normal shipments to paid customers, which caused difficulties in the operation of the Bitmain mining machine department.
On June 13, 2020, Hong Kong Bitmain, the parent company of Beijing Bitmain, issued a statement accusing Ketuan Zhan of signing a "Sales Agency Agreement" with the Ark Data Technology Co., Ltd. in which it holds shares, in an attempt to embezzle Beijing Bit's assets.
On June 17, 2020, the media revealed that Ketuan Zhan started selling 14,000 T17+ series mining machines at low prices.
On June 20, 2020, Hong Kong Bitmain officially suspended the supply of chips to the Shenzhen factory.
On July 13, 2020, in the "A Letter to All My colleagues in the Shenzhen Factory" released by Bitmain in Hong Kong, more details were added on the series of Ketuan Zhan's actions in June.
The legal person Feng Zhou of the Shenzhen plant is related to Ketuan Zhan. After being relieved of Ketuan Zhan's post, Jihan Wu flew to Shenzhen to have a long talk with Feng Zhou. Jihan Wu believes that Feng Zhou is the right person to manage the factory and help the company overcome difficulties, and decides to leave Feng Zhou to continue to manage the factory.
This wrong decision staged a story of a farmer and a snake. When Ketuan Zhan began to counterattack Bitmain, Feng Zhou was also quickly instigated and began to assist Ketuan Zhan in seizing customer machines and transferring 17,000 T17 mining machines in the warehouse. Hainan Continental Ark Data Technology Co., Ltd., which is held by Ketuan Zhan, sold them at a low price.
In order to protect the interests of customers, Jihan Wu had to make a compromise and paid the payment for some goods to a bank account controlled by Ketuan Zhan in exchange for delivery. However, after the other party received a payment of 109 million, the delivery stopped. On July 8, 2020, 5600 mining machines have been overdue.
At the same time, the factory defaulted on suppliers’ accounts payable as much as 200 million yuan. Bank acceptance bills issued by the factory, exceeding 36 million yuan, will expire on July 17, and more than 34 million yuan will expire on July 23. It is understood that Ketuan Zhan, after receiving the bank's dunning call, made it clear that he would not repay the loan, which would destroy the company and the entire group's credit in financial institutions.
7、 This is not the end
So far, the power struggle between the founders of Bitmain has been more than half a year. The office building already occupied by Ketuan Zhan is still empty, and most employees choose to work from home. Some chip developers returned to the office with the acquiescence of Jihan Wu and continued to maintain research and development to reduce the impact of infighting on technological iteration and competitiveness.
This giant ship that once stood on top of the supercomputer chip is crashing into the iceberg due to the madness of the former helm. Ketuan Zhan's madness and Jihan Wu's compromise made mistakes again and again. Bitmain tried to save himself many times, but was unable to get out of the black hole.
If the time goes back to that day in 2013, would Jihan Wu and Yuesheng Ge still choose to dial Ketuan Zhan?
submitted by paulcheung1990 to Bitcoin [link] [comments]

Industry of accusation: how do websites publishing compromising material work? Yuri Mosha Experience.

Industry of accusation: how do websites publishing compromising material work? Yuri Mosha Experience.
By Ignat Shestakov
Photo: Global Look Press/Monika Skolimowska
Fake news technologies are becoming more sophisticated, partly owing to the support of Hollywood. Furthermore, the simplest methods of disinformation are getting more and more efficient. Izvestia has figured out why the oldest heads of this monster can never be chopped off.
“The oldest heads” are the websites containing compromising material, which make money from customers wishing to ruin lives of their competitors, and from these competitors willing to pay to remove from the Internet publications about themselves having different degrees of reliability.
And we are not even talking about such veterans of information warfare like the site compromat.ru, that was created in 1999, blocked in 2017 although still perfectly working, but rather short-living web pages that get created as quickly as then become deleted. Their editorial staff sometimes publishes damaging information not even at the request, but simply to keep up with other teams.
Kompromat as a business
Entrepreneur Yuri Mosha had to deal with compromising materials published on the Internet several times. According to him, back in the early 2010s, such things were done by single websites, unrelated to one another. Some of them positioned themselves as official mass media having editorial staff and real legal addresses. “At that time, we could fight it. We contacted that sites and threatened them with filing court claims. In most cases, it helped, because they were afraid of responsibility”, Mosha told Izvestia.
A new wave of compromising material against the entrepreneur who makes money by helping those wishing to move to the United States from the former Soviet Union countries, emerged two years ago. He tried to make a deal with the sites or to make pressure on them through lawyers. But this time it was all pointless: “Now this is big business, and there are groups that have hundreds of websites with dummy registrations”.
Photo: Screenshot
Mosha contacted several owners of websites containing compromising materials by mail. Some of them were ready to delete publications for $ 7,000, others — for $ 20,000. Ordering publication of material damaging a competitor is cheaper — from $ 50,000 to $ 5,000. “You send an e-mail. They answer: “No problem, here’s a bitcoin wallet, transfer the money and I’ll delete the post.” At the same time each group attaches a list of their sites to an email,” the entrepreneur said. He did not pay anything.
Photo: Screenshot
I found a dark PR man, whom I paid at the end, however, not for removing materials, but for his advice. First advise was: you should not pay anyone. As soon as you pay, they will understand that you are ready to do it, and you will keep paying for the rest of your life. And even if they play fair and delete you from one site, they will post you on 50 others. He told me: “You see, we all know each other, and we are retyping all publications. As soon as information appears on one resource, the robot transfers it to others. And if a person pays [an owner of one website containing compromising material], he will start to pay everyone”.
His second hint was that suing them is useless. Because when there is a court decision, if Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor) blocks it (only) on the territory of the Russian Federation, they will see that you are fighting with them, and will publish even more information about you.
Third, he said that the target must be not the sites, but Google and Yandex. As he said, they exist due to the support from Google and Yandex. Those two are just like salesmen in a gun shop who sell rifles to buyers who say they will shoot people in the street. They [search engines] do not fight against this [compromising material] at all. Before the lawsuit [with the search engines] I myself sent them information [about compromising material]. I attached a police clearance certificate, a residence permit, confirmation of citizenship. After that I had to go to court.
Now Yuri Mosha is negotiating a settlement with Yandex and is suing Google. Read about the difficulties faced by the entrepreneur and other people trying to remove information about themselves from the Internet (especially not from the Internet segment of one country) through court action here.
Making business on a kompromat business
In recent years, several companies have emerged in the Russian Internet segment that earn money by helping people remove information about themselves from search engines, social networks and mass media. They would not be able to make money if the laws on the right to be forgotten worked well.
Here it should be mentioned, that these laws in different forms exist in many countries. And Russia stays behind its neighbors, as there the law only entered into force in 2016. In 2014, the Court of Justice of the European Union adopted the decision according to which the users, in some cases, have the right to request the search engine to remove their personal data from the search results. And the preconditions for this right were already established in the Convention on Human Rights, which entered into force in 1953. In the United States, such cases typically cite Section 230 of the Communications Decency Act of 1996.
So, it is difficult and time-consuming to seek a decision to get the data removed from search engines through courts. According to Yandex statistics, the company satisfied 27% of processed requests within three months from the date when the law on the right to be forgotten entered into force (that is, from January to March 2016). Google has more representative statistics, which, moreover, has been collected since 2014.
Photo: Depositphotos
That is why there are companies that resolve such issues avoiding judicial proceedings. They do not remove links to negative publications from search engines, but instead ensure that first pages of the search contain links to positive publications. They negotiate with social networks, contact websites and sometimes pay them.
The founder of one of such companies, Maxim Zlobin, told VC.RU that he first worked with company leaders, government officials and parliamentarians. But over time, he also started to work with individuals.
Maxim Zlobin, the ISN founder:
Once, a woman from Makhachkala contacted us. Hardly speaking Russian, she asked us to delete information about her sole proprietorship. At first, we could not understand why she needed this because search engines only showed records about the liquidation of the sole proprietorship. But then it appeared that her sole proprietorship had a code of the Russian National Classifier of Economic Activities (OKVED) referring to “Activities of massage parlors”. And although the woman did not provide any massage services to men (for religious reasons), if it became known to her relatives, she would be “forever covered with shame.” To remove this information, we partially used passages of the law on insulting the feelings of believers on the verge of the right to be forgotten.
Now half of Zlobin’s clients are businessmen, 30% are politicians, and 20% are public figures or individuals.
If you can’t delete it, take the lead
There are three methods the businessman uses in his work. The first one is negotiations, including offering money to web-platforms for removing negative publications. But, as noted by Yuri Mosha, this method is associated with high risks, including, first of all, the risk of the Streisand effect when the fact of an appeal may become a reason for new material. Second, there is a risk of getting into bondage when the payments to the web platform would become regular.
Prices for publication of the compromising material with which the founder of ISN works are lower than for those Mosha faced. Publishing information with a link to a foreign (containing the compromising information) site, costs €600–800. This allows the Russian kompromat-trash hole to avoid any responsibility for the publication. At the same time, deleting one publication costs from 5,000 to 600,000 rubles. That is, from $100 to about $ 10,000.
Photo: ТАСС/Ведомости/Максим Стулов
Therefore, the businessman considers the second method — work with search results — to be the most effective. Whitewashing articles about the client get posted and promoted in search engines. Thanks to this, the tarnishing publications move down to other pages of search results.
And the third way is a legal battle. When it comes to search engines, the right to be forgotten is used for this, but the common idea is that even if “there is some success in the court, in order to remove the information, you will have to go straight to the Constitutional Court”. Zlobin’s experts also use the law on personal data, which, in particular, states that no information about citizens of the Russian Federation can be stored and processed on the servers of foreign companies without the consent of these people. With social networks, according to Zlobin’s experience, it is often possible to reach an agreement provided that there is a reasonable proof that the compromising material is fabricated.
Kompromat on a business on a kompromat business
However, all this is useless, as Yuri Mosha noted with regret. Faced with the problem of kompromat, he contacted several companies of this kind. He did not mention ISN among those in his interview with Izvestia’s correspondent, however. And those he had contacted left him disappointed.
Yuri Mosha, an entrepreneur:
They cannot do anything. Some of them need a court decision. Others say, “We’re going to overlay [the negative content] with a positive one.” But I create such content myself, I have 5 thousand videos uploaded on YouTube, and it still doesn’t work.
All these companies are just scammers. They can’t do anything. I contacted one site [containing compromising material]. They said: half bitcoin [for deleting publications]. Then I contacted a company. They told me they would call back. They did call back and promised to solve the problem for one bitcoin.
Short-living website publishing compromising material of a different degree of truthfulness represent an ultimate expression of the fake news industry. Unlike the Hollywood-sponsored fake video technology, which (so far) takes resources and time, a site with catchy headlines can be created in several hours. And just as easily it can be removed from the Internet, as, for example, it happened with ostorozhno.ru.
The Site on Dangerous Connections, as was introduced by its authors, appeared in 2008. It published a standard set of material compromising politicians, including those of the Ural region, wrote URA.RU. Now the website link leads to a Riga travel guide with text stolen from a real travel site and ridiculous low-resolution photographs. It is quite obvious that when the money for the removal of the compromising material arrived, the creators simply covered it with a previously prepared dummy. And when a new order arrives, they will again remove it and continue to earn on lies.
Because it is so easy to create, remove, and reproduce such sites, they cannot be defeated. The University of Oxford recently published a report on the fight against fake news in various, primarily European, countries.
The term \"fake news\" addressed during the talk \"Between facts, fakes and manipulations - how do we defend democracy on the Internet?\" at the Ministry of Justice in Berlin, Germany. Photo: Global Look Press/dpa/Jörg Carstensen
The governments of all these countries do not make any attempts to counteract the sites posting compromising material. Because they just cannot. Most are trying to shift the responsibility onto social media. For example, in Germany, Facebook is threatened with a fine of up to €50 million if "obviously illegal" content is not removed within 24 hours. In some other countries, like Turkey or Bulgaria, according to the authors, the fight against fake news simply justifies the pressure on the opposition. And only two European countries, Sweden and Holland, came to an idea of teaching people to distinguish between rumors and the truth. Other countries, in contrast, just keep prohibiting things without obtaining any reasonable effect of this.
submitted by YuriMosha to u/YuriMosha [link] [comments]

