What is a Bitcoin Private Key, How to Use It, Keep it Safe!

The next XVG? Microcap 100x potential actually supported by fundamentals!

What’s up team? I have a hot one for you. XVG returned 12 million percent in 2017 and this one reminds me a lot of it. Here’s why:
Mimblewimble is like Blu-Ray compared to CD-ROM in terms of its ability to compress data on a blockchain. The current BTC chain is 277gb and its capacity is limited because every time you spend a coin, each node needs to validate its history back to when it was mined (this is how double spending is prevented). Mimblewimble is different - all transactions in a block are aggregated and netted out in one giant CoinJoin, and only the current spending needs to be verified. This means that dramatically more transactions can fit into a smaller space, increasing throughput and lowering fees while still retaining the full proof of work game theory of Bitcoin. These blockchains are small enough to run a full node on a cheap smartphone, which enhances the decentralization and censorship resistance of the network.
The biggest benefit, though, is that all transactions are private - the blockchain doesn’t reveal amounts or addresses except to the actual wallet owner. Unlike earlier decoy-based approaches that bloat the chain and can still be data mined (XMR), Mimblewimble leaves no trace in the blockchain, instead storing only the present state of coin ownership.
The first two Mimblewimble coins, Grin and Beam, launched to great fanfare in 2019, quickly reaching over $100m in market cap (since settled down to $22m and $26m respectively). They are good projects but grin has infinite supply and huge never-decreasing emission, and Beam is a corporate moneygrab whose founding investors are counting on you buying for their ROI.
ZEC is valued at $568m today, despite the facts that only 1% of transactions are actually shielded, it has a trusted setup, and generating a confidential transaction takes ~60 seconds on a powerful PC. XMR is a great project but it’s valued at $1.2b (so no 100x) and it uses CryptoNote, which is 2014 tech that relies on a decoy-based approach that could be vulnerable to more powerful computers in the future. Mimblewimble is just a better way to approach privacy because there is simply no data recorded in the blockchain for companies to surveil.
Privacy is not just for darknet markets, porn, money launderers and terrorists. In many countries it’s dangerous to be wealthy, and there are all kinds of problems with having your spending data be out there publicly and permanently for all to see. Namely, companies like Amazon are patenting approaches to identify people with their crypto addresses, “for law enforcement” but also so that, just like credit cards, your spending data can be used to target ads. (A) Coinbase is selling user data to the DEA, IRS, FBI, Secret Service, and who knows who else? (B) What about insurance companies raising your premiums or canceling your policy because they see you buying (legal) cannabis? If your business operates using transparent cryptocurrency, competitors can data mine your customer and supply chain data, and employees can see how much everyone else gets paid. I could go on, but the idea of “I have nothing to hide, so what do I care about privacy?” will increasingly ring hollow as people realize that this money printing will have to be paid by massive tax increases AND that those taxes will be directly debited from their “Central Bank Digital Currency” wallets.
100% privacy for all transactions also eliminates one HUGE problem that people aren’t aware of yet, but they will be: fungibility. Fungibility means that each coin is indistinguishable from any other, just like paper cash. Why is this important? Because of the ever-expanding reach of AML/KYC/KYT (Anti-Money Laundering / Know Your Customer / Know Your Transaction) as regulators cramp down on crypto and banks take over, increasingly coins become “tainted” in various ways. For example, if you withdraw coins to a mixing service like Wasabi or Samourai, you may find your account blocked. (C) The next obvious step is that if you receive coins that these chainalysis services don’t like for whatever reason, you will be completely innocent yet forced to prove that you didn’t know that the coins you bought were up to no good in a past life. 3 days ago, $100k of USDC was frozen. (D) Even smaller coins like LTC now have this problem, because “Chinese Drug Kingpins” used them. (E) I believe that censorable money that can be blocked/frozen isn’t really “your money”.
Epic Cash is a 100% volunteer community project (like XVG and XMR) that had a fair launch in September last year with no ICO and no premine. There are very few projects like this, and it’s a key ingredient in Verge’s success (still at $110m market cap today despite being down 97% since the bubble peak) and why it’s still around. It has a small but super passionate community of “Freemen” who are united by a belief in the sound money economics of Bitcoin Standard emission (21m supply limit and ever-decreasing inflation) and the importance of privacy.
I am super bullish on this coin for the following reasons:
Because it doesn’t have a huge marketing budget in a sea of VC-funded shitcoins, it is as-yet undiscovered, which is why it’s so cheap. There are only 4 Mimblewimble-based currencies on the market: MWC at $162m, BEAM at $26m, GRIN at $22m, and EPIC at $0.4m. This is not financial advice and as always, do your own research, but I’ve been buying this gem for months and will continue to.
This one ticks all the boxes for me, the only real problem is that it’s hard to buy much without causing a huge green candle. Alt season is coming, and coins like this are how your neighbor Chad got his Lambo back in 2017. For 2021, McLaren is a better choice and be sure to pay cash so that it doesn’t get repossessed like Chad!
  1. A https://www.vice.com/en_us/article/d35eax/amazon-bitcoin-patent-data-stream-identify-cryptocurrency-for-law-enforcement-government
  2. B https://decrypt.co/31461/coinbase-wants-to-identify-bitcoin-users-for-dea-irs
  3. C https://www.coindesk.com/binance-blockade-of-wasabi-wallet-could-point-to-a-crypto-crack-up
  4. D https://cointelegraph.com/news/centre-freezes-ethereum-address-holding-100k-usdc
  5. E https://www.coindesk.com/us-treasury-blacklists-bitcoin-litecoin-addresses-of-chinese-drug-kingpins
  6. F https://www.youtube.com/channel/UCWkTxl5Z6DNN0ASMRxSKV5g
  7. G http://epic.tech/whitepaper
  8. H https://medium.com/epic-cash/epic-cash-on-uniswap-22447904d375
  9. I https://epic.tech/wp-content/uploads/2019/09/figure-3.1.jpg
Links:
submitted by pinchegringo to CryptoMoonShots [link] [comments]

Introduction to Bitterfly: Butterfly Matrix Entropy Weight Consensus Algorithm

When Bitcoin launched 11 years ago, Satoshi Nakamoto had the vision of giving people power over their money. His vision lives on through BTC. However, the Bitcoin network has a few flaws. One of those flaws is the Proof of Work mechanism. Mining Bitcoin requires a huge amount of resources that are out of reach for most ordinary people. The result is that the BTC network is increasingly being placed in centralized control.The Bitterfly project hopes to change that using a revolutionary consensus mechanism called the Buttery that will be used on the Bitterfly blockchain.
About Bitterfly
Bitterfly wants to continue the vision that Nakamoto had for Bitcoin. The goal is to give power back to the people and place them in control of their finances. To do this, the Bitterfly team is working on three main areas that require improvement:
· The consensus mechanism
· The blockchain performance
· Community Governance
The Consensus Mechanism
To improve the consensus mechanism, the team behind Bitterfly has created the Butterfly algorithm that they will add to the PoW mechanism. Not only can it ensures that the hash rate is obtained fairly, it ensures that the hash rate of the whole network is enhanced via the butterfly effect.
Performance
In terms of performance, the Bitterfly blockchain has been upgraded to have a confirmed commercial speed of 5000TPS. Bitterfly is designed as a Blockchain As a Service open-source platform, which can be used in different applications.
Bitterfly will support different types of computing services that include cloud servers. As a result, it will utilize idle server resources to boost the hash rate support for the network.
Community Governance
When it comes to community Governance, Bitterfly plans to introduce a node competition mechanism that will release 210 nodes over time to enhance the butterfly effect. First, they will introduce the nodes via the Butterfly matrix network. Later, they will do so via a fair elimination process. The goal is to ensure that the nodes contribute to the success of Bitterfly.
The Encryption Algorithm
Encryption and decryption of data are at the core of the operation of any blockchain. It helps to guarantee the security of the whole blockchain. Only a corresponding private key can unlock data encrypted using a public key.
In most blockchains, the Hash Function and the Asymmetric Key Encryption Algorithm are used to encrypt and decrypt data. For the Hush Function, the main algorithms used are SHA and MD5.Bitterfly uses the SHA256 algorithm for encryption and RSA, DSA, and Elliptic curve algorithms for decryption. For the verification phase, Bitterfly developed the DFLYSChnorr, which is based on the SCHNOOR algorithm.
Consensus Algorithm
The consensus mechanism is used in the blockchain to ensure that each transaction is accurate. Bitterfly plans to operate within the enterprise space, which requires comprehensive and heterogeneous systems that are integrated with various communication protocols.
To deal with the challenges that might arise, Bitterfly developed a two-layer consensus algorithm for the PoW mechanism called the PBFT algorithm. Here is how the Bitterfly algorithm works:
· The network Structure
Bitterfly is designed as an internet payment and application protocol that is based on embracing the digital economy. It can facilitate value storage as well as the decentralized exchange of digital assets, payments, as well as clearing functions. Within Bitterfly, everyone can participate in productively. It will place a huge demand on Bitterfly. The network will offer performance guarantees as well as smart contracts.
· Bitterfly Consensus Algorithm
To meet the goal of decentralization and security, Bittefly wants to become a global computer instead of a P2P information system. Besides satisfying the decentralization and security needs of its users via PoW, the system will also need to perform at a high level.
As a result, the team opted to support smart contracts in commercial applications. To deal with the issue of energy consumption, the team came up with the Butterfly algorithm. The algorithm allows the use of PoW as well as other cross-chain methods such as the Layer 2 protocol. Confirmation of transactions is done via verification nodes.
Each node is preconfigured with a list of trusted nodes known as the Consensus Achievement List (CAL). The node list can be used to confirm transactions. Once a transaction is confirmed with the local ledger, it is integrated into the transaction candidate set while all illegal ones are discarded.
To improve the security of the network, the verification confirmation was raised to 60% unlike in other networks where it is 50% +1. A transaction is officially confirmed once it is confirmed by 80% of the CAL nodes. The process is known as the Last Closed Ledger, which represents the latest changes to the ledger.
Within Bitterfly, the identities of those taking part in the confirmation of transactions are known beforehand. AS a result, transactions are faster and the blockchain is more efficient.
Butterfly Matrix Entropy Weight Algorithm
Entropy is used to measure the level of uncertainty in the system. Bitterfly built a way to establish consensus using multiple factors. In the network, each data set has a corresponding weight.
Summary
For the past 11 years, Bitcoin has enjoyed tremendous success. The launch of Bitcoin ushered in a new era for humanity. For the first time in history, decentralized money that is outside the control of governments and other central entities is possible.
The new type of money gives people the power to control their finances and avoid the harsh effects of inflation caused by the wanton printing of government currency. When a new economic downturn hit the global economy, Bitcoin failed the litmus test. While Bitcoin should have helped to save people’s finances as the money printing began, it seemed to have followed the same trend as the sinking global economy.
It revealed that BTC still had numerous weaknesses that need to be corrected. Bitterfly wants to build on what Bitcoin has accomplished and do more with it. The team behind this project is quite optimistic. They believe that they can achieve what Bitcoin has achieved in the past 11 years. Besides that, they believe they can achieve where Bitcoin has failed in those past 11 years.
Social Media Links
TWITTER: https://twitter.com/BitterflyD
MEDIUM: https://medium.com/@BitterflyD
YOUTUBE: https://www.youtube.com/channel/UCxSNCzuQsNj-oCgepxzoXQg
TELEGRAM: https://t.me/Bitterfly_Disciples
submitted by Bitterfly_Disciples to u/Bitterfly_Disciples [link] [comments]

