# Talk:Satoshi Client Node Discovery - Bitcoin Wiki

• Talk:Satoshi Client Node Discovery - Bitcoin Wiki
• Vac - DNS Based Discovery
• Discovering Bitcoin’s Public Topology and Inﬂuential Nodes
• peer discovery - How do Bitcoin clients find each other ...
• Operating Modes — Bitcoin

##### How come governments cannot slowly censor bitcoin by preventing new nodes from finding peers?

When you run a node, you need to do peer node discovery to find the ip of other miners in the network. Apparently, bitcoin nodes go to centralised registered DNS websites to get a list of potential peer nodes on the network. (Ie seed.bitcoinstats.com) Since the websites that give you ip of node peers are centralised, why can’t governments remove them to prevent new nodes from discovering peers by removing these centralised websites?

##### A whole new kind of lightning & fiat interface through debit cards? Announcing lastbit

Soon after Satoshi made his big announcement more than a decade ago, a lot of concerns emerged pointing towards a crucial problem on his solution: scalability. Particularly since Mt. Gox, a lot started to change for Bitcoin. Out in the open, a multitude of crypto exchanges started popping up making Bitcoin and other coins easily accessible to pretty much anyone. Nevertheless, the original concerns on Satoshi’s proposal remained. In parallel and away from the spotlight, a group of passionate developers started crafting the solution to Bitcoin’s scalability problem. Today the solution is here and it’s name is the Lightning Network.
Currently, users can access for free a wide range of Bitcoin Lightning wallets. Nevertheless, instant Bitcoin payments are still far from mainstream. Most of these wallets are extremely hard to use and as such are only catered to the most experienced of users. Despite that, the future of Lightning looks bright. As of today, there are over 11K Lightning nodes out there and this number is steadily growing. Lightning’s case of becoming the solution to Bitcoin’s woes looks strong.
Holding that as a North star, we started building a solution to combine hardware level security with Lightning to enable instant Bitcoin to fiat transactions on hardware at a POS through debit card emulation.This project was overly ambitious and we quickly realized not enough people cared enough about hardware level security for payments. But the ground we covered was not in vain. During the process of building our hardware solution and talking to our beta users we came across a powerful discovery: enabling small and instant Bitcoin payments with zero fees to mainstream users via Lightning could be the way to finally make Bitcoin a widely and globally used means of payment.
During the last few years, we’ve seen titans, such as Coinbase and Binance, emerge. Undeniably, these projects have helped Bitcoin tremendously by raising awareness and making onboarding to the cryptocurrency easy and intuitive globally. Nevertheless, an equivalent figure to position Bitcoin as a globally usable currency via Lightning is yet to come.
With this in mind, we built an interoperable payments layer between Bitcoin (Lightning & On-Chain) and Euros (to start with), using payment instruments familiar to mainstream consumers, namely IBAN’s and debit cards. This means, users can move between Bitcoin and Euros in either direction, with a single interface.
This will allow users to:
-(i) Send and receive Bitcoin payments both form and to Lightning wallets and Bitcoin on-chain wallets;
-(ii) Send and receive Euro payments both from and to IBAN’s and debit cards;
-(iii) Make Bitcoin payments, both Lightning and on-chain, directly from Euro denominated IBAN’s and/or a debit cards; and
-(iv)Top-up Euro denominated debit cards directly with Bitcoin.
All of this was carefully built in response to what we heard from the community and as we mention throughout our story. We’ve dedicated the last few years of our lives and the foreseeable future to make this happen and we simply want to make it possible for more people to do things with Bitcoin.
TLDR: Lastbit is putting out a beta application that contains a single interface to Bitcoin, Lightning, Euros and debit cards. This app will allow users to move between these payment instruments in any direction they like. Get paid in Euros from a Lightning invoice? Sure. Pay Euros to a Lightning invoice? Sure. Swipe a debit card and pay for your purchase with a Lightning invoice? Sure. And more.

*We are still in beta and will soon start to roll-out in Europe

##### IamA Founder of HOPR a pioneering data privacy project. My name is Dr. Sebastian Bürgel - AMA

HOPR Team Foreword: Dr. Sebastian Bürgel received his PhD from ETH Zurich, one of the world's top 10 universities for Science and Technology, before becoming an entrepreneur and architect of decentralized blockchain applications. His technical know-how helped shape the Distributed Ledger Technology (DLT) Law of Switzerland. Previously, Dr. Bürgel co-founded Validity Labs, the first Swiss blockchain education and service company, and taught the former Swiss President, Johann Schneider-Ammann, his first blockchain lesson.
Dr. Bürgel also co-founded SONECT, a fintech startup that developed a widely-used virtual ATM network.
In His Own Words: I have dedicated my career to building technical solutions that empower the individual.
I am contributing to a privacy-first web3 with HOPRnet.org, a blockchain-based data privacy project I founded, where we are taking a positive and empowering approach to providing network-level data privacy for all. We are also incentivizing everyone – not just those with technical experience – to relay data (which masks sender and recipient) by running a HOPR node and earning HOPR tokens.
Privacy is a major topic for the web3, powering the next generation of web applications, platforms and services. I am also interested in the future of work towards a post-corporate era. Do humans need companies to create value? Digital organizations such as DAOs (decentralized autonomous organizations) are a major shift away from traditional employment, organizations and the way we work.
Before joining the blockchain and crypto ecosystem, I worked as a postdoctoral fellow and PhD student at ETH Zurich in the domain of microtechnology and microfabrication for biomedical applications such as drug discovery, cancer research and neglected tropical diseases.
I am happy to engage in discussions and support people who #buidl:
• any sort of privacy project that improve the limitations of VPNs, TOR or other P2P applications
• truly decentralized web3 applications based on blockchain and other P2P technologies such as IPFS, Libp2p and other decentralized computation, decentralized storage or decentralized value networks
• on-chain privacy in the blockchain domain such as zk-SNARKs, zk-STARKs, BulletProofs, Optimistic Rollups and zk-Rollups
• DAOs or other forms of digital organizations inspiring a future beyond today's corporations
• tokenized capital markets and token ecosystems that go beyond the ICO and STO hype
• stable tokens that combine the best of crypto currencies such as Bitcoin and traditional digital fiat money

##### Exactly 10 years ago Someone did a transfer of 184M BTC

Exactly 10 Years ago someone found a bug in bitcoin code that allowed him to transfer 184M bitcoins to 3 different address .

On August 15 2010, it was discovered that block 74638 contained a transaction that created 184,467,440,737.09551616 bitcoins for three different addresses.[1][2][3] Two addresses received 92.2 billion bitcoins each, and whoever solved the block got an extra 0.01 BTC that did not exist prior to the transaction. This was possible because the code used for checking transactions before including them in a block didn't account for the case of outputs so large that they overflowed when summed.[4]
A new version of the client was published within five hours of the discovery that contained a soft forking change to the consensus rules that rejected output value overflow transactions (as well as any transaction that paid more than 21 million bitcoins in an output for any reason).[5] The block chain was forked. Although many unpatched nodes continued to build on the "bad" block chain, the "good" block chain overtook it at a block height of 74691[6] at which point all nodes accepted the "good" blockchain as the authoritative source of Bitcoin transaction history.
The bad transaction no longer exists for people using the longest chain. Therefore, the bitcoins created by it do not exist either. While the transaction does not exist anymore, the 0.5 BTC that was consumed by it does. It appears to have come from a faucet and has not been used since.[7]
source : https://en.bitcoin.it/wiki/Value_overflow_incident

How I even know this ?
I know a guy that I've been to school with and he's been with bitcoin since 2010, while I criticized it and ignored it . lately we've been catching up and talk a lot, he said basically someone is probably manipulating the network in different way while we are unaware of.
"The 184M transaction was bold, everyone could have seen it. In the real world if A really good hacker would do the job , he would do it without us noticing, it will be under the surface, it might be too late if ever could someone else even notice"
I wanted to ask the community what do you think of that ?
could there ever be a way that someone else is using the network to benefit his own needs while exploiting some bug in the network we cant even see?
or that's not possible and he is fooling me ?

##### Exactly 10 years ago Someone did a transfer of 184M BTC

Exactly 10 Years ago someone found a bug in bitcoin code that allowed him to transfer 184M bitcoins to 3 different address .
On August 15 2010, it was discovered that block 74638 contained a transaction that created 184,467,440,737.09551616 bitcoins for three different addresses.[1][2][3] Two addresses received 92.2 billion bitcoins each, and whoever solved the block got an extra 0.01 BTC that did not exist prior to the transaction. This was possible because the code used for checking transactions before including them in a block didn't account for the case of outputs so large that they overflowed when summed.[4] A new version of the client was published within five hours of the discovery that contained a soft forking change to the consensus rules that rejected output value overflow transactions (as well as any transaction that paid more than 21 million bitcoins in an output for any reason).[5] The block chain was forked. Although many unpatched nodes continued to build on the "bad" block chain, the "good" block chain overtook it at a block height of 74691[6] at which point all nodes accepted the "good" blockchain as the authoritative source of Bitcoin transaction history. The bad transaction no longer exists for people using the longest chain. Therefore, the bitcoins created by it do not exist either. While the transaction does not exist anymore, the 0.5 BTC that was consumed by it does. It appears to have come from a faucet and has not been used since.[7]
source : https://en.bitcoin.it/wiki/Value_overflow_incident
How I even know this ?
I know a guy that I've been to school with and he's been with bitcoin since 2010, while I criticized it and ignored it . lately we've been catching up and talk a lot, he said basically someone is probably manipulating the network in different way while we are unaware of.
"The 184M transaction was bold, everyone could have seen it. In the real world if A really good hacker would do the job , he would do it without us noticing, it will be under the surface, it might be too late if ever could someone else even notice"
I wanted to ask the community what do you think of that ?
could there ever be a way that someone else is using the network to benefit his own needs while exploiting some bug in the network we cant even see?

## What is Bitcoin?

Bitcoin (₿) (ticker BTC)is an open source cryptocurrency. It is a decentralized cryptographic currency without a central bank or single administrator in control that can be sent from user to user on the peer-to-peer bitcoin network without the need for 3rd person in between like bank, or payment processor or institution all transaction processing and verification is carried out collectively by the network.
Find out more at http://www.bitcoinduliban.org/

## Why Bitcoin is the future?

Bitcoin emerged in 2009 as more economies across the world started losing trust in the current banking model. Institutions that have been around longer than ourselves have changed very little throughout our lifetime. Not only does the lack of trust, and stagnant change of banks allow Bitcoin to thrive, but also the possibility of eliminating inflation. Bitcoin saw the opportunity to take the power out of the institutions and provide a better service, and the people responded. Bitcoin operates universally, meaning for the first time, there is a possibility of a global currency. With truly international currency possibilities for global economic growth, social equality, self-sovereignty is endless.

## Why Bitcoin and not others?

It is a very good question, there at the moment of writing over 2000 projects and “coins” that emerged after Bitcoin. Many of them claim to be faster, better and more flexible than Bitcoin however very few have withstood the test of time or delivered their proposed product. The basic fundamentals of Bitcoin’s principle monetary policy are unprecedented, and by now, it is impossible to replicate its level of decentralization or network security, which is powered by a computer network as powerful as almost 12 trillion Intel Core i7 processors. Bitcoin also has the largest social / community strength. I would HIGHLY advise against investing or getting dragged into any project that claims superiority, I have single rule : if it says it's better than Bitcoin then its what we call “scam-coin” you will only get pulled in and lose your bitcoin/usd value causing a lot of pain and sadness . Sit down, read, learn and be patient, you will not miss out on anything over night and if something is rising in price quickly most likely it will crash as fast.

## Does bitcoin have an applicable use in daily life or is it only for holding for future gains?

Bitcoin has taken over the cryptocurrency market. It’s the largest and most well-known digital currency today. Many large companies are accepting Bitcoin as a legitimate source of funds, you can use your Bitcoin at but not limited to : KFC, Burger King, Microsoft, AT&T , Expedia, Subway, Twitch, Virgin Galactic and many more just look it up. You can look up merc and services at https://spendabit.co/ So if you are living abroad, you can use your bitcoin just like any other known currency in addition there are Debit cards in collaboration with VISA network offers that are backed by Bitcoin making you able to pay with it anywhere in the world just with a swipe or tap.

## As Lebanese in Lebanon, how can I buy or sell bitcoin ?

In Lebanon unfortunately we can not use our banking system to purchase bitcoin, there was a time where rain.bh an UAE based exchange was accepting Lebanese Cards, till it was stopped but give it a try we weren’t able to confirm all cards.
Therefore most common way to buy bitcoin in lebanon is using P2P which is person to person exchange, this can be through an international website such as localbitcoins.com or hodlhodl.com , all you gotta do is find a sell offer initiate transaction with seller , send him his payment using WesterUnion or Moneygram and once the seller receives payment your bitcoins will be released but make sure you use escrow service which ensures safety of your transaction therefore bitcoins you are buying are frozen for the seller and he can not retrieve them unless you fail to pay or run out of time window to pay. Another p2p way is through local bitcoin communities , there are plenty of traders willing to exchange with you however always ask for the reputation of the seller inside a group and never respond to private messages unless it is a confirmed reliable trader just to avoid losing and being scammed. Feel free to find out more about how to buy in Lebanon at http://www.bitcoinduliban.org/

## If I have a bank account outside Lebanon, can I use bitcoin to transfer money from Lebanon to my bank account outside?