DFINITY Research Report

DFINITY Research Report
Author: Gamals Ahmed, CoinEx Business Ambassador
ABSTRACT
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking. A “weight” is attributed to a chain based on the ranks of the leaders who propose the blocks in the chain, and that weight is used to select between competing chains. The DFINITY blockchain is layered on top of the DFINITY beacon and uses the beacon as its source of randomness for leader selection and leader ranking blockchain is further hardened by a notarization process which dramatically improves the time to finality and eliminates the nothing-at-stake and selfish mining attacks.
DFINITY consensus algorithm is made to scale through continuous quorum selections driven by the random beacon. In practice, DFINITY achieves block times of a few seconds and transaction finality after only two confirmations. The system gracefully handles temporary losses of network synchrony including network splits, while it is provably secure under synchrony.

1.INTRODUCTION

DFINITY is building a new kind of public decentralized cloud computing resource. The company’s platform uses blockchain technology which is aimed at building a new kind of public decentralized cloud computing resource with unlimited capacity, performance and algorithmic governance shared by the world, with the capability to power autonomous self-updating software systems, enabling organizations to design and deploy custom-tailored cloud computing projects, thereby reducing enterprise IT system costs by 90%.
DFINITY aims to explore new territory and prove that the blockchain opportunity is far broader and deeper than anyone has hitherto realized, unlocking the opportunity with powerful new crypto.
Although a standalone project, DFINITY is not maximalist minded and is a great supporter of Ethereum.
The DFINITY blockchain computer provides a secure, performant and flexible consensus mechanism. At its core, DFINITY contains a decentralized randomness beacon, which acts as a verifiable random function (VRF) that produces a stream of outputs over time. The novel technique behind the beacon relies on the existence of a unique-deterministic, non-interactive, DKG-friendly threshold signatures scheme. The only known examples of such a scheme are pairing-based and derived from BLS.
DFINITY’s consensus mechanism has four layers: notary (provides fast finality guarantees to clients and external observers), blockchain (builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon), random beacon (provides the source of randomness for all higher layers like smart contract applications), and identity (provides a registry of all clients).
DFINITY’s consensus mechanism has four layers

Figure1: DFINITY’s consensus mechanism layers
1. Identity layer:
Active participants in the DFINITY Network are called clients. Where clients are registered with permanent identities under a pseudonym. Moreover, DFINITY supports open membership by providing a protocol for registering new clients by depositing a stake with an insurance period. This is the responsibility of the first layer.
2. Random Beacon layer:
Provides the source of randomness (VRF) for all higher layers including ap- plications (smart contracts). The random beacon in the second layer is an unbiasable, verifiable random function (VRF) that is produced jointly by registered clients. Each random output of the VRF is unpredictable by anyone until just before it becomes avail- able to everyone. This is a key technology of the DFINITY system, which relies on a threshold signature scheme with the properties of uniqueness and non-interactivity.

https://preview.redd.it/hkcf53ic05e51.jpg?width=441&format=pjpg&auto=webp&s=44d45c9602ee630705ce92902b8a8379201d8111
3. Blockchain layer:
The third layer deploys the “probabilistic slot protocol” (PSP). This protocol ranks the clients for each height of the chain, in an order that is derived determin- istically from the unbiased output of the random beacon for that height. A weight is then assigned to block proposals based on the proposer’s rank such that blocks from clients at the top of the list receive a higher weight. Forks are resolved by giving favor to the “heaviest” chain in terms of accumulated block weight — quite sim- ilar to how traditional proof-of-work consensus is based on the highest accumulated amount of work.
The first advantage of the PSP protocol is that the ranking is available instantaneously, which allows for a predictable, constant block time. The second advantage is that there is always a single highest-ranked client, which allows for a homogenous network bandwidth utilization. Instead, a race between clients would favor a usage in bursts.
4. Notarization layer:
Provides fast finality guarantees to clients and external observers. DFINITY deploys the novel technique of block notarization in its fourth layer to speed up finality. A notarization is a threshold signature under a block created jointly by registered clients. Only notarized blocks can be included in a chain. Of all RSA-based alternatives exist but suffer from an impracticality of setting up the thresh- old keys without a trusted dealer.
DFINITY achieves its high speed and short block times exactly because notarization is not full consensus.
DFINITY does not suffer from selfish mining attack or a problem nothing at stake because the authentication step is impossible for the opponent to build and maintain a series of linked and trusted blocks in secret.
DFINITY’s consensus is designed to operate on a network of millions of clients. To en- able scalability to this extent, the random beacon and notarization protocols are designed such as that they can be safely and efficiently delegated to a committee

1.1 OVERVIEW ABOUT DFINITY

DFINITY is a blockchain-based cloud-computing project that aims to develop an open, public network, referred to as the “internet computer,” to host the next generation of software and data. and it is a decentralized and non-proprietary network to run the next generation of mega-applications. It dubbed this public network “Cloud 3.0”.
DFINITY is a third generation virtual blockchain network that sets out to function as an “intelligent decentralised cloud,”¹ strongly focused on delivering a viable corporate cloud solution. The DFINITY project is overseen, supported and promoted by DFINITY Stiftung a not-for-profit foundation based in Zug, Switzerland.
DFINITY is a decentralized network design whose protocols generate a reliable “virtual blockchain computer” running on top of a peer-to-peer network upon which software can be installed and can operate in the tamperproof mode of smart contracts.
DFINITY introduces algorithmic governance in the form of a “Blockchain Nervous System” that can protect users from attacks and help restart broken systems, dynamically optimize network security and efficiency, upgrade the protocol and mitigate misuse of the platform, for example by those wishing to run illegal or immoral systems.
DFINITY is an Ethereum-compatible smart contract platform that is implementing some revolutionary ideas to address blockchain performance, scaling, and governance. Whereas
DFINITY could pose a credible threat to Ethereum’s extinction, the project is pursuing a coevolutionary strategy by contributing funding and effort to Ethereum projects and freely offering their technology to Ethereum for adoption. DFINITY has labeled itself Ethereum’s “crazy sister” to express it’s close genetic resemblance to Ethereum, differentiated by its obsession with performance and neuron-inspired governance model.
Dfinity raised $61 million from Andreesen Horowitz and Polychain Capital in a February 2018 funding round. At the time, Dfinity said it wanted to create an “internet computer” to cut the costs of running cloud-based business applications. A further $102 million funding round in August 2018 brought the project’s total funding to $195 million.
In May 2018, Dfinity announced plans to distribute around $35 million worth of Dfinity tokens in an airdrop. It was part of the company’s plan to create a “Cloud 3.0.” Because of regulatory concerns, none of the tokens went to US residents.
DFINITY be broadening and strengthening the EVM ecosystem by giving applications a choice of platforms with different characteristics. However, if DFINITY succeeds in delivering a fully EVM-compatible smart contract platform with higher transaction throughput, faster confirmation times, and governance mechanisms that can resolve public disputes without causing community splits, then it will represent a clearly superior choice for deploying new applications and, as its network effects grow, an attractive place to bring existing ones. Of course the challenge for DFINITY will be to deliver on these promises while meeting the security demands of a public chain with significant value at risk.