LONG NETWORK on blockchain with secret correspondence

Coin name: LONG COINCoin
ticker: LONG (LNG)
Hash algorithm: SHA-256Message
Encryption Algorithm: ecdh and aes cbcCoin
Type: POWBlock time: 2 minutesPremine: 0Mined
Blocks confirmation: 30 blocksTransactions
confirmation: 6 blocksBlock
reward: 10 000 LONG
Fixed fee: 1 LONG/Кб
- Short SMS — 1 LONG
- Standard financial transactions — 1 LONG
- The limit on the amount of data transaction is 64kB (max fee is 64 LONG)Multicast transactions with simultaneous transmission of coins and messages
LONG NETWORK Core — Cryptographic decentralized network on an open source blockchain (based on bitcoin-core-0.12.1)LONG NETWORK works on the principle of encryption of all outgoing messages. All messages automatically fall into a single blockchain,accessible to all network members, and the fact that messages appear on the blockchain is “seen” by everyone. But! Even the sender cannot determine which computer will ultimately “read” the message, since only the addressee who owns the secret private key associated with the recipient’s address can “read” the message.Unlike traditional crypto messengers and networks, it is impossible to establish the very fact of “contact” of the sender and the recipient,which is the most compromising factor and makes it easy to decrypt messages by striking devices on the head.The system uses addresses similar to Bitcoin network addresses, which can be created locally by the user in unlimited quantities.
Official site: https://longnetwork.github.io/
Downloads:GitHub Full Sources (with cross build tools:
https://github.com/longnetwork/LONGNETWORK
Build from sources Tutorial (very simple) https://youtu.be/H5FkmPRJiEo
Posting in LONG NETWORK Tutorial https://youtu.be/MjAP4zS61_s
Community:
https://bitcointalk.org/index.php?topic=5235729.msg54102346#msg54102346
https://discord.gg/JjbU47K
https://twitter.com/PepperSteep
network services:
Exchange 1 https://trade.crypton.cf/
Explorer http://longchain.crypton.cf/
Mining pool http://longpool.crypton.cf/

https://preview.redd.it/dfph1f0bvj051.jpg?width=2069&format=pjpg&auto=webp&s=2800a1f4ab655dc37e8b73bee0b77135ca09f3b1
submitted by Daltonik to promoted [link] [comments]

Dr. Craig received the final key slice to access the Tulip Trust and to prove he is Satoshi VS fake news cryto dogs

I) Dr. Craig mined the first 70 Bitcoin Core blocks and more than Jan 14, 2020 he provided the documents of more than 16XXX public addresses to Ira and the Court. The US Judge decided to remove sections
The information about the 16XXX blocked mined by Dr. Craig was inside an encrypted file which required 7-6 key slices to decrypt it. You can check the Court document here https://www.courtlistener.com/recap/gov.uscourts.flsd.521536/gov.uscourts.flsd.521536.211.0.pdf
After Dr. Wright mined the first 70 blocks of bitcoin (the public addresses for which he has already disclosed), he implemented a unique and proprietary algorithm that he created to automate the key generation process so that each later block mined (after block 70) was assigned a different public address. From 2009 through 2010, he could view the many public addresses assigned to bitcoin he mined from block 71 (starting in 2009 to 2010) by accessing the bitcoin software on the computing devices he was then using for bitcoin mining. In about June 2011, Dr. Wright placed into an encrypted file

II) You can check the Court document here https://www.courtlistener.com/recap/gov.uscourts.flsd.521536/gov.uscourts.flsd.521536.376.0_1.pdf
Jan 10, 2020 Dr. Craig received the final key slice to unlock the encrypted file (section 1 above) so that he can access .
1**) the bitcoin software he used;**
III) Because Dr. Craig can access to the encrypt file content, on Jan 14, 2020 he provided the documents of more than 16XXX public addresses to Ira and the Court. The US Judge decided to remove sanctions against Dr. Craig because his 16xxxx BTC Core public addresses document complies with the Court order.
IV) From the above information, this is showing that Dr. Craig can access "other data from which information about bitcoin mined after block 70 could be re-generated " which means that
Dr. Carig can access to the private key for the Tulip Trust Wallet and to prove that he is Satoshi.

There are many fake news crypto dogs publishing fake articles, posts on BSV channel and everywhere.
Do not believe them - read Court documents and https://craigwright.net/ to know the truth.
submitted by BSVForever to bitcoincashSV [link] [comments]

How crazy is this? (A protocol for metadata obfuscation)

Alice and Bob want to have a private conversation but they also don't want anyone to know they're talking to each other.
I'm assuming that they can use some public key cryptography protocol that's sufficient to ensure their conversation is indeed private. Alice encrypts her messages using Bob's public key, and her encrypted messages can only be decrypted with Bob's private key.
But what about the metadata, ie the who/what/when/where information that we now know is collected routinely by the NSA, and which allows an adversary to determine that Alice and Bob are in communication?
As I understand it, there are several more or less practical ways to obscure the metadata -- including the identity of the intended recipient -- of Alice's and Bob's messages. These methods include steganography, TOpluggable transports, anonymizing email services and metadata encryption. But all of these approaches have weaknesses (eg trust issues, the existence of a central point of attack, susceptibility to traffic analysis), and as long as Alice's messages are ultimately being delivered to Bob (and vice versa), then any adversary who could discover this would know that Alice and Bob were in communication.
But what if Alice sent her encrypted messages not only to Bob, but to everyone ( * )? And everyone received them ( ** )? Public key encryption would ensure that only Bob would be able to actually decrypt and read the message, and meanwhile even an adversary with complete access to the entire network between Alice's and Bob's machines would still be unable to determine which particular instance of 'everyone' was the intended recipient. In other words, from the outside, an adversary would not be able to determine who Alice was talking to.
( * ) 'Everyone' here means 'everyone who's participating in this protocol'. Obviously, as with TOR, the more participants the better. This protocol would be trivially useless with only two users. But even three users would provide some protection. (Is Alice talking to Bob or to Carol?) And it would work a whole lot better if Bob were literally one in a million.
( ** ) Or rather: everyone's machine/device automatically received them. Each machine/device would then attempt to decrypt all incoming messages, and non-decipherable messages would automatically be discarded(***). The user would only be notified if the message was in fact for them.
(***) Or, more efficiently, be forwarded to a swarm of peers in a process that would be analogous to seeding a torrent.
If widely adopted, a protocol like this would presumably generate an insane amount of network traffic. Perhaps it might place an impossible, exponentially growing burden on the internet's infrastructure? I dunno. I also don't know if this could be mitigated by having each message be 'broadcast' using a P2P-like protocol? In any case, it's also going to be very resource intensive for every participating machine/device -- but then again, doesn't everyone who isn't mining bitcoins usually have countless unused CPU cycles on their machines?
Speaking of massive waste... you could also use this protocol to conceal the identity of the sender if everyone's device was set to automatically generate and send out a continual stream of dummy encrypted messages. And again, perhaps the absolute number of dummy messages could somehow be managed by recycling discarded messages back out into the swarm. (Even if this is possible, I think this kind of recycling would have to be done carefully, but I don't want to get into the details here.)
So what do you guys think? Is it so crazy it just might work? Or just plain crazy? Am I mischaracterizing the problem or the solution or missing some really obvious flaw?
submitted by the_man_in_pink to privacytoolsIO [link] [comments]