It is possible to transfer Bitcoin to an international account in the USA or EU for example, you would need to use recognized exchanges such as coinbase.com kraken.com and many others. It would be as simple as sending BTC to your coinbase account, converting to USD and withdrawing it to your account. However you must take few precautions, if you are sending a significant amount of BTC and converting it to USD you will need some kind of proof that these funds are yours otherwise you might get investigated for money laundering. So is it convenient to send ? I do not think so, if you managed to get what we call now in Lebanon “ Fresh USD” it would be much less of a hassle to simply initiate an international transaction.

## Why would I want to send Bitcoin to my family or friends in Lebanon ?

This is where I believe BTC can shine for us, you can use exchanges as coinbase,kraken or any prefered place to purchase some bitcoin that can be transferred to your family wallet within minutes. Your family or friends can exchange bitcoin or part that is needed with local traders to LBP at desired exchange rate therefore you are not forced to exchange at rates given by WesterUnion, after which they will be able to do their daily purchases and mitigate inflation rates to some extent. You can send as little as $1 and the transaction costs less than$1 for any amount.

## Why is the Bitcoin price so volatile ?

Indeed it can be, sudden swings of 20% both ways are considered normal if you look at daily data, however bitcoin since 2009 had only one trend which is upward, 80% chance is if you bought BTC at any moment in past 2 years is that you are on break even or positive not loss. Feel free to try this exercise by going to https://dcabtc.com/

## Should I invest?

NO. Now since we got the short version of this, let me elaborate. By the end of the day it is a new class of an asset, the price is still in the discovery phase and it could cause a lot of pain and sleepless nights if you invest more than you can chew to possibly lose. No one can advice you what to do with your money and how to position them, however i highly encourage to read, educate yourself on money before investing in BTC a good start would be https://bitcoinduliban.org. Please ask more knowledgeable bitcoin users and double check sources , once you feel confident enough that you understand this monetary system you can try dipping your toes with small amounts and build your position from there. Just stay away from quick gains schemes such as “online mining” “cloud mining” and anything that offers 100% returns in a very short time, if it's too good to be true then it's a scam.

## Scams, BE AWARE.

Due to our difficult situation we are being targeted by constant advertisement of potential new solutions using “newly developed cryptocurrencies“ , unfortunately such new technology does not exist and they are trying to take advantage of us by promising fake solutions.
Even Bitcoin can not provide you with a solution to your hard worked money being inaccessible in any Lebanese bank.
Here are few typical scam msgs:
• “A new amazing great best investment …”
• “Start mining Bitcoin now … just send us xx initial investment”
• ‘XX is a new digital currency being developed by a group of Stanford PhDs”
• “Elon musk give away - Send us 0.1 BTC or other crypto to get 10x the amount, NOW”
• “Apple Bitcoin Give away, watch now”
• “200% gains with mining, just set up a node”
• “This New amazing crypto will do 100x do not miss out like you did with Bitcoin”
• “Better, faster , cheaper than Bitcoin”

##### Remote node rapidly cycling between connecting and disconnecting

I couldn't find a post where someone has asked about a similar issue, so hopefully someone can either point me in the right direction or knows how to resolve this issue!
I have a remote full node running as a Tor hidden service which is open to inbound connections (confirmed via bitcoin-cli getpeerinfo and also connects with my other wallet.
I pointed the Bisq client to my remote node as [address].onion:8333 and can see it will briefly connect but then disconnect again. It will then cycle through this connecting / dying / reconnecting endlessly.
A segment of the log output looks like this (I have redacted my precise onion address though I will probably cycle a new set of keys soon - just privacy reasons I don't want a paper trail associated with this account - if you need it to help provide support DM me):
Jul-17 11:16:40.399 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 1 transactions at block height 633842 took 0 ms
Jul-17 11:16:40.619 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 0 transactions at block height 633843 took 0 ms
Jul-17 11:16:40.814 [BlockingClient network thread for xxxxxxxxx.onion:8333] INFO org.bitcoinj.core.PeerGroup: [xxxxxxxxx.onion]:8333: Peer died (0 connected, 0 pending, 1 max)
Jul-17 11:16:40.815 [PeerGroup Thread] INFO org.bitcoinj.core.PeerGroup: Peer discovery took 5.431 μs and returned 0 items
Jul-17 11:16:40.815 [PeerGroup Thread] INFO org.bitcoinj.core.PeerGroup: Waiting 1500 msec before next connect attempt to [xxxxxxxxx.onion]:8333
Jul-17 11:16:42.058 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 1 transactions at block height 633848 took 0 ms
Jul-17 11:16:42.216 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 0 transactions at block height 633849 took 0 ms
Jul-17 11:16:42.316 [PeerGroup Thread] INFO org.bitcoinj.core.PeerGroup: Attempting connection to [xxxxxxxxx.onion]:8333 (0 connected, 1 pending, 1 max)
Jul-17 11:16:42.378 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 0 transactions at block height 633850 took 0 ms
Jul-17 11:16:42.538 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 0 transactions at block height 633851 took 0 ms
Jul-17 11:16:42.598 [BlockingClient network thread for xxxxxxxxx.onion:8333] INFO org.bitcoinj.core.Peer: Announcing to xxxxxxxxx.onion:8333 as: /bitcoinj:0.14.7.bisq.1-SNAPSHOT/Bisq:1.3.5/
Jul-17 11:16:42.703 [JavaFX Application Thread] INFO b.c.d.node.parser.BlockParser: Parsing 1 transactions at block height 633852 took 0 ms
Jul-17 11:16:42.879 [BlockingClient network thread for xxxxxxxxx.onion:8333] INFO org.bitcoinj.core.Peer: [xxxxxxxxx.onion]:8333: Got version=70015, subVer='/Satoshi:0.20.99/', services=0x1033, time=2020-07-17 11:16:41, blocks=639615
Jul-17 11:16:42.880 [BlockingClient network thread for xxxxxxxxx.onion:8333] INFO org.bitcoinj.core.PeerGroup: [xxxxxxxxx.onion]:8333: New peer (1 connected, 0 pending, 1 max)

and then will die and repeat the cycle etc.
Any ideas?

##### Making electrumx server more private

I have been considering setting up my own electrumx server (have not done it yet)
Lets say I wanted to make my electrumx server NOT show up or be automatically connected to from other electrum clients.
Lets say I wanted the server to still be connected to the blockchain network, but only accept SPV from a client that has been manually set to use its address.
As I look through the configuration options, it would seem "PEER_ANNOUNCE" would be the most relevant setting, but I am not completely sure.

##### TIL that Satoshi left scrapes of GUI functionality for poker game in the Bitcoin Core in the 2009

TIL Satoshi left scrapes of poker functionality in the Bitcoin Core in the 2009
Today I stumbled upon a weird functionality in the uibase.cpp file in an old bitcoin node file I was reading for fun, Satoshi had written scrapes of GUI functionality for a poker game in the early version of Bitcoin 0.1.3 and maybe a little earlielater (didn't actually check that deep).
If Satoshi was planing an experiment with op codes for provably fair poker game in the very Bitcoin node (what an exciting thought lol, would actually download the entire blockchain), we may never know as I did not find a lot of info regarding this decision hidden in plain sight. The code applies only to the GUI dialog and is referenced in the uibase.h, uibase.cpp and uiproject.fbp.
As an unnecesary discovery this is, I actually thought this is a pretty neat fact I did not find anywhere else.
Also, as I am making my own private DPOS decentralized network, I think that this is a neat idea I could put in. Although I admit that this idea was almost certainly created long time ago when smart contracts were introduced.