1.1.1 DFINITY FUTURE

  • DFINITY aims to explore new blockchain territory related to the original goals of the Ethereum project and is sometimes considered “Ethereum’s crazy sister.”
  • DFINITY is developing blockchain-based infrastructure to support a new style of the internet (akin to Ethereum’s “World Computer”), one in which the internet itself will support software applications and data rather than various cloud hosting providers.
  • The project suggests this reinvented software platform can simplify the development of new software systems, reduce the human capital needed to maintain and secure data, and preserve user data privacy.
  • Dfinity aims to reduce the costs of cloud services by creating a decentralized “internet computer” which may launch in 2020
  • Dfinity claims transactions on its network are finalized in 3–5 seconds, compared to 1 hour for Bitcoin and 10 minutes for Ethereum.

1.1.2 DFINITY’S VISION

DFINITY’s vision is its new internet infrastructure can support a wide variety of end-user and enterprise applications. Social media, messaging, search, storage, and peer-to-peer Internet interactions are all examples of functionalities that DFINITY plans to host atop its public Web 3.0 cloud-like computing resource. In order to provide the transaction and data capacity necessary to support this ambitious vision, DFINITY features a unique consensus model (dubbed Threshold Relay) and algorithmic governance via its Blockchain Nervous System (BNS) — sometimes also referred to as the Network Nervous System or NNS.

1.2 DFINITY COMMUNITY

The DFINITY community brings people and organizations together to learn and collaborate on products that help steward the next-generation of internet software and services. The Internet Computer allows developers to take on the monopolization of the internet, and return the internet back to its free and open roots. We’re committed to connecting those who believe the same through our events, content, and discussions.

https://preview.redd.it/0zv64fzf05e51.png?width=637&format=png&auto=webp&s=e2b17365fae3c679a32431062d8e3c00a57673cf

1.3 DFINITY ROADMAP (TIMELINE) February 15, 2017

February 15, 2017
Ethereum based community seed round raises 4M Swiss francs (CHF)
The DFINITY Stiftung, a not-for-profit foundation entity based in Zug, Switzerland, raised the round. The foundation held $10M of assets as of April 2017.
February 8, 2018
Dfinity announces a $61M fundraising round led by Polychain Capital and Andreessen Horowitz
The round $61M round led by Polychain Capital and Andreessen Horowitz, along with an DFINITY Ecosystem Venture Fund which will be used to support projects developing on the DFINITY platform, and an Ethereum based raise in 2017 brings the total funding for the project over $100 million. This is the first cryptocurrency token that Andressen Horowitz has invested in, led by Chris Dixon.
August 2018
Dfinity raises a $102,000,000 venture round from Multicoin Capital, Village Global, Aspect Ventures, Andreessen Horowitz, Polychain Capital, Scalar Capital, Amino Capital and SV Angel.
January 23, 2020
Dfinity launches an open source platform aimed at the social networking giants

2.DFINITY TECHNOLOGY

Dfinity is building what it calls the internet computer, a decentralized technology spread across a network of independent data centers that allows software to run anywhere on the internet rather than in server farms that are increasingly controlled by large firms, such as Amazon Web Services or Google Cloud. This week Dfinity is releasing its software to third-party developers, who it hopes will start making the internet computer’s killer apps. It is planning a public release later this year.
At its core, the DFINITY consensus mechanism is a variation of the Proof of Stake (PoS) model, but offers an alternative to traditional Proof of Work (PoW) and delegated PoS (dPoS) networks. Threshold Relay intends to strike a balance between inefficiencies of decentralized PoW blockchains (generally characterized by slow block times) and the less robust game theory involved in vote delegation (as seen in dPoS blockchains). In DFINITY, a committee of “miners” is randomly selected to add a new block to the chain. An individual miner’s probability of being elected to the committee proposing and computing the next block (or blocks) is proportional to the number of dfinities the miner has staked on the network. Further, a “weight” is attributed to a DFINITY chain based on the ranks of the miners who propose blocks in the chain, and that weight is used to choose between competing chains (i.e. resolve chain forks).
A decentralized random beacon manages the random selection process of temporary block producers. This beacon is a Variable Random Function (VRF), which is a pseudo-random function that provides publicly verifiable proofs of its outputs’ correctness. A core component of the random beacon is the use of Boneh-Lynn-Shacham (BLS) signatures. By leveraging the BLS signature scheme, the DFINITY protocol ensures no actor in the network can determine the outcome of the next random assignment.
Dfinity is introducing a new standard, which it calls the internet computer protocol (ICP). These new rules let developers move software around the internet as well as data. All software needs computers to run on, but with ICP the computers could be anywhere. Instead of running on a dedicated server in Google Cloud, for example, the software would have no fixed physical address, moving between servers owned by independent data centers around the world. “Conceptually, it’s kind of running everywhere,” says Dfinity engineering manager Stanley Jones.
DFINITY also features a native programming language, called ActorScript (name may be subject to change), and a virtual machine for smart contract creation and execution. The new smart contract language is intended to simplify the management of application state for programmers via an orthogonal persistence environment (which means active programs are
not required to retrieve or save their state). All ActorScript contracts are eventually compiled down to WebAssembly instructions so the DFINITY virtual machine layer can execute the logic of applications running on the network. The advantage of using the WebAssembly standard is that all major browsers support it and a variety of programming languages can compile down to Wasm (not just ActorScript).
Dfinity is moving fast. Recently, Dfinity showed off a TikTok clone called CanCan. In January it demoed a LinkedIn-alike called LinkedUp. Neither app is being made public, but they make a convincing case that apps made for the internet computer can rival the real things.

2.1 DFINITY CORE APPLICATIONS

The DFINITY cloud has two core applications:
  1. Enabling the re-engineering of business: DFINITY ambitiously aims to facilitate the re-engineering of mass-market services (such as Web Search, Ridesharing Services, Messaging Services, Social Media, Supply Chain, etc) into open source businesses that leverage autonomous software and decentralised governance systems to operate and update themselves more efficiently.
  2. Enable the re-engineering of enterprise IT systems to reduce costs: DFINITY seeks to re-engineer enterprise IT systems to take advantage of the unique properties that blockchain computer networks provide.
At present, computation on blockchain-based computer networks is far more expensive than traditional, centralised solutions (Amazon Web Services, Microsoft Azure, Google Cloud Platform, etc). Despite increasing computational cost, DFINITY intends to lower net costs “by 90% or more” through reducing the human capital cost associated with sustaining and supporting these services.
Whilst conceptually similar to Ethereum, DFINITY employs original and new cryptography methods and protocols (crypto:3) at the network level, in concert with AI and network-fuelled systemic governance (Blockchain Nervous System — BNS) to facilitate Corporate adoption.
DFINITY recognises that different users value different properties and sees itself as more of a fully compatible extension of the Ethereum ecosystem rather than a competitor of the Ethereum network.
In the future, DFINITY hopes that much of their “new crypto might be used within the Ethereum network and are also working hard on shared technology components.”
As the DFINITY project develops over time, the DFINITY Stiftung foundation intends to steadily increase the BNS’ decision-making responsibilities over time, eventually resulting in the dissolution of its own involvement entirely, once the BNS is sufficiently sophisticated.
DFINITY consensus mechanism is a heavily optimized proof of stake (PoS) model. It places a strong emphasis on transaction finality through implementing a Threshold Relay technique in conjunction with the BLS signature scheme and a notarization method to address many of the problems associated with PoS consensus.

2.2 THRESHOLD RELAY

As a public cloud computing resource, DFINITY targets business applications by substantially reducing cloud computing costs for IT systems. They aim to achieve this with a highly scalable and powerful network with potentially unlimited capacity. The DFINITY platform is chalk full of innovative designs and features like their Blockchain Nervous System (BNS) for algorithmic governance.
One of the primary components of the platform is its novel Threshold Relay Consensus model from which randomness is produced, driving the other systems that the network depends on to operate effectively. The consensus system was first designed for a permissioned participation model but can be paired with any method of Sybil resistance for an open participation model.
“The Threshold Relay is the mechanism by which Dfinity randomly samples replicas into groups, sets the groups (committees) up for threshold operation, chooses the current committee, and relays from one committee to the next is called the threshold relay.”
Threshold Relay consists of four layers (As mentioned previously):
  1. Notary layer, which provides fast finality guarantees to clients and external observers and eliminates nothing-at-stake and selfish mining attacks, providing Sybil attack resistance.
  2. Blockchain layer that builds a blockchain from validated transactions via the Probabilistic Slot Protocol driven by the random beacon.
  3. Random beacon, which as previously covered, provides the source of randomness for all higher layers like the blockchain layer smart contract applications.
  4. Identity layer that provides a registry of all clients.