Introduction and overview of the Bitcoin system

Based on this post I made a bit earlier:
https://www.reddit.com/BitcoinBeginners/comments/euozq4/blockchain_and_btc_technical_review_of_the_past/
We put together an introductory overview of the Bitcoin System. As this is intended for beginners I think this subreddit would be a good place to get some feedback. What will you learn from the text:
If you do decide to go through the text would love some feedback. Was it clear? Did you get any value from it? Anything that needs to be expanded on?
----

1 Introduction to the Bitcoin System

1.1 Introduction and General Description

There are many definitions and descriptions of Bitcoin. Some describe it as an innovative virtual or crypto currency, some as the system for peer-to–peer electronic cash payment transactions, and some others as decentralized platform and infrastructure for anonymous payment transactions using any type of crypto currency.
In this Report we will adopt the concept that the Bitcoin system is a payment system. It has its own features, its own currency, its own protocols and components, and with all that Bitcoin supports payment transactions. In other words, the core function of the Bitcoin system is to support payments between two parties – the party that makes a payment and the party that receives the payment.
Based on the original concept and the description of the Bitcoin [Bitcoin, 2016], “it is a decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: transaction management and money issuance are carried out collectively by the network”.
The system is decentralized since its supporting platform blockchain, comprises an infrastructure of multiple distributed servers, mutually linked by an instantaneous broadcasting protocol. Users perform transactions within the open and distributed community of registered users. Digital currency used in the system is not electronic form of fiat currency, but a special form of the currency generated and used only within the Bitcoin system. This concept is based on the notion that money can be interpreted as any object, or any sort of record, that is accepted as payment for goods and services and repayment of debts in a given country or socio-economic context. Bitcoin system is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.
There are several important requirements when making any type of payment and with any currency. The best example of a “perfect” payment transaction that meets all these requirements is payment using cash over-the-counter. When a consumer pays to a merchant using cash over-the-counter, such transaction satisfies all requirements and expectations of both parties. First, the transaction is instantaneous, as the paper bill is transferred hand-to-hand, from the consumer to the merchant. The transaction is cheap, in fact there is no overhead charge to perform transaction, so the merchant receives the full amount. The transaction is irreversible, what is the property beneficial to merchants. The transaction is legal, as the merchant can verify the legality of the paper bill. And, finally, the transaction is anonymous for the consumer as he/she does not need to reveal his/her identity.
The only “problem” with cash over-the-counter is the cash itself, as using and handling cash has many disadvantages.
Bitcoin concept and system solves all issues and problems with the use of cash, but at the same time provides all advantages when performing transactions using digital and communication technologies. So, paying with Bitcoins is effectively payment transaction that uses “digital cash over-the-counter”. The concept of the Bitcoin system provides all advantages and benefits mentioned above with payments using cash over-the-counter, but eliminates the problems of using cash. That is the reason why Bitcoins are often referred to as “digital cash”.
One of significant features of payments using cash over-the-counter is that there are no third parties to participate or assist in the execution and validation of a transaction. This feature makes Bitcoin transactions very efficient and also very cheap to perform. Other types of todays payment systems, for instance using bank-to-bank account transfers or using bankcards, use many additional intermediate parties and use very complicated background infrastructure to validate and clear payment transactions. These infrastructures are complex to establish and operate, they are expensive, and they are vulnerable to attacks and penetrations by hackers. Bitcoin does not use such complex infrastructures, what is the reason that its transactions are efficient and cheap. An additional problem with third-party transaction players is that transaction parties must put the complete trust in all these parties without any means to verify their functionality, correctness, or security.
Bitcoin system uses public-key cryptography to protect the currency and transactions. Logical relationships between transaction parties is direct, peer-to-peer, and the process of validating transactions is based on cryptographic proof-of-work. When performing a transaction, the net effect is that certain amount of Bitcoins is transferred from one cryptographic address to another. Each user may have and use several addresses simultaneously. Each payment transaction is broadcast to the network of distributed transaction processing servers. These servers collect individual transactions, package them into blocks, and send them for validation.
Each block is cryptographically processed by the large number of so called “miners”. They each attempt to create cryptographic hash value that has special form. This is computationally very difficult and time-consuming task, therefore, it is very difficult to perform and repeat. Individual blocks are validated using cryptographic processing procedures that require substantial amount of work and computing power.
Approximately an hour or two after submitting the transaction for validation, each transaction is locked in time and by cryptographic processing by the massive amount of computing power that was used to complete the block. When the block is validated, it is added to the chain of all previous blocks, thus forming a public archive of all blocks and transactions in the system.
One of the most important problems with uncontrolled digital currency, where there are no third parties to validate and approve transactions, is so called double spending. Since the currency is digital, stored at user’s local workstations, in mobile phones, or on network servers, it can be easily copied and sent to multiple recipients multiple times.
Bitcoin system solves this problem with a very interesting approach. It is the first effective example of the solution for the double-spending problem without the need for assistance of any third party. Bitcoin solves this problem by keeping and distributing an archive of all transactions among all the users of the system via a peer-to-peer distribution network. Every transaction that occurs in the Bitcoin system is recorded in that public and distributed transactions ledger. Since the components in that ledger are blocks with transactions and the blocks are “chained” in time and in a cryptographic sequence, the ledger in the Bitcoin system is called blockchain.
That full blockchain of all transactions that were performed in the Bitcoin system before the specific transaction can be used to verify new transactions. The transactions are verified against the blockchain to ensure that the same Bitcoins have not been previously spent. This approach eliminates the double-spending problem. The essence of the verification procedure for a single transaction in fact is the test of the balance of the sending account. The test is very normal and natural: payment of a certain amount of the currency can be made only of the balance of the outgoing account is equal or larger than the payment amount. Current balance of an account is established by tracing all incoming and outgoing transactions for that account.
The procedure to verify the validity of individual transactions and to prevent double-spending is based on the use of special type of cryptographic protocol called public-key cryptography. With this type of cryptographic systems each user has two cryptographic keys. They are mutually related in the sense that, what ever the one key encrypts, the other key can decrypt. One of the two keys is a private key that is kept secret, and the other key is public key that can be shared with all other users in the system. When a user wants to make a payment to another user, the sender transfers certain amount of Bitcoins from his/her account to the account of the receiver. This action is performed by the sender by creating a payment message, called a “transaction,” which contains recipient’s public key – receiving address and payment amount. The transaction is cryptographically processed by the sender’s private key, the operation called digital signing, and as the result digital signature is created and appended to the transaction.
By using sender’s private key every user in the system can verify that the transaction was indeed created by the indicated sender, as his/her private key can successfully decrypt the content of the digital signature. The exchange is authentic, since the transaction was also cryptographically processed with the recipient’s public key, the operation which is called digital enveloping. This transformation guarantees that the transaction can be accepted and processed only by the holder of the corresponding private key, which is the intended recipient.
Every transaction, and thus the transfer of ownership of the specified amount of Bitcoins, is inserted, then time-stamped, and finally displayed in one “block” of the blockchain. Public-key cryptography ensures that all computers in the network have a constantly updated and verified record of all transactions within the Bitcoin network, which prevents double-spending and fraud.

