Bitcoin Cash Register Start accepting Bitcoin Cash at ...

i2p — anonymous network

A subreddit for information and discussions related to the I2P anonymous network. Visit http://geti2p.net to download I2P.
[link]

Gridcoin 5.0.0.0-Mandatory "Fern" Release

https://github.com/gridcoin-community/Gridcoin-Research/releases/tag/5.0.0.0
Finally! After over ten months of development and testing, "Fern" has arrived! This is a whopper. 240 pull requests merged. Essentially a complete rewrite that was started with the scraper (the "neural net" rewrite) in "Denise" has now been completed. Practically the ENTIRE Gridcoin specific codebase resting on top of the vanilla Bitcoin/Peercoin/Blackcoin vanilla PoS code has been rewritten. This removes the team requirement at last (see below), although there are many other important improvements besides that.
Fern was a monumental undertaking. We had to encode all of the old rules active for the v10 block protocol in new code and ensure that the new code was 100% compatible. This had to be done in such a way as to clear out all of the old spaghetti and ring-fence it with tightly controlled class implementations. We then wrote an entirely new, simplified ruleset for research rewards and reengineered contracts (which includes beacon management, polls, and voting) using properly classed code. The fundamentals of Gridcoin with this release are now on a very sound and maintainable footing, and the developers believe the codebase as updated here will serve as the fundamental basis for Gridcoin's future roadmap.
We have been testing this for MONTHS on testnet in various stages. The v10 (legacy) compatibility code has been running on testnet continuously as it was developed to ensure compatibility with existing nodes. During the last few months, we have done two private testnet forks and then the full public testnet testing for v11 code (the new protocol which is what Fern implements). The developers have also been running non-staking "sentinel" nodes on mainnet with this code to verify that the consensus rules are problem-free for the legacy compatibility code on the broader mainnet. We believe this amount of testing is going to result in a smooth rollout.
Given the amount of changes in Fern, I am presenting TWO changelogs below. One is high level, which summarizes the most significant changes in the protocol. The second changelog is the detailed one in the usual format, and gives you an inkling of the size of this release.

Highlights

Protocol

Note that the protocol changes will not become active until we cross the hard-fork transition height to v11, which has been set at 2053000. Given current average block spacing, this should happen around October 4, about one month from now.
Note that to get all of the beacons in the network on the new protocol, we are requiring ALL beacons to be validated. A two week (14 day) grace period is provided by the code, starting at the time of the transition height, for people currently holding a beacon to validate the beacon and prevent it from expiring. That means that EVERY CRUNCHER must advertise and validate their beacon AFTER the v11 transition (around Oct 4th) and BEFORE October 18th (or more precisely, 14 days from the actual date of the v11 transition). If you do not advertise and validate your beacon by this time, your beacon will expire and you will stop earning research rewards until you advertise and validate a new beacon. This process has been made much easier by a brand new beacon "wizard" that helps manage beacon advertisements and renewals. Once a beacon has been validated and is a v11 protocol beacon, the normal 180 day expiration rules apply. Note, however, that the 180 day expiration on research rewards has been removed with the Fern update. This means that while your beacon might expire after 180 days, your earned research rewards will be retained and can be claimed by advertising a beacon with the same CPID and going through the validation process again. In other words, you do not lose any earned research rewards if you do not stake a block within 180 days and keep your beacon up-to-date.
The transition height is also when the team requirement will be relaxed for the network.

GUI

Besides the beacon wizard, there are a number of improvements to the GUI, including new UI transaction types (and icons) for staking the superblock, sidestake sends, beacon advertisement, voting, poll creation, and transactions with a message. The main screen has been revamped with a better summary section, and better status icons. Several changes under the hood have improved GUI performance. And finally, the diagnostics have been revamped.

Blockchain

The wallet sync speed has been DRASTICALLY improved. A decent machine with a good network connection should be able to sync the entire mainnet blockchain in less than 4 hours. A fast machine with a really fast network connection and a good SSD can do it in about 2.5 hours. One of our goals was to reduce or eliminate the reliance on snapshots for mainnet, and I think we have accomplished that goal with the new sync speed. We have also streamlined the in-memory structures for the blockchain which shaves some memory use.
There are so many goodies here it is hard to summarize them all.
I would like to thank all of the contributors to this release, but especially thank @cyrossignol, whose incredible contributions formed the backbone of this release. I would also like to pay special thanks to @barton2526, @caraka, and @Quezacoatl1, who tirelessly helped during the testing and polishing phase on testnet with testing and repeated builds for all architectures.
The developers are proud to present this release to the community and we believe this represents the starting point for a true renaissance for Gridcoin!

Summary Changelog

Accrual

Changed

Most significantly, nodes calculate research rewards directly from the magnitudes in EACH superblock between stakes instead of using a two- or three- point average based on a CPID's current magnitude and the magnitude for the CPID when it last staked. For those long-timers in the community, this has been referred to as "Superblock Windows," and was first done in proof-of-concept form by @denravonska.

Removed

Beacons

Added

Changed

Removed

Unaltered

As a reminder:

Superblocks

Added

Changed

Removed

Voting

Added

Changed

Removed

Detailed Changelog

[5.0.0.0] 2020-09-03, mandatory, "Fern"

Added

Changed

Removed

Fixed

submitted by jamescowens to gridcoin [link] [comments]

Checker Thread (A list of hacked clients for easy reference)

Community contribution is the only way this thread will be useful. This is a WIP! More clients will be added as time goes on!
Quick note: The vast majority of these are files supplied by the community -- some may not work. The person who sent me 9b9t says it doesn't work, but I have not personally tested. Please let me know if it works or does not work.

Some additional notes:
I am open to community criticism so long as it can actually be used to benefit the thread. Issues with formatting, approach, client choice, etc. are all great things to come talk to me about so I may improve. However, people keep commenting the same things over and over and over — “VirusTotal can’t catch X” is a popular one — and I don’t have time to deal with it. If you have a security concern, you are more than welcome to raise it. HOWEVER, do not make unreasonable requests of me — I work, in addition to that I have a social life, I have responsibilities at home as well. This is a side thing that I do when I have the time. A lot of people have suggested looking through bytecode to determine if a client is malicious. I do not have the time to do this for every client. If you are willing to help and do more than say “you should do more than you already are, even though you have a job and a life outside of an obscure subreddit,” feel free to DM me. People who take the broken record approach and say things that are already covered in the thread, or refuse to offer help and just post complaints, will be blocked and ignored. I’m all down for making this post better, but I’m not gonna waste my time with people who won’t work with me. Thank you for your help!

BIG THANKS TO u/jpie726 FOR HIS MASSIVE CONTRIBUTIONS! WITHOUT HIM THIS LIST WOULD BE SIGNIFICANTLY LESS EXPANSIVE. GO UPVOTE THIS MAN INTO HEAVEN, HE DESERVES IT!

Eventually I would like to make a Python script that takes care of all the necessary tasks to install these clients. Python itself is available through the Windows Store as well as on Python's website, or through various other installers. It will install any additional dependencies via Pip and will use Curl to retrieve the files. Anyone interested in helping with this script is more than welcome to do so, if you wish. The two options for assisting me would be as follows:
1. You can install Visual Studio Code or Atom and work with me directly through those applications (more details soon™)
2. A GitHub page may be made and you could submit pull requests through that and edit the script alone.

#######################################################################
There is a misconception that I am only here for free paid clients.
1. I can't use a paid client unless I have access to a cracked version, an account, and the HWID bound to said account.
2. People are also saying there's a way for clients to track if someone leaks them. While I suppose this is possible if they bothered to put in the absurd amount of effort it would take, it would give them no benefit and it would do no good as I am not running the software on my desktop -- I am sending the software to VirusTotal, grabbing the SHA-256 checksum, and deleting the file.
3. If all you're going to do is post that "VirusTotal can't catch x" or "muh client" do not waste my time, and don't waste yours. You will be ignored in favor of people who will actually help me construct what I hope to be a megathread for this subreddit, FOR YOU GUYS. I mean jeez, someone's trying to help and half the fucking responses are "muh client" like come on. No wonder this fucking subreddit is dead, sheesh. If someone's trying to help you and you just step on their toes that's just not very cool, not everyone is trying to scam you. I do just be trying to help people who come here doe.
4. If you have concerns, raise them respectfully. Do not attack me, you will be ignored or if I feel so inclined I will give you 110% of the shit you give me right back to you. I will answer questions, I will elaborate on my goals, I will take helpful advice. Everything else will be outright ignored, and misinformation will be countered. That is all, thread below.
#######################################################################

I named this the Checker Thread to make it easy to search for in the subreddit. Enjoy.Below will be a list of hacked clients, with VirusTotal links, SHA-256 hashes, direct download links (skipping ad pages) and eventually features for each client. I'd also like to add what servers they do and don't work on, but I need the community to help with that.
The only client I use is Impact, send me additional clients in the comments and they will be added to this list.

Note about SHA-256 hashes:
SHA-256 hashes are a hash of a file produced algorithmically. This type of hash was developed by the United States National Security Agency, and is typically used to verify that files are what they are supposed to be. Widely used in cryptographic applications such as SSH, APT repositories, transactions on websites, verifying files, Bitcoin, and more. It is very common. This type of cryptographic hash has been in use since 2001. An SHA-256 hash will be the exact same for the same file regardless of the source of the file, so if your hash is different from the one listed here you do not have the legitimate installer OR the hash is not up-to-date.

Note about VirusTotal tests:
Several people have pointed out to me something I feel should be brought up in the main thread. VirusTotal is not a catch-all, just as your typical antivirus software is not a catch-all. It will not catch everything. It should be used as a general guideline only. Clean VirusTotal tests do not guarantee your safety, although if the program passes all ~70 or so antivirus engines it's probably safe to use. Any additional malicious activity should be caught by your antivirus program's heuristics. I take no responsibility for anything that is malicious, but I can say in good conscience that I have done everything I can to ensure that everything on this thread is safe. Keep in mind that programs that trip VirusTotal may still be safe to use, antivirus programs often pick up injectors as malware or Trojans because that's how those types of viruses behave in the real world. Use your best judgement. If your best judgement is not good enough, do not use these programs. You have been warned.