2.2.1 HOW DOES THRESHOLD RELAY WORK?

Threshold Relay produces an endogenous random beacon, and each new value defines random group(s) of clients that may independently try and form into a “threshold group”. The composition of each group is entirely random such that they can intersect and clients can be presented in multiple groups. In DFINITY, each group is comprised of 400 members. When a group is defined, the members attempt to set up a BLS threshold signature system using a distributed key generation protocol. If they are successful within some fixed number of blocks, they then register the public key (“identity”) created for their group on the global blockchain using a special transaction, such that it will become part of the set of active groups in a following “epoch”. The network begins at “genesis” with some number of predefined groups, one of which is nominated to create a signature on some default value. Such signatures are random values — if they were not then the group’s signatures on messages would be predictable and the threshold signature system insecure — and each random value produced thus is used to select a random successor group. This next group then signs the previous random value to produce a new random value and select another group, relaying between groups ad infinitum and producing a sequence of random values.
In a cryptographic threshold signature system a group can produce a signature on a message upon the cooperation of some minimum threshold of its members, which is set to 51% in the DFINITY network. To produce the threshold signature, group members sign the message
individually (here the preceding group’s threshold signature) creating individual “signature shares” that are then broadcast to other group members. The group threshold signature can be constructed upon combination of a sufficient threshold of signature shares. So for example, if the group size is 400, if the threshold is set at 201 any client that collects that many shares will be able to construct the group’s signature on the message. Other group members can validate each signature share, and any client using the group’s public key can validate the single group threshold signature produced by combining them. The magic of the BLS scheme is that it is “unique and deterministic” meaning that from whatever subset of group members the required number of signature shares are collected, the single threshold signature created is always the same and only a single correct value is possible.
Consequently, the sequence of random values produced is entirely deterministic and unmanipulable, and signatures generated by relaying between groups produces a Verifiable Random Function, or VRF. Although the sequence of random values is pre-determined given some set of participating groups, each new random value can only be produced upon the minimal agreement of a threshold of the current group. Conversely, in order for relaying to stall because a random number was not produced, the number of correct processes must be below the threshold. Thresholds are configured so that this is extremely unlikely. For example, if the group size is set to 400, and the threshold is 201, 200 or more of the processes must become faulty to prevent production. If there are 10,000 processes in the network, of which 3,000 are faulty, the probability this will occur is less than 10e-17.

2.3 DFINITY TOKEN

The DFINITY blockchain also supports a native token, called dfinities (DFN), which perform multiple roles within the network, including:
  1. Fuel for deploying and running smart contracts.
  2. Security deposits (i.e. staking) that enable participation in the BNS governance system.
  3. Security deposits that allow client software or private DFINITY cloud networks to connect to the public network.
Although dfinities will end up being assigned a value by the market, the DFINITY team does not intend for DFN to act as a currency. Instead, the project has envisioned PHI, a “next-generation” crypto-fiat scheme, to act as a stable medium of exchange within the DFINITY ecosystem.
Neuron operators can earn Dfinities by participating in network-wide votes, which could be concerning protocol upgrades, a new economic policy, etc. DFN rewards for participating in the governance system are proportional to the number of tokens staked inside a neuron.

2.4 SCALABILITY

DFINITY is constantly developing with a structure that separates consensus, validation, and storage into separate layers. The storage layer is divided into multiple strings, each of which is responsible for processing transactions that occur in the fragment state. The verification layer is responsible for combining hashes of all fragments in a Merkle-like structure that results in a global state fractionation that is stored in blocks in the top-level chain.

2.5 DFINITY CONSENSUS ALGORITHM

The single most important aspect of the user experience is certainly the time required before a transaction becomes final. This is not solved by a short block time alone — Dfinity’s team also had to reduce the number of confirmations required to a small constant. DFINITY moreover had to provide a provably secure proof-of-stake algorithm that scales to millions of active participants without compromising any bit on decentralization.
Dfinity soon realized that the key to scalability lay in having an unmanipulable source of randomness available. Hence they built a scalable decentralized random beacon, based on what they call the Threshold Relay technique, right into the foundation of the protocol. This strong foundation drives a scalable and fast consensus layer: On top of the beacon runs a blockchain which utilizes notarization by threshold groups to achieve near-instant finality. Details can be found in the overview paper that we are releasing today.
The roots of the DFINITY consensus mechanism date back to 2014 when thair Chief Scientist, Dominic Williams, started to look for more efficient ways to drive large consensus networks. Since then, much research has gone into the protocol and it took several iterations to reach its current design.
For any practical consensus system the difficulty lies in navigating the tight terrain that one is given between the boundaries imposed by theoretical impossibility-results and practical performance limitations.
The first key milestone was the novel Threshold Relay technique for decentralized, deterministic randomness, which is made possible by certain unique characteristics of the BLS signature system. The next breakthrough was the notarization technique, which allows DFINITY consensus to solve the traditional problems that come with proof-of-stake systems. Getting the security proofs sound was the final step before publication.
DFINITY consensus has made the proper trade-offs between the practical side (realistic threat models and security assumptions) and the theoretical side (provable security). Out came a flexible, tunable algorithm, which we expect will establish itself as the best performing proof-of-stake algorithm. In particular, having the built-in random beacon will prove to be indispensable when building out sharding and scalable validation techniques.

2.6 LINKEDUP

The startup has rather cheekily called this “an open version of LinkedIn,” the Microsoft-owned social network for professionals. Unlike LinkedIn, LinkedUp, which runs on any browser, is not owned or controlled by a corporate entity.
LinkedUp is built on Dfinity’s so-called Internet Computer, its name for the platform it is building to distribute the next generation of software and open internet services.
The software is hosted directly on the internet on a Switzerland-based independent data center, but in the concept of the Internet Computer, it could be hosted at your house or mine. The compute power to run the application LinkedUp, in this case — is coming not from Amazon AWS, Google Cloud or Microsoft Azure, but is instead based on the distributed architecture that Dfinity is building.
Specifically, Dfinity notes that when enterprises and developers run their web apps and enterprise systems on the Internet Computer, the content is decentralized across a minimum of four or a maximum of an unlimited number of nodes in Dfinity’s global network of independent data centers.
Dfinity is an open source for LinkedUp to developers for creating other types of open internet services on the architecture it has built.
“Open Social Network for Professional Profiles” suggests that on Dfinity model one can create “Open WhatsApp”, “Open eBay”, “Open Salesforce” or “Open Facebook”.
The tools include a Canister Software Developer Kit and a simple programming language called Motoko that is optimized for Dfinity’s Internet Computer.
“The Internet Computer is conceived as an alternative to the $3.8 trillion legacy IT stack, and empowers the next generation of developers to build a new breed of tamper-proof enterprise software systems and open internet services. We are democratizing software development,” Williams said. “The Bronze release of the Internet Computer provides developers and enterprises a glimpse into the infinite possibilities of building on the Internet Computer — which also reflects the strength of the Dfinity team we have built so far.”
Dfinity says its “Internet Computer Protocol” allows for a new type of software called autonomous software, which can guarantee permanent APIs that cannot be revoked. When all these open internet services (e.g. open versions of WhatsApp, Facebook, eBay, Salesforce, etc.) are combined with other open software and services it creates “mutual network effects” where everyone benefits.
On 1 November, DFINITY has released 13 new public versions of the SDK, to our second major milestone [at WEF Davos] of demoing a decentralized web app called LinkedUp on the Internet Computer. Subsequent milestones towards the public launch of the Internet Computer will involve:
  1. On boarding a global network of independent data centers.
  2. Fully tested economic system.
  3. Fully tested Network Nervous Systems for configuration and upgrades

2.7 WHAT IS MOTOKO?

Motoko is a new software language being developed by the DFINITY Foundation, with an accompanying SDK, that is designed to help the broadest possible audience of developers create reliable and maintainable websites, enterprise systems and internet services on the Internet Computer with ease. By developing the Motoko language, the DFINITY Foundation will ensure that a language that is highly optimized for the new environment is available. However, the Internet Computer can support any number of different software frameworks, and the DFINITY Foundation is also working on SDKs that support the Rust and C languages. Eventually, it is expected there will be many different SDKs that target the Internet Computer.
Full article
submitted by CoinEx_Institution to u/CoinEx_Institution [link] [comments]

Exchange 30+ cryptocurrencies to DigiByte at Flyp.me. Instant and accountless exchange.