##### Filecoin | Development Status and Mining Progress

https://preview.redd.it/5bqakdqgl3g51.jpg?width=865&format=pjpg&auto=webp&s=b709794863977eb6554e3919b9e00ca750e3e704
A decentralized storage network that transforms cloud storage into an account market. Miners obtain the integrity of the original protocol by providing data storage and / or retrieval. On the contrary, customers pay miners to store or distribute data and retrieve it.
Filecoin announced, that there will be more delays before its main network is officially launched.
Filecoin developers postponed the release date of their main network to late July to late August 2020.
As mentioned in a recent announcement, the Filecoin team said that the initiative completed the first round of the internal protocol security audit. Platform developers claim that the results of the review showed that they need to make several changes to the protocol’s code base before performing the second stage of the software testing process.
Created by Protocol Labs, Filecoin was developed using File System (IPFS), which is a peer-to-peer data storage network. Filecoin will allow users to trade storage space in an open and decentralized market.
Filecoin developers implemented one of the largest cryptocurrency sales in 2017. They have privately obtained over $200 million from professional or accredited investors, including many institutional investors. The main network was slated to launch last month, but in February 2020, the Philly Queen development team delayed the release of the main network between July 15 and July 17, 2020. They claimed that the outbreak of the Coronavirus (COVID-19) in China was the main cause of the delay. The developers now say that they need more time to solve the problems found during a recent codecase audit. The Filecoin team noted the following: “We have drafted a number of protocol changes to ensure that building our major network launch is safe and economically sound.” The project developers will add them to two different implementations of Filecoin (Lotus and go-filecoin) in the coming weeks. Filecoin developers conducted a survey to allow platform community members to cast their votes on three different launch dates for Testnet Phase 2 and mainnet. The team reported that the community gave their votes. Based on the vote results, the Filecoin team announced a “conservative” estimate that the second phase of the network test should begin by May 11, 2020. The main Filecoin network may be launched sometime between July 20 and August 21, 2020. The updates to the project can be found on the Filecoin Road Map. Filecoin developers stated: “This option will make us get the most important protocol changes first, and then implement the rest as protocol updates during testnet.” Filecoin is back down from the final test stage. Another filecoin decentralized storage network provider launched its catalytic test network, the final stage of the storage network test that supports the blockchain. In a blog post on her website, Filecoin said she will postpone the last test round until August. The company also announced a calibration period from July 20 to August 3 to allow miners to test their mining settings and get an idea of how competition conditions affected their rewards. Filecoin had announced earlier last month that the catalytic testnet test would precede its flagship launch. The delay in the final test also means that the company has returned the main launch window between August 31 and September 21. Despite the lack of clear incentives for miners and multiple delays, Filecoin has succeeded in attracting huge interest, especially in China. Investors remained highly speculating on the network’s mining hardware and its premium price. Mining in Filecoin In most blockchain protocols, “miners” are network participants who do the work necessary to promote and maintain the blockchain. To provide these services, miners are compensated in the original cryptocurrency. Mining in Filecoin works completely differently — instead of contributing to computational power, miners contribute storage capacity to use for dealing with customers looking to store data. Filecoin will contain several types of miners: Storage miners responsible for storing files and data on the network. Miners retrieval, responsible for providing quick tubes for file recovery. Miners repair to be carried out. Storage miners are the heart of the network. They earn Filecoin by storing data for clients, and computerizing cipher directories to check storage over time. The probability of earning the reward reward and transaction fees is proportional to the amount of storage that the Miner contributes to the Filecoin network, not the hash power. Retriever miners are the veins of the network. They earn Filecoin by winning bids and mining fees for a specific file, which is determined by the market value of the said file size. Miners bandwidth and recovery / initial transaction response time will determine its ability to close recovery deals on the network. The maximum bandwidth of the recovery miners will determine the total amount of deals that it can enter into. In the current implementation, the focus is mostly on storage miners, who sell storage capacity for FIL. ## Hardware recommendations The current system specifications recommended for running the miner are: • CPU 8+ • NVIDIA-manufactured GPU (to be expanded). • SSD drive designated as large buffer (512GB +). • Large amount of RAM for data replication account (128GB +) Compared to the hardware requirements for running a validity checker, these standards are much higher — although they definitely deserve it. Since these will not increase in the presumed future, the money spent on Filecoin mining hardware will provide users with many years of reliable service, and they pay themselves many times. Think of investing as a small business for cloud storage. To launch a model on the current data hosting model, it will cost millions of dollars in infrastructure and logistics to get started. With Filecoin, you can do the same for a few thousand dollars. Proceed to mining Deals are the primary function of the Filecoin network, and it represents an agreement between a client and miners for a “storage” contract. Once the customer decides to have a miner to store based on the available capacity, duration and price required, he secures sufficient funds in a linked portfolio to cover the total cost of the deal. The deal is then published once the mine accepts the storage agreement. By default, all Filecoin miners are set to automatically accept any deal that meets their criteria, although this can be disabled for miners who prefer to organize their deals manually. After the deal is published, the customer prepares the data for storage and then transfers it to the miner. Upon receiving all the data, the miner fills in the data in a sector, closes it, and begins to provide proofs to the chain. Once the first confirmation is obtained, the customer can make sure the data is stored correctly, and the deal has officially started. Throughout the deal, the miner provides continuous proofs to the chain. Clients gradually pay with money they previously closed. If there is missing or late evidence, the miner is punished. More information about this can be found in the Runtime, Cut and Penalties section of this page. At Filecoin, miners earn two different types of rewards for their efforts: storage fees and reward prevention. Storage fees are the fees that customers pay regularly after reaching a deal, in exchange for storing data. This fee is automatically deposited into the withdrawal portfolio associated with miners while they continue to perform their duties over time, and is locked for a short period upon receipt. Block rewards are large sums given to miners calculated on a new block. Unlike storage fees, these rewards do not come from a linked customer; Instead, the new FIL “prints” the network as an inflationary and incentive measure for miners to develop the chain. All active miners on the network have a chance to get a block bonus, their chance to be directly proportional to the amount of storage space that is currently being contributed to the network. Duration of operation, cutting and penalties “Slashing” is a feature found in most blockchain protocols, and is used to punish miners who fail to provide reliable uptime or act maliciously against the network. In Filecoin, miners are susceptible to two different types of cut: storage error cut, unanimously reduce error. Storage Error Reduction is a term used to include a wider range of penalties, including error fees, sector penalties, and termination fees. Miners must pay these penalties if they fail to provide reliability of the sector or decide to leave the network voluntarily. An error fee is a penalty that a miner incurs for each non-working day. Sector punishment: A penalty incurred by a miner of a disrupted sector for which no error was reported before the WindowPoSt inspection. The sector will pay an error fee after the penalty of the sector once the error is discovered. Termination Fee: A penalty that a miner incurs when a sector is voluntary or involuntarily terminated and removed from the network. Cutting consensus error is the penalty that a miner incurs for committing consensus errors. This punishment applies to miners who have acted maliciously against the network consensus function. Filecoin miners Eight of the top 10 Felticoin miners are Chinese investors or companies, according to the blockchain explorer, while more companies are selling cloud mining contracts and distributed file sharing system hardware. CoinDesk’s Wolfe Chao wrote: “China’s craze for Filecoin may have been largely related to the long-standing popularity of crypto mining in the country overall, which is home to about 65% of the computing power on Bitcoin at discretion.” With Filecoin approaching the launch of the mainnet blocknet — after several delays since the$ 200 million increase in 2017 — Chinese investors are once again speculating strongly about network mining devices and their premium prices.
Since Protocol Labs, the company behind Filecoin, released its “Test Incentives” program on June 9 that was scheduled to start in a week’s time, more than a dozen Chinese companies have started selling cloud mining contracts and hardware — despite important details such as economics Mining incentives on the main network are still endless.
Sales volumes to date for each of these companies can range from half a million to tens of millions of dollars, according to self-reported data on these platforms that CoinDesk has watched and interviews with several mining hardware manufacturers.
Filecoin’s goal is to build a distributed storage network with token rewards to spur storage hosting as a way to drive wider adoption. Protocol Labs launched a test network in December 2019. But the tokens mined in the testing environment so far are not representative of the true silicon coin that can be traded when the main network is turned on. Moreover, the mining incentive economics on testnet do not represent how final block rewards will be available on the main network.
However, data from Blockecoin’s blocknetin testnet explorers show that eight out of 10 miners with the most effective mining force on testnet are currently Chinese miners.
These eight miners have about 15 petabytes (PB) of effective storage mining power, accounting for more than 85% of the total test of 17.9 petable. For the context, 1 petabyte of hard disk storage = 1000 terabytes (terabytes) = 1 million gigabytes (GB).
Filecoin craze in China may be closely related to the long-standing popularity of crypt mining in the country overall, which is home to about 65% of the computing power on Bitcoin by estimation. In addition, there has been a lot of hype in China about foreign exchange mining since 2018, as companies promote all types of devices when the network is still in development.
“Encryption mining has always been popular in China,” said Andy Tien, co-founder of 1475, one of several mining hardware manufacturers in Philquin supported by prominent Chinese video indicators such as Fenbushi and Hashkey Capital.
“Even though the Velikoyen mining process is more technologically sophisticated, the idea of mining using hard drives instead of specialized machines like Bitcoin ASIC may be a lot easier for retailers to understand,” he said.
Meanwhile, according to Feixiaohao, a Chinese service comparable to CoinMarketCap, nearly 50 Chinese crypto exchanges are often somewhat unknown with some of the more well-known exchanges including Gate.io and Biki — have listed trading pairs for Filecoin currency contracts for USDT.
In bitcoin mining, at the current difficulty level, one segment per second (TH / s) fragmentation rate is expected to generate around 0.000008 BTC within 24 hours. The higher the number of TH / s, the greater the number of bitcoins it should be able to produce proportionately. But in Filecoin, the efficient mining force of miners depends on the amount of data stamped on the hard drive, not the total size of the hard drive.
To close data in the hard drive, the Filecoin miner still needs processing power, i.e. CPU or GPU as well as RAM. More powerful processors with improved software can confine data to the hard drive more quickly, so miners can combine more efficient mining energy faster on a given day.
As of this stage, there appears to be no transparent way at the network level for retail investors to see how much of the purchased hard disk drive was purchased which actually represents an effective mining force.
The U.S.-based Labs Protocol was behind Filecoin’s initial coin offer for 2017, which raised an astonishing $200 million. This was in addition to a$ 50 million increase in private investment supported by notable venture capital projects including Sequoia, Anderson Horowitz and Union Square Ventures. CoinDk’s parent company, CoinDk, has also invested in Protocol Labs.
After rounds of delay, Protocol Protocols said in September 2019 that a testnet launch would be available around December 2019 and the main network would be rolled out in the first quarter of 2020.
The test started as promised, but the main network has been delayed again and is now expected to launch in August 2020. What is Filecoin mining process?
Filecoin mainly consists of three parts: the storage market (the chain), the blockecin Filecoin, and the search market (under the chain). Storage and research market in series and series respectively for security and efficiency. For users, the storage frequency is relatively low, and the security requirements are relatively high, so the storage process is placed on the chain. The retrieval frequency is much higher than the storage frequency when there is a certain amount of data. Given the performance problem in processing data on the chain, the retrieval process under the chain is performed. In order to solve the security issue of payment in the retrieval process, Filecoin adopts the micro-payment strategy. In simple terms, the process is to split the document into several copies, and every time the user gets a portion of the data, the corresponding fee is paid. Types of mines corresponding to Filecoin’s two major markets are miners and warehousers, among whom miners are primarily responsible for storing data and block packages, while miners are primarily responsible for data query. After the stable operation of the major Filecoin network in the future, the mining operator will be introduced, who is the main responsible for data maintenance.
In the initial release of Filecoin, the request matching mechanism was not implemented in the storage market and retrieval market, but the takeover mechanism was adopted. The three main parts of Filecoin correspond to three processes, namely the stored procedure, retrieval process, packaging and reward process. The following figure shows the simplified process and the income of the miners:
The Filecoin mining process is much more complicated, and the important factor in determining the previous mining profit is efficient storage. Effective storage is a key feature that distinguishes Filecoin from other decentralized storage projects. In Filecoin’s EC consensus, effective storage is similar to interest in PoS, which determines the likelihood that a miner will get the right to fill, that is, the proportion of miners effectively stored in the entire network is proportional to final mining revenue.
It is also possible to obtain higher effective storage under the same hardware conditions by improving the mining algorithm. However, the current increase in the number of benefits that can be achieved by improving the algorithm is still unknown.
It seeks to promote mining using Filecoin Discover
Filecoin announced Filecoin Discover — a step to encourage miners to join the Filecoin network. According to the company, Filecoin Discover is “an ever-growing catalog of numerous petabytes of public data covering literature, science, art, and history.” Miners interested in sharing can choose which data sets they want to store, and receive that data on a drive at a cost. In exchange for storing this verified data, miners will earn additional Filecoin above the regular block rewards for storing data. Includes the current catalog of open source data sets; ENCODE, 1000 Genomes, Project Gutenberg, Berkley Self-driving data, more projects, and datasets are added every day.
Ian Darrow, Head of Operations at Filecoin, commented on the announcement:
“Over 2.5 quintillion bytes of data are created every day. This data includes 294 billion emails, 500 million tweets and 64 billion messages on social media. But it is also climatology reports, disease tracking maps, connected vehicle coordinates and much more. It is extremely important that we maintain data that will serve as the backbone for future research and discovery”.
Miners who choose to participate in Filecoin Discover may receive hard drives pre-loaded with verified data, as well as setup and maintenance instructions, depending on the company. The Filecoin team will also host the Slack (fil-Discover-support) channel where miners can learn more.
Filecoin got its fair share of obstacles along the way. Last month Filecoin announced a further delay before its main network was officially launched — after years of raising funds.
In late July QEBR (OTC: QEBR) announced that it had ceded ownership of two subsidiaries in order to focus all of the company’s resources on building blockchain-based mining operations.
The QEBR technology team previously announced that it has proven its system as a Filecoin node valid with CPU, GPU, bandwidth and storage compatibility that meets all IPFS guidelines. The QEBR test system is connected to the main Filecoin blockchain and the already mined filecoin coin has already been tested.
“The disclosure of Sheen Boom and Jihye will allow our team to focus only on the upcoming global launch of Filecoin. QEBR branch, Shenzhen DZD Digital Technology Ltd. (“ DZD “), has a strong background in blockchain development, extraction Data, data acquisition, data processing, data technology research. We strongly believe Filecoin has the potential to be a leading blockchain-based cryptocurrency and will make every effort to make QEBR an important player when Mainecoin mainnet will be launched soon”.
IPFS and Filecoin
Filecoin and IPFS are complementary protocols for storing and sharing data in a decentralized network. While users are not required to use Filecoin and IPFS together, the two combined are working to resolve major failures in the current web infrastructure.
IPFS
It is an open source protocol that allows users to store and transmit verifiable data with each other. IPFS users insist on data on the network by installing it on their own device, to a third-party cloud service (known as Pinning Services), or through community-oriented systems where a group of individual IPFS users share resources to ensure the content stays live.
The lack of an integrated catalytic mechanism is the challenge Filecoin hopes to solve by allowing users to catalyze long-term distributed storage at competitive prices through the storage contract market, while maintaining the efficiency and flexibility that the IPFS network provides.
Using IPFS
In IPFS, the data is hosted by the required data installation nodes. For data to persist while the user node is offline, users must either rely on their other peers to install their data voluntarily or use a central install service to store data.
Peer-to-peer reliance caching data may be a good thing as one or multiple organizations share common files on an internal network, or where strong social contracts can be used to ensure continued hosting and preservation of content in the long run. Most users in an IPFS network use an installation service.
Using Filecoin
The last option is to install your data in a decentralized storage market, such as Filecoin. In Filecoin’s structure, customers make regular small payments to store data when a certain availability, while miners earn those payments by constantly checking the integrity of this data, storing it, and ensuring its quick recovery. This allows users to motivate Filecoin miners to ensure that their content will be live when it is needed, a distinct advantage of relying only on other network users as required using IPFS alone.
It is important to know that Filecoin is built on top of IPFS. Filecoin aims to be a very integrated and seamless storage market that takes advantage of the basic functions provided by IPFS, they are connected to each other, but can be implemented completely independently of each other. Users do not need to interact with Filecoin in order to use IPFS.
Some advantages of sharing Filecoin with IPFS:
• Filecoin and IPFS CIDs share hash specifications.
• Use libp2p by Filecoin nodes to create secure connections with each other.
• Messaging between nodes and cluster propagation is facilitated in Filecoin by libp2p pubsub.
• IPLD use for blockchain data structures.
• Use Graphsync to transfer data between nodes.
Of all the decentralized storage projects, Filecoin is undoubtedly the most interested, and IPFS has been running stably for two years, fully demonstrating the strength of its core protocol.
Filecoin’s ability to obtain market share from traditional central storage depends on end-user experience and storage price. Currently, most Filecoin nodes are posted in the IDC room. Actual deployment and operation costs are not reduced compared to traditional central cloud storage, and the storage process is more complicated.
PoRep and PoSt, which has a large number of proofs of unknown operation, are required to cause the actual storage cost to be so, in the early days of the release of Filecoin. The actual cost of storing data may be higher than the cost of central cloud storage, but the initial storage node may reduce the storage price in order to obtain block rewards, which may result in the actual storage price lower than traditional central cloud storage.
In the long term, Filecoin still needs to take full advantage of its P2P storage, convert storage devices from specialization to civil use, and improve its algorithms to reduce storage costs without affecting user experience. The storage problem is an important problem to be solved in the blockchain field, so a large number of storage projects were presented at the 19th Web3 Summit. IPFS is an important part of Web3 visibility. Its development will affect the development of Web3 to some extent. Likewise, Web3 development somewhat determines the future of IPFS. Filecoin is an IPFS-based storage class project initiated by IPFS. There is no doubt that he is highly expected.
Resources :

##### Microtick blockchain is launched using Cosmos! 🚀

Microtick is a cosmos-based project that allows for price discovery of blockchain assets onchain instead of relying on an oracle to inject prices from the outside.
Users bet on the short-term price changes of assets (like Bitcoin, ETH, or anything else) and win/lose on their accuracy. It’s the first system of its kind and is a fascinating application of Cosmos technology and game theory.
It was launched today with support from ShapeShift and a variety of existing Cosmos validators like Chorus One and Figment. A block explorer is online already: https://microtick.spanish-node.es
With all of the issues surrounding oracle data accuracy and integrity, I am excited to see how Microtick evolves.