1.2 The Concept and Features of the Bitcoin System

There are many concepts and even more operational payment systems today in the world. Some are standard paper–based, some are digital and network based. What makes Bitcoin unique and distinctive, compared with all other payment systems that are in use today, are several of its core features.
The first of them is that the system uses its own currency. The reason for using its own currency is to make the system independent of financial institutions as trusted third parties. The unit of the currency is called Bitcoin. The currency is so called crypto currency, because it is generated and used based on execution of certain cryptographic algorithms and protocols. Performing specific cryptographic protocols is in the heart of operations to create new Bitcoins, to transfer them between transaction parties, and to validate the correctness of transactions.
Since appearance of Bitcoins, several new systems were introduced that use cryptography to manage its own currency, so all such currencies represent the category of crypto currencies. Later in this Report, some other digital / virtual currencies will be described that are created and managed using some other principles, so they are not called crypto currency. At the time of writing this Report, all such digital virtual currencies were called with general term tokens, sometimes also digital assets tokens. The reason is that they were created by the process called collateralization and therefore they are related to the value of some categories of real world assets which is expressed in digital tokens units.
The second interesting and important feature of the Bitcoin system is that the logical relationship between the two transaction parties is direct, peer-to–peer, i.e. there are no other parties that participate in the transaction. This is an important feature and benefit / advantage of the system that contributes to its efficiency when compared with the todays complex and expensive financial payment infrastructures and protocols. However, for distribution of transactions to their validators and later to all other members in the Bitcoin system the physical flow of each transaction is very complex and includes many parties.
It should be emphasized that performing transactions as direct, peer-to–peer transfers is one of the key features and the most significant reason for many benefits and advantages of the Bitcoin system. This approach is the key feature of the Bitcoin system as it enables security and anonymity of parties, efficiency in performing transactions, scaling of the system, and instantaneous settlement of payments. Therefore, supporting execution and validation of serious business peer–to–peer transactions is one of the core benefits of the blockchain concept, as it changes the current paradigm of Internet applications and transactions. Currently all Internet applications are organized and performed as client–server transactions. Such transactions are not efficient, do not provide sufficient privacy of participants, have dependencies on third parties and usually are vulnerable due to attacks of functional problems with large centralized application servers.
The next very important characteristic of the Bitcoin system is anonymity of users, their accounts, and transactions. This property means that the identities of the participants in the system are not known even to the partners performing a payment transaction. All other system operations – receiving payments, making payments, validating transactions, etc. are also performed anonymously. Interpreting this property correctly, the anonymity of transaction participants is so called pseudo-anonymity. Namely, in the process of validating transactions, all previous transactions of the sender are traced back to the original initial transaction. If that initial transaction was the purchase of Bitcoins at some Bitcoin Exchange, then the identity of the original owner of Bitcoins is known. Most if not all service providers in the Bitcoin system today require very strict identification of participants for the purpose of enforcing legal and regulated transactions and include certain restrictions of transaction frequency and amounts. This procedure, although understandable from the legal and regulatory point of view, has in fact in essence changed one of the core principles of the original concept of the Bitcoin system – full anonymity of users.
Better solution for fully anonymous payment transactions is so called zero–knowledge protocol, where the identity and authorization to perform Bitcoin transactions, is validated by anyone without revealing any identity information of the parties. The only problem with this approach is revealing the identity of transaction participants to law enforcement authorities in case of illegal transactions. But, such authorities have special authorization under the law and they should be enabled to get identifying information about transaction participants in the process of legal law enforcement procedures. But, all other service providers do not have such status, so if Bitcoin principles are strictly followed, they should not be able to have identifying information about system participants.
This approach and potential improvement of the Bitcoin system implies that the system needs one of the classical security services: role–based authorization. In such arrangement, there would be at least two categories of system participants: those that are authorized to maintain and access identifying information about the participants and those that are only authorized to perform transactions. In the first category are legal authorities, like police, driving license authorities, tax authorities, etc. In the context of the standard Identities Management Systems, such participants are called Identity Providers. All others are Identity Verifiers. Therefore, one of the main conclusions about true anonymity in the Bitcoin system is establishment of a sophisticated and multi-role Identities Management System, where some parties will be authorized Identity Providers and all others will be Identity Validators. Finally, referring back to the infrastructure of the Bitcoin system to perform and validate transactions – blockchain, the conclusion is that what is needed, as one of the most important extensions of the current concept of anonymity of Bitcoins participants, is an Identity Management System based itself on the use of blockchain and without Identity Providers as trusted third parties. Creation, distribution, use and validation of identities are transactions in the system, equivalent to payment transactions, so they should also be performed using blockchain protocol. Such system, that can provide reliable identities of all participants may be called Blockchain Identity Management System.
Another very important feature of the original concept of the Bitcoin system is that it is not controlled by any financial institution, by any regulatory body or by any legal financial authority when it comes to issuing Bitcoins and determining their value. This means that the currency used in the system and all transactions are exempted from any legal and financial rules and regulations. The rules controlling Bitcoin system are built in its code. This property is usually called “rule by the technical code”, as the rules of system operations, built in the code of its operational components, control and rule the operations of the system [UK, 2016], Chapter 3. This property is sometimes described as “control by the community”, i.e. the participating users.
This property implies that the value of Bitcoins is determined solely on the market – based on its supply and demand. This is quite natural approach, as the value of shares of companies are also determined on an open trading market. However, such approach implies that the value of Bitcoin, as crypto currency, is volatile related to fiat currencies. This property represent serious problem to perform payments using Bitcoin. It is well-known that volatile currencies are not suitable for payments. The practice of all the years while Bitcoins are in use has shown that its volatility represents one of the major obstacles for its main purpose – to be used as the payment system. In fact, it was announced that in 2019 the total value of Bitcoin transactions performed was about $ 11 T. However, unfortunately, only about 1.3% of those transactions were payments, all others were trading manipulations on exchanges. Based on that, it may be clearly stated that Bitcoin today is not used as the payment system, but as currency manipulation system. This is one of the main problems with the concept and current implementation and deployment of Bitcoin system and in near future may represent the main reason for its decline in popularity.

1.3 Innovative Contributions of the Bitcoin System

Besides an effective procedure to transfer an amount of crypto currency from one user (account) to another user (account), the major and indeed an essential contribution of the concept of the Bitcoin is the solution to the general problem how to establish trust between two mutually unknown and otherwise unrelated parties to such an extent and certainty that sensitive and secure transactions can be performed with full confidence over an open environment, such as Internet. In all current large scale and not only financial systems that problem is solved by using the assistance of third parties. For many (may be even all) current Internet applications and transactions those third parties are integrated and linked into a large, complex, expensive and vulnerable operational infrastructures. Examples of such infrastructures today are bankcard networks supporting global international payments, global international banking networks supporting international financial transfers, Public–Key Infrastructures (PKI), Identity Management Systems, and many others. It is a general consent that such infrastructures are expensive and, more important, vulnerable to external and internal attacks.
In addition to the complexity and vulnerabilities of such current operational supporting infrastructures, another requirement and prerequisite to use their services is that users must put the complete trust in these third parties. Accepting to trust those third–party service providers is the necessary and mandatory prerequisite to use their services.
Therefore, one of the most important contributions of the concept of Bitcoin is that it solves the issue how two parties, mutually unknown to each other in advance and otherwise completely unrelated, can perform sensitive and secure transactions, such as transfer of money – payments, but without assistance of any third party and without the need to place trust in any component of the system.
The practical benefits of solving this problem and the most important consequence of the solution for this problem – Bitcoin system, is that it provides the possibility for one Internet user to transfer not only Bitcoins, but also any other form of digital asset to or shared with another Internet user, such that the transfer is guaranteed to be safe and secure, that everyone knows that the transfer has been performed, and nobody can challenge the legitimacy of the transfer.
This feature of the Bitcoin system generated many very new, creative and innovative ideas where the concept equivalent to the Bitcoin can be used to perform secure and reliable transactions between users in an open community handling any type of digital asset ([Andreesen, 2014], [Sparkes, 2014], [UniCredit, 2016], [BitID, 2015], [PoE, 2015]). The examples of such applications and transactions range from commercial transitions, real estate transactions, energy trading, electronic voting, medical applications, and many others ([Kounelis, 2015], [Muftic, 2016]). The concept of blockchain as technology supporting validation of all such transactions is therefore called disruptive technology.
As the conclusion in this section, we may give a definition of blockchain:
Blockchain is an innovative concept, implemented as an infrastructure comprising multiple and distributed servers, mutually linked by special broadcasting and synchronization protocols, managing immutable objects with the purpose to enable and protect secure peer–to–peer transactions in a global and open environment.

1.4 Summary of Problems and Potential Solutions

In section 1.2 several problems of the Bitcoin system were mentioned and potential solutions for these problems were outlined. Recently, at the time of writing this Technical Report, several sources, mainly personal blogs and articles, appeared with very interesting opinions and statements regarding some other serious Bitcoin problems. Some of them are problems with the concept of the system, some problems of its design, and some problems of operations. In this section some of these problems are briefly summarized including suggestions for their potential solutions. The source of some problems was the article [Ein, 2018].
Problem 1: Complex Crypto Algorithms
Problem: Bitcoins is crypto currency and cryptographic algorithms used in the current version are very complex, based on the concept of proof–of–work, and require long time, special hardware and a lots of energy to perform
Potential Solution: Potential solution fro this problem is to use cryptographic algorithms that are simpler and therefore more efficient to execute and need less energy
Problems with Potential Solution: Lowering the complexity of crypto algorithms introduces vulnerability to hackers. Therefore, what is needed are strong algorithms and simple to perform for regular users and complex to break by hackers
Problem 2: Indirect Transactions, not Peer–to–Peer
Problem: Contrary to the concept claimed, in todays implementation Bitcoin payment transactions are not performed as direct, peer–to–peer transactions. They are performed indirectly, submitted to the Bitcoin network, and recipients receive them indirectly, by downloading validated transactions from the ledger
Potential Solution: Transactions should be performed directly, by transferring them directly between two users
Problems with Potential Solution: The problem with the potential solution is validation of transaction for proof of possession of Bitcoins by the sender and for prevention of double-spending. Therefore, what is needed is the protocol to validate peer–to–peer transactions.
Problem 3: Anonymity of Users not provided
Problem: Contrary to the concept claimed, in todays deployments of additional system components, mainly exchanges, users are not anonymous
Potential Solution: Blockchain–based Distributed Identity Management System with Role-based Authorizations
Problems with Potential Solution: The problem with potential solution is that it depends on trusted third parties with authorized roles. Therefore, what is needed is blockchain-based Identity Management System using hybrid (permissioned and unpermissioned) blockchain
Problem 4: Volatile Value, not suitable for Payments
Problem: Contrary to the concept claimed that Bitcoin is payment system, volatile value of the currency makes it inconvenient for payments
Potential Solution: Crypto currency with stable value
Problems with Potential Solution: The problem with the potential solution is that the value of Bitcoins is determined on the secondary market, during its trading (cash-in / cash-out). Therefore, what is needed is crypto currency that does not have volatile value
The remaining problems in this section are quoted from [Ein, 2018]:
Problem 5: Negative Environmental Impact
Problem: Mining algorithms and operational facilities (“mining farms”) consume too much electrical energy, based on the “proof-of-work” protocol
Potential Solution: Using mining algorithms that consume less energy, either as simpler / lighter crypto algorithms or using alternative crypto protocols to protect transactions integrity (“proof-of-stake”)
Problems with Potential Solution: The problem with the potential solution is that simpler / lighter algorithms open vulnerabilities to hackers while alternative crypto protocols are not backward compatible with the current system
Problem 6: Slow Performance (Delays) / Low Throughput
Problem: Due to blocking and the designed time for protection of transactions (10 minutes) Bitcoin system has very slow performance – transactions are validated in about an hour and transaction processing throughput is about 7 transactions per second
Potential Solution: Using transaction validation algorithms and protocols that do not need blocking of transactions, but transactions should be validated individually
Problems with Potential Solution: There are no serious problems with the proposed potential solution
Problem 7: Limited Number of Bitcoins
Problem: Due hardware and other types of failures, the number of available Bitcoins in the system is constantly reducing
Potential Solution: Potential solution could be to use smaller portions of Bitcoin (“Satoshi”) or introduce hard-fork by splitting the amount of available Bitcoins
Problems with Potential Solution: The problems with the first solution that it is not user-friendly and the problem with the second solution is backwards compatibility.
Problem 8: Real Value of Bitcoins
Problem: The value of Bitcoins is purely psychological and reflects only pure market speculations
Potential Solution: Potential solution could be to peg the value of Bitcoin to local fiat currencies in countries of deployments
Problems with Potential Solution: The problems with the potential solution is that such Bitcoins would be a new class of Bitcoins, not traded on exchanges and not volatile
At the end of this section, it is very interesting to quote two opinions about the future of Bitcoin and blockchain:
[Ein, 2018]: “It seems that Bitcoin will likely cease to have meaningful value, defeating the whole point and philosophy imagined by Satoshi Nakamoto, the alleged inventor of Bitcoin. Its current value appears to be purely psychological, and the hype seems to be driven by irrational exuberance, greed and speculation. Modern human history has seen many bubbles, including the dot-com bubble, the housing bubble and even the tulip bubble. However, when these bubbles exploded, many excellent dot-com companies survived, most houses regained their value and tulips still have meaning and carry value in our lives today. But what will happen when the Bitcoin bubble bursts? What utility or residual value will Bitcoin have to consumers and businesses? Most likely none. And this is the real problem with Bitcoin and crypto currencies.
Bitcoin will likely go down in history as a great technological invention that popularized blockchain yet failed due to its design limitations. Just like the industrial revolution was fueled by the combustion engine, Nakamoto’s most valuable contribution is the blockchain polymorphic engine that will further accelerate innovation in the post-information age and immensely affect our lives”.
This quote makes two very important and far–reaching predictions:
(1) Bitcoin, as the payment system will disappear (“. . . will go down in history”), and
(2) The most valuable contribution of the Bitcoin system is blockchain
This article was written in 2018. It is very interesting to notice that at the time of writing this Technical Report, (1) Bitcoin was still “alive” and (2) the concept and deployments of blockchain were in serious trouble.
Based on the principle of positive and creative approach, in the rest of this Technical Report, besides description of all technical details of the Bitcoin system, some potential solutions for its improvement will also be discussed.
However, contrary to the predicted status of Bitcoin, it seems that the predicted status of blockchain, in 2020 was still facing serious problems.
[Barber, 2019]: What's Blockchain Actually Good for, Anyway? For Now, Not Much
“Not long ago, blockchain technology was touted as a way to track tuna, bypass banks, and preserve property records. Reality has proved a much tougher challenge”.