We are thrilled to announce that another great coin will be listed in the Flyp.me Accountless Exchange! Starting today, DigiByte (DGB) is instantly available on Flyp.me.
Everyone can now flyp 30 different cryptocurrencies to DGB, head to Flyp.me. You don’t need any registration, email, nor account. Just one click to exchange seamlessly and instantly while always being in control of your privacy and private keys.
Thanks to the Digibyte team launching the DigiByte blockchain, an open-protocol with a focus on cybersecurity, digiassets, payments, and secure communications technologies was formed. Since 2014, many other blockchains like Ethereum, Zcash & Dogecoin have adopted DigiByte technology such as DigiShield.
We are extremely happy to allow everyone to instantly access DGB using their preferred wallet, while maintaining control of their private keys.
We are very pleased to bring you instant access to DigiByte. Since 2017, Flyp.me accountless exchanger has been focusing on privacy, simplicity and speed.
Welcome to accountless trading, DigiByte Community!
About DigiByte
Developed in 2013, the DigiByte blockchain was released in January 2014 by Jared Tate. Although based on Bitcoin, adjustments in the code allow for 15-second block times, real-time difficulty adjustment and DigiAssets.
With DigiAssets you can build on top of DigiByte, because it is a scalable secondary layer on top of the global DigiByte blockchain that allows for the decentralized issuance of assets, tokens, smart contracts, digital identity and much more. DigiByte have had 285,000+ full node downloads since 2017.
About Flyp.me
Flyp.me is the professional tool for instant crypto trading. There is no registration necessary and no hidden analytics tracking you. Moreover, Flyp.me does not control users' funds, so your private keys are not at risk of being held on third-party services.
Flyp.me currently supports over 30 cryptocurrencies and is continuing to add more: Bitcoin, Ethereum, Zcash, Augur, Litecoin, Syscoin, Pivx, Blackcoin, Dash, Decred, Dogecoin, Flyp.me Token, Gamecredits, Peercoin, Aidcoin, 0x, Vertcoin, Basic Attention Token, BLOCKv, Groestlcoin, Essentia, DAI, DGD, Power Ledger, Enjincoin, TrueUSD, Cardano, Storj, Monero, Maker, TetherUS and now DigiByte.
Connect with the community on Telegram, Twitter and Facebook.
submitted by flypme to flypme [link] [comments]