##### Top Proof Of Stake Networks and Staking Coin List

Proof of stake consensus algorithm was launched as an alternative to the proof of work algorithm and since its discovery in 2012, it has been used by a number of crypto platforms seeking to become more scalable than the Bitcoin network. With one of the main objectives of the proof of work model, allowing for a decentralized network to confirm transaction instead of a third party, the proof of stake model achieves this in a different manner. Before we dive into some of the top proof of stake cryptocurrency networks right now, it is best that we get an idea of what proof of stake is.
What Is Proof Of Stake?
Proof of Stake otherwise referred to as PoS is a consensus algorithm that makes use of the coin staking format. To explain better, for users on the network to be able to mine, they need to be able to stake a certain amount of coin on the network if they are to start mining. In addition to staking a certain amount, these individuals will only mine the total amount of coins that have been staked on the network. This simply means that if a manages to stake or lock up a huge amount of coins, let’s say about 10% of the total coins on the network, they will be able to validate about 10% of the total transactions that are carried out on the network. So if a network processes about 10,000 transactions each day, these miners will validate and receive rewards for validating 10% of the total blocks. Aside from the rewards they stand to gain, these miners are also paid transaction fees of users on the network each time they validate a transaction.
There are a couple of benefits that come from making use of PoS based blockchain networks and they include;
1. They are less expensive; unlike the PoW mechanism that requires users to invest their hard-earned funds in the purchase of expensive hardware or mining rigs, these PoS networks do not require you to pay for mining rigs. All you have to do is buy or own a certain amount of coin on the network and you can begin validating transactions and earning rewards.
2. It is eco-friendly; unlike PoW based networks, PoS networks offer users guaranteed returns. The value of these PoS based coins does not fall like the PoW based coins unless there is a slight change in the market.
3. On this network, stakers can decide to delegate their responsibilities to third-party agents to help them carry out.
Top Proof Of Stake Networks And Staking Coins
1. Dash (DASH)
Otherwise referred to as “Digital Cash”, DASH happens to be one of the very advanced crypto networks to adopt the PoS algorithm. DASH simply acts like liquid cash or P2P platform that is used to make payments for goods and services that are purchased daily. Currently, in most countries, DASH has been integrated as a means of payment for goods and services bought daily. In the last couple of years, DASH has implemented the InstantSend and PrivateSend features which will facilitate a fast and secure transaction for all on the network. Holders of the DASH coin can run master nodes on the network or receive rewards in DASH coins.
On the DASH network, users will have to stake about 1000 DASH coins when the price of one (1) DASH is equal to $300. While this network was built on Bitcoin’s main core it happens to focus on the privacy and quick transfer of funds aspect. Early adopters of DASH that have a large number of DASH coins in their possession will do well to become master nodes on the network. Individuals with about$300,000 worth of DASH coins will make approximately 7.5% annual profit from becoming master nodes on the network. Those seeking to stake DASH coins will do well to ensure that they have the DASH staking wallets in their possession.
2. NEO (NEO)
Previously referred to as Antshares, NEO happens to be the first Chinese open-source blockchain project in existence. The developers of this network have referred to it as the distributed network for the smart economy. Being a PoS powered network, users on the NEO blockchain can stake their coins if they want to become miners on the network. Aside from the fact that there is a crypto platform, NEO has a token which is referred to as GAS which can be staked on any of the NEO staking wallets available. Unlike some of the other PoS based crypto networks, NEO does not require users to keep their staking wallets open.
Stakers on the NEO network can expect a 4.5% annual profit when they stake on this network. There are a couple of benefits that are associated with making use of this PoS based network and they include; it is a smart network that affords you the opportunity to send and receive coins in less than no time. The certificates, as well as the identities, are digital. Also, there is a wide range of decentralized applications (DApps).
3. Vechain (VET)
This happens to be another top PoS based network and since its launch has been able to gather attention from members of the crypto community. This network has been said to be similar to the NEO network and it offers users the opportunity to carry out fast transactions at a reduced cost. Unlike some of the other PoS based networks, Vechain focus primarily on the supply chain industry. It has allied with the Amazon web service and Walmart China. When you stake VET on the Vechain network, you are given VTHO for staking VET coins on the network. It is used in transactions and it has a return of investment of about 2% or more. Users on the network get extra with the nodes and it is easy to make use of.
One of the main benefits of this network is that it is incredibly easy to make use of and it has a long-range of partnerships. In addition to this, it has a fair ROI rate as well as other amazing bonuses that users will have to enjoy as well.
As always, the team here at Affil Coin is happy to help where we can. So, if you ever have any questions, stop by the AffilCoin Telegram chat and talk to a member of our team! Furthermore, if you want to learn more about Delegated Proof of Stake, click here and visit the AffilCoin site!

##### 08-13 21:45 - 'Building the Infrastructure for the Future Decentralized Financial Market, Coinbase Included HBTC.Com Debut DeFi Project - Nest Protocol' (self.Bitcoin) by /u/Nest_Fan removed from /r/Bitcoin within 24-34min

'''
As the world’s leading regulatory compliant digital asset exchange, Coinbase sets one of the most stringent requirements for digital asset listing which includes technical evaluation of projects, legal and risk analysis, market supply and demand analysis, and crypto-economics. Coinbase holds a strong reputation in the digital asset industry, and thus the “Coinbase Standard” is considered as the industry benchmark for other digital asset projects, and the market has even seen the “Coinbase effect”.
On July 25 2020, Coinbase quietly launched the pricing chart of a decentralized oracle project, NEST Protocol (NEST), into its portal. Although Coinbase has yet to announce the inclusion of the project in its evaluation list, it represents a keen interest in the DeFi sector, and particularly in the DeFi price oracle projects.
NEST Protocol is the rising star in the decentralized price oracle sector
Decentralized financial services offered by the current mainstream DeFi platforms such as MakerDAO, Compound, dYdX, etc. rely heavily on the market data provided by the oracle projects. Oracle projects act as reliable information sources to feed these price data to other DeFi Projects, connecting the price data from the centralized world to the DeFi space. As such, the price oracle is an integral part of the decentralized financial services infrastructure.
Traditionally, the price oracle collects data from different platforms and feeds these data points to the DeFi space to create data reference points to enable them to function properly. However, many problems currently exist in the DeFi space, for example, blockchain network congestion, malicious attacks, wild market fluctuations, and other factors that may cause the data given by the price oracle to deviate from the true market data. These ultimately cause users to trade on wrong information in the DeFi space and increases such transaction costs.
Decentralized finance requires a fast, secure, and reliable price oracle. The birth of the decentralized price oracle is the embodiment of the blockchain industry’s thinking, and the current market projects offering decentralized price oracle services which includes NEST Protocol, Chainlink, Band Protocol, Tellor, Witness, Oraclize, and many others.
The innovation of NEST-Price is that every data point has been agreed upon by market validators, in line with the blockchain consensus mechanism. NEST-Price synchronizes the off-chain price in a highly decentralized manner, creating real and valid price data on-chain. This is the unique differentiator between NEST-Price and other price oracles.
Compared with other price oracle projects, NEST also has other features and advantages, such as the proposed peer-to-peer quotation matching as well as its unique verifier verification structure, making NEST more resilient to malicious attacks, resulting in a more decentralized network, and it’s on-chain prices closer to the fair market price. All of this has resulted in the NEST Protocol becoming a rising star in the DeFi price oracle sector. HBTC.com selects high-quality projects to list and partnering with NEST to promote the development of DeFi ecosystem
During the selection of quality assets, exchanges like [HBTC.com]1 and Coinbase adhere to the principle of a rigorous selection of assets from different projects to enable a proper range of digital assets. At the same time, in order to solve existing pain points in the digital asset industry, which currently lacks a market-making management solution, HBTC.com also has launched its own “coin listing crowdsourcing [liquidity initiative]2 “, redefining the exchange market making model.
HBTC.com, through its coin listing strategy, effectively reduces the problem of low liquidity in the early stages of high-quality projects, ensuring the smoothness of the user experience, and achieves a win-win situation for traders, the community, and the respective trading platform. These initiatives, coupled with reliable user protection and a responsible attitude, have earned a positive reputation among users.
Since its inception, the HBTC.com exchange has been committed to the discovery of both quality and promising digital asset projects. At a time when DeFi is growing rapidly, HBTC.com has a unique perspective for the decentralized price oracle sector and has prioritized NEST as a premium partner to debut the project alongside with its global branding upgrade. In addition, HBTC.com has [100% proof of reserves]3 for traders to validate the existence of assets via the Merkle tree, which brings transparency to the extreme.
In May 2020, NEST token delivered a 883.29% of return, at its peak, after its global debut on HBTC.com. At present, HBTC Exchange addresses holding NEST token accounts in a total of 141 million, ranked first in the overall network. At the same time, the HBTC Exchange network exclusively releases NEST staking mining and data show that NEST 24-hour turnover has reached $20.4 million. Post-listing of the NEST token, HBTC.com has also listed DeFi projects such as DF, OKS, NEST, SWTH, JST, NVT, and other DeFi projects with market potential; some projects have achieved astonishing performance in the secondary market. HBTC.com’s path to DeFi: developing public chains to prepare for the future ecosystem breakout. In terms of the DeFi product and ecosystem infrastructure, HBTC has deployed HBTC Chain since launched in 2018, an infrastructure designed for decentralized finance and DeFi business with patented Bluehelix decentralized cross-chain clearing and custody technology. The HBTC Chain is the DeFi ecosystem infrastructure that the team has spent a significant amount of effort to build. It is based on decentralization and community consensus and integrates cryptography and blockchain technologies to support decentralized association-based governance capabilities at the technical level. Based on decentralized key management, combining various cryptography tools including ECDSA, commitment, zero-knowledge proof, and multi-party computation, It implements the distributed private key generation and signature for cross-chain assets among all validators. On top of that, this technology can realize light-weight and non-intrusive cross-chain asset custody. On the clearing layer, HBTC Chain employs BHPOS consensus and horizontal sharding mechanisms to achieve high-performing transaction clearing, and implementation of OpenDex protocol to help the development of the DeFi ecosystem. In addition, with the success experience of Bluehelix Cloud SaaS and white label solutions and the HBTC Brokerage system, HBTC’s public chain also innovatively supports CEX+DEX mixed matchmaking model and OpenDex protocol and proposes the three-tier node system which consists of standard node + consensus node + core node. This structure provides HBTC public chain certain advantages in terms of performance and cross-chain transactions. Users can easily establish a DEX with OpenDex protocol at nearly zero cost, and all DEX will share the liquidity and support customized user interface and trading parameters. The trading experience can be completely comparable to centralized spot exchanges. With the launch of its test network, it is now possible to develop various DeFi applications on the HBTC public chain, such as decentralized swap, so that private keys are not controlled by any party; no KYC, which can prevent personal information leakage; and asset security through the setting of invalidation, cancellation of transactions and other functions, cross-chain asset mappings, such as the ability to issue cross-chain cBTC or other chain tokens, fully decentralized asset mapping contracts, and 100% reserves. Conclusion In the past few months, the DeFi market has been extremely active, the price of DeFi tokens has been rising, and a new round of competition with the centralized exchanges has started. HBTC Chain relies on the powerful technology of Bluehelix and [HBTC.com]1 , giving all public chains the ability to interconnect, and put into both DeFi and SaaS levels. Undoubtedly, as one of the first exchanges to build the DeFi ecosystem, HBTC is leading the breakout in the current DeFi craze and has now become the first choice of users to engage with quality DeFi projects. From BITCOIN news([[link]6 ) ''' Building the Infrastructure for the Future Decentralized Financial Market, Coinbase Included HBTC.Com Debut DeFi Project - Nest Protocol Go1dfish undelete link unreddit undelete link Author: Nest_Fan 1: *btc*com/ 2: m*diu**com/hbt***ficia*/hbt*-launches-ba**liquidi*y***owd*unding-li*ti*g-plan-redefine-t*e*exch*nge-*i*tin**m*d*l***6*58f*f1d* 3: hbtc.ze**e*k*co*/hc/*n-us/a**icles/3***46287754-HBT*-10*-*ro***of*Reserve 4: hb*c.co*/ 5: n*ws.bitcoin.c*m*bu*ld*ng-t**-infr***ructur*-f*r-the*fut*re*decen**ali**d-*inanc*a*-market-coi**as*-*ncluded-h*t*-*o*-*ebut-de**-p*oject-n*st-**otocol* 6: n**s.bit*oin*com/building-th*-infrast*u*ture*for-t*e-fut****decen**a**zed**inancia*-m*rket-coinbase-**c*uded-*b*c-c***deb***defi-**oject-*est**r**ocol/]^^5 Unknown links are censored to prevent spreading illicit content. submitted by removalbot to removalbot [link] [comments] ##### How does my Monero node discovers other nodes to connect and to download blocks from? I've read that Bitcoin has some hardcoded IPs for connecting to the network for the first time, so I assume Monero does something similar, but either in Bitcoin or Monero, how is this not a huge potential point of failure if those nodes get compromised? Could someone explain how does the discovery of Monero nodes works, and how this can be done safely? submitted by alive_consequence to Monero [link] [comments] ##### Chromia - Blockchain of Blockchains That Has Staged To Revolutionize Decentralized Application Development Blockchain has taken the world by storm. The tech may have been envisioned to power decentralized finance in Bitcoin, it's potential and use case had far exceeded such identity. It has opened the possibility to develop trust and openness in a way that has never been expressed before. However, like any new development, blockchain has many challenges that need to be addressed. Firstly, existing protocols that power the initial set of blockchains are too slow to garner advanced real-world usage. Their architectural build also implies they are unable to scale accordingly to meet application and usage demand. Blockchains are renowned for their strong security and immutability, nonetheless, these factors rely solely on the type of protocol or consensus adopted, and in many cases, the consensus of a particular blockchain may fail to establish a secured environment that could be relied upon under factual circumstances. On the developer end, developing and building blockchain applications is a nightmare many wanted to escape because most integrated blockchain programming languages are new with an unestablished root. This means programmers have to learn a new language from basics before they can start building on a blockchain network. The hardest part is that almost each of every type and brand of blockchain has its unique programming language which as a result contributes to non-interoperability that led to a status quo of blockchains being called an "island of self-isolation". An obvious solution to most of the aforementioned downsides is to start restructuring how blockchains are made by design and code. The good news is that a blockchain project with a new root has already achieved the feat of addressing most of these problems by building a relational blockchain system governed by a management system termed "Postchain". I am talking about Chromia blockchain network built by the ChromaWay development team. Chromia Chromia is a public blockchain with a relational database system build and design. What this means is that data can be structured and defined in any way by the builder of the system. This flexibility of data management allows for different usage scenarios. This is a sweet pot for developers but what is more interesting is the ability to code and deploy applications in a seamless manner. Chroma uses Postchain to oversee the operation of its blockchain network in conjunction with a flexible and easy-to-code programming language called RELL (Relational Language). Great protocol design? Thumb up! Nice programming language... Interesting! But what about other challenges mentioned in the opening part of the post? Hell yeah! A blockchain system cannot be duly considered if it can't scale and operate at a good speed. Chromia takes this factor to heart and ensures its network is able to process transactions at a block rate of 2 seconds, which is more than enough to support most applications and commercial usage. Blockchain Of Blockchains: Chromia Modular Configuration One method spam is avoided on blockchain networks is through integrated fee structure, most times, this is charged directly from users. However, Chromia thinks this idea should be rewritten by instead charging Dapps directly for the operation they perform. Consequently, and since most application usage differs from one type to another. This and many other implementations led to a modular blockchain design where each Dapp can reside on its own chain, dictate its own rule and usage and intended fee structure. The Dapps in this case acts like side chains that are attached to the governing Chromia infrastructure. Each Dapp or side chain is independent but benefits from the security and laid facilities of the network. Chromia adopted PBFT consensus to ensure consensus can be achieved under certain rules even if some node in the network cannot be relied upon at a time, thus, eliminating incidents such as 'one point of failure'. An Infrastructure For A Wide Range Of Usage Scenario Chromia launched its main net in Dec 2019, and moved from an experimental position to prove their dedication towards achieving their vision not just on paper but as a practical and working process. Ever since their main net launch. The chain has seen different types of apps deploy on its network. The network relational design also means Dapps with huge computational demand can work efficiently and seamlessly with any cause to worry. Let's look at some of these Dapps. Chromunity A decentralized social media platform that leverages the advantage of the relational computational build of Chromia to bring about fantastic social and community user experience. The advantages of Chromunity as a decentralized social platform is how users can control their data and interactions, vote for representatives that implement the will and voice of the community. Chromunity features a Reddit-like design and interface with the ability to post short/long meaningful content to a wide range of community categories or specific ones. These screenshots give a sneak peek into how the interactive user interface looks like. Green Asset Wallet This is the first enterprise Dapp to launch on the Chromia chain after its main net release. Using the quote of how the project defines itself. "Green Assets Wallet is the world’s first blockchain-based platform for easy validation and impact reporting of green bonds". The product has many features that are designed to suit investor's needs. From real-time collaboration to ensuring optimum trust and transparency to security. The Dapp is ideal for green bonds operations that look to make issuer and investors' lives an easier one. Investors have direct access to trusted green bond information, metrics, and data. Green asset wallet at allows investors to make new investment discoveries through search criteria, compare, benchmark, and follow up on investment opportunities". Issuers are able to operate with an independent, cost-efficient, and structured system, and provide investors with impact investment opportunities and report on achievements. Mines Of Dalarnia Is "an action-adventure platform-mining game where the player controls a character and guides them through various blocks of earth, to discover and collect minerals of multiple rarities. Includes a blockchain based real-estate market". Chromia transaction speed and computational efficiency make it an ideal platform to build decentralized or blockchain games of different kinds. Play Mines Of Dalarnia Conclusion Chromia combines many groundbreaking features that purport it as a new generation blockchain and set it out among the crowd. It's easy to code programming language, Postchain consortium, relational database system express qualities that fit different needs of decentralized applications and their operations. All of which state the chain strength and confidence of usage. Under the governance of ChromaWay - an organization of tech experts and geeks. Chromia is expected to continue on an upward positive momentum. Learn more about the project from it's official website Their Telegram group chat is a good place to start interacting with the community. Chromia has a Twitter presence and their Whitepaper is a good reference and tool to have a good overview of the project mission and vision at large. submitted by Sidonpee to Teamchromia [link] [comments] ##### Where is Bitcoin Going and When? The Federal Reserve and the United States government are pumping extreme amounts of money into the economy, already totaling over$484 billion. They are doing so because it already had a goal to inflate the United States Dollar (USD) so that the market can continue to all-time highs. It has always had this goal. They do not care how much inflation goes up by now as we are going into a depression with the potential to totally crash the US economy forever. They believe the only way to save the market from going to zero or negative values is to inflate it so much that it cannot possibly crash that low. Even if the market does not dip that low, inflation serves the interest of powerful people.
The impending crash of the stock market has ramifications for Bitcoin, as, though there is no direct ongoing-correlation between the two, major movements in traditional markets will necessarily affect Bitcoin. According to the Blockchain Center’s Cryptocurrency Correlation Tool, Bitcoin is not correlated with the stock market. However, when major market movements occur, they send ripples throughout the financial ecosystem which necessary affect even ordinarily uncorrelated assets.
Therefore, Bitcoin will reach X price on X date after crashing to a price of X by X date.

