Free Bitcoin & Forex Trading Signals - AtoZ Markets

Btc Price prediction and a free Bitcoin Signal indicator Download

Q: What is your prediction for Bitcoin price movements? The prediction is that bullish trend continues. The price is holding above the midpoint ($ 640) of the last rally and it is moving upward. There will be probably a correction before moving above the all time high at $1160, that correction could be a nice buying opportunity for who is looking for a good moment to buy.
See the green arrow for possible signal read more
What is this cool indicator you are always using to predict prices so accurately? Can I download it? Yes, that is called Bitcoin Signals indicator by Fapturbo2.0. You can download it for free here read more It works on Metatrader4. Green arrows = BUY, Red = Sell. Very easy and accurate predictions.
As usual we'll keep you informed about future updates and price moves! Your Bitcoin for free Team
submitted by Bit_coins to Bitcoin [link] [comments]

Trading, psychology, and the benefits of Trading Bots.

Trading, psychology, and the benefits of Trading Bots.

https://preview.redd.it/8lhgwekhbmv31.jpg?width=823&format=pjpg&auto=webp&s=35c417aa683b9fcdf37a126127c2e60c3ab405c2
Most beginners who open trading accounts on cryptocurrency exchanges and start independent trading, see only one goal — to earn as quickly as possible.
This is a big mistake. The fact is that trading on the stock exchange will only become truly profitable when it becomes a priority for the person who came to trading. As a rule, to combine trade with any other occupation and at the same time everywhere to succeed will not work.
Trading for a novice trader should be if not the main, then a very important and priority occupation. No need to wait for quick results.
Trading on the stock exchange — the same profession as a doctor, Builder or engineer. The only difference is that she can’t go to University. Just as one learns to be a Builder for five years, so it takes years to learn all the wisdom and secrets of the trade. Trading on the stock exchange is not a Stayer distance, it is a marathon. And the winner is the one who will find the courage to reach the end.
In addition, trade is very much changing a person, showing his qualities, which in everyday life he does not know. Over time, if a trader really wants to succeed in trading, he must completely rethink his life, change the system of values and look at many things, change himself.

Fear as a Component of Trading

The strongest emotion known to man is, of course, fear. What gives rise to the exchange’s fears? We can not predict the behavior of the market, and therefore fully control their money invested in its instruments. In addition to the unknown, when there is no understanding of how to safely get out of a predicament, we are afraid in advance of what traumatized us earlier. Because fear is so emotional, you need to surround yourself with the right facts to drive it away. We need to know for sure that our trading system should not generate more than three consecutive losing trades. Winners plan what to do if their trades fail.
So only a systematic approach will protect us from ourselves. That is why the investment rules written in the trading templates exist not only to communicate the best market opportunities but, more importantly, to protect us from our own internal “demons”.

Emotions in Trading

Seekers of strong emotions, adrenaline forget everything in pursuit of excitement. It follows that a novice investor, overtaken by the “adrenaline curse”, will trade at the slightest opportunity. Yet Dostoevsky, one of the most famous and avid players, said that for him the most acute feeling in life — to win money. The second most acute feeling is to lose them.
Paradoxically, few things give more pleasure than getting rid of the pain and torment of being in a losing trade. This creates a mental internal conflict. Awareness of losses brings “excitement” or a sense of exaltation, and our emotionality does not care what we pay for these experiences losses in the brokerage account. “Adrenaline curse” will drive us into the trade for thrills and extract them from there, regardless of the price.

Intuition on the Exchange

The mind of an intuitive investor tries to construct mental constructions of events. I will try to explain what mental construction is by the example of a chess player’s thinking. The grandmaster understands and remembers the position of each figure in terms of its mental constructions and relationships inherent in the arrangement of figures. The random arrangement of the figures does not fit into any of his mental constructs, and he cannot structure what he sees.
Market patterns on cryptocurrency charts compared to chess compositions include an excessive element of chaos so that they can be interpreted intuitively. Investors with intuition are able to achieve success with the help of” flair”, but this flair often leaves them. The intellect of the rational trader, on the contrary, is manifested in his ability to logically comprehend what is happening to him and to the reality around him and to make on this basis the simplest and most correct decision. Intuition is the ability of a person to penetrate into the essence of things not by reasoning or logical thinking, but by instantaneous, unconscious insight. This is the ability of a trader to “ see the market not with his mind but with his heart.” But, even with a highly developed intuition, you can not act on the market, using only it.This is the trap of intuitive trading — it is impossible to learn.

Fear of Taking Responsibility

What distinguishes successful traders from losers who lose money? First of all look at life. Most people are very passive.
If you ask people if they are happy with their lives, the answer is likely to be negative. On the question of who is to blame, I would say that the fault of the parents who have not given a good education, why now not get a good job; blame the employer who delays wages; blame the dollar, which is rising, then falling; to blame the President and the government who do not pay pensions, etc., In their troubles and problems most of the people blame anyone but themselves.
The same thing happens in the market because the exchange is a mirror of our life. Talk to the trader losing money, ask why he can’t make money in the market. He replied that the fault of the insiders, manipulators, blame the binary options broker too much Commission, to blame the neighbor who suggested the deal, which turned into a heavy loss. In other words, he himself would have been a millionaire long ago, but for a number of reasons, certainly beyond his control, until that happened.
If a person wants to achieve something-not just to lead a life, which are millions of ordinary people (every day to go to work, save five years for a car, twenty years for an apartment, etc.), and to live a full life, so that the financial issue went into the background, to work for fun, not for money, he needs to take responsibility for everything that happens in his life. A person needs to realize that the cause of everything that happens to him is himself.It is this view that allows you to succeed in life and in any business. And trade is no exception.
This is the way successful traders look at life. Once you realize that the cause of all your losses is yourself, and not some mythical manipulators, then the case will move forward.
*******************************************************************************************************
In the age of digital technologies, when artificial intelligence develops, computer technologies improve, mankind creates various tools to facilitate their own life and everyday life.
If we pay attention to trading, then this direction is actively developing, getting new and unique tools. Since any trader (beginner or experienced specialist) is subject to emotions and various psychological factors, there are tools such as trading bots.