----- C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S -----

Impact | 1.11.2 to 1.15.2 | Java Edition
VirusTotal Link for *.exe Installer | VirusTotal Link for *.jar Installer
SHA-256 Hash: 4EAFFB99759FBD949D0FBEF58AE9CEB45CE8CA2B0D7DC22147D4FF0E46F010EC
Impact triggered 0/72 engines on both installers.
Direct Link to Impact's *.exe Installer | Direct Link to Impact's *.jar Installer
------------------------------------------------------------------------------------------------------------------------------------------------

Sigma | 1.8 to 1.16 | Java Edition
VirusTotal Link for *.jar Installer | VirusTotal Link for the *.zip the Installer is Contained In
SHA-256 Hash for the *.zip file: 3FCD397849358522BF0EEEAF117487DBA860919900A904551DF512BE2C34B48C
Sigma's *.zip file triggered 0/59 engines on the *.zip file.
Sigma's *.jar file triggered 0/60 engines on the *.jar file.
Direct Link to Sigma's *.zip File that Contains the Installer
------------------------------------------------------------------------------------------------------------------------------------------------

9b9t | 1.12.2, needs testing | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 30E4F2778688D54CE7992AFDE509460A7BDDBDA77800219083D4D12BC696EEA0
9b9t triggered 0/60 engines.
AnonFile link to 9b9t's *.jar Mod
------------------------------------------------------------------------------------------------------------------------------------------------

Ingrosware | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: BD1A0F9079F4C834A251163C3A0ECBFF7DFC28AB00CF1C74008AADD042FAD358
Ingrosware triggered 0/59 engines.
AnonFile link to a pre-built *.jar Mod
Note: Ingrosware is open source, and is available on GitHub. If you want to build it yourself, you can do so here.
------------------------------------------------------------------------------------------------------------------------------------------------

Mercury | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 70E585A94218149970410ACAE5BE7C1C1B731140F1AF55FE2D1292B1CA74DCB9
Mercury triggered 0/60 engines.
AnonFile link to Mercury's *.jar Mod
------------------------------------------------------------------------------------------------------------------------------------------------

Atlas | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.jar Forge Mod
SHA-256 Hash: 7AEB7220CBD5D7C4E4421A940357F14EC70B18DB905469E288529FE3A2C04D57
Note: The file is called AceHackGold-n3.0-release.jar in VirusTotal. The client is identified as Atlas in the .nfo file it came bundled with.
Atlas triggered 7/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.jar Mod
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
Note 2: The file downloaded is called AceHackGold-n3.0-release.jar*, I'm not sure why. This file was community-sourced, but it has been inspected in the same manner as all the others*.
------------------------------------------------------------------------------------------------------------------------------------------------

Atom | 1.12.2 | Java Edition | Forge Mod | Use with extreme caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 3B43F952EB5B14F2B01592057B27E92B0E38B6874EA10B8E893BFCBC71463377
Note: The file is called output.157312297.txt in VirusTotal. In addition, VirusTotal identifies the file type properly (\.zip).*
Atom triggered 9/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it.
------------------------------------------------------------------------------------------------------------------------------------------------

Aurora | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 9A66929B629AB076383340D33E0EF9B8CE221679EF79315240EA6C760651A533
Aurora triggered 0/61 engines.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

CandyCat | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 8CEC2F9F28AA3957504E0CC66BF1516080C7BAC50EADB54DC6DD97E0E6E9C745
CandyCat triggered 9/61 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

DayNightGod | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 9CEEB43476B18149C0DA76B7AE94713AAF60ED4D2BFD2339E863CC46A1808A0D
DayNightGod triggered 1/59 engines.
Note: Upon closer inspection, only one engine was triggered. The client did not trigger the usual false-positives of a Trojan, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

HyperLethal | 1.12.2 | Java Edition | Forge Mod | Use with caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 77FACC1FDB0415438963CCC8DDB4081958563AAA962CE9C024E5063DA32E8FAD
HyperLethal triggered 2/59 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------

LoveClient | 1.12.2 | Java Edition | Forge Mod | Use with extreme caution!
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: C71EC42FF612D75CB7AA21B8400D164A74AAD9BB65D2DFEE232461DAF98034C2
LoveClient triggered 9/61 engines.
Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives.
AnonFile Link for the *.zip File
Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it.
------------------------------------------------------------------------------------------------------------------------------------------------

SnowHack | 1.12.2 | Java Edition | Forge Mod
VirusTotal Link for the *.zip the Forge Mod is Contained In
SHA-256 Hash: 7100C8D59CE06B279F7D03D834FC2C361F10BEAE913575FC7EFA74E498167D2C
SnowHack triggered 10/62 engines.
Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe, use with caution.
AnonFile Link for the *.zip File
Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play.
------------------------------------------------------------------------------------------------------------------------------------------------
submitted by Daemris to minecraftclients [link] [comments]

PDQ Deploy packs v72.0.0 (2020-09-18)

Background

This is v72.0.0 (v71.0.0, v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.012.20041
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.433 (Chrome)
  • Adobe Flash Player v32.0.0.433 (Firefox)
  • Adobe Flash Player v32.0.0.433 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.50.0
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v85.0.4183.102
  • Google Chrome Enterprise v85.0.4183.102 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 261
  • Java Development Kit 8 Update 261 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 261
  • Java Runtime 8 update 261 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v7.0.1
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v80.0.1
  • Mozilla Firefox v80.0.1 (x86)
  • Mozilla Firefox ESR v68.12.0
  • Mozilla Firefox ESR v68.12.0 (x86)
  • Mozilla Thunderbird v78.2.2 (x86) (customized; read notes)
  • Notepad++ v7.8.9 (x86)
  • Pale Moon v28.13.0
  • Pale Moon v28.13.0 (x86)
  • Spark v2.9.2 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.11
  • WinSCP v5.17.7 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to sysadmin [link] [comments]

PDQ Deploy packs v72.0.0 (2020-09-18)

Background

This is v72.0.0 (v71.0.0, v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.012.20041
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.433 (Chrome)
  • Adobe Flash Player v32.0.0.433 (Firefox)
  • Adobe Flash Player v32.0.0.433 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.50.0
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v85.0.4183.102
  • Google Chrome Enterprise v85.0.4183.102 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 261
  • Java Development Kit 8 Update 261 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 261
  • Java Runtime 8 update 261 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v7.0.1
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v80.0.1
  • Mozilla Firefox v80.0.1 (x86)
  • Mozilla Firefox ESR v68.12.0
  • Mozilla Firefox ESR v68.12.0 (x86)
  • Mozilla Thunderbird v78.2.2 (x86) (customized; read notes)
  • Notepad++ v7.8.9 (x86)
  • Pale Moon v28.13.0
  • Pale Moon v28.13.0 (x86)
  • Spark v2.9.2 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.11
  • WinSCP v5.17.7 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to pdq [link] [comments]