[Lucanus, 2020]: Has Blockchain Failed Before It Even Really Began?

“Just as everyone was getting really excited about its potential, it appears blockchain is dead. For a technology that was supposed to transform and solve seemingly every problem in the world, the enthusiasm is fading pretty quickly”.
At the time of writing this Technical Report, there were many new blockchain – concepts, design and even several deployed and operational instances. Some of them are even very popular, but only among enthusiastic developers. The overall trends with real life deployments, and more and more comments about the capabilities and features of blockchains are appearing with negative connotation. Therefore, seems that even for blockchain some innovative concepts and approaches are needed. They are beyond the scope of this Technical Report and will be addressed in some of our follow-up reports.
submitted by Theus5 to u/Theus5 [link] [comments]

Introduction and overview of the Bitcoin system

In relation to this post:
https://www.reddit.com/btc/comments/eupegk/technical_review_of_the_past_10_years_and_how_the/
We put together an introductory overview of the Bitcoin System. As this is intended to help increase public understanding of BTC and thus increase it's adoption. What will you learn from the text:
If you do decide to go through the text would love some feedback. Was it clear? Did you get any value from it? Anything that needs to be expanded on? - we are really excited about this project and hope to make it to the best of our abilities.
----

1 Introduction to the Bitcoin System

1.1 Introduction and General Description

There are many definitions and descriptions of Bitcoin. Some describe it as an innovative virtual or crypto currency, some as the system for peer-to–peer electronic cash payment transactions, and some others as decentralized platform and infrastructure for anonymous payment transactions using any type of crypto currency.
In this Report we will adopt the concept that the Bitcoin system is a payment system. It has its own features, its own currency, its own protocols and components, and with all that Bitcoin supports payment transactions. In other words, the core function of the Bitcoin system is to support payments between two parties – the party that makes a payment and the party that receives the payment.
Based on the original concept and the description of the Bitcoin [Bitcoin, 2016], “it is a decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: transaction management and money issuance are carried out collectively by the network”.
The system is decentralized since its supporting platform blockchain, comprises an infrastructure of multiple distributed servers, mutually linked by an instantaneous broadcasting protocol. Users perform transactions within the open and distributed community of registered users. Digital currency used in the system is not electronic form of fiat currency, but a special form of the currency generated and used only within the Bitcoin system. This concept is based on the notion that money can be interpreted as any object, or any sort of record, that is accepted as payment for goods and services and repayment of debts in a given country or socio-economic context. Bitcoin system is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.
There are several important requirements when making any type of payment and with any currency. The best example of a “perfect” payment transaction that meets all these requirements is payment using cash over-the-counter. When a consumer pays to a merchant using cash over-the-counter, such transaction satisfies all requirements and expectations of both parties. First, the transaction is instantaneous, as the paper bill is transferred hand-to-hand, from the consumer to the merchant. The transaction is cheap, in fact there is no overhead charge to perform transaction, so the merchant receives the full amount. The transaction is irreversible, what is the property beneficial to merchants. The transaction is legal, as the merchant can verify the legality of the paper bill. And, finally, the transaction is anonymous for the consumer as he/she does not need to reveal his/her identity.
The only “problem” with cash over-the-counter is the cash itself, as using and handling cash has many disadvantages.
Bitcoin concept and system solves all issues and problems with the use of cash, but at the same time provides all advantages when performing transactions using digital and communication technologies. So, paying with Bitcoins is effectively payment transaction that uses “digital cash over-the-counter”. The concept of the Bitcoin system provides all advantages and benefits mentioned above with payments using cash over-the-counter, but eliminates the problems of using cash. That is the reason why Bitcoins are often referred to as “digital cash”.
One of significant features of payments using cash over-the-counter is that there are no third parties to participate or assist in the execution and validation of a transaction. This feature makes Bitcoin transactions very efficient and also very cheap to perform. Other types of todays payment systems, for instance using bank-to-bank account transfers or using bankcards, use many additional intermediate parties and use very complicated background infrastructure to validate and clear payment transactions. These infrastructures are complex to establish and operate, they are expensive, and they are vulnerable to attacks and penetrations by hackers. Bitcoin does not use such complex infrastructures, what is the reason that its transactions are efficient and cheap. An additional problem with third-party transaction players is that transaction parties must put the complete trust in all these parties without any means to verify their functionality, correctness, or security.
Bitcoin system uses public-key cryptography to protect the currency and transactions. Logical relationships between transaction parties is direct, peer-to-peer, and the process of validating transactions is based on cryptographic proof-of-work. When performing a transaction, the net effect is that certain amount of Bitcoins is transferred from one cryptographic address to another. Each user may have and use several addresses simultaneously. Each payment transaction is broadcast to the network of distributed transaction processing servers. These servers collect individual transactions, package them into blocks, and send them for validation.
Each block is cryptographically processed by the large number of so called “miners”. They each attempt to create cryptographic hash value that has special form. This is computationally very difficult and time-consuming task, therefore, it is very difficult to perform and repeat. Individual blocks are validated using cryptographic processing procedures that require substantial amount of work and computing power.
Approximately an hour or two after submitting the transaction for validation, each transaction is locked in time and by cryptographic processing by the massive amount of computing power that was used to complete the block. When the block is validated, it is added to the chain of all previous blocks, thus forming a public archive of all blocks and transactions in the system.
One of the most important problems with uncontrolled digital currency, where there are no third parties to validate and approve transactions, is so called double spending. Since the currency is digital, stored at user’s local workstations, in mobile phones, or on network servers, it can be easily copied and sent to multiple recipients multiple times.
Bitcoin system solves this problem with a very interesting approach. It is the first effective example of the solution for the double-spending problem without the need for assistance of any third party. Bitcoin solves this problem by keeping and distributing an archive of all transactions among all the users of the system via a peer-to-peer distribution network. Every transaction that occurs in the Bitcoin system is recorded in that public and distributed transactions ledger. Since the components in that ledger are blocks with transactions and the blocks are “chained” in time and in a cryptographic sequence, the ledger in the Bitcoin system is called blockchain.
That full blockchain of all transactions that were performed in the Bitcoin system before the specific transaction can be used to verify new transactions. The transactions are verified against the blockchain to ensure that the same Bitcoins have not been previously spent. This approach eliminates the double-spending problem. The essence of the verification procedure for a single transaction in fact is the test of the balance of the sending account. The test is very normal and natural: payment of a certain amount of the currency can be made only of the balance of the outgoing account is equal or larger than the payment amount. Current balance of an account is established by tracing all incoming and outgoing transactions for that account.
The procedure to verify the validity of individual transactions and to prevent double-spending is based on the use of special type of cryptographic protocol called public-key cryptography. With this type of cryptographic systems each user has two cryptographic keys. They are mutually related in the sense that, what ever the one key encrypts, the other key can decrypt. One of the two keys is a private key that is kept secret, and the other key is public key that can be shared with all other users in the system. When a user wants to make a payment to another user, the sender transfers certain amount of Bitcoins from his/her account to the account of the receiver. This action is performed by the sender by creating a payment message, called a “transaction,” which contains recipient’s public key – receiving address and payment amount. The transaction is cryptographically processed by the sender’s private key, the operation called digital signing, and as the result digital signature is created and appended to the transaction.
By using sender’s private key every user in the system can verify that the transaction was indeed created by the indicated sender, as his/her private key can successfully decrypt the content of the digital signature. The exchange is authentic, since the transaction was also cryptographically processed with the recipient’s public key, the operation which is called digital enveloping. This transformation guarantees that the transaction can be accepted and processed only by the holder of the corresponding private key, which is the intended recipient.
Every transaction, and thus the transfer of ownership of the specified amount of Bitcoins, is inserted, then time-stamped, and finally displayed in one “block” of the blockchain. Public-key cryptography ensures that all computers in the network have a constantly updated and verified record of all transactions within the Bitcoin network, which prevents double-spending and fraud.