Trading Bots/Robots

A trading robot (bot) is a program that has a certain algorithm. It buys or sells cryptocurrency assets, focusing on the situation in the market. The first trading robots appeared in 2012, and since then they have become more and more perfect. Currently, according to some estimates, 90% of short-term transactions are made either by bots or with their participation.
Bots are usually developed for specific trading platforms. Most cryptocurrency exchanges have an API, and they are generally positive about free auto trading within their platform.
In contrast to the positive attitude to exchange robots, exchanges often have a negative attitude to arbitration robots. On the rules of trade can be found in the official documentation of the exchange, and if there is no such information, the question can be asked directly to technical support.Some people wonder: is it possible to write your bot trader? This is not an easy option, which is suitable only for experienced programmers. After writing, bots are tested for a long time in the market, corrected numerous errors, corrected strategy.
A programmer can also write a bot based on someone else’s code. Some bots are open source, and anyone can find it on GitHub and modify it to fit their needs.
Buy a bot for trading cryptocurrency: there are inexpensive programs for trading (about $ 10), and the cost of more high-quality and complex exceeds more than $ 200 and even $ 1000. There is no maximum price limit for bots, top bots are written to order $ 1500 and more.
Users are usually offered a choice of several tariff plans for crypto bots, from economy to luxury. The inexpensive option includes the most basic trading algorithms, and the expensive one brings maximum profit and works on more complex algorithms. Arbitration bots are a more expensive exchange. Known cases when downloading the bot, people got on your computer virus-miner or virus-cipher, which encrypt all your personal files and demanded a ransom in bitcoin, usually in bitcoin. Naturally, after transferring the ransom to the specified wallet, no decryption of the files occurred.
Trading strategy of stock and arbitrage bots can be very simple, for example:- When the price of cryptocurrency decreases, you need to buy it.- If the price rises, it should be sold.- Or much more complicated. The algorithm can take into account historical data for the last time, indicators, navigate by signals. Quality bots analyze more than a hundred parameters when placing orders.
Some programs do not change the algorithm, and there are bots that can connect or configure additional parameters. This option is well suited for experienced traders who have their own preferences in the style of trading.
A standard bot can perform such actions:- To assess the market situation, to monitor the rate at a given period of time, to make a forecast. In manual trading, it can show signals to the trader.- Create buy or sell orders.- To report on the profit or loss received.
On the example of our IMBA-Exchange, we came to the conclusion that we also need to provide an opportunity for each trader to use bots so that they can be in a comfortable trading environment.
Our exchange specialists are developing their own bot for cryptocurrency trading, which will be an excellent and convenient addition to every trader who wants to eliminate the psychological factor and seeks to get stable earnings without losing personal time.
*******************************************************************************************************
IMBA-Exchange Metronix bot makes life easier for every investor.
For example, Ing. Michael Eder the CEO of IMBA-Exchange, who has 10 years of experience in trading and the last 3 years in cryptocurrency trading, has firmly decided for himself that in the current realities trading on the exchange simply needs bots:
Throughout the time that I have been trading, I can confidently say that today trading bots are necessary for all traders as the main tool. No matter how long you are in exchange trading, but the nature of the person is designed so that under the influence of psychological factors, market conditions, etc. You still make mistakes and, as a result, this leads to financial losses.Our Metronix Trading Bot will help to solve these problems and eliminate negative consequences. A bot is a tool; it has no feelings. He performs a specific task for a given program and performs it almost unmistakably. The task of the trader is to monitor the situation on the market and correctly, as well as at the right time to configure your bot.
Stay with us, in front of you will find many interesting and new.
Material developed by experts IMBA-Exchange
submitted by IMBA-Exchange to u/IMBA-Exchange [link] [comments]

Top 12 Cryptocurrencies Ranked by Risk-Adjusted Return

TL;DR: The Sharpe Ratio is an excellent tool to assess risk-adjusted return on an investment. 4 cryptocurrencies (Bitcoin, Dash, Monero, and Bitcoin Cash) all have Sharpe Ratio’s over 2, which signals a good investment per risk involved.

The Long Version

How many people have told you that cryptocurrencies are too risky? A fraud? A Ponzi Scheme?
Bitcoin has increased over 1,500% over the last year, but none of this is new. Cryptocurrencies have been on a tear unlike anything we have ever seen…just look at how it compares to the various bubbles of the past:
Full Disclosure: not calling it a bubble…just providing context!
Comparison of Bitcoin to Past Bubbles
But you…you are a savvy investor.
Outsized gains tell us nothing except something increased from a little to alot.

Total Returns are not adjusted for risk

Let’s take the following quiz…one is the right answer, but you won’t be graded for it.
Which of the following investments would you rather be in?
  1. Crypto A started at $1, went to $500, back down to $1, back up to $600
  2. Crypto B started at $1, went to $100, to $300, to $600
Both investments have the same return, but which would you choose?
I’ll give you some ti…oh you already have an answer? You choose #2?
Exactly.
Most investors look at total returns over various timeframes — one-day, one-month, one-year— when evaluating an investment. These returns are misleading since they aren’t adjusted for risk.
Just look at the example above —Crypto A made a massive return on the initial investment, but that does not mean it was a compelling investment opportunity.
“Using volatility as a measure of risk is nuts. Risk to us is 1) the risk of permanent loss of capital, or 2) the risk of inadequate return.” — Charlie Munger
If only there was a better way…

What is the Sharpe Ratio?

The ELI5 Version of the Sharpe Ratio
The Sharpe ratio is a measure used heavily in the finance world for calculating risk-adjusted returns.
The calculation solves the issue of misleading total returns by taking the average return earned above the risk-free rate per unit of volatility or total risk — an absolute measure of risk.
Investors can directly compare multiple investments and evaluate the amount of risk taken on to generate the same percentage points of return, which makes for a much fairer comparison.
While this does make for a much better comparison, you are smart and know that even though something may have a higher Sharpe Ratio, that does not indicate it is less volatile…the higher ratio actually indicated that the investment risk-to-reward profile is much better or proportional vs. another.
So for this article, I will show you how to implement the Sharpe Ratio in the wonderful world of cryptocurrencies.

Top Cryptocurrencies by Sharpe Ratio

With your new, sweet investment tool, you can calculate the Sharpe Ratios of top cryptocurrencies.
But because I love you (and to save time), I went ahead and did it for you:
Top 12 Cryptocurrencies by Sharpe Ratio
Not surprisingly, Bitcoin ranks as the top risk-adjusted earning cryptocurrency from the top 12. Even though Bitcoin is very volatile, the returns have matched the craziness.
What is interesting to me, is all the way at the bottom — our dear friend NEO, aka the “Chinese Ethereum”. A Sharpe Ratio of 0.03 in an industry of 1s, 2s, 3s, and a 4 is honestly…terrible. But a large portion of this is due to NEO stumbling out of the gate after getting listed on Bitfinex, with returns of -18%, -13%, and -24% in the first 10 days of trading.

My Gift to you — a tool to automatically calculate Sharpe Ratio

A post from me would not be complete without a tool for you to utilize what we just talked about.
The spreadsheet pulls in the top 12 cryptocurrencies from the Bitfinex exchange, and calculates the Sharpe Ratio for each.
The user can modify the risk free rate, calculations, and any of the currencies currently being pulled.
First time install
The tool is nice and simple to use. It requires about 2 minutes to setup, then after that you are good to go.
  1. Make of copy of the worksheet: Click Here
  2. Install the Spreadstreet Google Sheets Add-in
  3. Follow the instructions and log-in to the add-in
  4. Formulas in the sheet should update

RESOURCES

Download the add-in: https://spreadstreet.io/tools/google-sheets-add-in
Help: https://spreadstreet.io/docs
First time install and login:
https://www.youtube.com/watch?v=aLjtPR4T2bg
Bitfinex Candles endpoint help: https://spreadstreet.io/knowledge-base/bitfinex-api-candles-endpoint/

RELATED POSTS

A Super Simple Cryptocurrency Arbitrage Spreadsheet for Finding Mismatched Prices
10 Statistical Price Predictions for 10 Cryptocurrencies
High-Flyers and Shitcoins: What I Learned from Analyzing CoinMarketCap Data in Google Sheets
7 Smart Ethereum Price Prediction Methods for HODL’ers

ABOUT THE AUTHOR

John Young is the founder of Spreadstreet.io, former Financial Analyst for a big-ass company, and runner-up in the 6th grade spelling bee. He would have invested in Google if he knew about it...and had any money.
He is the author of the Spreadstreet blog, which has over 3 readers (not a typo). He hopes to hit 10, but honestly writing is a lot of work.
submitted by 1kexperimentdotcom to CryptoMarkets [link] [comments]