## Stock Market Crash

The Federal Reserve has caused some serious consternation with their release of ridiculous amounts of money in an attempt to buoy the economy. At face value, it does not seem to have any rationale or logic behind it other than keeping the economy afloat long enough for individuals to profit financially and politically. However, there is an underlying basis to what is going on which is important to understand in order to profit financially.
All markets are functionally price probing systems. They constantly undergo a price-discovery process. In a fiat system, money is an illusory and a fundamentally synthetic instrument with no intrinsic value – similar to Bitcoin. The primary difference between Bitcoin is the underlying technology which provides a slew of benefits that fiat does not. Fiat, however, has an advantage in being able to have the support of powerful nation-states which can use their might to insure the currency’s prosperity.
Traditional stock markets are composed of indices (pl. of index). Indices are non-trading market instruments which are essentially summaries of business values which comprise them. They are continuously recalculated throughout a trading day, and sometimes reflected through tradable instruments such as Exchange Traded Funds or Futures. Indices are weighted by market capitalizations of various businesses.
Price theory essentially states that when a market fails to take out a new low in a given range, it will have an objective to take out the high. When a market fails to take out a new high, it has an objective to make a new low. This is why price-time charts go up and down, as it does this on a second-by-second, minute-by-minute, day-by-day, and even century-by-century basis. Therefore, market indices will always return to some type of bull market as, once a true low is formed, the market will have a price objective to take out a new high outside of its’ given range – which is an all-time high. Instruments can only functionally fall to zero, whereas they can grow infinitely.
So, why inflate the economy so much?
Deflation is disastrous for central banks and markets as it raises the possibility of producing an overall price objective of zero or negative values. Therefore, under a fractional reserve system with a fiat currency managed by a central bank – the goal of the central bank is to depreciate the currency. The dollar is manipulated constantly with the intention of depreciating its’ value.
Central banks have a goal of continued inflated fiat values. They tend to ordinarily contain it at less than ten percent (10%) per annum in order for the psyche of the general populace to slowly adjust price increases. As such, the markets are divorced from any other logic. Economic policy is the maintenance of human egos, not catering to fundamental analysis. Gross Domestic Product (GDP) growth is well-known not to be a measure of actual growth or output. It is a measure of increase in dollars processed. Banks seek to produce raising numbers which make society feel like it is growing economically, making people optimistic. To do so, the currency is inflated, though inflation itself does not actually increase growth. When society is optimistic, it spends and engages in business – resulting in actual growth. It also encourages people to take on credit and debts, creating more fictional fiat.
Inflation is necessary for markets to continue to reach new heights, generating positive emotional responses from the populace, encouraging spending, encouraging debt intake, further inflating the currency, and increasing the sale of government bonds. The fiat system only survives by generating more imaginary money on a regular basis.
Bitcoin investors may profit from this by realizing that stock investors as a whole always stand to profit from the market so long as it is managed by a central bank and does not collapse entirely. If those elements are filled, it has an unending price objective to raise to new heights. It also allows us to realize that this response indicates that the higher-ups believe that the economy could crash in entirety, and it may be wise for investors to have multiple well-thought-out exit strategies.