1.2 The Concept and Features of the Bitcoin System

There are many concepts and even more operational payment systems today in the world. Some are standard paper–based, some are digital and network based. What makes Bitcoin unique and distinctive, compared with all other payment systems that are in use today, are several of its core features.
The first of them is that the system uses its own currency. The reason for using its own currency is to make the system independent of financial institutions as trusted third parties. The unit of the currency is called Bitcoin. The currency is so called crypto currency, because it is generated and used based on execution of certain cryptographic algorithms and protocols. Performing specific cryptographic protocols is in the heart of operations to create new Bitcoins, to transfer them between transaction parties, and to validate the correctness of transactions.
Since appearance of Bitcoins, several new systems were introduced that use cryptography to manage its own currency, so all such currencies represent the category of crypto currencies. Later in this Report, some other digital / virtual currencies will be described that are created and managed using some other principles, so they are not called crypto currency. At the time of writing this Report, all such digital virtual currencies were called with general term tokens, sometimes also digital assets tokens. The reason is that they were created by the process called collateralization and therefore they are related to the value of some categories of real world assets which is expressed in digital tokens units.
The second interesting and important feature of the Bitcoin system is that the logical relationship between the two transaction parties is direct, peer-to–peer, i.e. there are no other parties that participate in the transaction. This is an important feature and benefit / advantage of the system that contributes to its efficiency when compared with the todays complex and expensive financial payment infrastructures and protocols. However, for distribution of transactions to their validators and later to all other members in the Bitcoin system the physical flow of each transaction is very complex and includes many parties.
It should be emphasized that performing transactions as direct, peer-to–peer transfers is one of the key features and the most significant reason for many benefits and advantages of the Bitcoin system. This approach is the key feature of the Bitcoin system as it enables security and anonymity of parties, efficiency in performing transactions, scaling of the system, and instantaneous settlement of payments. Therefore, supporting execution and validation of serious business peer–to–peer transactions is one of the core benefits of the blockchain concept, as it changes the current paradigm of Internet applications and transactions. Currently all Internet applications are organized and performed as client–server transactions. Such transactions are not efficient, do not provide sufficient privacy of participants, have dependencies on third parties and usually are vulnerable due to attacks of functional problems with large centralized application servers.
The next very important characteristic of the Bitcoin system is anonymity of users, their accounts, and transactions. This property means that the identities of the participants in the system are not known even to the partners performing a payment transaction. All other system operations – receiving payments, making payments, validating transactions, etc. are also performed anonymously. Interpreting this property correctly, the anonymity of transaction participants is so called pseudo-anonymity. Namely, in the process of validating transactions, all previous transactions of the sender are traced back to the original initial transaction. If that initial transaction was the purchase of Bitcoins at some Bitcoin Exchange, then the identity of the original owner of Bitcoins is known. Most if not all service providers in the Bitcoin system today require very strict identification of participants for the purpose of enforcing legal and regulated transactions and include certain restrictions of transaction frequency and amounts. This procedure, although understandable from the legal and regulatory point of view, has in fact in essence changed one of the core principles of the original concept of the Bitcoin system – full anonymity of users.
Better solution for fully anonymous payment transactions is so called zero–knowledge protocol, where the identity and authorization to perform Bitcoin transactions, is validated by anyone without revealing any identity information of the parties. The only problem with this approach is revealing the identity of transaction participants to law enforcement authorities in case of illegal transactions. But, such authorities have special authorization under the law and they should be enabled to get identifying information about transaction participants in the process of legal law enforcement procedures. But, all other service providers do not have such status, so if Bitcoin principles are strictly followed, they should not be able to have identifying information about system participants.
This approach and potential improvement of the Bitcoin system implies that the system needs one of the classical security services: role–based authorization. In such arrangement, there would be at least two categories of system participants: those that are authorized to maintain and access identifying information about the participants and those that are only authorized to perform transactions. In the first category are legal authorities, like police, driving license authorities, tax authorities, etc. In the context of the standard Identities Management Systems, such participants are called Identity Providers. All others are Identity Verifiers. Therefore, one of the main conclusions about true anonymity in the Bitcoin system is establishment of a sophisticated and multi-role Identities Management System, where some parties will be authorized Identity Providers and all others will be Identity Validators. Finally, referring back to the infrastructure of the Bitcoin system to perform and validate transactions – blockchain, the conclusion is that what is needed, as one of the most important extensions of the current concept of anonymity of Bitcoins participants, is an Identity Management System based itself on the use of blockchain and without Identity Providers as trusted third parties. Creation, distribution, use and validation of identities are transactions in the system, equivalent to payment transactions, so they should also be performed using blockchain protocol. Such system, that can provide reliable identities of all participants may be called Blockchain Identity Management System.
Another very important feature of the original concept of the Bitcoin system is that it is not controlled by any financial institution, by any regulatory body or by any legal financial authority when it comes to issuing Bitcoins and determining their value. This means that the currency used in the system and all transactions are exempted from any legal and financial rules and regulations. The rules controlling Bitcoin system are built in its code. This property is usually called “rule by the technical code”, as the rules of system operations, built in the code of its operational components, control and rule the operations of the system [UK, 2016], Chapter 3. This property is sometimes described as “control by the community”, i.e. the participating users.
This property implies that the value of Bitcoins is determined solely on the market – based on its supply and demand. This is quite natural approach, as the value of shares of companies are also determined on an open trading market. However, such approach implies that the value of Bitcoin, as crypto currency, is volatile related to fiat currencies. This property represent serious problem to perform payments using Bitcoin. It is well-known that volatile currencies are not suitable for payments. The practice of all the years while Bitcoins are in use has shown that its volatility represents one of the major obstacles for its main purpose – to be used as the payment system. In fact, it was announced that in 2019 the total value of Bitcoin transactions performed was about $ 11 T. However, unfortunately, only about 1.3% of those transactions were payments, all others were trading manipulations on exchanges. Based on that, it may be clearly stated that Bitcoin today is not used as the payment system, but as currency manipulation system. This is one of the main problems with the concept and current implementation and deployment of Bitcoin system and in near future may represent the main reason for its decline in popularity.

1.3 Innovative Contributions of the Bitcoin System

Besides an effective procedure to transfer an amount of crypto currency from one user (account) to another user (account), the major and indeed an essential contribution of the concept of the Bitcoin is the solution to the general problem how to establish trust between two mutually unknown and otherwise unrelated parties to such an extent and certainty that sensitive and secure transactions can be performed with full confidence over an open environment, such as Internet. In all current large scale and not only financial systems that problem is solved by using the assistance of third parties. For many (may be even all) current Internet applications and transactions those third parties are integrated and linked into a large, complex, expensive and vulnerable operational infrastructures. Examples of such infrastructures today are bankcard networks supporting global international payments, global international banking networks supporting international financial transfers, Public–Key Infrastructures (PKI), Identity Management Systems, and many others. It is a general consent that such infrastructures are expensive and, more important, vulnerable to external and internal attacks.
In addition to the complexity and vulnerabilities of such current operational supporting infrastructures, another requirement and prerequisite to use their services is that users must put the complete trust in these third parties. Accepting to trust those third–party service providers is the necessary and mandatory prerequisite to use their services.
Therefore, one of the most important contributions of the concept of Bitcoin is that it solves the issue how two parties, mutually unknown to each other in advance and otherwise completely unrelated, can perform sensitive and secure transactions, such as transfer of money – payments, but without assistance of any third party and without the need to place trust in any component of the system.
The practical benefits of solving this problem and the most important consequence of the solution for this problem – Bitcoin system, is that it provides the possibility for one Internet user to transfer not only Bitcoins, but also any other form of digital asset to or shared with another Internet user, such that the transfer is guaranteed to be safe and secure, that everyone knows that the transfer has been performed, and nobody can challenge the legitimacy of the transfer.
This feature of the Bitcoin system generated many very new, creative and innovative ideas where the concept equivalent to the Bitcoin can be used to perform secure and reliable transactions between users in an open community handling any type of digital asset ([Andreesen, 2014], [Sparkes, 2014], [UniCredit, 2016], [BitID, 2015], [PoE, 2015]). The examples of such applications and transactions range from commercial transitions, real estate transactions, energy trading, electronic voting, medical applications, and many others ([Kounelis, 2015], [Muftic, 2016]). The concept of blockchain as technology supporting validation of all such transactions is therefore called disruptive technology.
As the conclusion in this section, we may give a definition of blockchain:
Blockchain is an innovative concept, implemented as an infrastructure comprising multiple and distributed servers, mutually linked by special broadcasting and synchronization protocols, managing immutable objects with the purpose to enable and protect secure peer–to–peer transactions in a global and open environment.