TIL: The latest ponzi scheme - PIPcoin

Well today was interesting. After seeing a ton of people trying to spam their referral links into some of the big Facebook groups we run at work, I decided to investigate a bit more after dinner & a couple of glassses of wine.
Let me introduce you to PIPcoin. (for those like me who missed it when it last came up on the sub)
PIPcoin from the horses mouth
PIPcoin's CEO on SABC
One of his "free" seminars.
Here is a quick recording off their homepage :-(
Pipcoin is Africa’s first P2P Cryptocurrency and is more seen as an emerging digital currency that seeks to revolutionize accessibility and raise awareness about the importance of online trading to the multitudes of both the aspirant traders and those who are completely unaware of the abounding benefits and opportunities offered by the digital market. Thus, for all its worth as a potential life-changing tool, we want Pipcoin to be everybody’s business.
So this is new... lets take a look at their FAQ's because I have many! here are my favourite bits:
What Is The Structure Of A Pipcoin? Pipcoin Concept (for developers) -IF YOU HAVE 0,9999 MICRO-PIPS THEN IT WILL BE ROUNDED OFF TO 1.0000 – MAKING IT 1 PIPCOIN-
lol really? Where does that extra micro tit pip come from?
Why Pipcoin Isnt A Get Rich Quick Scheme Whenever there is a new digital breakthrough it is natural for people to be sceptic, this has been scientifically proven. Even at one stage the internet was said to be a scam, same goes to online trading, they said it won’t last. Same goes to Facebook; they said it’s an information-leaking scam. Same goes again to Bitcoin they said it’s a ‘failed experiment’. Pipcoin is the people’s currency and can never in a scale be compared to ponzi schemes and investment bonanzas; Pipcoin is a friend-to-friend digital currency which has its own crypto keys and public ledger just like any other legit digital currency. Everyone is a host to the currency, every participants’ computers serve as servers to the system and just like forex trading it is a zero-sum game, when you buy the coins there will be someone selling to you.
SkepticalHippoIsSkeptical.jpg
Who Is The Founder Of Pipcoin? However the inception of the idea can be credited to David Schwartz and the inception of the algorithm and mathematics behind to Ref Wayne, a 21 year old South African who is behind the creation of most high-tech forensic software as well as the indicators for financial trading platform (Forex Metatrader), it is without chance that the creation of Pipcoin is water-proof and crack-free.
Aside from the laughable wording, this is perhaps the most interesting part. If you can make it through this interview or this video his story sounds a lot like this "David Schwartz" story here. Excuse the popups but give it a read and obviously the comments at the bottom.
Is Pipcoin Legal? ...After all, there is no authority that can stop anyone from buying and selling a product online.
hahahahahahahahAHAHAha!
Do I Need To Provide Any Id Documents To Join Pipcoin is a cryptocurrency which means it’s completely encrypted, even for its users, it remains completely confidential. You don’t need to submit any documents.
erm... surely this goes against SO many laws in SA?
How Reliable Is This Website In Terms Of Security And Keeping Personal Data And Pipcoins [no ? at the end of these ones for some reason] We pay great attention to security and the confidential information on the website is protected by EV SSL. We don’t divulge any personal data of members to third parties. Your participation too, is strictly confidential.
thats...not really explaining it at all. SSL isnt the be-all and end all - but oh there's another one right below. Im sure that'll clear it up...
Are You Protected From Hackers We have installed power Anti-DDOS protection on our servers and have many other security measures.
well that settles it.
ok ok so whats next?
Some points/gems from their Terms of User PDF [mirror here] (i've never heard that phrase) but looks like something from the lawfirm of Copy, Pasta and Google.
All references to the ‘company,’ ‘us,’ ‘our,’ ‘we’ or ‘Pipchain’ means Pipchain South Africa S.a.r.l., a company registered under the laws of South Africa, with a share capital of EUR 55,222.08, having its registered address at L-2340 South Africa, 1, rue Philippe II, registered with the South Africa Trade and Companies Register under number B 190.078 (Business License number B190078).
I tried to find out if thats real but I couldnt figure out how to do it via the new http://www.cipc.co.za/ site.
Their privacy policy link https://pipchain.com/PrivacyPolicy.pdf 404's
Typos galore eg - " Server failure ordata loss;"
We make no warranty that the Website or the server that makes it available, are free of viruses or errors, that its content is accurate, that it will be uninterrupted, or that defects will be corrected.
wut?!
  1. AGREEMENT TO HOLD PIPCHAIN HARMLESS
wut2
7.2. If you are obligated to indemnify us, we will have the right, in our sole discretion, to control any action or proceeding (at our expense) and determine whether we wish to settle it.
ok...
9.1. You need not use a Pipchain Wallet. If you wish to use the Wallet, you must create a wallet with Pipchain to access the Services (“Wallet”)
I need an adult.
10.5. No Storage or Transmission of Pipcoins. Pipcoins are an intangible, digital asset. They exist only by virtue of the ownership record maintained in the Pipcoin network. The Services do not store, send or receive Pipcoins. Any transfer of title that might occur in any Pipcoins occurs on the decentralized ledger within the Pipcoin network and not within the Services. We do not guarantee that the Service can effect the transfer of title or right in any Pipcoins.
and
10.8. No Cancellations or Modifications. Once transaction details have been submitted to the Pipcoin network via the Services, The Services cannot assist you to cancel or otherwise modify your transaction details. Pipchain has no control over the Pipcoin Network and does not have the ability to facilitate any cancellation or modification requests.
In the SABC interview (linked at the top of this post) the CEO says he took bitcoin and 'modified' it to be safer and so you can track 'stolen or lost' coins. So thats a lie.
  1. DISCONTINUANCE OF SERVICES 15.1. We may, in our sole discretion and without cost to you, with or without prior notice and at any time, modify or discontinue, temporarily or permanently, any portion of our Services. You are solely responsible for storing, outside of the Services, a backup of any Wallet Address and Private Key pair that you maintain in your Wallet.
erm, ok but because PIPcoins can only be traded on their website and not transferred to anything else... how does that work?
17.1.3. Use any robot, spider, crawler, scraper or other automated means or interface not provided by us to access our Services or to extract data; 17.1.4. Use or attempt to use another user’s Wallet without authorization
the enter key is a hard one to find on a laptop I'll give them that one...
---- gets more wine ---
They claim to have a 30-35% growth rate on any and all investments! Crazy returns.
I did a bit of a google on them and immediately found these posts.
Some choice excerpts:
The company has promised that it will soon be issuing a debit card. Promising to issue a debit is an old trick used by fraudulent companies to create a false sense of trust and legitimacy to unsuspecting investors.
and
The transfer of pipcoins is verified by one sources, instead of 3 independent source as is usually the case with legitimate crypto currencies with a blockchain.
and
They also use wording similar to ‘get-rich-quick' scheme lines such as “Pipcoin will create over a 100 millionaires by the end of this financial year”. These are revealing signs of a fraudulent scheme. Moreover, pipcoin is a closed system, you cannot trade with anyone other than randomly chose people registered on the website. Their blockchain is not public or transparent, in fact, they do not have a blockchain and, if they do have one, then it is not operational.
So who's behind it? Who is this Ref dude?
According to his Twitter bio he's "Youngest Billionaire in Africa | Founder of African 1st ever digital currency ! Get a minimum interest of 35% @infopipcoin"
here are some choice images from his public FB:
I tried to register on https://mypipcoins.com/ but there's an ASPX error during the registration process and it kept trying to switch between https and http. Great start. I tried in all major browsers and they all failed so I gave up on trying to signup with my temp email [email protected] :(
So then, lets take a closer look at the support they offer on their site. They've got one of those "live chat" widgets on their site and this evening there was actually someone online :)
I said "hello" and saw "busi has joined the conversation" - sweet.
Here is the transcript I downloaded before they killed the chat. Lucky I insta-clicked the download before they killed my chat session.
As you can see by the chat log, Busi linked me to whats obviously the new 'site' they're launching this weekend https://pipchain.com/
The site looks a lot like the blockchain.info website.
Their market page is awesome compared to blockchain.info's one! its even got a bigger market cap! Note the article links are all the same, except for two small things.
  1. None of the links work...because
  2. they've done a find&replace in the code, replacing all instances of "bitcoin" with "pipcoin" XD
Anyway, I thought I'd try signup on THIS site and lo 'n behold I managed to sign up! [email protected] lives!
Here is PIPcoin's dashboard and here is Blockchain.info's dashboard.
Here is PIPcoins transactions page and here is Blockchain.info's transaction page.
So pretty much a blatant copy/pasta job.
-- final thoughts --
Its unfortunate that the quality of journalism in SA is so weak. PIPcoin getting a lot of media attention for something thats honestly so dodgy, if you looked at it for more than 5 minutes you'd know. Many people are going to fall for this and if you look at the comments on twitter or on his FB posts or on any video calling out the scam you'll shake your head.
Someone (not me) has even put this site together https://www.pipcoin.co/ which is as informative as it is awesome! Click the login and it takes you to "Logging in should be the last thing you should be worried about right now." and the bottom of the site has the best burn ever
"This website was built as a public service announcement by concerned citizens (and shows what a legitimate site should look like"
I did try connect with the 'owner' via twitter to find the source/calculation of the "R40 314 800,00 lost & counting" figure but so far no reply.
Anyway its late and I'm going to bed. I hope you learnt something and if you see anyone in your social circles promoting this please make them aware.
EDIT: Reddit formatting is hard.
EDIT2: Got a reply from the person behind the pipcoin.co site - http://imgur.com/a/995oN which honestly shows the lack of skills the scheme has in the development/security field and now if you rewatch the interviews you can see why he's so scripted when talking about the tech stack.
EDIT3: Sigh. I made a comment on the PIPcoin FB page to warn people about this and this is the response I found this morning - http://imgur.com/a/tFoAy I dont even know what/how to respond...
submitted by Ruach to southafrica [link] [comments]

