MY PRICE

Proof of Work (POW). Why is this the power of the Bitcoin network?

POW

The proof of work consists of a piece of information that is extremely expensive to obtain but very easy to verify, which the miner must produce to validate its candidate block and which every node in the network can easily and quickly verify.
The proof-of-work procedure is performed on a candidate block that collects all the transactions that the node has in its own mempool that it decides to add. These transactions are verified independently by each node, but are not confirmed, i.e. they are not yet part of the blockchain, because they have not yet been inserted into a valid block.
When the miner calculates the hash of the blockheader, it actually considers all the transactions present in the block, because the merkleroot of the candidate block summarizes all the transactions that have been inserted in the block, because it is the "digest" value of the merkle tree.
The merkle tree is nothing more than a structure of transaction hashes that progressively summarizes all the transactions it has examined, until it reaches the top, which is a single global hash that is the "fingerprint" of all the transactions.

La procédure de validation

The POW is thus obtained by a procedure by which the miner creates the hash of the blockheader, in a repeated way, until it can find a value of this hash which is lower than a fixed value repeatedly, until he can find a value of this hash which is lower than a value fixed by the protocol (target) by the protocol (target) which can vary thanks to an auto-adjustment every 2016 blocks. In this case, we speak of a "difficulty adjustment" procedure which reacts automatically to the hashrate available network by calibrating the difficulty and ensuring that the Bitcoin network produces 1 block every 10 minutes, no less. every 10 minutes, no more and no less.
To be able to satisfy this value, the miner, makes many attempts by changing some parameters of the header, including the nonce and extra nonce.

La récompense au mineur

Among the transactions present in the block, the first is the coinbase transaction. This transaction allows the miner to get the reward for exploiting the block according to the value established by the protocol rules.
The costs of the inserted transactions are also part of the miner's reward. This is why the miner is encouraged to add as many transactions as possible, starting with those with the highest fees. However, the protocol rules still allow for blocks with very few transactions. Once this is done, the block is propagated to the network and all the other nodes check for compliance with the protocol, then verify the block. If the block is verified, it becomes the TIP, the highest block.
If the block had a different reward, which is not compatible with the current value allowed by the protocol, it would be rejected by the other nodes and the miner would have no reward. This event is part of the benefit/punishment mechanism of Bitcoin's economic incentive system. I hope I've been helpful in understanding how the Bitcoin network's transaction validation mechanism works. If you have any questions, you can post a comment and contact me, I will remain available. I am also happy if you want to reach me on my website or linkedin.

Today I want to talk about an open source messaging system that is really different from the other alternatives available such as whatsapp, telegram, signal and all the signal derivatives. There has been a lot of talk about it lately because of the whatsapp policy change and many people have gone elsewhere, especially to telegram and signal. But in reality, these alternative applications to whatsapp are an improvement to your privacy?

Signal?

For example, if we consider signal, it is opensource and the repository is on github. It seems to be a great be a great alternative to whatsapp, but .... If you go and look at the requirements at the url https://github.com/aqnouch/Signal-Setup-Guide you will see the following list (at the time of writing) of the systems and software needed to install a server. I mention the server because it is the server that determines the management of accounts and metadata and is responsible for managing the data:
Requirements (Signal)

Twilio (for OTP SMS)

Amazon S3 (for Avatar and attachments, can be subbed with MinIO) Amazon SQS (for CDS queue, can be replaced by LocalStack) Firebase (for push notifications) As you can see, signal uses external services to run, including amazon. These requirements are in fact necessary preconditions to be met, at the server installation level, for it to work properly. That is, what needs to be in place to make the installation possible and work. So, in order not to use whatsapp because of the attack on privacy, we are faced with an alternative that, although open source, depends on other services of large companies and then we are back to square one. If our communication goes through tools that are owned or managed by other companies, we will somehow have interference from those companies on our data.

Telegram?

What can we say about telegram? Can we see the code of the telegram servers (I mentioned the server, which is the unit that manages connections and sorts communications)? Is it in the public domain? No. Why not? We don't know it. The fact that we can't know the source code of the server, nor the structure with which it is made up, the libraries it uses and the way it handles data, is a big problem for our privacy.
The thing we know about telegram is that it sends your encrypted messages to something. Since you don't have the source code, you don't know exactly what is being done on that server with your data. So it doesn't make much sense to recommend telegram as a solution to improve the privacy of your text communications. At the end of the day, we are still in an unverifiable and non-transparent domain.

Jami!

So we need an alternative that is truly decentralized and does not impact our privacy. A real alternative is Jami. A software that I could try and analyze during a few weeks of testing and I could see how good it really is to protect our privacy and not leave our metadata on third party servers.
Jami is an open source, decentralized and peer2peer software. What does that mean? It means that it doesn't use a central server and the communication is actually between the two peers with end-to-end encryption. it also doesn't use a central server that can then monitor the metadata.