Blockchain Use in Intellectual Property

Blockchain Use in Intellectual Property
Link to original article: https://block.co/blockchain-use-in-intellectual-property/
Patents, trademarks, and industrial designs, along with copyrights, are all types of intellectual property protections that help creators of written stories, inventions, artistic works, or symbols to stop people from stealing or copying their pieces of work. In this article, we will examine how blockchain is used in Intellectual Property rights.
Broadly speaking, Intellectual Properties (IP) are “unique, value-adding creations of the human intellect that result from human ingenuity, creativity, and inventiveness.” (Kalanje, 2006).
By observing trends, we can identify a steady increase in the number of Intellectual Property applications worldwide. According to official statistics by the World Intellectual Property Organization (WIPO), applications worldwide of patents grew 72.3% over ten years, increasing to 3,326,300 from 2008 to 2018. Trademarks grew an astonishing 160% over the same period, to a record 14,321,800 number of applications, while industrial design applications were 1,312,600, growing by 61%. Every country has a specific authority where to apply for proper protection. However, it is becoming increasingly common that these jurisdictions will utilize blockchain technology to provide a smoother, faster, and cheaper application process and a system that ensures an incorruptible and secure timestamping through the hashing function.
How does it work?
Blockchain ‘trust’ is guaranteed by hashing algorithms, instead of third parties. Since, by default, hashes are unique and cannot be misinterpreted, nor two same hashes can be produced, it’s just easy to identify and match that hash with a unique document creating an unambiguous proof of existence. This way, a permanent ledger of data is created to prove the existence and the lifecycle of a specific IP right, enhancing its protection at a registry or in court.
Blockchain use in Intellectual Property potential is enormous, aiding in the evidence of creatorship and provenance authentication to registering and clearing IP rights; digital rights management; establishing and enforcing IP agreements, licenses, or exclusive distribution networks through smart contracts; and transmitting payments in real-time to IP owners.
In the case of patents, the real benefit of using blockchain lies in the immutable ledger of records with a tamper-proof code providing strong evidence of facts about an invention life-cycle. However, unlike copyrights, any new creation will still have to be patented with the proper authority or anyone else will be free to copy it or claim it without incurring any legal trouble.
https://preview.redd.it/py8eashu7vp51.png?width=940&format=png&auto=webp&s=224cf5fb4087a6100f99a05c19038b18abeca6fa
“Deploying blockchain technology within the patent system could reduce inefficiencies in recording and efficiently agreeing the time of registrations, perhaps across several national patent systems” (Boucher et al., 2017).
In the case of Copyrights, these do not need to be registered with a government authority, therefore blockchain can have a major role in ensuring that evidence can be provided of authorship, use, and status of a specific production. Particularly, in case of disputes in court, blockchain provides strong evidence to prove an inventor’s right on intellectual property, and protect legal rights on authorship. So, when including writing and literary or artistic works, creators get some type of protection automatically via blockchain, whereas with others, they have to apply for it.
Trademarks, on the other hand, are the IP protection type that can most benefit from blockchain because it can easily, quickly, and very cheaply prove how similar are two marks to each other and who can claim to have used it first, providing immutable and timestamped proof of dates and usage. By using blockchain, many of the questions which can arise about exactly when, where, and how the trademark was used, can be instantly answered.
Cyprus-based company Block.co provides services in a range of different industries, and timestamping trademarks on the blockchain is one of them. The company is a spin-off of the University of Nicosia, one of the biggest blockchain contributors globally, and its mission is to eliminate document fraud in all sectors, by transforming the way institutions manage digital records.
International business and technology lawyer Christiana Aristidou makes large use of Block.co’s services and especially in copyrights and trademarks for several of her clients.
“We consider the Block.co solution indispensable towards our objective of constantly enhancing the provision of our legal services through innovative technological solutions. The protection of copyright and other relevant intellectual property rights now involves a simple, fast, automated, and cost-efficient, blockchain-backed certificate issuance. Using blockchain, thereby ensuring a transparent, immutable, secure, time-stamped, and tamper-proof recording of data, the Block.co solution offers a revolutionary and innovative means to protect our clients’ intellectual property, instead of other time-consuming and costly traditional processes.” she recently stated.
“Specifically, our clients’ data and evidence supporting their authorship, invention, or creation of any property that warrants copyright protection, may now be recorded in a digital document, which is then verified in a trusted and time-stamped manner on a blockchain. Our clients retain ownership and control of their data, having been granted easy access to a self-verifiable blockchain-secured certificate of such data.”
Smart Contracts
Smart contracts could also represent an important asset of blockchain technology because they can be used in intellectual property to establish and enforce agreements such as licenses and allow the transmission of payments in real-time to IP owners. Indeed, they allow automatic payments for transactions between users and rights holders with no middle man, thereby cutting out intermediate fees, longer procedures, and bureaucratic hurdles.
https://preview.redd.it/arfnefjx7vp51.png?width=940&format=png&auto=webp&s=78db6dc6f734385de74e2916091fff72e935c4e8
Blockchain in IP around the world
In Europe, various governmental agencies and IP registries such as the European Union Intellectual Property Office (EUIPO) are actively involved in researching and promoting blockchain capabilities within the industry.
In particular, they believe blockchain can transform IP rights by highlighting, in one of their advanced research forums, that:
  • IP and blockchain are interrelated
  • Blockchain is transformative
  • IP protection will drive innovation in the ecosystem
  • Blockchain technology will transform IP protection and enforcement
  • Blockchain technology provides opportunities for both pirates and law enforcement
In India, the IPO (Indian Patent Office) is working on using blockchain and other innovative technologies like AI and IOT to enable smoother patent processes. A Blockchain-AI-based ecosystem is on the table to manage IP protection in India, intending to produce a much more efficient, straightforward, and faster procedure. IPO recently announced a tender called, “Expression of Interest for Making use of Artificial Intelligence, Blockchain, IoT and other latest technologies in the Patent Processing system of IPO”, reinforcing their will to proceed along this line of work and stay up to date with the technological innovation that blockchain, AI and IoT can bring to the benefit of IP rights. A legal framework for a Blockchain-based IP registry to protect and commercialize smart ideas is one of the main and earliest initiatives the IPO is taking for the Indian IP industry.
In the United States, we find a clear example of how blockchain is used to protect American businesses from IPR theft by testing imports. Since blockchain has proven to be beneficial to streamline communication between multiple parties securely, the U.S. Customs and Border Protection (CBP), with the funding of the Department of Homeland Security’s Science & Technology Directorate, recently completed a proof-of-concept (PoC) of a blockchain platform with that specific aim. Personal data and trade secrets would be kept safe at all times using encrypted keys, with the blockchain acting as an immutable ledger to record trade transactions.
In Southeast Asia, Thailand is leading the way in developing blockchain technology for IP protection. Various organizations and government offices have invested in projects aimed at implementing the tech to make IPR processes more efficient and faster. The Ministry of Commerce has recently launched a feasibility study to explore the use of blockchain for IP registration in the country, while the Thai Trade Policy and Strategy Office (TPSO), in collaboration with the British Embassy, were designated to analyze the study and translate it into action plans for future developments.
Conclusion — Blockchain limits and benefits in IP
As with every new technology, especially the most disruptive ones, setbacks can be both from a technical and a systemic perspective. Enormous processing power and scalability are still the main issues from a technical point, whereas a system that could connect registries across the world through a single distributed ledger represents the main challenge, not only for IP-related industries. Thankfully, Block.co’s solution already uses the Bitcoin blockchain and its network effect for this purpose, envisioning truly decentralized and secure storage for IP rights, that will outlive any issuing institution itself.
An international standardized system and platform that could facilitate global communication and successful management of IP rights via blockchain is an ambition that is reflected in healthcare, law, and many other industries. On the other hand, blockchain based IP rights enforcement is already a huge achievement, especially for those small artists who could not afford teams of lawyers to defend them in disputes to prove records of their authorship.
For more info, contact Block.co directly or email at [email protected].
Tel +357 70007828
Get the latest from Block.co, like and follow us on social media:
✔️Facebook
✔️LinkedIn
✔️Twitter
✔️YouTube
✔️Medium
✔️Instagram
✔️Telegram
✔️Reddit
✔️GitHub
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