Can we talk about sharding and decentralized scaling for Raiblocks?

Introduction
This essay contains a healthy dose of math sprinkled with opinion, and I would be the first to admit that my math and personal opinions are sometimes wrong. The beauty of these forums is that it allows us to discuss topics in depth, and with enough group scrutiny we should arrive at the truth. I'm actually a cryptocurrency noob; I've only been looking at it in earnest for a few months, but I've seen enough to conclude that we are in the middle of a revolution, and if I don't intellectually participate somehow, I think I'll regret it for the rest of my life.
Here I analyze sharding in a PoS (proof-of-stake) system, and I will show that not only is sharding good, but I will quantify just how beneficial it is to Tps (transactions per second of the whole network) and mps (messages per second processed by each individual node). I use Raiblocks as my point of departure, regarding it as both my inspiration and my object of critique. But much of the discussion should be relevant to any PoS sharded system.
As you may know, Raiblocks does not employ ledger sharding, but seeing as every wallet is already in its own separate blockchain, it's basically already half-way there! From an engineering perspective, sharding is low-hanging fruit for a block-lattice structure like Raiblock's, especially when you compare it to how complicated it is for single-blockchain currencies.
For the record, I think that Raiblocks will scale just fine according to the current strategy laid out by Colin LeMahieu (u/meor) . By using only full nodes and hosting them in enterprise grade servers (basically datacenters), chances are good that the network will be able to keep up with future Tps (transaction per second) growth. Skeptics have been questioning if people are going to be willing to run nodes pro bono, just to support the network. But I don't doubt that many vendors will jump at the chance. If I'm Amazon, and I've been paying 3% of everything to Visa all these years, when there's an option to basically run my own Visa, I take it.
Payment networks like Paypal have been offering free person-to-person payments for years, eating the costs of processing those transactions in exchange for the opportunity to take their cut when those same people pay online vendors like Amazon. This makes business sense because only a minority of transactions are person-to-person anyway. Most payments result from people buying stuff. So, in a sense, vendors like Amazon have already been subsidizing our free transactions for years. By running Raiblocks nodes, they would still be subsidizing our transactions, but it would be a better deal than what they were getting before.
But have we forgotten something here? Is this really the dream of the instant, universal, decentralized, uncensorable payment network that was promised and only kinda delivered by Bitcoin? Decentralization comes in a spectrum, and while this is certainly better than a private blockchain like Ripple, the future of Raiblocks that we're looking at is a smallish number of supernodes run by a consortium of corporations, governments, and maybe a sprinkling of die-hard fans.
You may ask, but what about the nodes run by you and me on our dinky home computers and cable modem connections? Well, people need to remember that Raiblocks nodes need to talk to each other every time there's a transaction, in order to exchange their votes. The more nodes there are, the more messages have to be received and sent per node per transaction. Having more nodes may improve the decentralization, redudancy, and robustness of the network, but speed it definitely does not. Sure, the SSD of a computer running a mock node will handle 7000 tps, but the real bottleneck is network IO, not disk IO, and how many Comcast internet plans are going to keep up with 7000 x N messages per second, where N is the total number of nodes? If you take the message size to be 260 bytes (credit to u/juanjux's packet-sniffing skills), and the number of nodes to be 1000, that's 1.8 GB/s. Also, if you consider that at least two messages will need to be exchanged with every node (one for the sending wallet, one for the receiving), the network requirements per node becomes 3.6 GB/s. This requirement applies to both the download and upload bandwidth, since in addition to receiving votes from other nodes, you have to announce your own vote to all of them as well. Maybe with multicasting upload requirements can be relaxed, but the overall story is the same: you almost want to convince small players not to run their own nodes, so N doesn't grow too large. Hence, the lack of dividends.
So, if we're resigned to running Raiblocks from corporate supernodes in the future, we might want to ask ourselves, why is decentralization so important anyway? For 99.9% of the cases, I actually think it won't matter. People just want their transactions to complete in a low-cost and timely fashion. And that's why I think Ripple and Raiblocks on their current trajectories have bright futures. They are the petty cash of the future. But for bulk wealth storage, you want decentralization because it makes it hard for any one entity to gain control over your money. No government will be able to step in and freeze your funds if you're Wikileaks or a political dissident when your cryptocurrency network is hosted on millions of computers scattered across the internet. I know the millions number sounds outlandish given that Bitcoin itself has fewer than 12k nodes at present, but that's my vision for the future. And I hope that by the end of this essay, you'll agree it's plausible.
The main benefit of sharding is that it allows nodes to divide the task of hosting the ledger into smaller chunks, reducing the per-node bandwidth requirements to achieve a certain Tps. I'll show that this benefit comes without having to sacrifice ledger redundancy, so long as sufficient nodes can be recruited. One disadvantage that must be noted is the increased overhead of coordinating a large number of nodes subscribed to partial ledgers. At the very least, nodes will need to know how wealthy other nodes are for voting purposes. However, I don't see how an up-to-the-second update of nodal wealth is necessary, since wealth changes on the timescale of months, if not years. It should be sufficient to conduct a role call once every few weeks to update nodes on who the other nodes are and to impart information about wealth and ledger subscriptions. Nonetheless, in principle this overhead means it is still possible to have too many nodes even with sharding.
Raiblocks has a unique advantage over single-chain cryptocoins in that each wallet address is already its own blockchain. This makes it especially amenable to sharding, since each wallet can already be thought of as its own shard! You just need a clever algorithm to decide which nodes subscribe to which wallets. For the purposes of this analysis, I assume a random subscription, so that for example if both you and I subscribe to 10% of the ledger, our subscriptions are probabilistically independent, and we intersect on roughly one percent of the total wallet space. I will also assume that all nodes are identical to each other in bandwidth, though in practice I think each node's owner should decide how much bandwidth he is willing to commit, letting the node's software dynamically adjust its P to maintain the desired bandwidth, where P, or the participation level, is the fraction of the ledger that the node is subscribed to. That way, when the Tps of the network increases over time, each node will use the increasing bandwidth demand as a feedback signal to automatically lower its ledger subscription percentage. Then, all that would be missing for smooth and seamless network growth is a mechanism for ensuring node count growth.
 