## Economic Analysis of Bitcoin

The reason why the Fed is so aggressively inflating the economy is due to fears that it will collapse forever or never rebound. As such, coupled with a global depression, a huge demand will appear for a reserve currency which is fundamentally different than the previous system. Bitcoin, though a currency or asset, is also a market. It also undergoes a constant price-probing process. Unlike traditional markets, Bitcoin has the exact opposite goal. Bitcoin seeks to appreciate in value and not depreciate. This has a quite different affect in that Bitcoin could potentially become worthless and have a price objective of zero.
Bitcoin was created in 2008 by a now famous mysterious figure known as Satoshi Nakamoto and its’ open source code was released in 2009. It was the first decentralized cryptocurrency to utilize a novel protocol known as the blockchain. Up to one megabyte of data may be sent with each transaction. It is decentralized, anonymous, transparent, easy to set-up, and provides myriad other benefits. Bitcoin is not backed up by anything other than its’ own technology.
Bitcoin is can never be expected to collapse as a framework, even were it to become worthless. The stock market has the potential to collapse in entirety, whereas, as long as the internet exists, Bitcoin will be a functional system with a self-authenticating framework. That capacity to persist regardless of the actual price of Bitcoin and the deflationary nature of Bitcoin means that it has something which fiat does not – inherent value.
Bitcoin is based on a distributed database known as the “blockchain.” Blockchains are essentially decentralized virtual ledger books, replete with pages known as “blocks.” Each page in a ledger is composed of paragraph entries, which are the actual transactions in the block.
Blockchains store information in the form of numerical transactions, which are just numbers. We can consider these numbers digital assets, such as Bitcoin. The data in a blockchain is immutable and recorded only by consensus-based algorithms. Bitcoin is cryptographic and all transactions are direct, without intermediary, peer-to-peer.
Bitcoin does not require trust in a central bank. It requires trust on the technology behind it, which is open-source and may be evaluated by anyone at any time. Furthermore, it is impossible to manipulate as doing so would require all of the nodes in the network to be hacked at once – unlike the stock market which is manipulated by the government and “Market Makers”. Bitcoin is also private in that, though the ledge is openly distributed, it is encrypted. Bitcoin’s blockchain has one of the greatest redundancy and information disaster recovery systems ever developed.
Bitcoin has a distributed governance model in that it is controlled by its’ users. There is no need to trust a payment processor or bank, or even to pay fees to such entities. There are also no third-party fees for transaction processing. As the ledge is immutable and transparent it is never possible to change it – the data on the blockchain is permanent. The system is not easily susceptible to attacks as it is widely distributed. Furthermore, as users of Bitcoin have their private keys assigned to their transactions, they are virtually impossible to fake. No lengthy verification, reconciliation, nor clearing process exists with Bitcoin.
Bitcoin is based on a proof-of-work algorithm. Every transaction on the network has an associated mathetical “puzzle”. Computers known as miners compete to solve the complex cryptographic hash algorithm that comprises that puzzle. The solution is proof that the miner engaged in sufficient work. The puzzle is known as a nonce, a number used only once. There is only one major nonce at a time and it issues 12.5 Bitcoin. Once it is solved, the fact that the nonce has been solved is made public.
A block is mined on average of once every ten minutes. However, the blockchain checks every 2,016,000 minutes (approximately four years) if 201,600 blocks were mined. If it was faster, it increases difficulty by half, thereby deflating Bitcoin. If it was slower, it decreases, thereby inflating Bitcoin. It will continue to do this until zero Bitcoin are issued, projected at the year 2140. On the twelfth of May, 2020, the blockchain will halve the amount of Bitcoin issued when each nonce is guessed. When Bitcoin was first created, fifty were issued per block as a reward to miners. 6.25 BTC will be issued from that point on once each nonce is solved.
Unlike fiat, Bitcoin is a deflationary currency. As BTC becomes scarcer, demand for it will increase, also raising the price. In this, BTC is similar to gold. It is predictable in its’ output, unlike the USD, as it is based on a programmed supply. We can predict BTC’s deflation and inflation almost exactly, if not exactly. Only 21 million BTC will ever be produced, unless the entire network concedes to change the protocol – which is highly unlikely.
Some of the drawbacks to BTC include congestion. At peak congestion, it may take an entire day to process a Bitcoin transaction as only three to five transactions may be processed per second. Receiving priority on a payment may cost up to the equivalent of twenty dollars ($20). Bitcoin mining consumes enough energy in one day to power a single-family home for an entire week. ## Trading or Investing? The fundamental divide in trading revolves around the question of market structure. Many feel that the market operates totally randomly and its’ behavior cannot be predicted. For the purposes of this article, we will assume that the market has a structure, but that that structure is not perfect. That market structure naturally generates chart patterns as the market records prices in time. In order to determine when the stock market will crash, causing a major decline in BTC price, we will analyze an instrument, an exchange traded fund, which represents an index, as opposed to a particular stock. The price patterns of the various stocks in an index are effectively smoothed out. In doing so, a more technical picture arises. Perhaps the most popular of these is the SPDR S&P Standard and Poor 500 Exchange Traded Fund ($SPY).
In trading, little to no concern is given about value of underlying asset. We are concerned primarily about liquidity and trading ranges, which are the amount of value fluctuating on a short-term basis, as measured by volatility-implied trading ranges. Fundamental analysis plays a role, however markets often do not react to real-world factors in a logical fashion. Therefore, fundamental analysis is more appropriate for long-term investing.
The fundamental derivatives of a chart are time (x-axis) and price (y-axis). The primary technical indicator is price, as everything else is lagging in the past. Price represents current asking price and incorrectly implementing positions based on price is one of the biggest trading errors.
Markets and currencies ordinarily have noise, their tendency to back-and-fill, which must be filtered out for true pattern recognition. That noise does have a utility, however, in allowing traders second chances to enter favorable positions at slightly less favorable entry points. When you have any market with enough liquidity for historical data to record a pattern, then a structure can be divined. The market probes prices as part of an ongoing price-discovery process. Market technicians must sometimes look outside of the technical realm and use visual inspection to ascertain the relevance of certain patterns, using a qualitative eye that recognizes the underlying quantitative nature
Markets and instruments rise slower than they correct, however they rise much more than they fall. In the same vein, instruments can only fall to having no worth, whereas they could theoretically grow infinitely and have continued to grow over time. Money in a fiat system is illusory. It is a fundamentally synthetic instrument which has no intrinsic value. Hence, the recent seemingly illogical fluctuations in the market.
According to trade theory, the unending purpose of a market or instrument is to create and break price ranges according to the laws of supply and demand. We must determine when to trade based on each market inflection point as defined in price and in time as opposed to abandoning the trend (as the contrarian trading in this sub often does). Time and Price symmetry must be used to be in accordance with the trend. When coupled with a favorable risk to reward ratio, the ability to stay in the market for most of the defined time period, and adherence to risk management rules; the trader has a solid methodology for achieving considerable gains.
We will engage in a longer term market-oriented analysis to avoid any time-focused pressure. The Bitcoin market is open twenty-four-hours a day, so trading may be done when the individual is ready, without any pressing need to be constantly alert. Let alone, we can safely project months in advance with relatively high accuracy. Bitcoin is an asset which an individual can both trade and invest, however this article will be focused on trading due to the wide volatility in BTC prices over the short-term.

## Technical Indicator Analysis of Bitcoin

Technical indicators are often considered self-fulfilling prophecies due to mass-market psychology gravitating towards certain common numbers yielded from them. They are also often discounted when it comes to BTC. That means a trader must be especially aware of these numbers as they can prognosticate market movements. Often, they are meaningless in the larger picture of things.
• Volume – derived from the market itself, it is mostly irrelevant. The major problem with volume for stocks is that the US market open causes tremendous volume surges eradicating any intrinsic volume analysis. This does not occur with BTC, as it is open twenty-four-seven. At major highs and lows, the market is typically anemic. Most traders are not active at terminal discretes (peaks and troughs) because of levels of fear. Volume allows us confidence in time and price symmetry market inflection points, if we observe low volume at a foretold range of values. We can rationalize that an absolute discrete is usually only discovered and anticipated by very few traders. As the general market realizes it, a herd mentality will push the market in the direction favorable to defending it. Volume is also useful for swing trading, as chances for swing’s validity increases if an increase in volume is seen on and after the swing’s activation. Volume is steadily decreasing. Lows and highs are reached when volume is lower.
Therefore, due to the relatively high volume on the 12th of March, we can safely determine that a low for BTC was not reached.
• VIX – Volatility Index, this technical indicator indicates level of fear by the amount of options-based “insurance” in portfolios. A low VIX environment, less than 20 for the S&P index, indicates a stable market with a possible uptrend. A high VIX, over 20, indicates a possible downtrend. VIX is essentially useless for BTC as BTC-based options do not exist. It allows us to predict the market low for SPY, which will have an indirect impact on BTC in the short term, likely leading to the yearly low. However, it is equally important to see how VIX is changing over time, if it is decreasing or increasing, as that indicates increasing or decreasing fear. Low volatility allows high leverage without risk or rest. Occasionally, markets do rise with high VIX. As VIX is unusually high, in the forties, we can be confident that a downtrend for the S&P 500 is imminent. • RSI (Relative Strength Index): The most important technical indicator, useful for determining highs and lows when time symmetry is not availing itself. Sometimes analysis of RSI can conflict in different time frames, easiest way to use it is when it is at extremes – either under 30 or over 70. Extremes can be used for filtering highs or lows based on time-and-price window calculations. Highly instructive as to major corrective clues and indicative of continued directional movement. Must determine if longer-term RSI values find support at same values as before. It is currently at 73.56. • Secondly, RSI may be used as a high or low filter, to observe the level that short-term RSI reaches in counter-trend corrections. Repetitions based on market movements based on RSI determine how long a trade should be held onto. Once a short term RSI reaches an extreme and stay there, the other RSI’s should gradually reach the same extremes. Once all RSI’s are at extreme highs, a trend confirmation should occur and RSI’s should drop to their midpoint. ## Trend Definition Analysis of Bitcoin Trend definition is highly powerful, cannot be understated. Knowledge of trend logic is enough to be a profitable trader, yet defining a trend is an arduous process. Multiple trends coexist across multiple time frames and across multiple market sectors. Like time structure, it makes the underlying price of the instrument irrelevant. Trend definitions cannot determine the validity of newly formed discretes. Trend becomes apparent when trades based in counter-trend inflection points continue to fail. Downtrends are defined as an instrument making lower lows and lower highs that are recurrent, additive, qualified swing setups. Downtrends for all instruments are similar, except forex. They are fast and complete much quicker than uptrends. An average downtrend is 18 months, something which we will return to. An uptrend inception occurs when an instrument reaches a point where it fails to make a new low, then that low will be tested. After that, the instrument will either have a deep range retracement or it may take out the low slightly, resulting in a double-bottom. A swing must eventually form. A simple way to roughly determine trend is to attempt to draw a line from three tops going upwards (uptrend) or a line from three bottoms going downwards (downtrend). It is not possible to correctly draw a downtrend line on the BTC chart, but it is possible to correctly draw an uptrend – indicating that the overall trend is downwards. The only mitigating factor is the impending stock market crash. ## Time Symmetry Analysis of Bitcoin Time is the movement from the past through the present into the future. It is a measurement in quantified intervals. In many ways, our perception of it is a human construct. It is more powerful than price as time may be utilized for a trade regardless of the market inflection point’s price. Were it possible to perfectly understand time, price would be totally irrelevant due to the predictive certainty time affords. Time structure is easier to learn than price, but much more difficult to apply with any accuracy. It is the hardest aspect of trading to learn, but also the most rewarding. Humans do not have the ability to recognize every time window, however the ability to define market inflection points in terms of time is the single most powerful trading edge. Regardless, price should not be abandoned for time alone. Time structure analysis It is inherently flawed, as such the markets have a fail-safe, which is Price Structure. Even though Time is much more powerful, Price Structure should never be completely ignored. Time is the qualifier for Price and vice versa. Time can fail by tricking traders into counter-trend trading. Time is a predestined trade quantifier, a filter to slow trades down, as it allows a trader to specifically focus on specific time windows and rest at others. It allows for quantitative measurements to reach deterministic values and is the primary qualifier for trends. Time structure should be utilized before price structure, and it is the primary trade criterion which requires support from price. We can see price structure on a chart, as areas of mathematical support or resistance, but we cannot see time structure. Time may be used to tell us an exact point in the future where the market will inflect, after Price Theory has been fulfilled. In the present, price objectives based on price theory added to possible future times for market inflection points give us the exact time of market inflection points and price. Time Structure is repetitions of time or inherent cycles of time, occurring in a methodical way to provide time windows which may be utilized for inflection points. They are not easily recognized and not easily defined by a price chart as measuring and observing time is very exact. Time structure is not a science, yet it does require precise measurements. Nothing is certain or definite. The critical question must be if a particular approach to time structure is currently lucrative or not. We will measure it in intervals of 180 bars. Our goal is to determine time windows, when the market will react and when we should pay the most attention. By using time repetitions, the fact that market inflection points occurred at some point in the past and should, therefore, reoccur at some point in the future, we should obtain confidence as to when SPY will reach a market inflection point. Time repetitions are essentially the market’s memory. However, simply measuring the time between two points then trying to extrapolate into the future does not work. Measuring time is not the same as defining time repetitions. We will evaluate past sessions for market inflection points, whether discretes, qualified swings, or intra-range. Then records the times that the market has made highs or lows in a comparable time period to the future one seeks to trade in. What follows is a time Histogram – A grouping of times which appear close together, then segregated based on that closeness. Time is aligned into combined histogram of repetitions and cycles, however cycles are irrelevant on a daily basis. If trading on an hourly basis, do not use hours. • Yearly Lows (last seven years): 1/1/13, 4/10/14, 1/15/15, 1/17/16, 1/1/17, 12/15/18, 2/6/19 • Monthly Mode: 1, 1, 1, 1, 2, 4, 12 • Daily Mode: 1, 1, 6, 10, 15, 15, 17 • Monthly Lows (for the last year): 3/12/20 (10:00pm), 2/28/20 (7:09am), 1/2/20 (8:09pm), 12/18/19 (8:00am), 11/25/19 (1:00am), 10/24/19 (2:59am), 9/30/19 (2:59am), 8/29,19 (4:00am), 7/17/19 (7:59am), 6/4/19 (5:59pm), 5/1/19 (12:00am), 4/1/19 (12:00am) • Daily Lows Mode for those Months: 1, 1, 2, 4, 12, 17, 18, 24, 25, 28, 29, 30 • Hourly Lows Mode for those Months (Military time): 0100, 0200, 0200, 0400, 0700, 0700, 0800, 1200, 1200, 1700, 2000, 2200 • Minute Lows Mode for those Months: 00, 00, 00, 00, 00, 00, 09, 09, 59, 59, 59, 59 • Day of the Week Lows (last twenty-six weeks): Weighted Times are repetitions which appears multiple times within the same list, observed and accentuated once divided into relevant sections of the histogram. They are important in the presently defined trading time period and are similar to a mathematical mode with respect to a series. Phased times are essentially periodical patterns in histograms, though they do not guarantee inflection points Evaluating the yearly lows, we see that BTC tends to have its lows primarily at the beginning of every year, with a possibility of it being at the end of the year. Following the same methodology, we get the middle of the month as the likeliest day. However, evaluating the monthly lows for the past year, the beginning and end of the month are more likely for lows. Therefore, we have two primary dates from our histogram. 1/1/21, 1/15/21, and 1/29/21 2:00am, 8:00am, 12:00pm, or 10:00pm In fact, the high for this year was February the 14th, only thirty days off from our histogram calculations. The 8.6-Year Armstrong-Princeton Global Economic Confidence model states that 2.15 year intervals occur between corrections, relevant highs and lows. 2.15 years from the all-time peak discrete is February 9, 2020 – a reasonably accurate depiction of the low for this year (which was on 3/12/20). (Taking only the Armstrong model into account, the next high should be Saturday, April 23, 2022). Therefore, the Armstrong model indicates that we have actually bottomed out for the year! Bear markets cannot exist in perpetuity whereas bull markets can. Bear markets will eventually have price objectives of zero, whereas bull markets can increase to infinity. It can occur for individual market instruments, but not markets as a whole. Since bull markets are defined by low volatility, they also last longer. Once a bull market is indicated, the trader can remain in a long position until a new high is reached, then switch to shorts. The average bear market is eighteen months long, giving us a date of August 19th, 2021 for the end of this bear market – roughly speaking. They cannot be shorter than fifteen months for a central-bank controlled market, which does not apply to Bitcoin. (Otherwise, it would continue until Sunday, September 12, 2021.) However, we should expect Bitcoin to experience its’ exponential growth after the stock market re-enters a bull market. Terry Laundy’s T-Theory implemented by measuring the time of an indicator from peak to trough, then using that to define a future time window. It is similar to an head-and-shoulders pattern in that it is the process of forming the right side from a synthetic technical indicator. If the indicator is making continued lows, then time is recalculated for defining the right side of the T. The date of the market inflection point may be a price or indicator inflection date, so it is not always exactly useful. It is better to make us aware of possible market inflection points, clustered with other data. It gives us an RSI low of May, 9th 2020. The Bradley Cycle is coupled with volatility allows start dates for campaigns or put options as insurance in portfolios for stocks. However, it is also useful for predicting market moves instead of terminal dates for discretes. Using dates which correspond to discretes, we can see how those dates correspond with changes in VIX. Therefore, our timeline looks like: • 2/14/20 – yearly high (10372 USD)
• 3/12/20 – yearly low thus far ($3858 USD) • 5/9/20 – T-Theory true yearly low (BTC between 4863 and 3569) • 5/26/20 – hashrate difficulty halvening • 11/14/20 – stock market low • 1/15/21 – yearly low for BTC, around$8528
• 8/19/21 – end of stock bear market
• 11/26/21 – eighteen months from halvening, average peak from halvenings (BTC begins rising from $3000 area to above$23,312)
• 4/23/22 – all-time high
Taken from my blog: http://aliamin.info/2020/