How Data Centralization Ends by 2030

Link to Coindesk: https://www.coindesk.com/data-centralization-2030
The next 10 years will witness the systematic manipulation of human life at a scale unrivaled in history. For all the recent controversies over privacy and surveillance, the real threat is ahead of us.
Unless new approaches to online identity and data management take hold, both governments and private actors will move inexorably from knowing you to shaping you. Blockchain-enabled decentralization will develop as the only viable response to the iron logic of data centralization.
Blockchain believers often talk as though today’s early-adopter use cases, such as cryptocurrency trading and decentralized finance, will lead straight to mass market adoption. As the inevitable ‘killer apps’ appear, so the story goes, blockchain-based systems will conquer the mainstream. One might imagine that we’ll all soon be trading digital collectibles and relying on token-curated registries for accurate information. Governments will lose control over money, and blockchain-based smart contracts will replace court-enforced legal agreements. Uber, Facebook and the banks will wither away in the face of tokenized alternatives.
This narrative is wishful thinking. In most markets, intermediaries will endure for the same reasons they always have: they provide value. The Ubers and Facebooks – and yes, even the banks – tame complexity and produce coherent, convenient, de-risked experiences that no decentralized community can ever match. Early adopters use blockchain-based systems for ideological reasons or to get rich on cryptocurrency speculation. The billions behind them in the mainstream will not. The lock-in power of network effects creates high barriers for alternative economic systems. And the need for trust disqualifies decentralized solutions that are havens for criminals, incapable of effective compliance or vulnerable to catastrophic attacks – which, regrettably, means virtually all of them today.
Truly decentralized blockchain systems will reach critical mass not out of hope but out of necessity. Powerful actors and mainstream users will adopt blockchain as a counterbalance to digital behavior-shaping by governments and private platforms. Dramatic innovations such as decentralized autonomous organizations (DAOs), which manage activity automatically through smart contracts, will become significant at the end point of this process, once the foundations are in place.
Big data and artificial intelligence, pitched as freeing us from human frailties, are becoming powerful tools for social control. This is occurring along two parallel tracks: surveillance authoritarianism and surveillance capitalism. Through massive data collection and aggregation, China’s social credit system envisions an airtight regime of perfect compliance with legal and social obligations. Many other governments, including liberal democracies, are adopting similar techniques. The potential for catching terrorists, child predators and tax evaders is simply too appealing – whether it’s the real objective or a cover story.
"WHAT WE NEED IS A TECHNOLOGY THAT ALLOWS FOR SHARING WITHOUT GIVING UP CONTROL. FORTUNATELY, IT EXISTS."
Meanwhile, private digital platforms are using troves of data to shape online experiences consistent with their business models. What you see online is, increasingly, what maximizes their profits. Companies such as Google, Amazon, Tencent and Alibaba can build the best algorithms because they have the most data. And they aren’t interested in sharing.
Regulatory interventions will fail to derail the self-reinforcing momentum for ever more centralized data repositories. They may even accelerate it by creating layers of compliance obligations that only the largest firms can meet. Europe’s General Data Protection Regulation (GDPR) actually increased the market share of Google and Facebook in online advertising, and so it is not surprising to see such incumbents actively welcoming the prospect of more regulation.
The only lasting solution is to change the economics of data, not to impose private property rights; that would accelerate the market forces promoting data centralization. Giving you “ownership” over your data means giving you legal cover to sell it, by clicking “OK” to a one-sided contract you’ll never read. The problem is not ownership, but control. In today’s algorithm-driven world, sharing and aggregating data increases its value, producing better models and better predictions. The trouble is that once we share, we lose control to centralized data hogs.
What we need is a technology that allows for sharing without giving up control. Fortunately, it exists. It is called blockchain. Blockchain technology is, fundamentally, a revolution in trust. In the past, trust required ceding control to counter parties, government authorities or intermediaries who occupied the essential validating roles in transaction networks. Blockchain allows participants to trust the results they see without necessarily trusting any actor to verify them. That’s why major global firms in health care, finance, transportation, international trade and other fields are actively developing cross-organizational platforms based on blockchain and related technologies. No database can provide a trusted view of information across an entire transactional network without empowering a central intermediary. Blockchain can.
Adopting any new platform at scale, along with the necessary software integration and process changes, takes time – especially when the technology is so immature. But today’s incremental deployments will serve as proofs-of-concept for the more radical innovations to come. Chinese blockchain networks are already managing tens of billions of dollars of trade finance transactions. Pharmaceutical companies are tracking drugs from manufacturing to pharmacies using the MediLedger platform. Boeing is selling a billion dollars of airline parts on Honeywell’s blockchain-based marketplace. Car insurance companies are processing accident claims in a unified environment for the first time. These and other enterprise consortia are doing the essential technical and operational groundwork to handle valuable transactions at scale.
The need for transformative approaches to data will become acute in the next five years. Every week, it seems, another outrage comes to light. For instance, users who posted photos under Creative Commons licenses or default-public settings were shocked they were sucked into databases used to train facial-recognition systems. Some were even used in China’s horrific campaign against Uighur Muslims. Clearview AI, an unknown startup, scraped three billion social media images for a face identification tool it provided, with no oversight, to law enforcement, corporations and wealthy individuals. The examples will only get worse as firms and nations learn new ways to exploit data. The core problem is there is no way to share information while retaining control over how it gets used.
Blockchain offers a solution. It will be widely adopted because, behind the scenes, the current data economy is reaching its breaking point. Outrage over abuses is building throughout the world. The immensely valuable online advertising economy attracts so much fraud that the accuracy of its numbers is coming into question. Communities are looking for new ways to collaborate. Governments are realizing the current system is an impediment to effective service delivery.
The technologist Bill Joy famously stated that no matter how many geniuses a company employs, most smart people work somewhere else. The same is true of data. Even giants such as Google, Facebook and Chinese government agencies need to obtain information from elsewhere in their quest for perfect real-time models of every individual. These arrangements work mostly through contracts and interfaces that ease the flow of data between organisations. As Facebook discovered when Cambridge Analytica extracted massive quantities of user data for voter targeting, these connection points are also vulnerabilities. As tighter limits are placed on data-sharing, even the big players will look for ways to rebuild trust.
The blockchain alternative will begin innocuously. Government authorities at the subnational level are deploying self-sovereign identity to pull together information securely across disparate data stores. This technology allows anyone to share private information in a fine-grained way while still retaining control. You shouldn’t have to reveal your address to confirm your age, or your full tax return to verify your stated income. The necessary cryptography doesn’t require a blockchain, but the desired trust relationships do.
Once people have identities that belong to them, not to banks or social media services, they will use them as the basis for other interactions. Imagine a world where you never need to give a third-party unnecessary data to log into a website, apply for a job, refinance a mortgage or link your bank account to a mobile payment app. Where you can keep your personal and professional profiles completely separate if you choose. Where you can be confident in the reputation of a car mechanic or an Airbnb or a product made in China without intermediaries warping ratings for their own gain. The convenience of user experiences we enjoy within the walled gardens of digital platforms will become the norm across the vastness of independent services.
We will gradually come to view access to our personal information as an episodic, focused interaction, rather than fatalistically accepting an open season based on preliminary formal consent. Major hardware companies such as Apple, which don’t depend on targeted advertising, will build decentralized identity capabilities into their devices. They will add cryptocurrency wallets linked behind the scenes to existing payment and messaging applications. Stablecoins – cryptocurrencies pegged to the dollar, pound or other assets – will help tame volatility and facilitate movement between tokens and traditional currencies. Privately created stablecoins will coexist with central bank digital currencies, which are under development in most major countries throughout the world.
Once this baseline infrastructure is widely available, the real changes will start to occur. DAOs will begin to attract assets as efficient ways for communities to achieve their goals. These entities won’t replace state-backed legal systems; they will operate within them. As numerous controversies, crashes and hacks have already demonstrated, software code is too rigid for the range of situations in the real world, absent backstops for human dispute resolution. Fortunately, there are solutions under development to connect legal and digital entities, such as OpenLaw’s Limited Liability Autonomous Organisations and Mattereum’s Asset Passports.
Today, the legal machinery of contracts strengthens the power of centralized platforms. User agreements and privacy policies enforce their control over data and limit individuals’ power to challenge it. Blockchain-based systems will flip that relationship, with the legal system deployed to protect technology-backed user empowerment. Large aggregations of information will be structured formally as “data trusts” that exercise independent stewardship over assets. They will operate as DAOs, with smart contracts defining the terms of data usage. Users will benefit from sharing while retaining the ability to opt out.
"DATA WILL BE TREATED NOT AS PROPERTY BUT AS A RENEWABLE RESOURCE, WITH THE COMPETITION FOR ECONOMIC VALUE IN THE APPLICATIONS BUILT ON TOP OF IT."
Many significant applications require aggregation of data to drive algorithms, including traffic monitoring (and eventually autonomous vehicles); insurance and lending products serving previously excluded or overcharged customer groups; diagnosis and drug dosing in health care; and demand forecasting for economic modeling. Collective action problems can prevent constructive developments even when rights in data are well defined. DAOs will gradually find market opportunities, from patronage of independent artists to mortgage securitization.
The big data aggregators won’t go away. They will participate in the decentralized data economy because it provides benefits for them as well, cutting down on fraud and reinforcing user trust, which is in increasingly scarce supply. Over time, those who provide benefits of personalization and targeting will more and more be expected to pay for it. A wide range of brokering and filtering providers will offer users a choice of analytics, some embedded in applications or devices and some providing services virtually in the cloud. Governments will focus on making data available and defining policy objectives for services that take advantage of the flow of information. Data will be treated not as property but as a renewable resource, with the competition for economic value in the applications built on top of it.
The most powerful benefit of open data built on blockchain-based decentralised control is that it will allow for new applications we can’t yet envision. If startups can take advantage of the power of data aggregation that today is limited to large incumbents, they are bound to build innovations those incumbents miss.
The surveillance economy took hold because few appreciated what was happening with their data until it was too late. And the cold reality is that few will accept significantly worse functionality or user experience in return for better privacy. That is why the blockchain-powered revolution will make its way up from infrastructural foundations of digital identity and hardware, rather than down from novel user-facing applications.
This vision is far from certain to be realized. Business decisions and government policies could make blockchain-based data decentralization more or less likely. The greatest reason for optimism is that the problem blockchain addresses – gaining trust without giving up control – is becoming ever more critical. The world runs on trust. Blockchain offers hope for recasting trust in the networked digital era.
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

PDQ Deploy packs v71.0.0 (2020-06-12)

Background

This is v71.0.0 (v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.009.20063
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.387 (Chrome)
  • Adobe Flash Player v32.0.0.387 (Firefox)
  • Adobe Flash Player v32.0.0.387 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.48.1
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v83.0.4103.97
  • Google Chrome Enterprise v83.0.4103.97 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 241
  • Java Development Kit 8 Update 241 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 241
  • Java Runtime 8 update 241 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v6.4.4
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v77.0.1
  • Mozilla Firefox v77.0.1 (x86)
  • Mozilla Firefox ESR v68.9.0
  • Mozilla Firefox ESR v68.9.0 (x86)
  • Mozilla Thunderbird v68.9.0 (x86) (customized; read notes)
  • Notepad++ v7.8.7 (x86)
  • Pale Moon v28.10.0
  • Pale Moon v28.10.0 (x86)
  • Spark v2.8.3 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.10 -- ! NOTE: Switched to x64 only (dropped x86 package)
  • WinSCP v5.17.6 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force recycle bin to empty for every user on target)
  • Enable Remote Desktop (enables Remote Desktop on the target machine)
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to sysadmin [link] [comments]

One Million South Koreans Now Have Blockchain Drivers Licenses

Link to Cointelegraph article: https://cointelegraph.com/news/one-million-south-koreans-now-have-blockchain-drivers-licenses
The program was only launched in May but already one million South Koreans have opted for a blockchain based license.
One million South Koreans have foregone their physical drivers license in favour of a blockchain-powered digital alternative used in conjunction with the PASS smartphone app.
This represents more than 3% of the entire driving population in South Korea, which sat at 32.6 million licensed drivers in 2019 according to Statista. This is the first authorized digital identification card to be used throughout South Korea and received approval by the nation’s Ministry of Science and ICT in September 2019.
The project was launched in May by the National Police Agency in partnership with the Korea Road Traffic Authority, and the country’s three major telecommunication providers: SK, KT and LG U+. By last month, 27 of South Korea’s driver’s license testing centres were using the PASS app to renew and reissue digital drivers licenses.
The legally recognised ID solution can also be used for identification and proof-of-age requirements, such as at convenience stores and retail chains selling cigarettes and alcohol. Users show their licence via a barcode or QR code on the app. Non-Korean residents receiving English versions of the licenses.
Other industries, including rental car and shared rides services, are also researching the ability to use these IDs as a replacement for face-to-face verification checks.

South Korea is pro blockchain

This week alone has seen South Korea announce multiple integrations of blockchain technology. Seongnam’s payment program will be expanded by issuing new digital gift certificates while beachgoers in Busan will be able to pay for services with Bitcoin (BTC) and Ethereum (ETH).
One of South Korea’s biggest banks KEB Hana Bank has partnered with the Korea Expressway Corporation to implement a blockchain-based toll system for the country’s highways.