Some math
Symbol Definition
mps messages per second received/sent per individual node
N total number of nodes
Tps transactions per second processed by the whole network
R ledger redundancy
P fractional participation level of an individual node
k role call frequency
From the definitions, it should be apparent that
(1) R = NP
There are two types of messages that nodes have to deal with, transaction messages and role-call messages. Transaction messages are those related to updating the ledger when money is sent from one wallet to another. For each transaction, each node presiding over the sending wallet/shard will need to
  1. Broadcast its vote to the other R members of the shard. In the normal case this is a thumbs up signal and no conflict resolution is required.
  2. Receive votes from the other R members of the shard
  3. Broadcast its thumbs up to the R members of the receiving wallet/shard
Each node presiding over the receiving wallet/shard will need to
  1. receive thumbs up signals from the R members of the sending wallet/shard
Therefore, on a macro level upload and download requirements are the same. (Two messages sent, two messages received.)
Role-call messages are those related to disseminating an active directory of which nodes are participating in which wallets and information about nodal wealth. Knowledge about each individual node is broadcasted to the network at a rate of k. I think 10-6 Hz is reasonable, for an update interval of 12 days. For each update, all R nodes presiding over the wallet of the node whose information is being shared will broadcast their view of the node's wealth to all N nodes. Therefore, from the perspective on an individual node:
  1. The rate that role-call messages are received is kRN.
  2. The rate that role-call messages are sent is k(# node wallets presided over)N = k(NP)N = kRN.
Again, upload and download rates are the same. Since upload and download rates are symmetric (which intuitively should be true since every message that is sent needs to be received), the parameter mps can be used equally to describe upload and download bandwidth.
(2) mps = 2R(PTps) + kRN,
where the two terms correspond to the transaction and role-call messages, respectively. Using (1), (2) can be rewritten as
(3) mps = 2R2Tps/N + kRN
Here, we see an interesting relationship between the different message categories and the node count. For a fixed ledger redundancy R and Tps, the number of transaction messages is inversely proportional to the number of nodes. This is intuitive. If all of a sudden there are twice as many nodes and ledger redundancy remains the same, then each node has halved its ledger subscription and only has to deal with half as many transactions. This is the "many hands make light work" phenomenon in action. On the other hand, the number of role-call messages increases in proportion to the number of nodes. The interplay between these two factors determines the sweet spot where mps is at a local minimum. Since the calculus is straightforward, I'll leave it as an exercise to the reader to show that
(4) N_sweetspot = (2RTps/k)1/2
Alternatively, another way of looking things is to consider mps to be fixed. This may be more appropriate if each node is pegged at its committed bandwidth. Then (3) describes the relationship between the ledger redundancy and N. You may ask how this can be reconciled with (1), which seems to imply that N and R are directly proportional, but in this scenario each node is dynamically adjusting its ledger subscription P in response to a changing N to maintain a constant bandwidth mps. In this view, the sweet spot for N is where R is maximized. Interestingly, regardless of which view you take, you arrive at the same expression for the sweet spot (4).
If N < N_sweetspot, then transaction messages dominate the total message count. The system is in the transaction-heavy regime and needs more nodes to help carry the transaction load. If N > N_sweetspot (the node-heavy regime), transaction messages are low, but the number of role-call messages is large and it becomes expensive to keep the whole network in sync. When N = N_sweetspot, the two message categories occur at the same rate, which is easily verified by plugging (4) back into (3). This is when the network is at its most decentralized: message count per node is low while redundancy is high.
Note that N_sweetspot increases as Tps1/2. This implies that, as transaction rate increases, the network will not optimally scale without somehow attracting new people to run nodes. But the incentives can't be too good either, or N may increase beyond N_sweetspot. Ideally, a feedback mechanism using market forces will encourage the network to gravitate towards the sweet spot (more on this later).
One special case is where P=1 and N=R. This is when the network is at its most centralized operating point, with every single node acting as a full node. This minimizes node count for a given redundancy level R and is how Raiblocks is currently designed. I will show that for most real-world numbers, the role-call term is so small as to be negligible, but the mps is many orders of magnitude higher than in the decentralized case because of the large transaction term.
Assuming that we are able to keep the network operating at its sweet spot, by plugging (4) into (3), we arrive at
(5) mps_sweetspot = R3/2(8kTps)1/2
If instead we plug N=R into (3), we arrive at
(6) mps_centralized = 2RTps + kR2
So, we see that in the decentralized case the mps of individual nodes increases as the square root of Tps, a much more sustainable form of scaling than the linear relationship in the centralized case.
And now, the moment we've all been waiting for: plugging various network load scenarios into these formulas and comparing the most decentralized case to the most centralized. Real world operation will be somewhere in between these two extremes.
Fixed parameters
packet size (bytes) 260
k (Hz) 1.00E-06
R 1000
transaction fee ($) $0.01
Tps
0.1 1 10 100 1,000 10,000 100,000
Total monthly dividends $2,592 $25,920 $259,200 $2,592,000 $25,920,000 $259,200,000 $2,592,000,000
Decentralized node requirements
mps (Hz) 28 89 283 894 2,828 8,944 28,284
node traffic (bytes/s) 7.35E+03 2.33E+04 7.35E+04 2.33E+05 7.35E+05 2.33E+06 7.35E+06
N 1.41E+04 4.47E+04 1.41E+05 4.47E+05 1.41E+06 4.47E+06 1.41E+07
P 7.07E-02 2.24E-02 7.07E-03 2.24E-03 7.07E-04 2.24E-04 7.07E-05
Total Network Traffic (bytes/s) 1.04E+08 1.04E+09 1.04E+10 1.04E+11 1.04E+12 1.04E+13 1.04E+14
Yearly Network Traffic (bytes) 3.28E+15 3.28E+16 3.28E+17 3.28E+18 3.28E+19 3.28E+20 3.28E+21
Decentralized node income
monthly per node ($) $0.18 $0.58 $1.83 $5.80 $18.33 $57.96 $183.28
income/GB ($/GB) $0.0096 $0.0096 $0.0096 $0.0096 $0.0096 $0.0096 $0.0096
Centralized node requirements
mps (Hz) 2.01E+02 2.00E+03 2.00E+04 2.00E+05 2.00E+06 2.00E+07 2.00E+08
node traffic (bytes/s) 5.23E+04 5.20E+05 5.20E+06 5.20E+07 5.20E+08 5.20E+09 5.20E+10
N 1000 1000 1000 1000 1000 1000 1000
P 1 1 1 1 1 1 1
Total Network Traffic (bytes/s) 5.23E+07 5.20E+08 5.20E+09 5.20E+10 5.20E+11 5.20E+12 5.20E+13
Yearly Network Traffic (bytes) 1.65E+15 1.64E+16 1.64E+17 1.64E+18 1.64E+19 1.64E+20 1.64E+21
Centralized node income
monthly per node ($) $2.59 $25.92 $259.20 $2,592 $25,920 $259,200 $2,592,000
income/GB ($/GB) 0.0191 0.0192 0.0192 0.0192 0.0192 0.0192 0.0192
Yes, I did sneak a transaction fee in there, which is anathema to the Raiblocks way. But I wanted to incentivize people to run nodes. Observe that income per gigabyte remains the same, independent of network Tps, because both total income and total bandwidth scale proportionally to Tps. The decentralized case has half the income/GB because the role-call overhead doubles network activity. In either case, the income per GB depends on transaction fee and is independent of network load.
An interesting number to check online is the price/GB that various ISP's charge. With Google Fiber, it is possible to purchase bandwidth as low as $0.00076 per GB, meaning that it may be possible for nodes to be profitable even if fees were lowered by another order of magnitude. As time progresses, bandwidth costs will only go down, so fees may be able to be lowered even further past that. But because of electricity and other miscellaneous costs, I think a one cent transaction fee is probably pretty close to what people need to incentivize them to run nodes.
With sharding, even many home broadband connections today can feasibly support 100,000 transactions per second, with each node subscribed to about one ten thousandth of the total ledger and handling about 7 MB/s. Getting 14 million people to run nodes may seem like a tall order, but the financial incentives are there. Just look at all the people who have rushed to do GPU mining. Here, bandwidth replaces hashing power as the tool used for mining.
According to a study done by Cisco, yearly internet traffic is projected to reach 3.3 ZB by 2021. Looking at the table, that means if we ever reach 100,000 Tps, Sharded Raiblocks traffic would be equal to the rest of the world combined. Yikes! But if you think about it, nobody along the way is taking on an unbearable load. Users pay low fees for transactions. Nodes get dividends. ISPs get additional customers. The only ones who lose out are Visa, Paypal, and banks.
With such a large network presence, the cultural impact of this coin would be huge. That, in addition to the sheer number of participants running nodes as side businesses would cement this as the coin of the people.
From a macro level, I see no red flags that would indicate this is economically or technically infeasible. Of course, the devil's in the details so I'm posting this to see if people think I'm on the right track. To me, it seems that the possibilities are tantalizing and someone needs to build a test net to see if this idea flies (u/meor, if any of this sounds appealing, are you guys hiring? ;) ).
Musings
I've only scratched the surface and there are many other topics that are worthy of deeper discussion:
submitted by Cookiemole to RaiBlocks [link] [comments]