1.4 Summary of Problems and Potential Solutions

In section 1.2 several problems of the Bitcoin system were mentioned and potential solutions for these problems were outlined. Recently, at the time of writing this Technical Report, several sources, mainly personal blogs and articles, appeared with very interesting opinions and statements regarding some other serious Bitcoin problems. Some of them are problems with the concept of the system, some problems of its design, and some problems of operations. In this section some of these problems are briefly summarized including suggestions for their potential solutions. The source of some problems was the article [Ein, 2018].
Problem 1: Complex Crypto Algorithms
Problem: Bitcoins is crypto currency and cryptographic algorithms used in the current version are very complex, based on the concept of proof–of–work, and require long time, special hardware and a lots of energy to perform
Potential Solution: Potential solution fro this problem is to use cryptographic algorithms that are simpler and therefore more efficient to execute and need less energy
Problems with Potential Solution: Lowering the complexity of crypto algorithms introduces vulnerability to hackers. Therefore, what is needed are strong algorithms and simple to perform for regular users and complex to break by hackers
Problem 2: Indirect Transactions, not Peer–to–Peer
Problem: Contrary to the concept claimed, in todays implementation Bitcoin payment transactions are not performed as direct, peer–to–peer transactions. They are performed indirectly, submitted to the Bitcoin network, and recipients receive them indirectly, by downloading validated transactions from the ledger
Potential Solution: Transactions should be performed directly, by transferring them directly between two users
Problems with Potential Solution: The problem with the potential solution is validation of transaction for proof of possession of Bitcoins by the sender and for prevention of double-spending. Therefore, what is needed is the protocol to validate peer–to–peer transactions.
Problem 3: Anonymity of Users not provided
Problem: Contrary to the concept claimed, in todays deployments of additional system components, mainly exchanges, users are not anonymous
Potential Solution: Blockchain–based Distributed Identity Management System with Role-based Authorizations
Problems with Potential Solution: The problem with potential solution is that it depends on trusted third parties with authorized roles. Therefore, what is needed is blockchain-based Identity Management System using hybrid (permissioned and unpermissioned) blockchain
Problem 4: Volatile Value, not suitable for Payments
Problem: Contrary to the concept claimed that Bitcoin is payment system, volatile value of the currency makes it inconvenient for payments
Potential Solution: Crypto currency with stable value
Problems with Potential Solution: The problem with the potential solution is that the value of Bitcoins is determined on the secondary market, during its trading (cash-in / cash-out). Therefore, what is needed is crypto currency that does not have volatile value
The remaining problems in this section are quoted from [Ein, 2018]:
Problem 5: Negative Environmental Impact
Problem: Mining algorithms and operational facilities (“mining farms”) consume too much electrical energy, based on the “proof-of-work” protocol
Potential Solution: Using mining algorithms that consume less energy, either as simpler / lighter crypto algorithms or using alternative crypto protocols to protect transactions integrity (“proof-of-stake”)
Problems with Potential Solution: The problem with the potential solution is that simpler / lighter algorithms open vulnerabilities to hackers while alternative crypto protocols are not backward compatible with the current system
Problem 6: Slow Performance (Delays) / Low Throughput
Problem: Due to blocking and the designed time for protection of transactions (10 minutes) Bitcoin system has very slow performance – transactions are validated in about an hour and transaction processing throughput is about 7 transactions per second
Potential Solution: Using transaction validation algorithms and protocols that do not need blocking of transactions, but transactions should be validated individually
Problems with Potential Solution: There are no serious problems with the proposed potential solution
Problem 7: Limited Number of Bitcoins
Problem: Due hardware and other types of failures, the number of available Bitcoins in the system is constantly reducing
Potential Solution: Potential solution could be to use smaller portions of Bitcoin (“Satoshi”) or introduce hard-fork by splitting the amount of available Bitcoins
Problems with Potential Solution: The problems with the first solution that it is not user-friendly and the problem with the second solution is backwards compatibility.
Problem 8: Real Value of Bitcoins
Problem: The value of Bitcoins is purely psychological and reflects only pure market speculations
Potential Solution: Potential solution could be to peg the value of Bitcoin to local fiat currencies in countries of deployments
Problems with Potential Solution: The problems with the potential solution is that such Bitcoins would be a new class of Bitcoins, not traded on exchanges and not volatile
At the end of this section, it is very interesting to quote two opinions about the future of Bitcoin and blockchain:
[Ein, 2018]: “It seems that Bitcoin will likely cease to have meaningful value*, defeating the whole point and philosophy imagined by Satoshi Nakamoto, the alleged inventor of Bitcoin. Its current value appears to be purely psychological, and the hype seems to be driven by irrational exuberance, greed and speculation. Modern human history has seen many* bubbles*, including the dot-com bubble, the housing bubble and even the tulip bubble. However, when these bubbles exploded, many excellent dot-com companies survived, most houses regained their value and tulips still have meaning and carry value in our lives today. But what will happen when the Bitcoin bubble bursts? What* utility or residual value will Bitcoin have to consumers and businesses? Most likely none*. And this is the real problem with Bitcoin and crypto currencies.*
Bitcoin will likely go down in history as a great technological invention that popularized blockchain yet failed due to its design limitations*. Just like the industrial revolution was fueled by the combustion engine, Nakamoto’s most valuable contribution is the* blockchain polymorphic engine that will further accelerate innovation in the post-information age and immensely affect our lives”.
This quote makes two very important and far–reaching predictions:
(1) Bitcoin, as the payment system will disappear (“. . . will go down in history”), and
(2) The most valuable contribution of the Bitcoin system is blockchain
This article was written in 2018. It is very interesting to notice that at the time of writing this Technical Report, (1) Bitcoin was still “alive” and (2) the concept and deployments of blockchain were in serious trouble.
Based on the principle of positive and creative approach, in the rest of this Technical Report, besides description of all technical details of the Bitcoin system, some potential solutions for its improvement will also be discussed.
However, contrary to the predicted status of Bitcoin, it seems that the predicted status of blockchain, in 2020 was still facing serious problems.
[Barber, 2019]: What's Blockchain Actually Good for, Anyway? For Now, Not Much
“Not long ago, blockchain technology was touted as a way to track tuna, bypass banks, and preserve property records. Reality has proved a much tougher challenge”.

[Lucanus, 2020]: Has Blockchain Failed Before It Even Really Began?

“Just as everyone was getting really excited about its potential, it appears blockchain is dead. For a technology that was supposed to transform and solve seemingly every problem in the world, the enthusiasm is fading pretty quickly”.
At the time of writing this Technical Report, there were many new blockchain – concepts, design and even several deployed and operational instances. Some of them are even very popular, but only among enthusiastic developers. The overall trends with real life deployments, and more and more comments about the capabilities and features of blockchains are appearing with negative connotation. Therefore, seems that even for blockchain some innovative concepts and approaches are needed. They are beyond the scope of this Technical Report and will be addressed in some of our follow-up reports.
submitted by Theus5 to btc [link] [comments]

Utopia, 1984 Group, bad PR, 1984 Group and [NetStalkers] media garbage

Utopia, 1984 Group, bad PR, 1984 Group and [NetStalkers] media garbage
What would you understand immediately reading my post, I do not want to throw mud at the program or the team of 1984. I just want to explain to everyone that you need to look for advantages in everything and bring the matter to a logical conclusion. And the most important thing is to be committed to your work. And if you choose any product, you must be faithful to it to the end. Be the captains who are to the end with the ship, not the rats running from it.

Hello
In today's post, I would like to tell an interesting story that there is really worthwhile software in the world, what marketing is wrong, and how it is bad to turn to wrong media personalities. Of course, most people know about it. But I think this should be publicly shown, maybe for many and will be useful in the future.

But every cloud has a silver lining. In any case, I think this will be a good stress test for the web. So I can say that even if a bad PR company gives a good result.

Let's start from the very beginning, namely from the software Utopia and the 1984 Group. Of course, little is known about them; more precisely, practically nothing is known. But there is a brief information about her. All of course taken only from the official beta of the portal and block hackology
Spoiler for compact post) About Utopia ecosystem
Utopia – Anti 1984 Ecosystem
Utopia is a decentralized peer-to-peer network, With Utopia you can send instant text and voice messages, transfer files, create group chats and channels, send emails and conduct a private discussion. Currently Utopia is an application for Windows, iOS and Linux which offers all the features within one application. Utopia users get on their ‘Utopia ecosystem‘ as the application also provides a built-in Idyll browser to view websites within Utopia peer-to-peer network . Utopia comes with a Cryptocurrency which is called ‘Crypton‘ and is Proof-of-Stake. uWallet allows you to store,transfer your Crypton(CRP) or even create vouchers and credit cards, Utopia Network includes Utopia Name System (UNS) which is a decentralized registry of names that are impossible to expropriate, freeze or corrupt by 3rd-party as no one has control over the system rather its self-governed by rules set in place which are applicable to everyone.