Australia’s blockchain-based licenses

South Korea isn’t the only country to look at transitioning existing licenses to digital formats on blockchain. In late 2018, Australia’s NSW government announced the trial of Ethereum-based digital licenses which can replace physical ones.
submitted by BlockDotCo to u/BlockDotCo [link] [comments]

TIFU by having my laptop used for bitcoin mining

FU is still in progress and I have no way of knowing when it started, which may be what is stressing me out the most right now. So come with me on a journey of regret while my fourth malware scanner of the night sits at 64% and my friends have gone to bed.
So the story, I guess, would begin back when I first started university, about five years ago. I got into art school for visual communication and planned on becoming an animator. To celebrate and to support me, my dad bought me a kick ass lenovo gaming laptop with the power of a billion suns (as you may come to guess, I am not tech savvy. Definitely not tech savvy enough to own this laptop) capable of running several adobe programs at once, with a RAM wide enough to put my mother's behind to shame, with an internal disk memory as big as the disappointment in my father's eyes. College begins, websites for illicit procuration of expensive programs exist, my naive young sunshine self doesn't even know what a VPN is, and for some reason which is is causing me an enormous amount of self-hatred right now, owning a top of the range gaming laptop with amazing everything doesn't seem like a good enough reason for me to pay for an antivirus, so I go with the free software, the ffp1 option, the least-amount-of-having-to-think-about-it choice, because I would totally NOT regret that later, perhaps five years later, at 3 AM - ironically while trying to animate for the first time ever.
I continue my happy little life with my absolute beast of a laptop but shit happens and I never actually go into animation, I go into printmaking, which is the most analog of art forms possibly ever, so between having a huge amount of studio work, thesis research and just life stuff, my laptop spends the prime of his life as a glorified facebook machine, a particularly large and lovely screen to watch parks and rec on perhaps. Or so I think...
Now I may have noticed performance issues at various points, in fact now that I think about it I moved away from using photoshop a long time ago, and when I think about it further I even got a new wacom tablet last winter, because of the unbearable lag... the shame covers me like a wet blanket. What a fucking idiot. No refrigerator-buzz noises, wheezing fans or uncomfortably hot undersides were enough to make me go "hey, perhaps my free antivirus is a piece of rubbish, and it would be worth ten minutes of my time to run a slightly deeper scan than just the automatic stuff that I even only run when it gets absolutely forced on me". No. I had to just plow on, forgetting that my computer ever ran quietly at all, or that it once harnessed the power of a billion suns, that crashes and reboots and long waiting times are not supposed to happen.
Around October 2019 I got annoyed enough to look into how to even use a split drive computer for the first time, and I moved all my bulky user folders to a different drive, and patted myself on the shoulder real good for being such a computer wizard. Hell I even cleaned my registry!
But let's get to the point... amongst many minor technological issues for which my solution is to ignore until I forget, is the fact that my phones memory is full because i am constantly photographing everything with it, but for some reason my laptop stopped recognising my phone as a device. So I started poking around yesterday, and when I tried to update windows I got an error code saying that one or more updates failed. You know that scene in Spirited Away when San pulls on a tiny string in the side of the super stinky bath house guest and a huge stream of pollution comes roaring out? Yeah. Somewhere at the horizon of my mind the thought passed by that it was weird that I hadn't been getting push notifications about windows updates. I looked for my antivirus, and lo and behold, it is gone. I googled some stupid shit like "why has my antivirus disappeared ", get some stupid first-result answer, and leave it at that.
Today as I am following my first animation course online (well done me, yay) as I stare at the endless unjustified blue loading circle next to my cursor my idle mind wanders to my nonexistent antivirus, and i figure i should download a new one. So i do, and i run a scan, and it gives me a warning for one problematic file: Win64: Malware-Gen Trojan. Eek, I think, I have only an extremely vague notion of what that is but I'm sure it's no fun. So I find a lovely step by step guide with pictures made for idiots like me which walks me through the installation of a whole parade of malware scans, and the first one finds 22 malware files, of which 5 Trojans, PUMs to disable my firewall, security centre and antivirus, and 15 PUPs including stuff that apparently had to be manually installed by the user even though I've never seen it before, and one lovely shitty cherry on top, the bitcoin miner.
After removing all those I run the next scan, it comes up with loads of new issues. Then I download and run a third scanner, still more problematic files found. And finally one in a file location that gives me some indication as when this started happening: in year 1 of college when I very briefly dipped my toes into a bunch of fancy programs and then never opened them again for not having had the time or energy.
So there we have it folks, my beast processors have been mining bitcoin for someone for what may have been five years while I watched porn and browsed reddit, and now that i actually sat down to do what this laptop was bought to do, instead i am spending entire days ridding it of a wonderful garden of malware that someone has planted and tended. Karma, bitch. And the worst thing is that I will never know exactly what they did, if they were after more than my bitcoin potential, whether they have been accessing other stuff. Tomorrow I'm changing all my passwords and pins, growing a moustache, and moving to Florida. The morale of this story is: live up to the gifts you receive.
TL;DR: I was gifted a brand new gaming laptop to become an animator. I downloaded a bunch of programs, never used them, maintained nonexistent safety practices and was an unknowing bitcoin mine for possibly five years.
submitted by Procrasturbator2000 to tifu [link] [comments]

QUADRIGA 2.0 = COINBERRY?

TL;DR- A "Canadian" crypto exchange has been blowing off customers while their accounts and funds are frozen. Their company isn't trading in Canada, their PR hlooks grandiose but in fact isn't impressive at all, and they are now lying to customers about the reason for the delays.
FULL BREAKDOWN
Coinberry uses "trusted by the Canadian Government" as their main call-to-action and as leverage to gain your business due to their partnership with two municipalities (Richmond Hill and Innisfil township) Townships are NOT part of the Canadian Federal Government, they are municipalities. Municipalities are autonomous. The Canadian federal government and LOCAL government aren't the same thing, that is fraudulent representation.
The mayor of Innisfil has been known to accept gifts from companies trying to get in his favour. Only 5% of CANADIANS- not Innisfil residents, hold cryptocurrency. So, in a town of 36K people, where the majority of the population is 50+ in age, how many are likely to hold bitcoin? Coinberry is the only one benefiting from this; they get to say they've partnered with a township, and if anyone actually wanted to pay property tax in Bitcoin then they need to sign up with Coinberry.
The special information package tells Innisfil residents that "Coinberry has fully supportive, transparent and CDIC insured segregated banking in Canada (page 2/26) A quick Google search will tell you that's false - the CDIC does NOT cover digital currencies as of April 30th, 2020. The document linked stating this was made in 2019. How much did this mayor get paid to lie to his citizens?! I doubt he'd do it for free.
They leverage being PIPEDA compliant, yet all you need is a self assessment tool. It's based on opinion, yet it's their first selling point. It's a garbage selling point that gives false confidence to potential clients.
FINTRAC REGISTRY AND THEIR SHELL COMPANY IN MALTA
They claim to be the only FINTRAC registered company. Nope. A quick search of other crypto exchanges in the FINTRAC lookup proves that claim wrong: https://www10.fintrac-canafe.gc.ca/msb-esm/public/msb-search/search-by-name/
Their privacy policy mentions a parent company. Their parent company is listed on FINTRAC as CB INTERNATIONAL LIMITED, and is based in Malta. For those of you who aren't aware, Malta is well known for being the best place to set up shell companies in order to avoid taxes and protect CEOs from lawsuits after "their" money. This was NOT the case for Kraken, Newton or Shakepay. Only Coinberry feels they need a shell company in another country.
They have 4 companies listed, all Coinberry. All 4 listings show Coinberrys agent activities listed as money transferring, and 2 of them are listed as agents of CB INTERNATIONAL LIMITED (the parent company). This parent company is located in Malta and has listed its activities as foreign exchange and money transferring. This means all of the exchanges happening are actually happening in MALTA not Canada.
They seem to be the only exchange (with Canadian HQ) doing this: Kraken, Newton and Shakepay list their agent activities as foreign exchange dealing, and all are registered IN CANADA. This implies your money is also staying in Canada on their platforms.
Where there is smoke, there is fire.
edit: added a TL;DR, took out unnecessary sentences, cleaned up wording. I was pissed when I wrote this. I just want to see Coinberry suits come clean about the delays. Tell people why you can't get their money back as soon as you said you would, because this only making crypto even scarier for new adopters.
submitted by cosmicariel to Scams [link] [comments]

PDQ Deploy packs v71.0.0 (2020-06-12)

Background

This is v71.0.0 (v70.0.0, v69.0.0, etc...) of our PDQ installers and includes all installers from the previous package with old versions removed.
All packages:
  1. ...install silently and don't place desktop or quicklaunch shortcuts
  2. ...disable all auto-update, nag popup and stat-collection/telemetry "features" possible
  3. ...work with the free or paid version of PDQ Deploy but do not require it - each package can run standalone (e.g. from a thumb drive) or pushed with SCCM/GPO/etc if desired. PM me if you need assistance setting something like that up

Download

Primary:
Download the torrent.
Secondary: Download the self-extracting archive from one of the repos:
Mirror HTTPS HTTP Location Host
Official link link US-NY SGC-Hosting
#1 link link FR mxmod
Tertiary:
Plug one of these keys into Resilio Sync (formerly called "BT Sync") to pull down that repository:
- BTRSRPF7Y3VWFRBG64VUDGP7WIIVNTR4Q (Installer Packages, ~2.25 GB) - BMHHALGV7WLNSAPIPYDP5DU3NDNSM5XNC (WSUS Offline updates, ~12.00 GB) 
Make sure the settings for your Sync folder look like this (or this if you're on v1.3.x). Specifically you need to enable DHT.
Quaternary: (source code)
The Github page contains all scripts and wrapper files used in the pack. Check it out if you want to see the code without downloading the full binary pack, or just steal them for your own use. Note that downloading from Github directly won't work - you need either this provided pack or go manually fetch all the binaries yourself in order to just plug them in and start working.