Groestlcoin Christmas Release!

Groestlcoin Dec 2018 Christmas Release Update

As per usual the 3 months has been all hand-on-deck, helping to bring further adoption utilities to Groestlcoin. The markets have been red but as always that doesn't stop the show from going on with regards to the development since the last release update on 24th September. Here's a recap of what has happened so far:

Recap:

What’s New Today?

Groestlcoin on Trezor Model T

As of the latest version of the Trezor Model T firmware, Groestlcoin is now officially supported! The Trezor Model T is the next-generation cryptocurrency hardware wallet, designed to be your universal vault for all of your digital assets. Store and encrypt your coins, passwords and other digital keys with confidence. The Trezor Model T now supports over 500 cryptocurrencies.

Blockbook MainNet & TestNet Block Explorer

Blockbook is an open-source Groestlcoin blockchain explorer with complete REST and websocket APIs that can be used for writing web wallets and other apps that need more advanced blockchain queries than provided by groestlcoind RPC.
Blockbook REST API provides you with a convenient, powerful and simple way to read data from the groestlcoin network and with it, build your own services.

Features:

Blockbook is available via https://blockbook.groestlcoin.org/ Testnet: https://blockbook-test.groestlcoin.org/ Source code: https://github.com/Groestlcoin/blockbook

Edge Wallet

Groestlcoin has been added to the Edge wallet for Android and iOS. Edge wallet is secure, private and intuitive. By including support for ShapeShift, Simplex and Changelly, Edge allows you to seamlessly shift between digital currencies, anywhere with an internet connection.

Features:

Android: https://play.google.com/store/apps/details?id=co.edgesecure.app
iOS: https://itunes.apple.com/us/app/edge-bitcoin-wallet/id1344400091?mt=8
Direct Android: https://edge.app/app

CoinID Wallet

We are excited to announce that Groestlcoin has been added to CoinID! With integrated cold and hot wallet support, and a host of other unique wallet features, CoinID can easily become your go-to wallet for storing Groestlcoin. More details can be found here: https://coinid.org/s/groestlcoin-wallet-overview.pdf

Features

Android: https://play.google.com/store/apps/details?id=org.coinid.wallet.grs
iOS: https://itunes.apple.com/us/app/grs-wallet-for-coinid/id1439638550

Groestlcoin Sentinel - Windows Released

Groestlcoin Sentinel is the easiest and fastest way to track balances of your Groestlcoin addresses.
Features
You can download it using the links below.
Download the Windows Wallet (64 bit) here: https://github.com/Groestlcoin/Groestlcoin-Sentinel-Windows/releases/download/1.0/SentinelSetup_x64.msi
Download the Windows Wallet (32 bit) here: https://github.com/Groestlcoin/Groestlcoin-Sentinel-Windows/releases/download/1.0/SentinelSetup_x86.msi
Source code: https://github.com/Groestlcoin/Groestlcoin-Sentinel-Windows/

Groestlcoin BIP39 Tool 0.3.9 Update

The Groestlcoin BIP39 tool is an open-source web tool for converting BIP39 mnemonic codes to addresses and private keys. This enables the greatest security against third-party wallets potentially disappearing – You’ll still have access to your funds thanks to this tool.
What’s New
Download the Groestlcoin BIP39 tool here: https://github.com/Groestlcoin/bip39/archive/master.zip
Source code: https://github.com/groestlcoin/bip39
Or use hosted version: https://groestlcoin.org/bip39/

Electrum-GRS 3.2.3 Update

Electrum-GRS is a lightweight "thin client" Groestlcoin wallet Windows, MacOS and Linux based on a client-server protocol. Its main advantages over the original Groestlcoin client include support for multi-signature wallets and not requiring the download of the entire block chain.
What’s New

Electrum + Android Version 3.2.3:

Android: https://play.google.com/store/apps/details?id=org.groestlcoin.electrumgrs
Windows & OSX: https://github.com/Groestlcoin/electrum-grs/releases/
Linux:
sudo apt-get install python3-setuptools python3-pyqt5 python3-pip python3-dev libssl-dev sudo pip3 install groestlcoin_hash sudo pip3 install https://github.com/Groestlcoin/electrum-grs/releases/download/v3.2.3/Electrum-grs-3.2.3.tar.gz electrum-grs
GitHub Source server: https://github.com/Groestlcoin/electrumx-grs
Github Source server installer: https://github.com/Groestlcoin/electrumx-grs-installer
Github Source client: https://github.com/Groestlcoin/electrum-grs