Vitalik's response to Tuur

I interlaced everything between Vitalik and Tuur to make it easier to read.
1/ People often ask me why I’m so “against” Ethereum. Why do I go out of my way to point out flaws or make analogies that put it in a bad light?
Intro
2/ First, ETH’s architecture & culture is opposite that of Bitcoin, and yet claims to offer same solutions: decentralization, immutability, SoV, asset issuance, smart contracts, …
Second, ETH is considered a crypto ‘blue chip’, thus colors perception of uninformed newcomers.
Agree! I personally find Ethereum culture far saner, though I am a bit biased :)
3/ I've followed Ethereum since 2014 & feel a responsibility to share my concerns. IMO contrary to its marketing, ETH is at best a science experiment. It’s now valued at $13B, which I think is still too high.
Not an argument
4/ I agree with Ethereum developer Vlad Zamfir that it’s not money, not safe, and not scalable. https://twitter.com/VladZamfistatus/838006311598030848
@VladZamfir Eth isn't money, so there is no monetary policy. There is currently fixed block issuance with an exponential difficulty increase (the bomb).
I'm pretty sure Vlad would say the exact same thing about Bitcoin
5/ To me the first red flag came up when in our weekly hangout we asked the ETH founders about to how they were going to scale the network. (We’re now 4.5 years later, and sharding is still a pipe dream.)
Ethereum's Joe Lubin in June 2014: "anticipate blockchain bloat—working on various sharding ideas". https://www.youtube.com/watch?v=oJG9g0lCPU8&feature=youtu.be&t=36m41s
The core principles have been known for years, the core design for nearly a year, and details for months, with implementations on the way. So sharding is definitely not at the pipe dream stage at this point.
6/ Despite strong optimism that on-chain scaling of Ethereum was around the corner (just another engineering job), this promise hasn’t been delivered on to date.
Sure, sharding is not yet finished. Though more incremental stuff has been going well, eg. uncle rates are at near record lows despite very high chain usage.
7/ Recently, a team of reputable developers decided to peer review a widely anticipated Casper / sharding white paper, concluding that it does not live up to its own claims.
Unmerciful peer review of Vlad Zamfir & co's white paper to scale Ethereum: "the authors do NOT prove that the CBC Casper family of protocols is Byzantine fault tolerant in either practice or theory".
That review was off the mark in many ways, eg. see https://twitter.com/technocrypto/status/1071111404340604929, and by the way CBC is not even a prerequisite for Serenity
8/ On the 2nd layer front, devs are now trying to scale Ethereum via scale via state channels (ETH’s version of Lightning), but it is unclear whether main-chain issued ERC20 type tokens will be portable to this environment.
Umm... you can definitely use Raiden with arbitrary ERC20s. That's why the interface currently uses WETH (the ERC20-fied version of ether) and not ETH
9/ Compare this to how the Bitcoin Lightning Network project evolved:
elizabeth stark @starkness: For lnd: First public code released: January 2016 Alpha: January 2017 Beta: March 2018…
Ok
10/ Bitcoin’s Lightning Network is now live, and is growing at rapid clip.
Jameson Lopp @lopp: Lightning Network: January 2018 vs December 2018
Sure, though as far as I understand there's still a low probability of finding routes for nontrivial amounts, and there's capital lockup griefing vectors, and privacy issues.... FWIW I personally never thought lightning is unworkable, it's just a design that inherently runs into ten thousand small issues that will likely take a very long time to get past.
11/ In 2017, more Ethereum scaling buzz was created, this time the panacea was “Plasma”.
@TuurDemeester Buterin & Poon just published a new scaling proposal for Ethereum, "strongly complementary to base-layer PoS and sharding": plasma.io https://twitter.com/VitalikButerin/status/895467347502182401
Yay, Plasma!
12/ However, upon closer examination it was the recycling of some stale ideas, and the project went nowhere:
Peter Todd @peterktodd These ideas were all considered in the Treechains design process, and ultimately rejected as insecure.
Just because Peter Todd rejected something as "insecure" doesn't mean that it is. In general, the ethereum research community is quite convinced that the fundamental Plasma design is fine, and as far as I understand there are formal proofs on the way. The only insecurity that can't be avoided is mass exit vulns, and channel-based systems have those too.
13/ The elephant in the room is the transition to proof-of-stake, an “environmentally friendly” way to secure the chain. (If this was the plan all along, why create a proof-of-work chain first?)
@TuurDemeester "Changing from proof of work to proof of stake changes the economics of the system, all the rules change and it will impact everything."
Umm... we created a proof of work chain first because we did not have a satisfactory proof of stake algo initially?
14/ For the uninitiated, here’s a good write-up that highlights some of the fundamental design problems of proof-of-stake. Like I said, this is science experiment territory.
And here's a set of long arguments from me on why proof of stake is just fine: https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ. For a more philosophical piece, see https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51
15/ Also check out this thread about how Proof of Stake blockchains require subjectivity (i.e. a trusted third party) to achieve consensus: https://forum.blockstack.org/t/pos-blockchains-require-subjectivity-to-reach-consensus/762?u=muneeb … and this thread on Bitcoin: https://www.reddit.com/Bitcoin/comments/59t48m/proofofstake_question/
Yes, we know about weak subjectivity, see https://blog.ethereum.org/2014/11/25/proof-stake-learned-love-weak-subjectivity/. It's really not that bad, especially given that users need to update their clients once in a while anyway, oh and by the way even if the weak subjectivity assumption is broken an attacker still needs to gather up that pile of old keys making up 51% of the stake. And also to defend against that there's Universal Hash Time.
16/ Keep in mind that Proof of Stake (PoS) is not a new concept at all. Proof-of-Work actually was one of the big innovations that made Bitcoin possible, after PoS was deemed impractical because of censorship vulnerability.
@TuurDemeester TIL Proof-of-stake based private currency designs date at least back to 1998. https://medium.com/swlh/the-untold-history-of-bitcoin-enter-the-cypherpunks-f764dee962a1
Oh I definitely agree that proof of work was superior for bootstrap, and I liked it back then especially because it actually managed to be reasonably egalitarian around 2009-2012 before ASICs fully took over. But at the present time it doesn't really have that nice attribute.
17/ Over the years, this has become a pattern in Ethereum’s culture: recycling old ideas while not properly referring to past research and having poor peer review standards. This is not how science progresses.Tuur Demeester added,
[email protected] has been repeatedly accused of /criticised for not crediting prior art. Once again with plasma: https://twitter.com/DamelonBCWS/status/895643582278782976
I try to credit people whenever I can; half my blog and ethresear.ch posts have a "special thanks" section right at the top. Sometimes we end up re-inventing stuff, and sometimes we end up hearing about stuff, forgetting it, and later re-inventing it; that's life as an autodidact. And if you feel you've been unfairly not credited for something, always feel free to comment, people have done this and I've edited.
18/ One of my big concerns is that sophistry and marketing hype is a serious part of Ethereum’s success so far, and that overly inflated expectations have lead to an inflated market cap.
Ok, go on.
19/ Let’s illustrate with an example.
...
20/ A few days ago, I shared a critical tweet that made the argument that Ethereum’s value proposition is in essence utopian.
@TuurDemeester Ethereum-ism sounds a bit like Marxism to me:
  • What works today (PoW) is 'just a phase', the ideal & unproven future is to come: Proof-of-Stake.…
...
21/ I was very serious about my criticism. In fact, each one of the three points addressed what Vitalik Buterin has described as “unique value propositions of Ethereum proper”. https://www.reddit.com/ethereum/comments/5jk3he/how_to_prevent_the_cannibalism_of_ethereum_into/dbgujr8/
...
22/ My first point, about Ethereum developers rejecting Proof-of-Work, has been illustrated many times over By Vitalik and others. (See earlier in this tweetstorm for more about how PoS is unproven.)
Vitalik Non-giver of Ether @VitalikButerin: I don't believe in proof of work!
See above for links as to why I think proof of stake is great.
23/ My second point addresses Ethereum’s romance with the vague and dangerous notion of ‘social consensus’, where disruptive hard-forks are used to ‘upgrade’ or ‘optimize’ the system, which inevitably leads to increased centralization. More here:
See my rebuttal to Tuur's rebuttal :)
24/ My third point addresses PoS’ promise of perpetual income to ETHizens. Vitalik is no stranger to embracing free lunch ideas, e.g. during his 2014 ETH announcement speech, where he described a coin with a 20% inflation tax as having “no cost” to users.
Yeah, I haven't really emphasized perpetual income to stakers as a selling point in years. I actually favor rewards being as low as possible while still being high enough for security.
25/ In his response to my tweet, Vitalik adopted my format to “play the same game” in criticizing Bitcoin. My criticisms weren't addressed, and his response was riddled with errors. Yet his followers gave it +1,000 upvotes!
Vitalik Non-giver of Ether @VitalikButerin: - What works today (L1) is just a phase, ideal and unproven future (usable L2) is to come - Utopian concept of progress: we're already so confident we're finished we ain't needin no hard forks…
Ok, let's hear about what the errors are...
26/ Rebuttal: - BTC layer 1 is not “just a phase”, it always will be its definitive bedrock for transaction settlement. - Soft forking digital protocols has been the norm for over 3 decades—hard-forks are the deviation! - Satoshi never suggested hyperbitcoinization as a goal.
Sure, but (i) the use of layer 1 for consumer payments is definitely, in bitcoin ideology, "just a phase", (ii) I don't think you can make analogies between consensus protocols and other kinds of protocols, and between soft forking consensus protocols and protocol changes in other protocols, that easily, (iii) plenty of people do believe that hyperbitcoinization as a goal. Oh by the way: https://twitter.com/tuurdemeestestatus/545993119599460353
27/ This kind of sophistry is exhausting and completely counter-productive, but it can be very convincing for an uninformed retail public.
Ok, go on.
28/ Let me share a few more inconvenient truths.
...
29/ In order to “guarantee” the transition to PoS’ utopia of perpetual income (staking coins earns interest), a “difficulty bomb” was embedded in the protocol, which supposedly would force miners to accept the transition.
The intended goal of the difficulty bomb was to prevent the protocol from ossifying, by ensuring that it has to hard fork eventually to reset the difficulty bomb, at which point the status quo bias in favor of not changing other protocol rules at the same time would be weaker. Though forcing a switch to PoS was definitely a key goal.
30/ Of course, nothing came of this, because anything in the ETH protocol can be hard-forked away. Another broken promise.
Tuur Demeester @TuurDemeester: Looks like another Ethereum hard-fork is going to remove the "Ice Age" (difficulty increase meant to incentivize transition to PoS). https://www.cryptocompare.com/coins/guides/what-is-the-ethereum-ice-age/
How is that a broken promise? There was no social contract to only replace the difficulty-bombed protocol with a PoS chain.
31/ Another idea that was marketed heavily early on, was that with ETH you could program smart contract as easily as javascript applications.
Tuur Demeester @TuurDemeester: I forgot, but in 2014 Ethereum was quite literally described as "Javascript-on-the-blockchain"
Agree that was over-optimistic, though the part of the metaphor that's problematic is the "be done with complex apps in a couple hours" part, NOT the "general-purpose languages are great" part.
32/ This was criticized by P2P & OS developers as a reckless notion, given that every smart contracts is actually a “de novo cryptographic protocol”. In other words, it’s playing with fire. https://bitcointalk.org/index.php?topic=1427885.msg14601127#msg14601127
See above
33/ The modular approach to Bitcoin seems to be much better at compartmentalizing risk, and thus reducing attack surfaces. I’ve written about modular scaling here...
To be fair, risk is reduced because Bitcoin does less.
34/ Another huge issue that Ethereum has is with scaling. By putting “everything on the blockchain” (which stores everything forever) and dubbing it “the world computer”, you are going to end up with a very slow and clogged up system.
Christopher Allen @ChristopherA: AWS cost: $0.000000066 for calc, Ethereum: $26.55. This is about 400 million times as expensive. World computer? https://hackernoon.com/ether-purchase-power-df40a38c5a2f
We never advocated "putting everything on the blockchain". The phrase "world computer" was never meant to be interpreted as "everyone's personal desktop", but rather as a common platform specifically for the parts of applications that require consensus on shared state. As evidence of this, notice how Whisper and Swarm were part of the vision as complements to Ethereum right from the start.
35/ By now the Ethereum bloat is so bad that cheaply running an individual node is practically impossible for a lay person. ETH developers are also imploring people to not deploy more smart contract apps on its blockchain.
Tuur Demeester @TuurDemeester: But... deploying d-apps on the "Ethereum Virtual Machine" is exactly what everyone was encouraged to do for the past 4 years. Looks like on-chain scaling wasn't such a great idea after all.
Umm.... I just spun up a node from scratch last week. On a consumer laptop.
36/ As a result, and despite the claims that running a node in “warp” mode is easy and as good as a full node, Ethereum is becoming increasingly centralized.
@TuurDemeester Finally a media article touching on the elephant in the room: Ethereum has become highly centralized. #infura https://www.coindesk.com/the-race-is-on-to-replace-ethereums-most-centralized-layeamp?__twitter_impression=true
See above
37/ Another hollow claim: in 2016, Ethereum was promoted as being censorship resistant…
Tuur Demeester @TuurDemeester: Pre TheDAO #Ethereum presentation: "uncensorable, code is law, bottom up". http://ow.ly/qW49302Pp92
Yes, the DAO fork did violate the notion of absolute immutability. However, the "forking the DAO will lead to doom and gloom" crowd was very wrong in one key way: it did NOT work as a precedent justifying all sorts of further state interventions. The community clearly drew a line in the sand by firmly rejecting EIP 867, and EIP 999 seems to now also be going nowhere. So it seems like there's some evidence that the social contract of "moderately but not infinitely strong immutability" actually can be stable.
38/ Yet later that year, after only 6% of ETH holders had cast a vote, ETH core devs decided to endorse a hard-fork that clawed back the funds from a smart contract that held 4.5% of all ETH in circulation. More here: ...
See above
39/ Other potential signs of centralization: Vitalik Buterin signing a deal with a Russian government institution, and ETH core developers experimenting with semi-closed meetings: https://twitter.com/coindesk/status/902892844955860993 …,
Hudson Jameson @hudsonjameson: The "semi-closed" Ethereum 1.x meeting from last Friday was an experiment. The All Core Dev meeting this Friday will be recorded as usual.
Suppose I were to tomorrow sign up to work directly for Kim Jong Un. What concretely would happen to the Ethereum protocol? I suspect very little; I am mostly involved in the Serenity work, and the other researchers have proven very capable of both pushing the spec forward even without me and catching any mistakes with my work. So I don't think any argument involving me applies. And we ended up deciding not to do more semi-closed meetings.
40/ Another red flag to me is the apparent lack of relevant expertise in the ETH development community. (Check the responses…)
Tuur Demeester @TuurDemeester: Often heard: "but Ethereum also has world class engineers working on the protocol". Please name names and relevant pedigree so I can follow and learn. https://twitter.com/TuurDemeestestatus/963029019447955461
I personally am confident in the talents of our core researchers, and our community of academic partners. Most recently the latter group includes people from Starkware, Stanford CBR, IC3, and other groups.
41/ For a while, Microsoft veteran Lucius Meredith was mentioned as playing an important role in ETH scaling, but now he is likely distracted by the failure of his ETH scaling company RChain. https://blog.ethereum.org/2015/12/24/understanding-serenity-part-i-abstraction/
I have no idea who described Lucius Meredith's work as being important for the Serenity roadmap.... oh and by the way, RChain is NOT an "Ethereum scaling company"
42/ Perhaps the recently added Gandalf of Ethereum, with his “Fellowship of Ethereum Magicians” [sic] can save the day, but imo that seems unlikely...
Honestly, I don't see why Ethereum Gandalf needs to save the day, because I don't see what is in danger and needs to be saved...
43/ This is becoming a long tweetstorm, so let’s wrap up with a few closing comments.
Yay!
44/ Do I have a conflict of interest? ETH is a publicly available asset with no real barriers to entry, so I could easily get a stake. Also, having met Vitalik & other ETH founders several times in 2013-’14, it would have been doable for me to become part of the in-crowd.
Agree there. And BTW I generally think financial conflicts of interest are somewhat overrated; social conflicts/tribal biases are the bigger problem much of the time. Though those two kinds of misalignments do frequently overlap and reinforce each other so they're difficult to fully disentangle.
45/ Actually, I was initially excited about Ethereum’s smart contract work - this was before one of its many pivots.
Tuur Demeester @TuurDemeester: Ethereum is probably the first programming language I will teach myself - who wouldn't want the ability to program smart BTC contracts?
Ethereum was never about "smart BTC contracts"..... even "Ethereum as a Mastercoin-style meta-protocol" was intended to be built on top of Primecoin.
46/ Also, I have done my share of soul searching about whether I could be suffering from survivor’s bias.
@TuurDemeester I just published “I’m not worried about Bitcoin Unlimited, but I am losing sleep over Ethereum” https://medium.com/p/im-not-worried-about-bitcoin-unlimited-but-i-am-losing-sleep-over-ethereum-b5251c54e66d
Ok, good.
47/ Here’s why Ethereum is dubious to me: rather than creating an open source project & testnet to work on these interesting computer science problems, its founders instead did a securities offering, involving many thousands of clueless retail investors.
What do you mean "instead of"? We did create an open source project and testnet! Whether or not ETH is a security is a legal question; seems like SEC people agree it's not: https://www.cnbc.com/2018/06/14/bitcoin-and-ethereum-are-not-securities-but-some-cryptocurrencies-may-be-sec-official-says.html
48/ Investing in the Ethereum ICO was akin to buying shares in a startup that had “invent time travel” as part of its business plan. Imo it was a reckless security offering, and it set the tone for the terrible capital misallocation of the 2017 ICO boom.
Nothing in the ethereum roadmap requires time-travel-like technical advancements or anything remotely close to that. Proof: we basically have all the fundamental technical advancements we need at this point.
49/ In my view, Ethereum is the Yahoo of our day - an unscalable “blue chip” cryptocurrency:
Tuur Demeester @TuurDemeester: 1/ The DotCom bubble shows that the market isn't very good at valuing early stage technology. I'll use Google vs. Yahoo to illustrate.
Got it.
50/ I’ll close with a few words from Gregory Maxwell from 2016,: https://bitcointalk.org/index.php?topic=1427885.msg14601127#msg14601127
See my rebuttal to Greg from 2 years ago: https://www.reddit.com/ethereum/comments/4g1bh6/greg_maxwells_critique_of_ethereum_blockchains/
submitted by shouldbdan to ethtrader [link] [comments]