Pack list

Installers:
(Updates in bold. All installers are 64-bit unless otherwise marked)
  • 7-Zip v19.00
  • 7-Zip v19.00 (x86)
  • Adobe Acrobat Reader DC v20.009.20063
  • Adobe AIR v32.0.0.125
  • Adobe Flash Player v32.0.0.387 (Chrome)
  • Adobe Flash Player v32.0.0.387 (Firefox)
  • Adobe Flash Player v32.0.0.387 (IE / ActiveX)
  • Apple iTunes v12.5.1.21
  • CDBurnerXP v4.5.8.7128
  • FileZilla Client v3.48.1
  • Gimp v2.10.20 (x86)
  • Google Chrome Enterprise v83.0.4103.97
  • Google Chrome Enterprise v83.0.4103.97 (x86)
  • Google Earth Pro v7.3.3
  • Java Development Kit 8 Update 241
  • Java Development Kit 8 Update 241 (x86)
  • Java Development Kit 11.0.7
  • Java Runtime 8 update 241
  • Java Runtime 8 update 241 (x86)
  • Java Runtime 10.0.2
  • KTS KypM Telnet/SSH Server v1.19c (x86)
  • LibreOffice v6.4.4
  • Microsoft .NET Framework v3.5.1 SP1 (x86)
  • Microsoft Silverlight v5.1.50918.0
  • Mozilla Firefox v77.0.1
  • Mozilla Firefox v77.0.1 (x86)
  • Mozilla Firefox ESR v68.9.0
  • Mozilla Firefox ESR v68.9.0 (x86)
  • Mozilla Thunderbird v68.9.0 (x86) (customized; read notes)
  • Notepad++ v7.8.7 (x86)
  • Pale Moon v28.10.0
  • Pale Moon v28.10.0 (x86)
  • Spark v2.8.3 (x86)
  • TightVNC v2.8.27
  • TightVNC v2.8.27 (x86)
  • UltraVNC v1.2.4.0 (x86)
  • VLC media player v3.0.10 -- ! NOTE: Switched to x64 only (dropped x86 package)
  • WinSCP v5.17.6 (x86)
Utilities:
  • Clean Up ALL Printers (purge all printers from target)
  • Clean Up Orphaned Printers (remove non-existent printers from the spooler)
  • Empty All Recycle Bins (force all recycle bins to empty on target)
  • Enable Remote Desktop
  • Install PKI Certificates
  • Reboot (force target reboot in 15 seconds)
  • Remove Adobe Flash Player (removes all versions)
  • Remove Java Runtime (removes JRE versions 3-11 using all means necessary)
  • Remove Microsoft Silverlight (removes all versions of Silverlight)
  • Temp File Cleanup
  • USB Device Cleanup. Uninstalls non-present USB hubs, USB storage devices and their storage volumes, Disks, CD-ROM's, Floppies, WPD devices and deletes their registry items. Devices will re-initialize at next connection

Instructions

  1. Import all .XML files from the \job files directory into PDQ deploy (it should look roughly like this after you've imported them).
  2. Copy all files from the \repository directory to wherever your repository is.
  3. All jobs reference PDQ's $(Repository) variable, so make sure it's set in preferences.

Package Notes

  1. Read the notes in the PDQ interface for each package, they explain exactly what that installer does. Basically, most packages use a .bat file to accomplish multi-step installs with the free version of PDQ. You can edit the batch files to see what they do; most just delete "All Users" desktop shortcuts and things like that. changelog-v##-updated-.txt has version and release history in addition to random notes where I complain about things like Reader DC and how much of a pain it is to build packages for.
  2. Thunderbird:
    • Thunderbird is configured to use a global config file stored on a network share. This allows for settings changes en masse. By default it's set to check for config updates every 120 minutes.
    • You can change the config location, update frequency, OR disable this behavior entirely by editing thunderbird-custom-settings.js.
    • A copy of the config file is in the Thunderbird directory and is called thunderbird-global-settings.js
    • If you don't want any customizations, just edit Thunderbird's .bat file and comment out or delete all the lines mentioning the custom config files.
  3. Microsoft Offline Updates - built using the excellent WSUS Offline tool. Please donate to them if you can, their team does excellent work.

Integrity

In the folder \integrity verification the file checksums.txt is signed with my PGP key (0x07d1490f82a211a2, pubkey included). You can use this to verify package integrity.
If you find a bug or glitch, PM me or post it here. Advice and comments are welcome and appreciated.

Donations

These packs will always be free and open-source. If you feel like giving away your hard-earned cash to random strangers on the internet you may do so here:
Patreon
Bitcoin: 1Bfxpo1WqTGwRXZKrwYZV2zvJ4ggyj9GE1
Monero (preferred):
46ZUK4VDLLz3zapDw62UaS71ZfFBjH9uwhc8FeyocPhUHHsuxj5zfvpZpZcZFHWpxoXD99MVt6PnR9QfftXDV8s6CFAnPSo
"Do not withhold good from those to whom it is due, when it is in your power to act."
submitted by vocatus to pdq [link] [comments]

Nhom VBC CHROMIA AMA TRANSCRIPT (15/05/2020)