Groestlcoin ivendPay Integration

ivendPay and Groestlcoin cryptocurrency have announced the start of integration.
IT company ivendPay, the developer of a universal multicurrency payment module for automatic and retail trade, intends to integrate Groestlcoin cryptocurrency — one of the oldest and the most reputable Bitcoin forks into the payment system. Groestlcoin is characterized by instant transactions with almost zero commission and is optimal for mass retail trade where micropayments are mostly used.
According to Sergey Danilov, founder and CEO of ivendPay, Groestlcoin will become the 11th cryptocurrency integrated into the payment module. The first working vending machines for the sale of coffee, snacks and souvenirs, equipped with ivendPay modules, served the visitors of the CryptoEvent RIW exhibition at VDNKh in Moscow and accepted Bitcoin, Go Byte, Dash, Bitcoin Cash, Ethereum, Ethereum Classic, Zcash, Bitcoin Gold, Dogecoin and Emercoin. ivendPay terminals are designed and patented to accept payments in electronic money, cryptocurrencies and cash when connecting the corresponding cash terminal. Payment for the purchase takes a few seconds, the choice of the payment currency occurs at the time of placing the order on the screen, the payment is made by QR-code through the cryptocurrency wallet on the smartphone.
The interest in equipping vending machines with ivendPay terminals has already been shown by the companies of Malaysia and Israel, where first test networks would be installed. ivendPay compiles a waiting list for vending networks interested in buying terminals and searches for an investor to launch industrial production. According to Sergey Danilov, the universal payment terminal ivendPay for the vending machine will cost about $500. The founder of ivendPay has welcomed the appearance of Groestlcoin among integrated cryptocurrencies, as it is another step towards the realization of the basic idea of digital money - free and cross-border access to goods and services for everybody.
submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Top 12 Cryptocurrencies Ranked by Risk-Adjusted Return

TL;DR: The Sharpe Ratio is an excellent tool to assess risk-adjusted return on an investment. 4 cryptocurrencies (Bitcoin, Dash, Monero, and Bitcoin Cash) all have Sharpe Ratio’s over 2, which signals a good investment per risk involved.

The Long Version

How many people have told you that cryptocurrencies are too risky? A fraud? A Ponzi Scheme?
Bitcoin has increased over 1,500% over the last year, but none of this is new. Cryptocurrencies have been on a tear unlike anything we have ever seen…just look at how it compares to the various bubbles of the past:
Full Disclosure: not calling it a bubble…just providing context!
Comparison of Bitcoin to Past Bubbles
But you…you are a savvy investor.
Outsized gains tell us nothing except something increased from a little to alot.

Total Returns are not adjusted for risk

Let’s take the following quiz…one is the right answer, but you won’t be graded for it.
Which of the following investments would you rather be in?
  1. Crypto A started at $1, went to $500, back down to $1, back up to $600
  2. Crypto B started at $1, went to $100, to $300, to $600
Both investments have the same return, but which would you choose?
I’ll give you some ti…oh you already have an answer? You choose #2?
Exactly.
Most investors look at total returns over various timeframes — one-day, one-month, one-year— when evaluating an investment. These returns are misleading since they aren’t adjusted for risk.
Just look at the example above —Crypto A made a massive return on the initial investment, but that does not mean it was a compelling investment opportunity.
“Using volatility as a measure of risk is nuts. Risk to us is 1) the risk of permanent loss of capital, or 2) the risk of inadequate return.” — Charlie Munger
If only there was a better way…

What is the Sharpe Ratio?

The ELI5 Version of the Sharpe Ratio
The Sharpe ratio is a measure used heavily in the finance world for calculating risk-adjusted returns.
The calculation solves the issue of misleading total returns by taking the average return earned above the risk-free rate per unit of volatility or total risk — an absolute measure of risk.
Investors can directly compare multiple investments and evaluate the amount of risk taken on to generate the same percentage points of return, which makes for a much fairer comparison.
While this does make for a much better comparison, you are smart and know that even though something may have a higher Sharpe Ratio, that does not indicate it is less volatile…the higher ratio actually indicated that the investment risk-to-reward profile is much better or proportional vs. another.
So for this article, I will show you how to implement the Sharpe Ratio in the wonderful world of cryptocurrencies.

Top Cryptocurrencies by Sharpe Ratio

With your new, sweet investment tool, you can calculate the Sharpe Ratios of top cryptocurrencies.
But because I love you (and to save time), I went ahead and did it for you:
Top 12 Cryptocurrencies by Sharpe Ratio
Not surprisingly, Bitcoin ranks as the top risk-adjusted earning cryptocurrency from the top 12. Even though Bitcoin is very volatile, the returns have matched the craziness.
What is interesting to me, is all the way at the bottom — our dear friend NEO, aka the “Chinese Ethereum”. A Sharpe Ratio of 0.03 in an industry of 1s, 2s, 3s, and a 4 is honestly…terrible. But a large portion of this is due to NEO stumbling out of the gate after getting listed on Bitfinex, with returns of -18%, -13%, and -24% in the first 10 days of trading.

My Gift to you — a tool to automatically calculate Sharpe Ratio

A post from me would not be complete without a tool for you to utilize what we just talked about.
The spreadsheet pulls in the top 12 cryptocurrencies from the Bitfinex exchange, and calculates the Sharpe Ratio for each.
The user can modify the risk free rate, calculations, and any of the currencies currently being pulled.
First time install
The tool is nice and simple to use. It requires about 2 minutes to setup, then after that you are good to go.
  1. Make of copy of the worksheet: Click Here
  2. Install the Spreadstreet Google Sheets Add-in
  3. Follow the instructions and log-in to the add-in
  4. Formulas in the sheet should update

RESOURCES

Download the add-in: https://spreadstreet.io/tools/google-sheets-add-in
Help: https://spreadstreet.io/docs
First time install and login:
https://www.youtube.com/watch?v=aLjtPR4T2bg
Bitfinex Candles endpoint help: https://spreadstreet.io/knowledge-base/bitfinex-api-candles-endpoint/

RELATED POSTS

A Super Simple Cryptocurrency Arbitrage Spreadsheet for Finding Mismatched Prices
10 Statistical Price Predictions for 10 Cryptocurrencies
High-Flyers and Shitcoins: What I Learned from Analyzing CoinMarketCap Data in Google Sheets
7 Smart Ethereum Price Prediction Methods for HODL’ers

ABOUT THE AUTHOR

John Young is the founder of Spreadstreet.io, former Financial Analyst for a big-ass company, and runner-up in the 6th grade spelling bee. He would have invested in Google if he knew about it...and had any money.
He is the author of the Spreadstreet blog, which has over 3 readers (not a typo). He hopes to hit 10, but honestly writing is a lot of work.
submitted by 1kexperimentdotcom to CryptoCurrency [link] [comments]