Our metadatas

What is metadata? Metadata is all the information surrounding a communication, such as 1) the date the communication took place, 2) the identity of the parties connected to the communication, 3) the duration of the communication, etc. Extremely important information that centralized services will sooner or later use to make money from your privacy. These metadata provide an accurate profile of your situation, your behaviors and even your knowledge. They are therefore very useful to build your digital alter-ego.
With Jami, we will solve the problem at the source, preventing the collection and storage of metadata, thanks to the decentralization that the system allows. In fact, we only have two terminals that communicate and all communication data (metadata) is stored locally.

Les clés cryptographiques

Nothing resides on any server or third party. We are solely responsible for the communication and our data and all communication is encrypted with keys that belong only to us. As always, when we are the sole owners of the cryptographic keys, we own the content we exchange with the other party. Decentralization also avoids intermediate points where metadata can be monitored.
Jami doesn't need a central server, so your account is only stored locally. When you want to use your account, you don't need to connect to a service and you don't have to provide any data or phone number to anyone, not even an email. Jami does not need to register and does not need reference numbers to work.
The password you enter when starting Jami is only used to encrypt data locally on your device. Messages are encrypted with an RSA key.
Jami is available for windows, linux, android, ios and is easy to install. The software is available at https://Jami.net where you can also find information about the installation which, as mentioned, is very simple. You will also find access to the source code repository which is open.
I hope I have provided some value-added information and resources and have been helpful. If you wish, you can contact me with any questions or clarifications regarding my profile on linkedin or you can contact me and follow and support me on patreon with tips and exclusive content.

What is cryptocurrency?

Cryptocurrency is a form of payment that can be exchanged online for goods and services. Many companies have issued their own currencies, often called tokens, and these can be traded specifically for the good or service that the company provides. Think of them as you would arcade tokens or casino chips. You’ll need to exchange real currency for the cryptocurrency to access the good or service. Cryptocurrencies work using a technology called blockchain. Blockchain is a decentralized technology spread across many computers that manages and records transactions. Part of the appeal of this technology is its security.

What's a blockchain ?

A blockchain is a growing list of records, called blocks, that are linked using cryptography.
Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree).
By design, a blockchain is resistant to modification of its data. This is because once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks.
The blockchain was invented by a person (or group of people) using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin.
The identity of Satoshi Nakamoto remains unknown to date. The invention of the blockchain for bitcoin made it the first digital currency to solve the double-spending problem without the need of a trusted authority or central server. The bitcoin design has inspired other applications and blockchains that are readable by the public and are widely used by cryptocurrencies. The blockchain is considered a type of payment rail.Private blockchains have been proposed for business use but Computerworld called the marketing of such privatized blockchains without a proper security model "snake oil".However, others have argued that permissioned blockchains, if carefully designed, may be more decentralized and therefore secure in practice than permissionless ones.

RTX 3060 Ether mining accidentally unlocked by Nvidia’s own update

A software update released by Nvidia inadvertently bypassed the Ether (ETH) mining block the firm placed on its own GeForce RTX 3060 graphics card.
A spokesperson for Nvidia confirmed on Tuesday that the latest 470.05 driver update was mistakenly released with code intended for use only by Nvidia developers, which allowed for the removal of the hash rate limiter.
“A developer driver inadvertently included code used for internal development which removes the hash rate limiter on RTX 3060 in some configurations,” said an Nvidia spokesperson, as reported by The Verge.
In February, Nvidia decided to intentionally hamper the Ether-mining effectiveness of its RTX 3060 series graphics cards to prevent a demand-induced shortage caused by crypto miners. A three-way handshake between the hardware, the software and the computer firmware was supposed to ensure that the card recognized when it was being used to mine Ether and cut its computational power in half, from 50 megahertz per second to 25 MH/s.
But the back door that allowed the card’s hash rate limiter to be bypassed came from the software side, and it was released by Nvidia itself. The offending beta update has since been pulled by the software company, but versions of it have already made it out onto the internet.
Elsewhere on Tuesday, Andreas Schilling of tech website HardwareLuxx tested reports that custom edits to a computer’s BIOS were required to bypass the hash rate limiter. After testing driver 470.05 with a custom and standard BIOS, Schilling confirmed that no special modifications were required and that Nvidia’s driver removed the hash rate limiter itself.
While the news only compounds the misery of gamers waiting to upgrade their graphics cards, the gaffe by Nvidia might not necessarily result in Ether miners eating up the next supply of GPU shipments. According to Hexus, the latest reports suggest that the affected driver can only unlock one RTX 3060 at a time, rendering it unsuitable for use in large mining-farms, for the time being at least.
Initial rumors suggested a custom modification had bypassed the RTX 3060’s hash rate limiter last Wednesday, allowing it to mine Ether at full capacity. It was later revealed that the mod had not enabled the card to mine Ether specifically but had been rigged to enable the mining of another GPU-mineable cryptocurrency, Ravencoin (RVN).

RECENT ARTICLES