##### Dive Into Tendermint Consensus Protocol (I)

This article is written by the CoinEx Chain lab. CoinEx Chain is the world’s first public chain exclusively designed for DEX, and will also include a Smart Chain supporting smart contracts and a Privacy Chain protecting users’ privacy.
longcpp @ 20200618
This is Part 1 of the serialized articles aimed to explain the Tendermint consensus protocol in detail.
Part 1. Preliminary of the consensus protocol: security model and PBFT protocol
Part 2. Tendermint consensus protocol illustrated: two-phase voting protocol and the locking and unlocking mechanism
Part 3. Weighted round-robin proposer selection algorithm used in Tendermint project
Any consensus agreement that is ultimately reached is the General Agreement, that is, the majority opinion. The consensus protocol on which the blockchain system operates is no exception. As a distributed system, the blockchain system aims to maintain the validity of the system. Intuitively, the validity of the blockchain system has two meanings: firstly, there is no ambiguity, and secondly, it can process requests to update its status. The former corresponds to the safety requirements of distributed systems, while the latter to the requirements of liveness. The validity of distributed systems is mainly maintained by consensus protocols, considering the multiple nodes and network communication involved in such systems may be unstable, which has brought huge challenges to the design of consensus protocols.

## The semi-synchronous network model and Byzantine fault tolerance

Researchers of distributed systems characterize these problems that may occur in nodes and network communications using node failure models and network models. The fail-stop failure in node failure models refers to the situation where the node itself stops running due to configuration errors or other reasons, thus unable to go on with the consensus protocol. This type of failure will not cause side effects on other parts of the distributed system except that the node itself stops running. However, for such distributed systems as the public blockchain, when designing a consensus protocol, we still need to consider the evildoing intended by nodes besides their failure. These incidents are all included in the Byzantine Failure model, which covers all unexpected situations that may occur on the node, for example, passive downtime failures and any deviation intended by the nodes from the consensus protocol. For a better explanation, downtime failures refer to nodes’ passive running halt, and the Byzantine failure to any arbitrary deviation of nodes from the consensus protocol.
Compared with the node failure model which can be roughly divided into the passive and active models, the modeling of network communication is more difficult. The network itself suffers problems of instability and communication delay. Moreover, since all network communication is ultimately completed by the node which may have a downtime failure or a Byzantine failure in itself, it is usually difficult to define whether such failure arises from the node or the network itself when a node does not receive another node's network message. Although the network communication may be affected by many factors, the researchers found that the network model can be classified by the communication delay. For example, the node may fail to send data packages due to the fail-stop failure, and as a result, the corresponding communication delay is unknown and can be any value. According to the concept of communication delay, the network communication model can be divided into the following three categories:
• The synchronous network model: There is a fixed, known upper bound of delay $\Delta$ in network communication. Under this model, the maximum delay of network communication between two nodes in the network is $\Delta$. Even if there is a malicious node, the communication delay arising therefrom does not exceed $\Delta$.
• The asynchronous network model: There is an unknown delay in network communication, with the upper bound of the delay known, but the message can still be successfully delivered in the end. Under this model, the network communication delay between two nodes in the network can be any possible value, that is, a malicious node, if any, can arbitrarily extend the communication delay.
• The semi-synchronous network model: Assume that there is a Global Stabilization Time (GST), before which it is an asynchronous network model and after which, a synchronous network model. In other words, there is a fixed, known upper bound of delay in network communication $\Delta$. A malicious node can delay the GST arbitrarily, and there will be no notification when no GST occurs. Under this model, the delay in the delivery of the message at the time $T$ is $\Delta + max(T, GST)$.
The synchronous network model is the most ideal network environment. Every message sent through the network can be received within a predictable time, but this model cannot reflect the real network communication situation. As in a real network, network failures are inevitable from time to time, causing the failure in the assumption of the synchronous network model. Yet the asynchronous network model goes to the other extreme and cannot reflect the real network situation either. Moreover, according to the FLP (Fischer-Lynch-Paterson) theorem, under this model if there is one node fails, no consensus protocol will reach consensus in a limited time. In contrast, the semi-synchronous network model can better describe the real-world network communication situation: network communication is usually synchronous or may return to normal after a short time. Such an experience must be no stranger to everyone: the web page, which usually gets loaded quite fast, opens slowly every now and then, and you need to try before you know the network is back to normal since there is usually no notification. The peer-to-peer (P2P) network communication, which is widely used in blockchain projects, also makes it possible for a node to send and receive information from multiple network channels. It is unrealistic to keep blocking the network information transmission of a node for a long time. Therefore, all the discussion below is under the semi-synchronous network model.
The design and selection of consensus protocols for public chain networks that allow nodes to dynamically join and leave need to consider possible Byzantine failures. Therefore, the consensus protocol of a public chain network is designed to guarantee the security and liveness of the network under the semi-synchronous network model on the premise of possible Byzantine failure. Researchers of distributed systems point out that to ensure the security and liveness of the system, the consensus protocol itself needs to meet three requirements:
• Validity: The value reached by honest nodes must be the value proposed by one of them
• Agreement: All honest nodes must reach consensus on the same value
• Termination: The honest nodes must eventually reach consensus on a certain value
Validity and agreement can guarantee the security of the distributed system, that is, the honest nodes will never reach a consensus on a random value, and once the consensus is reached, all honest nodes agree on this value. Termination guarantees the liveness of distributed systems. A distributed system unable to reach consensus is useless.

## The CAP theorem and Byzantine Generals Problem

In a semi-synchronous network, is it possible to design a Byzantine fault-tolerant consensus protocol that satisfies validity, agreement, and termination? How many Byzantine nodes can a system tolerance? The CAP theorem and Byzantine Generals Problem provide an answer for these two questions and have thus become the basic guidelines for the design of Byzantine fault-tolerant consensus protocols.
Lamport, Shostak, and Pease abstracted the design of the consensus mechanism in the distributed system in 1982 as the Byzantine Generals Problem, which refers to such a situation as described below: several generals each lead the army to fight in the war, and their troops are stationed in different places. The generals must formulate a unified action plan for the victory. However, since the camps are far away from each other, they can only communicate with each other through the communication soldiers, or, in other words, they cannot appear on the same occasion at the same time to reach a consensus. Unfortunately, among the generals, there is a traitor or two who intend to undermine the unified actions of the loyal generals by sending the wrong information, and the communication soldiers cannot send the message to the destination by themselves. It is assumed that each communication soldier can prove the information he has brought comes from a certain general, just as in the case of a real BFT consensus protocol, each node has its public and private keys to establish an encrypted communication channel for each other to ensure that its messages will not be tampered with in the network communication, and the message receiver can also verify the sender of the message based thereon. As already mentioned, any consensus agreement ultimately reached represents the consensus of the majority. In the process of generals communicating with each other for an offensive or retreat, a general also makes decisions based on the majority opinion from the information collected by himself.
According to the research of Lamport et al, if there are 1/3 or more traitors in the node, the generals cannot reach a unified decision. For example, in the following figure, assume there are 3 generals and only 1 traitor. In the figure on the left, suppose that General C is the traitor, and A and B are loyal. If A wants to launch an attack and informs B and C of such intention, yet the traitor C sends a message to B, suggesting what he has received from A is a retreat. In this case, B can't decide as he doesn't know who the traitor is, and the information received is insufficient for him to decide. If A is a traitor, he can send different messages to B and C. Then C faithfully reports to B the information he received. At this moment as B receives conflicting information, he cannot make any decisions. In both cases, even if B had received consistent information, it would be impossible for him to spot the traitor between A and C. Therefore, it is obvious that in both situations shown in the figure below, the honest General B cannot make a choice.
According to this conclusion, when there are $n$ generals with at most $f$ traitors (n≤3f), the generals cannot reach a consensus if $n \leq 3f$; and with $n > 3f$, a consensus can be reached. This conclusion also suggests that when the number of Byzantine failures $f$ exceeds 1/3 of the total number of nodes $n$ in the system $f \ge n/3$ , no consensus will be reached on any consensus protocol among all honest nodes. Only when $f < n/3$, such condition is likely to happen, without loss of generality, and for the subsequent discussion on the consensus protocol, $n \ge 3f + 1$ by default.
The conclusion reached by Lamport et al. on the Byzantine Generals Problem draws a line between the possible and the impossible in the design of the Byzantine fault tolerance consensus protocol. Within the possible range, how will the consensus protocol be designed? Can both the security and liveness of distributed systems be fully guaranteed? Brewer provided the answer in his CAP theorem in 2000. It indicated that a distributed system requires the following three basic attributes, but any distributed system can only meet two of the three at the same time.
1. Consistency: When any node responds to the request, it must either provide the latest status information or provide no status information
2. Availability: Any node in the system must be able to continue reading and writing
3. Partition Tolerance: The system can tolerate the loss of any number of messages between two nodes and still function normally

https://preview.redd.it/1ozfwk7u7m851.png?width=1400&format=png&auto=webp&s=fdee6318de2cf1c021e636654766a7a0fe7b38b4
A distributed system aims to provide consistent services. Therefore, the consistency attribute requires that the two nodes in the system cannot provide conflicting status information or expired information, which can ensure the security of the distributed system. The availability attribute is to ensure that the system can continuously update its status and guarantee the availability of distributed systems. The partition tolerance attribute is related to the network communication delay, and, under the semi-synchronous network model, it can be the status before GST when the network is in an asynchronous status with an unknown delay in the network communication. In this condition, communicating nodes may not receive information from each other, and the network is thus considered to be in a partitioned status. Partition tolerance requires the distributed system to function normally even in network partitions.
The proof of the CAP theorem can be demonstrated with the following diagram. The curve represents the network partition, and each network has four nodes, distinguished by the numbers 1, 2, 3, and 4. The distributed system stores color information, and all the status information stored by all nodes is blue at first.
1. Partition tolerance and availability mean the loss of consistency: When node 1 receives a new request in the leftmost image, the status changes to red, the status transition information of node 1 is passed to node 3, and node 3 also updates the status information to red. However, since node 3 and node 4 did not receive the corresponding information due to the network partition, the status information is still blue. At this moment, if the status information is queried through node 2, the blue returned by node 2 is not the latest status of the system, thus losing consistency.
2. Partition tolerance and consistency mean the loss of availability: In the middle figure, the initial status information of all nodes is blue. When node 1 and node 3 update the status information to red, node 2 and node 4 maintain the outdated information as blue due to network partition. Also when querying status information through node 2, you need to first ask other nodes to make sure you’re in the latest status before returning status information as node 2 needs to follow consistency, but because of the network partition, node 2 cannot receive any information from node 1 or node 3. Then node 2 cannot determine whether it is in the latest status, so it chooses not to return any information, thus depriving the system of availability.
3. Consistency and availability mean the loss of the partition tolerance: In the right-most figure, the system does not have a network partition at first, and both status updates and queries can go smoothly. However, once a network partition occurs, it degenerates into one of the previous two conditions. It is thus proved that any distributed system cannot have consistency, availability, and partition tolerance all at the same time.