Register yourself as a Beta Tester, Contributor or a Promoter. Each category gets to enjoy the ecosystem while the rewards vary (reward system will be explained shortly).
Utopia ecosystem is a culmination of multi-year effort by a group of technology enthusiasts dedicated to freedom of self-expression and privacy. We call ourselves a 1984 Group. Among us there are top-notch professionals in almost every IT field, such as cryptographic, software, networking engineers and many more. This has been a long and challenging journey. After all this had never been done before! Finally, we present an ecosystem that will change the way World communicates and handles financial transactions. Utopia brief taken from their official website. Mentioning ‘financial transactions’ makes one wonder that Bitcoin was also disrupting the conventional financial system
Lets Explore Utopia and all the features in detail. please note as this is a beta application many of the features might change in future or some even get removed.
Utopia Encryption
Each user participates in transmission of network data but only the recipient can decrypt the data. Advanced encryption ensures interception-proof communication channel to all Utopia users. All communication is secure and protected by Curve25519 high-speed elliptic curve cryptography while local storage is encrypted by 256-bit AES. Big Brother is no longer watching you!
Installing Utopia
Once you register on the Beta Portal you have to download Utopia Application. After installing the application you will be given a Hardware ID and a Private Key, these keys are required to activate your beta license which can be done from the Activation Page. Please keep in mind that your beta portal website login credentials are not linked with Utopia Application and you can have a different username for the app and the website. Once you activate the license your utopia account will be tied with your beta portal account. A step by step procedure for easy understanding of the activation procedure:
Register at Utopia Beta Portal
Download Utopia software
Install the program by following simple instructions on installation wizard
Run Utopia and Create your account. You will be provided with Public Key and Hardware ID. Those are needed to activate your Utopia software
Login to your account
Click on JOIN BETA
Agree to the Rules and click SUBMIT
Click on NEW ACTIVATION and Enter Public Key and Hardware ID
Click ADD
Now your Utopia is activated and you are ready to test it

https://preview.redd.it/gq8brrk1rmc31.jpg?width=880&format=pjpg&auto=webp&s=02a96016755765dfef53309eb78a4abf0011d9c6
Utopia Dashboard
Utopia is a feature-rich platform that is specifically designed to protect privacy of communication, confidentiality and security of personal data. It was created for privacy-conscious public who believe that privacy is paramount. Utopia is a decentralized network, with no central server involved in data transmission or storage. The network is supported by people who use it’s many high quality features.

https://preview.redd.it/w2nhvx54rmc31.jpg?width=1366&format=pjpg&auto=webp&s=d5f7a958c67ca46ba2c2d34489c83579c0d18d0b
The first glimpse we get of the application is at the Dashboard which has navigational menu for easy access to all of its many features for us to explore, use and report bugs while it is in beta testing phase.

uMail (Utopia Mail)
uMail is a secure alternative to classic e-mail. uMail can be sent to Utopia users that are in your contact list for now. uMail has all functionality of email localized to Utopia ecosystem. No servers are used for mail transmission or storage. uMail account, that is created by default when you join the Utopia network, enables unlimited messaging and attachment storage. Utopia ecosystem encryption guarantees the security of mail transmission and storage. Your uMail, as an internal part of Utopia, cannot be blocked or seized.

https://preview.redd.it/8q7ljch6rmc31.jpg?width=1366&format=pjpg&auto=webp&s=2bcc4896fa74bb5d2ca23c4c9414fcd4d015ab41


All those who value their data privacy would find this useful including activists and journalists knowing that their data is going straight to the designated user and no 3rd party can intercept their data. Currently the limit set for the attachments is 100 MB but as per the team it may be increased in future.

uWallet (Utopia Wallet)
All financial functionality can be found in Utopia built-in uWallet. uWallet allows you to make and accept payments denominated in Utopia cryptocurrency ‘Crypton‘, accept payments at your website, pay by Crypto Cards without revealing your Identity or bill fellow Utopia users for your services. With uWallet you can store value in Cryptons, receive mining rewards, use uVouchers, request payments and accept payments using the built-in API.


Utopia Mining – Crypton
Utopia has an inbuilt cryptocurrency called Crypton (CRP), which is proof-of-stake therefore a modest machine can also be used to mine cryptons through the GUI based Utopia application or with terminal based Mining bot which comes with the application.

https://preview.redd.it/aadlqb8crmc31.jpg?width=814&format=pjpg&auto=webp&s=2a100b98b2d912898d1b4a316f05f999846ab7b1


Utopia rewards users that support the ecosystem through Mining by emission of new Cryptons. When you run your Utopia software or bot you will receive your share of collective reward. Mining does not slow your computer down and is environmentally friendly. You may also run a number of bots at several servers or computers to multiply the Crypton mining speed.

https://preview.redd.it/2yktqfkermc31.jpg?width=1024&format=pjpg&auto=webp&s=c099c8439d25ea1e95682c14116d812f85180dc6


uNS (Utopia Naming System)
Utopia has introduced uNS (Utopia Naming System) which is a unique naming system and independent from the conventional Domain Naming System. DNS is subject to pressure and censorship from less than prefect international laws. Domains can be revoked or suspended due to multiple reasons, such as non-response to WhoIS inquiry or other register policies, non-payment, government actions and so on.
uNS, in contrast, is a truly decentralized non-censored registry hosted by Utopia Network participants with no expiration dates, renewal fees, suspensions and revocations. There is only one rule: First come, First served.

https://preview.redd.it/pfwstp5grmc31.jpg?width=1024&format=pjpg&auto=webp&s=1e282b2ad57f61ae3e4a114e75a96e20f7fc3a73


uNS registered name should be unique. You may register as many uNS registered names as you want while registration is not free and costs are paid in crypton:
Single letter uNS costs 1000 CRP
Two letter uNS costs 500 CRP
Three letter uNS costs 5 CRP
Four letter or more costs 0.1 CRP

Miscellaneous Features
Making Groups, Adding users, Chatting and Emailing, Sending Mails and Mining Cryptons might be the highlights but Utopia claims to be an ecosystem therefore they had to incorporate many more features so that users of Utopia ecosystem do not feel the need to go out of the system. List of other useful features within the Utopia Application are listed
Packet Forwarding : uNS Manager lists option of ‘Packet Forwarding’ which is an internal system allowing any utopian user to host a website which can be accessed by the Idyll browser, the naming system of the website is explained above, if you register hackology uNS you can make a website and it will open when you visit http://hackology/ and that is it. This option allows to tunnel any kind of data between users in ecosystem, making possible to host different types of resources including websites inside Utopia Network. At the time of writing few fellow Utopia users made Utopia sites which can be accessed at http://trade/ and at http://crystalforest

https://preview.redd.it/1z5pbk8jrmc31.jpg?width=1024&format=pjpg&auto=webp&s=03d088e681d00b7c65610a0672ade07f593fb62b


File Manager : All files which are sent or received in Utopia can be accessed from the builtin file manager which also includes an image viewer. As of now the file transfers are limited to 100MB.
Voice Notes : Utopia also supports sending and receiving of Voice messages which you can send to those who are added with you.
Dark Theme : The program comes in standard theme but how can they miss out a Dark Theme for the privacy savvy ? Users can opt for dark theme by going to Tools > Settings > Interface and selecting the ‘Dark Space‘ theme
Utopia API : Utopia comes with a comprehensive API for users to incorporate in their own projects. For instance, using API you can accept payments denominated in Crypton at your website, automatically manage your channels, send instant messages and much more. To get started once you enable the API you can also access the API documentation.
Network Fee Structure : Utopia provides us with an option to view all the network enforced fee and they are updated live on the network as the fee structure changes, thus one can stay updated with the current fee structure. You can access the Network Fee from uWallet > Treasury Data > Network Fee

https://preview.redd.it/62ofvlrormc31.jpg?width=1024&format=pjpg&auto=webp&s=9ab0ecd8eda8f17290f1e10afd23c67ec828ecb5
Game : Utopia also supports in-app games which can be played in multiplayer, as of writing there is a working Chess game.


You can find more about Utopia on Hackology Blog.

Well, now I want to say personally my opinion after using Utopia.

It is very difficult to judge a product at the beta test stage, but at the moment I can highlight both the pros and cons of both the program and the team that develops it. I want to notice that this is my subjective opinion and you can or may not share it. So, let's begin:

Advantages:
  1. In principle, everything is really anonymous, as far as can be judged really using this software.
  2. Non-indexable channels (If you make it private and hide it from the search) at least we tested it inside the ecosystem. To find even by keywords is not real
  3. Non-indexable pages that you create. If you do not have a direct link, find a site even in the global search is not possible
  4. Easy mining of krypton. Even the weakest computers do not load, very comfortable
  5. Convenient system of anonymity of user information (Without exchange of public keys, even the avatar will not work)
  6. An easy-to-learn interface that arrived to us from 2004 (Old School will understand and appreciate)
  7. In fact, it reminds the decentralized Internet and may well become such with the proper development
  8. Inside the ecosystem there are no labels and notions of who is who, which simplifies the interaction within it
  9. Intervention from outside is at least very difficult, tried methods known to us, failed
  10. Indeed similar to a decentralized ecosystem.
  11. The team quickly fix problems
  12. Availability of detailed and collapsible instructions to all APIs within the ecosystem

There are many advantages and if I list everything, the post will be unrealistically large, therefore I have identified the main ones, and everyone after use must decide for himself what he liked.

And now about the shortcomings, they will be more likely related to common problems than specifically to the software or the command:

  1. Many functions that will have to be mastered by yourself, almost 0 guides
  2. The reaction of the team to the problems through the support leaves much to be desired
  3. The presence of bugs (not critical and absolutely, just not pleasant, both visually and in use)
  4. Not the right choice of PR company to promote software
  5. The team is known for development but is not good friends with product promotion.
  6. Localization, while only English (Well, this is a lesser problem)
  7. Absence of the familiar function (for example, attached videos and the like)
  8. All traffic from the site, even if you put it on the UPU goes through you, and in fact it denies anonymity