IoT Testing !!!

IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices. Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article. Given the above, many questions arise related to the security status of IoT devices, namely: What are the current standards and protocols for IoT? What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have? What methods of testing IoT devices exist? Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.
Challenges of testing IoT devices
To a request to name essential items, many would answer: food, a roof over your head, clothes … With one caveat: this was the case in the last century.
Since then, the species Homo Sapiens has accumulated needs. We need automatic sensors to control the lighting, not just switches, for smart systems to monitor health and car traffic. The list goes on … In general, we can make life easier and better.
Let’s try to figure out how all this Internet of things works before moving on to testing.
IoT testing
Content
What is the Internet of Things (IoT)? Examples of IoT devices # 1) Wearable technology: # 2) Infrastructure and development # 3) Health Technologies that are present in IoT IoT Testing # 1) Usability: # 2) IoT Security: # 3) Network features: # 4) Efficiency: # 5) Compatibility testing: # 6) Pilot testing: # 7) Check for compliance: # 8) Testing updates: IoT testing challenges # 1) Hard / soft # 2) Device Interaction Model # 3) Testing data coming in real time # 4) UI # 5) Network Availability IoT Testing Tools # 1) Software: # 2) Hard: Total What is the Internet of Things (IoT)? The Internet of things (or IoT) is a network that combines many objects: vehicles, home automation, medical equipment, microchips, etc. All these constituent elements accumulate and transmit data. Through this technology, the user controls the devices remotely.

Examples of IoT devices

# 1) Wearable technology: Fitbit Fitness Bracelets and Apple Watch smart watches sync seamlessly with other mobile devices.

IoT – watches and bracelets

Itís easier to collect health information: heart rate, body activity during sleep, etc.
# 2) Infrastructure and development The CitySense app analyzes lighting data online and turns lights on and off automatically. There are applications that control traffic lights or report on the availability of parking lots.
# 3) Health Some health monitoring systems are used in hospitals. The basis of their work is indicative data. These services control the dosage of drugs at different times of the day. For example, the UroSense application monitors the level of fluid in the body and, if necessary, increases this level. And doctors will learn about patient information wirelessly.
Technologies that are present in IoT RFID (Radio Frequency Identification), EPC (Electronic Product Code) NFC (ìNear Field Communicationî) provides two-way communication between devices. This technology is present in smartphones and is used for contactless transactions.
Bluetooth It is widely used in situations where near-field communication is sufficient. Most often present in wearable devices. Z-Wave. Low frequency RF technology. Most often used for home automation, lighting control, etc. WiFi. The most popular network for IoT (file, data and message transfer). IoT Testing Consider an example : a medical system that monitors health status, heart rate, fluid content, and sends reports to healthcare providers. Data is displayed in the system; archives available. And doctors are already deciding whether to take medication for the patient remotely.
IoT architecture
There are several approaches for testing the IoT architecture.
# 1) Usability: It is necessary to provide usability testing of each device. A medical device that monitors your health should be portable.
Sufficiently thought out equipment is needed that would send not only notifications, but also error messages, warnings, etc. The system must have an option that captures events, so that the end user understands. If this is not possible, event information is stored in the database. The ability to process data and exchange tasks between devices is carefully checked. # 2) IoT Security: Data is at the heart of all connected devices. Therefore, unauthorized access during data transfer is not ruled out. From the point of view of software testing, it is necessary to check how secure / encrypted the data is. If there is a UI, you need to check if it is password protected. # 3) Network features: Network connectivity and IoT functionality are critical. After all, we are talking about a system that is used for health purposes. Two main aspects are tested: The presence of a network , the possibility of data transfer (whether jobs are transferred from one device to another without any hitch). The scenario when there is no connection . Regardless of the level of reliability of the system, it is likely that the status of the system will be ìofflineî. If the network is unavailable, employees of the hospital or other organization need to know about it (notifications). Thus, they will be able to monitor the condition of the patient themselves, and not wait for the system to work. On the other hand, in such systems there is usually a mechanism that saves data if the system is offline. That is, data loss is eliminated. # 4) Efficiency: It is necessary to take into account the extent to which the healthcare solution is applicable in specific conditions. In testing, from 2 to 10 patients participate, data is transmitted to 10-20 devices. If the entire hospital is connected to the network, this is already 180-200 patients. That is, there will be more actual data than test data. In addition, it is necessary to test the utility for monitoring the system: current load, power consumption, temperature, etc. # 5) Compatibility testing: This item is always present in the plan for testing the IoT system. The compatibility of different versions of operating systems, browser types and their respective versions, devices of different generations, communication modes [for example, Bluetooth 2.0, 3.0] is extremely important for IoT. # 6) Pilot testing: Pilot testing is a mandatory point of the test plan. Only tests in the laboratory will allow us to conclude that the system is functional. In pilot testing, the number of users is limited. They make manipulations with the application and express their opinion. These comments turn out to be very helpful, they make a reliable application. # 7) Check for compliance: The system, which monitors the state of health, undergoes many compliance checks. It also happens that a software product passes all stages of testing, but fails the final test for compliance [testing is carried out by the regulatory body]. It is more advisable to check for compliance with norms and standards before starting the development cycle. # 8) Testing updates: IoT is a combination of many protocols, devices, operating systems, firmware, hardware, network layers, etc. When an update occurs – be it a system or something else of the above – rigorous regression testing is required. The overall strategy is being amended to avoid the difficulties associated with the upgrade.

IoT testing challengesIoT testing

# 1) Hard / soft IoT is an architecture in which software and hardware components are closely intertwined. Not only software is important, but also hard: sensors, gateways, etc.
Functional testing alone will not be enough to certify the system. All components are interdependent. IoT is much more complicated than simpler systems [only software or only hard].
# 2) Device Interaction Model Components of the network must interact in real time or close to real. All this becomes a single whole – hence the additional difficulties associated with IoT (security, backward compatibility and updates).
# 3) Testing data coming in real time Obtaining this data is extremely difficult. The matter is complicated by the fact that the system, as in the described case, may relate to the health sector.
# 4) UI An IoT network usually consists of different devices that are controlled by different platforms [iOS, Android, Windows, linux]. Testing is possible only on some devices, since testing on all possible devices is almost impossible.
# 5) Network Availability Network connectivity plays an important role in IoT. The data rate is increasing. IoT architecture should be tested under various connection conditions, at different speeds. Virtual network emulators in most cases are used to diversify network load, connectivity, stability, and other elements of load testing . But the evidence is always new scenarios, and the testing team does not know where the difficulties will arise in the future.