Thai Nhat Minh | Stably:
First of all, can you have a brief introduction about yourself as well as about Chromia? Henrik_hjelte, Sergelubkin
Henrik Hjelte:
Hello. My name is Henrik Hjelte. I am Co-Founder and CEO of Chromia.
I have more than 30 years of experience in programming and a degree in Economics from Uppsala University.
BTW economics and computers = blockchain, so finally found a job that fits me.
I was introduced to the blockchain by the leader of the colored-coins project Alex Mizrahi in 2013
Colored coins project was a very influential thing
It was the first way for user created tokens
bolted on to the only blockchain at the time (almost) bitcoin
We started ChromaWay 2014, with Or Perelman too, to explore if the world was interested in “tokens” and those kind of applications
We worked with enterprise blockchain for some time, but now we are focused on Chromia, a new public platform for mainstream decentralized applications using relational blockchain technology.
Ok, maybe I should tell something about Chromia and not myself too.
Chromia is a better blockchain for building decentralized Apps.
better because it follows the “normal worlds” way of managing data.
A little history: I found a text/description to paste:
Chromia is a brainchild of ChromaWay. ChromaWay has a long record of delivering pioneering projects around the world. We issued Euros on the Bitcoin blockchain with LHV bank, allowed investors to invest in startups in a wholly decentralized way with Funderbeam, digitized the title transfer process with the Swedish land registry, and mediated the green bond market. ChromaWay’s core team created the world’s first protocol to issue tokens already in 2012, when blockchain was called “bitcoin 2.0”. Then ChromaWay introduced the relational model to enterprise blockchains with a consortium database called Postchain. Now Postchain is going public as the foundation for Chromia, a better blockchain for building decentralised Apps.
Chromia is a new public blockchain based on the idea of integrating traditional databases, Relational databases with blockchain security. Chromia is a general purpose blockchain with full smart contract capabilities, just that it is a lot easier to code, even complex applications. You code with an easy to learn new programming language that combines the power of SQL and normal languages but makes it secure in a blockchain context. Up to 1/10 the code-lines vs other blockchains.
If you don’t believe me, check this blog (later, stay in the chat):
https://blog.chromia.com/reasons-for-rell-compactness/
The aim of Chromia is to combine relational databases, which exist in every kind of organization, with blockchains. We want to provide a platform for our users to develop totally decentralized apps securely. Our goal is for Chromia to be seen as the number one infrastructure for decentralized applications.
Think about it: blockchain is about managing data (in a shared context).
And… What do we use to manage data? A Database!
Serge:
Sure! My name is Serge! And I work in Chromia marketing department. Also, I help coordinate various projects inside the company
My background is in Economics and Marketing
Thai Nhat Minh | Stably:
Question 1️⃣
DApp is currently mainly concentrated in the field of games, and its life cycle is basically short, just like the Crypto Kitty is only hot for a while, how to dig the application of DApp in more fields and how to improve the utilization rate of DApp? u/henrik_hjelte u/sergelubkin
Serge:
Good one, let me answer
Gaming is quite a challenging target because good UX is expected, it needs to be fast, responsive, etc. If we can do that, then we can also do all sorts of other stuff.
Also, it lets us experiment with things without a lot of hassle, it’s easier to get users, and so on. It’s also a growing niche within blockchain. You can check our latest game, Mines of Dalarnia https://www.minesofdalarnia.com
We also have Enterprise projects already, for example Green Assets Wallet https://greenassetswallet.org/about that already launched on the first Mainnet version called Bootstrap Net,we also have https://capchap.se built on our tech, more projects like non-profit review platform Impactoria, public land registries, medical projects and so on
Also don’t forget about our fully decentralized social network/forum that is live already on the testnet https://testnet.chromunity.com.
Thai Nhat Minh | Stably:
Question 2️⃣
How will dapp face the world change after the epidemic? u/henrik_hjelte u/sergelubkin
Henrik Hjelte:
Nobody can say for sure, but maybe people will tend to be online more than offline, so demand on online products and dapps as well will increase.
I just came in from an internal demo of a secret project we do, and it can be seen as a way to hang out online (a bit cryptic answer)
There are also interesting use cases of dapps in the medical field.
For example, we participated in the world-wide hackathon Hack for Sweden. Where our submission was to create an app on Chromia blockchain that increases the coordination between countries and hospitals especially during the hard time and COVID19.
Chromia wants to help the European Union (and the world, but we saw problems in the EU…) and its citizens to provide transparency over the necessary medical and protective devices and appliances of which we see shortage during this emergency crisis.
You can watch our promo here https://twitter.com/chromaway/status/1247557274337447938?s=20.
For me it was a fun Hackathon too because for once I got the opportunity to code… I told everyone else I will not do any bossing…
We try to continue this path on medical applications a bit.
Thai Nhat Minh | Stably:
Question 3️⃣
DApps are still not directly embedded in mobile phones like Apps at this moment, and DApps have also been flooded with bet content. How can guests increase the use of DApps and lower the threshold for using DApps? u/henrik_hjelte u/sergelubkin
Serge:
The answer is — better User Experience. We believe that in order for a DApp to be usable and become more widely accepted it has to feel like a normal App. A DApp needs to have quick transactions, scale well & shouldn’t require users to pay for each transaction. This is something that is possible now with using Chromia. It’s an extremely exciting time since we are going to see a new generation of DApps.
On top of that, we think that we might have an ace coming up. We have built a game to demonstrate the powers and possibilities of Chromia. A little bit about the game: In Mines of Dalarnia (https://www.minesofdalarnia.com), players get to explore the vast expanses of interplanetary treasure mines. With an innovative Dalarnia Token system, players can purchase virtual mining plots, and put them up for rent into the community, allowing for real-estate tycoons to earn more Tokens. Mining plots can also undergo their own upgrades, making them more lucrative to explore, as well as a hot property for rental by miners. The game takes advantage of these NFT-based tokens to securely track exchanges, and provide a sense of ownership and wealth to players as they grow their mining and resource empire.
Watch our trailer https://youtu.be/bDXKOp1Asqw and sign-up for the TestNet on the website!
Thai Nhat Minh | Stably:
Question 4️⃣
Many practitioners think that the main reason for restricting the development of DApp is “incomplete infrastructure”. How effective is the current “cross-chain” and “side-chain” solution? u/henrik_hjelte u/sergelubkin
Serge:
Our infrastructure resembles Alibaba Cloud, so a DApp developer just goes and deploys his DApp’s blockchain into it, it’s easy. Also our language Rell https://rell.chromia.com/en/maste is more robust than any other blockchain programming language.Or Azure or AWS
Rell combines the following features:
  1. Relational data modeling and queries similar to SQL. People familiar with SQL should feel at home once they learn the new syntax.
  2. Normal programming constructs: variables, loops, functions, collections, etc.
  3. Constructs which specifically target application backends and, in particular, blockchain-style programming including request routing, authorization, etc.
Rell aims to make programming as convenient and simple as possible. It minimizes boilerplate and repetition. At the same time, as a static type system it can detect and prevent many kinds of defects prior to run-time.
Maybe Henrik wants to add something. :)
Henrik Hjelte:
Yes, I can add some thing
Consider again the real /normal world. What made the apps you use every day? Behind the bank app is a relational database. Web 1.0, “shopping on the internet” was a relational database hooked up to a webpage.
web 2.0: Thefacebook was PhP and MySQL hack
again, a relational database.
So, we aim to make it just as easy to do decentralized apps as normal apps.
Also “the cloud” inspiration is more normal. In Chromia, the dapp developer pays for hosting the application (normally). Not the USERS.
No gas,this is a big usability improvement.
Thai Nhat Minh | Stably:
Question 5️⃣
There are many DApp development platforms on the market. What are the competitive advantages of Chromia? It can be explained in terms of development cost and ease of use that everyone is more concerned about. u/henrik_hjelte u/sergelubkin
Henrik Hjelte:
This what I’m talking about. I think “Ease of use” combined with “Power” is our biggest strength.
Easiness is our core feature thanks to the relational database aspect of our system. Relational databases are run by 85% of the enterprise market at the moment.
And used in 100% of all organizations.
The largest vendor on that market Oracle, has a bigger market cap than bitcoin,
So, this makes it easy for enterprises to integrate our tech stack to their normal systems without the need to redo them, like in most cases where blockchain pilots have failed.
That’s partially why we had success with enterprise customer which are live in the Chromia network.
And: there is a large set of features that relational databases have that alternatives (noSQL) do not have or do not do as well.
And blockchain is very primitive compared to that.
Data indepence, mathematical foundations etc. Large books have been written about it…
On Chromiam It’s very easy for developers to deploy DApps because they already know SQL-style programming. Keep in mind that we worked with customers and developers to build our tech stack while solving problems for them. We didn’t build something unneeded, we had proof of validation from the market.
SQL is top 3rd language in the world (after HTML and javascript).
source: stackoverflow survey 2019, among 90 000 developers…
Top 4 used databases: different flavors of SQL (relational databases)
So, they are used for a reason: Ease of use/programming, power etc.
Also, Rell is our language, is statically typed (means bugs are discovered when programs are written rather than we they run). It is also more compact, up to 1/7 of the code lines of SQL. And have “normal” programming constructs + blockchain programming built in.
Because we require both relational database properties and more security than SQL, currently Rell is the only choice. It is really easy to learn, please go check https://rell.chromia.com/en/maste.
Chromia also provides news to the database developer community….
millions of developers in potential.
OK, bear this in mind when you wonder how we can compete with blockchain X… Blockchain X is a fart in the ocean compare to the SQL world 😊
Bach Tuyet
You have organized many AMA sessions to the international community in general and Vietnam in particular. What do you most want to get after AMA sessions from the community? u/henrik_hjelte
Sergey
I’ll take this one:) our goal is to grow the community
  1. We want people to join our channels such as telegram, twitter, email also our decentralized forum https://testnet.chromunity.com and participate in discussions
  2. We want people to try our dapps such as Mines of Dalarnia
  3. We want to get feedback and understand the most important issues people care about Chromia and the blockchain industry in general
  4. We want to get more developers building on top of Chromia
LBTS:
What was your motivation for creating RELL and not use other languages? What benefits? Why name it RELL also?
Henrik Hjelte:
We have a private/federated relational blockchain called Postchain, and it allows SQL. But that can work in a small environment when you know all parties, and if you are really careful in checking code. But not for a more secure, distributed on the web setup, so we had to make it more secure (Deterministic, statically typed).
In the process, we also took the opportunity to make it cool and nice.
Also: it is simply not possibly to use evm, jvm, or web assembly. We need/want a database in the bottom. Postgresql is our virtual machine. You do not reimplement that…. 10+ years codebase….
Lee:
Being part of the gamer community, I would like to know what you would think about collaborating with a MOBA, RPG or Arcade game or some kind of project?
Henrik Hjelte:
We are already collaborating with some smaller studios. For bigger fish, we want to show them what is completely unique and visionary with Chromia, and we think we need various examples. So, first arcade game MoD (linked above) is one example, it is not the full potential or anything but a start. In this summer, krystopia 2 a puzzle game from Antler Interactive will be released.
What is even cooler is the “demo project” we do together with them, where we will show how a mutliplayer game with real blockchain features will work.
I just saw it an hour ago and was blown away
OH, and there is another studio releasing something very cool. Full logic on chain strategy game. Chain of Alliance.
oyibo pepper:
Do you encourage HACKATHON programs for intending Developers to test their skills and build on RELL
Can you explain more about CHROMIA AMBASSADORS PROGRAM, CAN I BECOME AN AMBASSADOR
Serge:
Yes, you can, but you will need to change your avatar 🤣
Seriously, we are growing our Chromians community if you want to become one please ping our admins in Chromia telegram group.
Also, we are planning virtual hackathons soon, please subscribe to stay updated
Infinite Crypto:
Since the Chromia project is currently working on the Ethereum blockchain ERC20 standard!
But we know that there are a lot of scalability issues with Ethereum, so why would you choose the Ethereum blockchain over other scalable blockchains? Do you have any plans for Mainnet launch of Chromia?
Henrik Hjelte:
ETH is just used in a pre-phase for tokens. We will have our own mainnet tokens interchangable with ETH.
Oyinbo pepper
What’s CHROMIA SSO and SDK, how can I get started
Henrik Hjelte
Both are 3 letters. That is what they have in common.
SDK = software development kit, check docs on https://rell.chromia.com
SSO = single sign on. A unique UX improvement. You approve an app in your wallet (vault) with super ease. no need to remember codes
sso: https://blog.chromia.com/chromia-sso-the-whys-and-the-whats/
We have a fundamentally different model from bitcoin and ethereum and the likes. The blockchain is not run by anonymous computers in basement and student dorms across the world. We have more of known identities, so 51% attacks is protected not by PoW/PoS but other consensus. Please see our whitepaper. Note that we are not noobs when it comes to this, our CTO Alex has published papers in academic journals on consensus etc. from 2013, and done several important ideas for blockchain. Sidechains we think he was first with, tokens too.
Sheron Fernando:
Is there any plan to makes partnership with local cryptocurrency developers from each country to make $CHR usage more worldwide?
Serge:
Yes, we are looking for cooperation with more external developers. Send me a message if you are interested in developing something on Chromia.
Stella:
What are the underlying problems in the Dapps today that can be solved with the Chromia protocol?
Serge:
  1. Scalability — on Chromia your dapp can have unlimited numbers of users thanks to parallel scaling
  2. Easiness of use — you don’t need external wallets, no need to buy crypto to pay for gas etc
  3. Cost — in general to deploy the dapp and to use the dapp
Marcel Lagacé:
Why build this platform? What is Chromia mission? What are the most prominent features of the platform? Can you clarify the use case for this feature?
Henrik Hjelte:
We build the platform to fix the problems with blockchains, that we ourselves have experienced since 2014 (before ethereum existed).
LBTS:
Can you tell us about Chromia developers? How motivated and experienced are they to always deliver the best products?
Henrik Hjelte:
I can tell you that we recruit developers that are really good, from all parts of the world. Vietnam has been a hub because we found many good, so in Ukraine.
How can we say “we have so good developers”? First one thing that is a bit different is that we are pretty experienced in leadership team of development. I do not code much anymore since I’m a CEO. But I do have now over 30 years of experience. Got published and was payed when I was 15. First full-time professional developer job at 18. Have released open-source projects used by 10: s of thousand developers.
And Alex, our CTO is Extremely good. That is why I recruited him to my old startup 2006 or so… So: we have experience to sort out good developers from bad.
Marcel Lagacé:
Does Chromia staking model is different from other staking platform??
What are the beneficial advantages of chromia staking system?
Serge:
The main difference is that we have independent Providers, entities that are not connected. These serious players are exchanges, data centres, professional staking companies. They provide a backbone of the ecosystem and host dapps. Like Amazon servers in the cloud. They cannot have stake bigger than the maximum thus they can’t control the network. This is probably the main difference with classic DPoS networks
Nguyen Duy Bao:
A lot of people will want to know what the strength of Chromia is but I want to know the weaknesses and problems Chromia faces ? How do you plan to solve it?
Henrik Hjelte:
A weakness I guess is weak compared to “competition”. And there are some blockchain projects that got crazy amount of funding. So how can we compete with that, when they can hire more developers for example? Well here is what experience comes into play: More developers does not always increase productivity a lot, it is diminishing returns. You can see many large projects, with 100 of developers fail miserably with no results.
And actually, sometimes true with marketing spend too. It is generally good with money, but if you are a bit clever you can compete also on marketing with less money than your competition.
Please follow Chromia on Social Media:
Website: https://www.chromia.com
Twitter: https://twitter.com/chromia
FaceBook: https://www.facebook.com/teamchromia
LinkedIn: https://www.linkedin.com/company/chromia
Telegram: https://t.me/hellochromia
Decentralized Social network Chromunity: https://testnet.chromunity.com
Free-to-Play Blockchain Game Mines of Dalarnia: https://www.minesofdalarnia.com
submitted by dam30 to Teamchromia [link] [comments]