The discovery of the CAP theorem seems to declare that the aforementioned goals of the consensus protocol is impossible. However, if you’re careful enough, you may find from the above that those are all extreme cases, such as network partitions that cause the failure of information transmission, which could be rare, especially in P2P network. In the second case, the system rarely returns the same information with node 2, and the general practice is to query other nodes and return the latest status as believed after a while, regardless of whether it has received the request information of other nodes. Therefore, although the CAP theorem points out that any distributed system cannot satisfy the three attributes at the same time, it is not a binary choice, as the designer of the consensus protocol can weigh up all the three attributes according to the needs of the distributed system. However, as the communication delay is always involved in the distributed system, one always needs to choose between availability and consistency while ensuring a certain degree of partition tolerance. Specifically, in the second case, it is about the value that node 2 returns: a probably outdated value or no value. Returning the possibly outdated value may violate consistency but guarantees availability; yet returning no value deprives the system of availability but guarantees its consistency. Tendermint consensus protocol to be introduced is consistent in this trade-off. In other words, it will lose availability in some cases.
The genius of Satoshi Nakamoto is that with constraints of the CAP theorem, he managed to reach a reliable Byzantine consensus in a distributed network by combining PoW mechanism, Satoshi Nakamoto consensus, and economic incentives with appropriate parameter configuration. Whether Bitcoin's mechanism design solves the Byzantine Generals Problem has remained a dispute among academicians. Garay, Kiayias, and Leonardos analyzed the link between Bitcoin mechanism design and the Byzantine consensus in detail in their paper The Bitcoin Backbone Protocol: Analysis and Applications. In simple terms, the Satoshi Consensus is a probabilistic Byzantine fault-tolerant consensus protocol that depends on such conditions as the network communication environment and the proportion of malicious nodes' hashrate. When the proportion of malicious nodes’ hashrate does not exceed 1/2 in a good network communication environment, the Satoshi Consensus can reliably solve the Byzantine consensus problem in a distributed environment. However, when the environment turns bad, even with the proportion within 1/2, the Satoshi Consensus may still fail to reach a reliable conclusion on the Byzantine consensus problem. It is worth noting that the quality of the network environment is relative to Bitcoin's block interval. The 10-minute block generation interval of the Bitcoin can ensure that the system is in a good network communication environment in most cases, given the fact that the broadcast time of a block in the distributed network is usually just several seconds. In addition, economic incentives can motivate most nodes to actively comply with the agreement. It is thus considered that with the current Bitcoin network parameter configuration and mechanism design, the Bitcoin mechanism design has reliably solved the Byzantine Consensus problem in the current network environment.

## Practical Byzantine Fault Tolerance, PBFT

It is not an easy task to design the Byzantine fault-tolerant consensus protocol in a semi-synchronous network. The first practically usable Byzantine fault-tolerant consensus protocol is the Practical Byzantine Fault Tolerance (PBFT) designed by Castro and Liskov in 1999, the first of its kind with polynomial complexity. For a distributed system with $n$ nodes, the communication complexity is $O(n2$.) Castro and Liskov showed in the paper that by transforming centralized file system into a distributed one using the PBFT protocol, the overwall performance was only slowed down by 3%. In this section we will briefly introduce the PBFT protocol, paving the way for further detailed explanations of the Tendermint protocol and the improvements of the Tendermint protocol.
The PBFT protocol that includes $n=3f+1$ nodes can tolerate up to $f$ Byzantine nodes. In the original paper of PBFT, full connection is required among all the $n$ nodes, that is, any two of the n nodes must be connected. All the nodes of the network jointly maintain the system status through network communication. In the Bitcoin network, a node can participate in or exit the consensus process through hashrate mining at any time, which is managed by the administrator, and the PFBT protocol needs to determine all the participating nodes before the protocol starts. All nodes in the PBFT protocol are divided into two categories, master nodes, and slave nodes. There is only one master node at any time, and all nodes take turns to be the master node. All nodes run in a rotation process called View, in each of which the master node will be reelected. The master node selection algorithm in PBFT is very simple: all nodes become the master node in turn by the index number. In each view, all nodes try to reach a consensus on the system status. It is worth mentioning that in the PBFT protocol, each node has its own digital signature key pair. All sent messages (including request messages from the client) need to be signed to ensure the integrity of the message in the network and the traceability of the message itself. (You can determine who sent a message based on the digital signature).
The following figure shows the basic flow of the PBFT consensus protocol. Assume that the current view’s master node is node 0. Client C initiates a request to the master node 0. After the master node receives the request, it broadcasts the request to all slave nodes that process the request of client C and return the result to the client. After the client receives f+1 identical results from different nodes (based on the signature value), the result can be taken as the final result of the entire operation. Since the system can have at most f Byzantine nodes, at least one of the f+1 results received by the client comes from an honest node, and the security of the consensus protocol guarantees that all honest nodes will reach consensus on the same status. So, the feedback from 1 honest node is enough to confirm that the corresponding request has been processed by the system.

https://preview.redd.it/sz8so5ly7m851.png?width=1400&format=png&auto=webp&s=d472810e76bbc202e91a25ef29a51e109a576554
For the status synchronization of all honest nodes, the PBFT protocol has two constraints on each node: on one hand, all nodes must start from the same status, and on the other, the status transition of all nodes must be definite, that is, given the same status and request, the results after the operation must be the same. Under these two constraints, as long as the entire system agrees on the processing order of all transactions, the status of all honest nodes will be consistent. This is also the main purpose of the PBFT protocol: to reach a consensus on the order of transactions between all nodes, thereby ensuring the security of the entire distributed system. In terms of availability, the PBFT consensus protocol relies on a timeout mechanism to find anomalies in the consensus process and start the View Change protocol in time to try to reach a consensus again.
The figure above shows a simplified workflow of the PBFT protocol. Where C is the client, 0, 1, 2, and 3 represent 4 nodes respectively. Specifically, 0 is the master node of the current view, 1, 2, 3 are slave nodes, and node 3 is faulty. Under normal circumstances, the PBFT consensus protocol reaches consensus on the order of transactions between nodes through a three-phase protocol. These three phases are respectively: Pre-Prepare, Prepare, and Commit:
• The master node of the pre-preparation node is responsible for assigning the sequence number to the received client request, and broadcasting the message to the slave node. The message contains the hash value of the client request d, the sequence number of the current viewv, the sequence number n assigned by the master node to the request, and the signature information of the master nodesig. The scheme design of the PBFT protocol separates the request transmission from the request sequencing process, and the request transmission is not to be discussed here. The slave node that receives the message accepts the message after confirming the message is legitimate and enter preparation phase. The message in this step checks the basic signature, hash value, current view, and, most importantly, whether the master node has given the same sequence number to other request from the client in the current view.
• In preparation, the slave node broadcasts the message to all nodes (including itself), indicating that it assigns the sequence number n to the client request with the hash value d under the current view v, with its signaturesig as proof. The node receiving the message will check the correctness of the signature, the matching of the view sequence number, etc., and accept the legitimate message. When the PRE-PREPARE message about a client request (from the main node) received by a node matches with the PREPARE from 2f slave nodes, the system has agreed on the sequence number requested by the client in the current view. This means that 2f+1 nodes in the current view agree with the request sequence number. Since it contains information from at most fmalicious nodes, there are a total of f+1 honest nodes that have agreed with the allocation of the request sequence number. With f malicious nodes, there are a total of 2f+1 honest nodes, so f+1represents the majority of the honest nodes, which is the consensus of the majority mentioned before.
• After the node (including the master node and the slave node) receives a PRE-PREPARE message requested by the client and 2f PREPARE messages, the message is broadcast across the network and enters the submission phase. This message is used to indicate that the node has observed that the whole network has reached a consensus on the sequence number allocation of the request message from the client. When the node receives 2f+1 COMMIT messages, there are at least f+1 honest nodes, that is, most of the honest nodes have observed that the entire network has reached consensus on the arrangement of sequence numbers of the request message from the client. The node can process the client request and return the execution result to the client at this moment.
Roughly speaking, in the pre-preparation phase, the master node assigns a sequence number to all new client requests. During preparation, all nodes reach consensus on the client request sequence number in this view, while in submission the consistency of the request sequence number of the client in different views is to be guaranteed. In addition, the design of the PBFT protocol itself does not require the request message to be submitted by the assigned sequence number, but out of order. That can improve the efficiency of the implementation of the consensus protocol. Yet, the messages are still processed by the sequence number assigned by the consensus protocol for the consistency of the distributed system.
In the three-phase protocol execution of the PBFT protocol, in addition to maintaining the status information of the distributed system, the node itself also needs to log all kinds of consensus information it receives. The gradual accumulation of logs will consume considerable system resources. Therefore, the PBFT protocol additionally defines checkpoints to help the node deal with garbage collection. You can set a checkpoint every 100 or 1000 sequence numbers according to the request sequence number. After the client request at the checkpoint is executed, the node broadcasts messages throughout the network, indicating that after the node executes the client request with sequence number n, the hash value of the system status is d, and it is vouched by its own signature sig. After 2f+1 matching CHECKPOINT messages (one of which can come from the node itself) are received, most of the honest nodes in the entire network have reached a consensus on the system status after the execution of the client request with the sequence numbern, and then you can clear all relevant log records of client requests with the sequence number less than n. The node needs to save these2f+1 CHECKPOINTmessages as proof of the legitimate status at this moment, and the corresponding checkpoint is called a stable checkpoint.
The three-phase protocol of the PBFT protocol can ensure the consistency of the processing order of the client request, and the checkpoint mechanism is set to help nodes perform garbage collection and further ensures the status consistency of the distributed system, both of which can guarantee the security of the distributed system aforementioned. How is the availability of the distributed system guaranteed? In the semi-synchronous network model, a timeout mechanism is usually introduced, which is related to delays in the network environment. It is assumed that the network delay has a known upper bound after GST. In such condition, an initial value is usually set according to the network condition of the system deployed. In case of a timeout event, besides the corresponding processing flow triggered, additional mechanisms will be activated to readjust the waiting time. For example, an algorithm like TCP's exponential back off can be adopted to adjust the waiting time after a timeout event.
To ensure the availability of the system in the PBFT protocol, a timeout mechanism is also introduced. In addition, due to the potential the Byzantine failure in the master node itself, the PBFT protocol also needs to ensure the security and availability of the system in this case. When the Byzantine failure occurs in the master node, for example, when the slave node does not receive the PRE-PREPARE message or the PRE-PREPARE message sent by the master node from the master node within the time window and is thus determined to be illegitimate, the slave node can broadcast to the entire network, indicating that the node requests to switch to the new view with sequence number v+1. n indicates the request sequence number corresponding to the latest stable checkpoint local to the node, and C is to prove the stable checkpoint 2f+1 legitimate CHECKPOINT messages as aforementioned. After the latest stable checkpoint and before initiating the VIEWCHANGE message, the system may have reached a consensus on the sequence numbers of some request messages in the previous view. To ensure the consistency of these request sequence numbers to be switched in the view, the VIEWCHANGE message needs to carry this kind of the information to the new view, which is also the meaning of the P field in the message. P contains all the client request messages collected at the node with a request sequence number greater than n and the proof that a consensus has been reached on the sequence number in the node: the legitimate PRE-PREPARE message of the request and 2f matching PREPARE messages. When the master node in view v+1 collects 2f+1 VIEWCHANGE messages, it can broadcast the NEW-VIEW message and take the entire system into a new view. For the security of the system in combination with the three-phase protocol of the PBFT protocol, the construction rules of the NEW-VIEW information are designed in a quite complicated way. You can refer to the original paper of PBFT for more details.

VIEWCHANGE contains a lot of information. For example, C contains 2f+1 signature information, P contains several signature sets, and each set has 2f+1 signature. At least 2f+1 nodes need to send a VIEWCHANGE message before prompting the system to enter the next new view, and that means, in addition to the complex logic of constructing the information of VIEWCHANGE and NEW-VIEW, the communication complexity of the view conversion protocol is $O(n2$.) Such complexity also limits the PBFT protocol to support only a few nodes, and when there are 100 nodes, it is usually too complex to practically deploy PBFT. It is worth noting that in some materials the communication complexity of the PBFT protocol is inappropriately attributed to the full connection between n nodes. By changing the fully connected network topology to the P2P network topology based on distributed hash tables commonly used in blockchain projects, high communication complexity caused by full connection can be conveniently solved, yet still, it is difficult to improve the communication complexity during the view conversion process. In recent years, researchers have proposed to reduce the amount of communication in this step by adopting aggregate signature scheme. With this technology, 2f+1 signature information can be compressed into one, thereby reducing the communication volume during view change.