IoT Testing ToolsIoT and software

There are many tools that are used in testing IoT systems.
They are classified depending on the purpose:
# 1) Software: Wireshark : An open source tool. Used to monitor traffic in the interface, source / given host address, etc. Tcpdump : This tool does a similar job. The utility does not have a GUI, its interface is the command line. It enables the user to flash TCP / IP and other packets that are transmitted over the network. # 2) Hard: JTAG Dongle: A tool similar to debuggers in PC applications. Allows you to find defects in the code of the target platform and shows the changes step by step. Digital Storage Oscilloscope : checks various events using time stamps, power outages, signal integrity. Software Defined Radio : emulates a transmitter and receiver for various wireless gateways. IoT is an emerging market and many opportunities. In the foreseeable future, the Internet of things will become one of the main areas of work for tester teams. Network devices, smart gadget applications, communication modules – all this plays an important role in the study and evaluation of various services.
Total The approach to testing IoT may vary depending on the specific system / architecture.
Itís difficult to test IoT, but at the same time itís an interesting job, since testers have a good place to swing – there are many devices, protocols and operating systems.
PS You should try out the TAAS format (“tests from the user’s point of view”), and not just fulfill the formal requirements.
—————
Smart watches, baby-sitters, wireless gadgets and devices such as, for example, a portable radio station have long been part of everyday life.
Hackers have already proven that many of these attacks on IoT are possible.
Many people in general first learned about IoT security threats when they heard about the Mirai botnet in September 2016.
According to some estimates, Mirai infected about 2.5 million IoT devices, including printers, routers and cameras connected to the Internet.
The botnetís creators used it to launch distributed denial of service (DDoS) attacks, including an attack on the KrebsonSecurity cybersecurity blog.
In fact, the attackers used all devices infected with Mirai to try to connect to the target site at the same time, in the hope of suppressing the servers and preventing access to the site.
Since Mirai was first published on the news, attackers launched other botnet attacks on IoT, including Reaper and Hajime.
Experts say that such attacks are most likely in the future.
The Internet of Things (IoT) can bring many advantages to modern life, but it also has one huge drawback: security threats.
In its 2018 IOT forecasts, Forroter Research notes: ìSecurity threats are a major concern for companies deploying IoT solutions – in fact, this is the main task of organizations looking to deploy IoT solutions.
However, most firms do not regularly prevent IoT-specific security threats, and business pressure suppresses technical security issues. î
IoT security risks can be even more significant on the consumer side, where people are often unaware of potential threats and what they should do to avoid threats.
A 2017 IoT security survey sponsored by Gemalto Security Provider found that only 14 percent of consumers surveyed consider themselves IoT-aware.
This number is particularly noteworthy because 54 percent of the respondents owned an average of four IoT devices.
And these IoT security threats are not just theoretical.
Hackers and cybercriminals have already found ways to compromise many IoT devices and networks, and experts say that successful attacks are likely to increase.
Forrester predicted: “In 2018, we will see more attacks related to IoT … except that they will increase in scale and loss.”
What types of IoT security threats will enterprises and consumers face in 2018?
Based on historical precedent, here are ten of the most likely types of attacks.
  1. Botnets and DDoS attacks
  2. Remote recording The possibility that attackers can hack IoT devices and record owners without their knowledge is not revealed as a result of the work of hackers, but as a result of the work of the Central Intelligence Agency (CIA).
Documents released by WikiLeaks implied that the spy agency knew about dozens of zero-day exploits for IoT devices, but did not disclose errors, because they hoped to use vulnerabilities to secretly record conversations that would reveal the actions of alleged opponents of America.
Documents pointed to vulnerabilities in smart TVs, as well as on Android and iOS smartphones.
The obvious consequence is that criminals can also exploit these vulnerabilities for their vile purposes.
  1. Spam In January 2014, one of the first known attacks using IoT devices used more than 100,000 Internet-connected devices, including televisions, routers, and at least one smart refrigerator to send 300,000 spam emails per day.
The attackers sent no more than 10 messages from each device, which makes it very difficult to block or determine the location of the incident.
This first attack was not far from the last.
IoT spam attacks continued in the fall with the Linux.ProxyM IoT botnet.
  1. APTs In recent years, advanced persistent threats (APTs) have become a serious concern for security professionals.
APTs are carried out by funded and widespread attackers such as nation states or corporations that launch complex cyberattacks that are difficult to prevent or mitigate.
For example, the Stuxnet worm, which destroyed Iranian nuclear centrifuges and hacking Sony Pictures 2014, was attributed to nation states.
Because the critical infrastructure is connected to the Internet, many experts warn that APTs may launch a power-oriented IoT attack, industrial control systems, or other systems connected to the Internet.
Some even warn that terrorists could launch an attack on iOT, which could harm the global economy.
  1. Ransomware Ransomware has become too common on home PCs and corporate networks. Now experts say that it is only a matter of time before the attackers begin to block smart devices. Security researchers have already demonstrated the ability to install ransomware on smart thermostats. For example, they can raise the temperature to 95 degrees and refuse to return it to its normal state until the owner agrees to pay a ransom in Bitcoins. They can also launch similar attacks on garage doors, vehicles, or even appliances. How much would you pay to unlock your smart coffee pot first thing in the morning?
  2. Data theft Obtaining important data, such as customer names, credit card numbers, social security numbers, and other personal information, is still one of the main goals of cyber attacks.
IoT devices represent a whole new vector of attack for criminals looking for ways to invade corporate or home networks.
For example, if an improperly configured device or IoT sensor is connected to corporate networks, this can give attackers a new way to enter the network and potentially find the valuable data that they need.
  1. Home theft As smart locks and smart garage doors become more commonplace, it is also more likely that cybercriminals can become real thieves.
Home systems that are not properly protected can be vulnerable to criminals with sophisticated tools and software.
Security researchers are unlikely to have shown that itís quite easy to break into a house through smart locks from several different manufacturers, and smart garage doors do not seem to be much safer.
  1. Communication with children One of the most disturbing IoT security stories came from children.
One couple discovered that the stranger not only used his monitor for children to spy on their three-year-old son, this stranger also spoke with his child through the device.
Mother heard an unknown voice: ìWake up, boy, dad is looking for you,î and the child said that he was scared because at night someone was talking to him on an electronic device.
As more and more children’s gadgets and toys connect to the Internet, it seems likely that these frightening scenarios may become more common.
  1. Remote control of a vehicle As vehicles become smarter and more accessible on the Internet, they also become vulnerable to attack.
Hackers have shown that they can take control of a jeep, maximize air conditioning, change the radio station, start the wipers, and ultimately slow down the car.
The news led to the recall of 1.4 million cars, but whitehat researchers, following the original exploit, said they discovered additional vulnerabilities that were not fixed by the Chrysler patch applied to the recalled cars.
Although experts say the automotive industry is doing a great job of ensuring vehicle safety, it is almost certain that attackers will find new vulnerabilities in such smart cars.
  1. Personal attacks Sometimes IoT covers more than just devices – it can also include people who have connected medical devices implanted in their bodies.
An episode of the television series Homeland attempted a murder aimed at an implanted medical device, and former vice president Dick Cheney was so worried about this scenario that he turned off the wireless capabilities on his implanted defibrillator.
This kind of attack has not yet happened in real life, but it remains possible, as many medical devices become part of the IoT.
submitted by farabijfa to u/farabijfa [link] [comments]

Is Bitcoin Dead Los Angeles Bitcoin Meetup - January 2014 Are Bitcoin Legal Will Bitcoin Recover Best Bitcoin For Mac

English: Bitcoin relative mining difficulty chart with logarithmic vertical scale. Relative difficulty defined as 1 at 9 January 2009. Higher number means higher difficulty. Horizontal range is from 9 January 2009 to 8 November 2014. Bitcoin difficulty is a value used to show how hard is it to find a hash that will be lower than target defined by system. Bitcoin mining difficulty is changed every 2016 blocks. The difficulty charts show that it has increased significantly. Bitcoin Difficulty Increase. Difficulty on the bitcoin network is a measure of how problematic it is to find a hash below a given target. Valid blocks must have a hash below the global block difficulty target. There is also a share difficulty which applies to mining pools and their ability to find a hash that is lower than the global target. Since January 2014, we observe gradual decline of BTC market price and the miners revenue. This tendency is mostly caused by the significant increase of the mining difficulty. Comparing to January 2014, current Bitcoin mining process requires much more computing power, which results in higher expenses, namely electricity costs. The current mining difficulty (October 1, 2014: 34,661,000,000 ... Bitcoin is live since January 2009, so it took quite a while. Since the bitcoin difficulty went down in 2014 for the first time, this didn't happen very often again. Most of the time a decline in bitcoin difficulty is driven by a decreasing bitcoin price. A lower price makes bitcoin mining less profitable. This causes miners to turn their machines off which decreases the hash rate. A lower ...

[index] [6649] [9609] [40786] [12619] [41663] [13397] [37114] [25650] [47140] [32648]

Is Bitcoin Dead

To read more about bitcoin paper wallet, go to internet site the following: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin miner, asic bitcoin mine... For more info with regards to Bitcoin wallet card, litecoin wallet card, go to site below: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin miner, as... For more info concerning Bitcoin wallet card, litecoin wallet card, please visit internet site here: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin... For more info regarding bitcoin paper wallet, please visit web site below: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin miner, asic bitcoin miner... For more info concerning Bitcoin wallet card, litecoin wallet card, please visit site right here: http://www.cryptocoinwalletcards.com/ Tags: asic bitcoin mi...

#