Decentralized MLM Software Development Company

Decentralization is the process of distributing and dispersing power away from a central authority. Most financial and governmental systems, which are currently in existence, are centralized, meaning that there is a single highest authority in charge of managing them, such as a central bank or state apparatus. There are several crucial disadvantages to this approach, stemming from the fact that any central authority also plays the role of a single point of failure in the system: any malfunction at the top of the hierarchy, whether unintentional or deliberate, inevitably has a negative effect on the entire system. Bitcoin was designed as a decentralized alternative to government money and therefore doesn’t have any single point of failure, making it more resilient, efficient and democratic. Its underlying technology, the Blockchain, is what allows for this decentralization, as it offers every single user an opportunity to become one of the network’s many payment processors. Since Bitcoin’s appearance, many other cryptocurrencies, or altcoins, have appeared, and most of the times they also use the Blockchain in order to achieve some degree of decentralization.
📷
MLM Software with Ethereum Smart Contract : Decentralized MLM Software Development Company
Smart Contracts
A smart contract is a protocol that enforces the performance of a contract with adding the terms of the agreement into the code. Smart contracts are a great way to exclude any third party from the transaction and make transaction prices lower, as they need no validation. Smart contracts are implemented in a lot of cryptocurrencies to control the transfers of digital currency, establish a governance and a lot of other things. But smart contracts have a wider range of possible implementations. Smart contracts may be used in voting, management, machine-to-machine interactions in the internet-of-things, real estate and in the building of personal data storage with specific access policies, e.g., medical databases. Still, smart contracts are not perfect. They don’t exclude the possibility of bugs or fraud and have no way of changing post-factum, which may be necessary in some cases. The Smart Contract Process
Pre-defining the contract.Here the terms of engagement are established by all counterparties, e.g. currency to be used to make payments, the currency rates, and variable interest rate.The conditions for execution are also set; for example the time, date and even the variable interest rate at a given value.
Events — here events trigger the implementation of the contract.
The events can refer to; the information received and initiation of the transaction.
Execution and the transfer of value — here the terms of the contract will dictate the movement of value which is based on if the conditions have been met.
Settlement of the contact — this can happen in two ways;On-chain assets (digital)– in the case of virtual assets such as cryptocurrency, the accounts are automatically settled.Off-chain assets (physical) — for assets like stocks and fiat, the changes to accounts on the ledger will match the off-chain settlement instructions.
📷
MLM Software in Smart contract Ethereum DApp
Benefits Of Smart Contracts
  1. Transparency
Smart contracts allow for the terms and conditions of these contracts to be fully accessible and visible to all the relevant parties. Once the agreement has been established, there is no way to dispute it.
  1. Accuracy
One of the main requirements of smart contracts is the need to record all the terms and conditions in precise details. The element is necessary since an omission can result in transaction errors. So, automated contracts try to avoid the pitfalls that are associated with manually filling out heaps of forms.
  1. Security
Smart contracts employ the highest level of data encryption that is currently available, the same as what is used by cryptocurrencies. By doing this, their level of protection is among the best and the most secure on the world wide web.
  1. Speed
Smart contracts live on the internet and run on software code. As a result, they can execute transactions very fast. This speed can save many hours when compared to traditional business processes.
  1. Efficiency
This is the byproduct of accuracy and speed. The great thing is that higher efficiencies lead to more value-generating transactions that are processed per unit of time.
  1. Clear Communication
When setting up smart contracts, there is a need to detail everything accurately. This means there is no room for miscommunication or misinterpretation. Therefore, they can cut down on efficiency that is lost to gaps in communication.
  1. Storage and Backup
Smart contracts are used to record vital details of each transaction. Therefore, wherever an individual’s details are used in a contract, they are permanently stored for future reference. So, in case there is data loss then these attributes can be easily retrieved.
  1. Trust
The good thing about smart contacts is that they inspire absolute confidence in their execution. The secure, autonomous and transparent nature of these agreements takes away the possibility of bias, manipulation or error.
  1. Guaranteed Outcomes
This is another attractive feature of automated contracts. They have the potential to significantly reduce or even eliminate the need for litigation and going to courts. By employing self-executing contracts, these parties commit themselves to operate by the rules of the underlying code.
  1. Savings
One of the primary benefits of a smart contract is that they eliminate the need for having a vast chain of middlemen. This means there is no need for lawyers, banks, witnesses and any other intermediaries.
Types of Smart Contracts
Smart contracts have the potential to disrupt many industries including the banking sector, insurance, telecommunication, art world, music and film, education and many more. They range from simple to complex.
An example of simple contracts includes time-stamping services like ascribe for art registry — also, governmental and semi-governmental records for land titles, birth certificates, school, and university degrees.
However, many regulatory aspects are made up of complex contracts. A good example is the Decentralized Autonomous Organization which represents the most complex form of smart contracts.
MLM Software With Smart Contract The Ethereum integrated Crypto MLM software is most preferred due to the following reasons: ·Highly secured data storage
·Reliable and trustworthy
·Decentralized with clear transparency
·Risk free, unhackable, immutable smart contract
·Peer to Peer automated transactions etc
📷
MLM Software with Ethereum Smart Contract : Decentralized MLM Software Development Company
Start a smart contract based MLM Website with the support of a leading Cryptocurrency MLM software development company
who provides all types of MLM business script with advanced and effective smart contract development solutions. As it have many advantages like devoid of fraudulent activities, east tracking, multiple payment options, less risk and low cost, huge ROI, there arise many MLM businesses to compete with. You can customize your own MLM system by choosing any of your desired MLM Clone Scripts. Herewith, the top smart contract MLM Clone Scripts and also you can develop your own MLM clone app based on your business requirements. ØMillion Money Clone Script
Forsage Clone Script
Etrix.io MLM Clone Script
Doubleway MLM Clone Script
Ethereums Cash MLM Clone Script
XOXO Smart Contract MLM Clone
Tags :
#MLM Software with Smart Contracts #Smart Contract MLM Software #Ethereum MLM Software #Decentralized MLM Software #MLM with Ethereum Smart contract #forsage clone #Million Money Software Clone #Smart contract developers Malaysia #Top MLM Software Malaysia
Contact : Fatin / Linges +60164998736 www.cryptosoftmalaysia.com
submitted by cryptosoftmalaysiakl to u/cryptosoftmalaysiakl [link] [comments]

Forgot My Bitcoin Wallet Password! - YouTube Earn Bitcoin instantly - Get bitcoin now 5BTC - Fast ... Cracked bitcoin adder With Key Injector earn free! Btc ... How To Trade Bitcoin Cryptocurrency for Beginners - YouTube Bitcoin Loophole Review BitcoinLoophole

Bitcoin-code.net ist Web-Browser-Hijacker-Virus, der milde Aktion auf Web-Browser und Windows-System verursacht. Es führt zu bösartigen Aktionen auf Windows-Systemen. Es wird als Suchmaschine verbreitet, die häufig und schnell sucht. In Wirklichkeit ist es ein nervender Virus, der die Leistung des Webbrowsers völlig verändert. Bitcoin-code.net lästige Bedrohung, die alle Web-Browser wie ... Überprüfen Sie, ob the-bitcoin-code.org ein Betrug Website oder eine sichere Website ist. Ermitteln Sie, ob the-bitcoin-code.org ist ein Betrug, betrügerische oder infiziert mit Malware, Phishing, Betrug und Spam, wenn Sie Aktivität haben Registry; If you already feel ready, visit the website and create an account with Bitcoin Code. This software will not ask you for too much information to start: it will be enough for you to enter ... The code associating accounts with transactions is clumsy and unreliable so we would like get rid of it. --- There is a rebased version of #7729 atop this PR at https:/ /github. com/ryanofsky/ bitcoin/ commits/ pr/label, see https:/ /github. com/bitcoin/ bitcoin/ pull/7729# issuecomment-338417139. The Bitcoin Cash Register app is completely open source. You are welcome to inspect and modify the source code as you wish, or even put in a pull request or drop us a line if you have a suggestion for an improvement. View iOS codebase on Github View Android codebase on Github

[index] [4767] [25679] [20592] [20470] [29557] [49060] [4133] [49874] [44594] [40978]

Forgot My Bitcoin Wallet Password! - YouTube

Get an additional $10 in Bitcoins from Coinbase when purchasing through my referral link http://fredyen.com/get/Bitcoins Here is a quick beginner's guide on ... Best profit Bitcoin site Immediately Get him on 5 Bitcoin now easy to use Withdrawal at the same time without waiting / It works in all countries of the worl... Automated and Bitcoin Loophole trading account registration manual Binary Options Trading App Software application Bot. Bitcoin Loophole Summary. In summary, there are some evident principles that ... SET UP YOUR COINBASE ACCOUNT: https://goo.gl/mWo1aM HOW TO EARN WITH CRYPTOCURRENCY: BEGINNER’S GUIDE https://goo.gl/nTDLgS ----- Today we’re talking about h... Register today to become a member of the fastest growing company in the history of the world, the announced goal is to own the No. 1 community globally opera...

#