All about BitMex trading platform

Many crypto traders want to engage in leverage trading for different reasons; mostly to rapidly grow their capital. But nothing good comes easy so most trader abstained due to the high risk involved. Well in this post, I’m going to explain step by step how to trade crypto on BitMex with up to 100x leverage. Additionally for more conservative traders I will provide some telegram channels that gives free and VIP BitMex signal towards the end of this post. See the outline below as guideline as the post duels into BitMex operation. - How to create and fund BitMex account - BitMex overview and alt. coin pair contracts - Trading long and short with and without leverage - How to use stop losses
HOW TO CREATE AND FUND BITMEX ACCOUNT Simply go to https://www.bitmex.com/registeiHcxly. At the top right hand side corner hit register and fill in the required details. There are limitations for traders from the United State but it can be by-passed by selecting a different country of residence with the help the help of a VPN.
To add a two factor authorization for addition security, simply click corner of the dashboard; hit account and security, scroll down to security section and enable Google authenticator or yubikey. For Google authenticator visit Google Play Store on mobile phone and download the app. Open it and click the little plus sign at the top; scan the QR Code and enter the generated code on BitMex. Click submit to finish the process, so anytime you want to log-in enter a new two factor token generated on Google authenticator and log-in.
To fund your BitMex account, click account and send bitcoin to the bitcoin deposit address. An email will be sent to you after it receives the bitcoin. You can also check the balance in the account section
BITMEX OVERVIEW AND ALT COIN PAIR CONTRACTS BitMex dashboard is made up of different section and can be rearranged as traders see fit. This post covers all important sections necessary for trading. It covers order book, Order, recent trades and position/margin section.
At the midway after place order is position subsection. The leverage value is set in this section and depending on the alt coin pair it value ranges from cross to 100x. With the exception of Bitcoin all other pairs has a leverage limit below 50x.
TRADING BUY/LONG AND SELL/SHORT WITH AND WITHOUT LEVERAGE Depending on the speculation made a trader can either Buy/long or sell/short alt. pair, i.e. buy/long if predicted price to move above current price and sell/short if predicted price to move lower than current price. To open or close a position a trader can use the limit or market section. The amount to buy or sell is entered in the space beside the “quantity” in USD. Just below the “quantity” under the limit section is “Limit price” beside which a trader can enter the intended entry price. If a limit price is below the current price, a buy/long order will not be executed until the current price retraces and hit the limit price but, if limit price is set above current price, i.e. deep into the market buy/long order will execute immediately. Opposite scenario applies to the sell/short order.
In the market section only Quantity is required, this mean orders are executed automatically at current best price. Its disadvantage is double fee payment (Maker and taker fee)
LEVERAGE Leveraging simply refers to borrowing. Depending on risk a trader is willing to take leverage can be as high as 100 times the trading capital. For example a trader with $20 can trade with $200 under 10x leverage. In a nutshell, a trader can multiply his trade amount with leverage as he sees fit. But the higher the leverage the higher the risk involved. For simplicity a 10x leverage will be used to explain some parameters. Under the Buy/Long and Sell/Short there is cost, order value and available balance. Cost is the actual amount a trader risk on particular trade; order value is the amount being traded with leverage i.e. order value = cost × leverage and available balance is remaining balance after cost is deducted in original balance.
With leverage being explained it will be unfair to skip its risky aspect. At the point of executing an order with leverage a pop up box to confirm the order will be displayed. On the box are the order details: - Order value: Trade quantity with leverage - Cost: The actual capital of stake - Available balance: Balance remaining without the cost - Estimated liquidation price: If hit the price at which a trader’s position will be liquidated and result in loss of all cost price. So it is very important to look at the liquidation price before executing a particular trade.
Position section becomes very important after confirming an order. It is there the liquidation price unrealized PNL and active orders are monitored. The unrealized PNL shows percentage loss or gain of open positions while realize PNL indicates that of close position.
HOW TO USE STOP LOSSES In the last tab under place order section are stop losses. It consist of four different type - stop limit, stop market, trailing stop and take profit
Now that we’ve covered the essential part of BitMex trading, let’s scrutinize and look at success rate of some BitMex trading signal telegram channel. The best BitMex signal telegram channel I’ve come across so far is Bitmex Call t.me/bitmexcall. They roughly give 1 signal per day on their free channel. Their success rate is around 91% i.e. in 22 signal 20 hit their targets while remaining 2 hit stop losses. Other channels are Bitmex Lifestyle t.me/ bitmexlifestyle and Zcrypto trading t.me/zcrypto. Register and start BitMex trading via my affiliate link and enjoy 10% fee discount for the next 6 months. https://www.bitmex.com/registeiHcxly If comfortable you can also donate BTC for an ongoing trading signal app and website project I’m currently developing to 1K4SLVq5QaC7F1VHWzsjp94LucXuRprU1C HAPPY TRADING
Buy BTC from Coinbase via https://www.coinbase.com/join/57fa34df135663714e192d99 and enjoy bonus of 10 dollars Or from Remitano via https://remitano.com/ng?ref=mumeen bit.ly/2J2CcLb
submitted by sb_order to u/sb_order [link] [comments]

All about BitMex trading platform

Many crypto traders want to engage in leverage trading for different reasons; mostly to rapidly grow their capital. But nothing good comes easy so most trader abstained due to the high risk involved. Well in this post, I’m going to explain step by step how to trade crypto on BitMex with up to 100x leverage. Additionally for more conservative traders I will provide some telegram channels that gives free and VIP BitMex signal towards the end of this post. See the outline below as guideline as the post duels into BitMex operation. - How to create and fund BitMex account - BitMex overview and alt. coin pair contracts - Trading long and short with and without leverage - How to use stop losses
HOW TO CREATE AND FUND BITMEX ACCOUNT Simply go to https://www.bitmex.com/registeiHcxly. At the top right hand side corner hit register and fill in the required details. There are limitations for traders from the United State but it can be by-passed by selecting a different country of residence with the help the help of a VPN.
To add a two factor authorization for addition security, simply click corner of the dashboard; hit account and security, scroll down to security section and enable Google authenticator or yubikey. For Google authenticator visit Google Play Store on mobile phone and download the app. Open it and click the little plus sign at the top; scan the QR Code and enter the generated code on BitMex. Click submit to finish the process, so anytime you want to log-in enter a new two factor token generated on Google authenticator and log-in.
To fund your BitMex account, click account and send bitcoin to the bitcoin deposit address. An email will be sent to you after it receives the bitcoin. You can also check the balance in the account section
BITMEX OVERVIEW AND ALT COIN PAIR CONTRACTS BitMex dashboard is made up of different section and can be rearranged as traders see fit. This post covers all important sections necessary for trading. It covers order book, Order, recent trades and position/margin section.
At the midway after place order is position subsection. The leverage value is set in this section and depending on the alt coin pair it value ranges from cross to 100x. With the exception of Bitcoin all other pairs has a leverage limit below 50x.
TRADING BUY/LONG AND SELL/SHORT WITH AND WITHOUT LEVERAGE Depending on the speculation made a trader can either Buy/long or sell/short alt. pair, i.e. buy/long if predicted price to move above current price and sell/short if predicted price to move lower than current price. To open or close a position a trader can use the limit or market section. The amount to buy or sell is entered in the space beside the “quantity” in USD. Just below the “quantity” under the limit section is “Limit price” beside which a trader can enter the intended entry price. If a limit price is below the current price, a buy/long order will not be executed until the current price retraces and hit the limit price but, if limit price is set above current price, i.e. deep into the market buy/long order will execute immediately. Opposite scenario applies to the sell/short order.
In the market section only Quantity is required, this mean orders are executed automatically at current best price. Its disadvantage is double fee payment (Maker and taker fee)
LEVERAGE Leveraging simply refers to borrowing. Depending on risk a trader is willing to take leverage can be as high as 100 times the trading capital. For example a trader with $20 can trade with $200 under 10x leverage. In a nutshell, a trader can multiply his trade amount with leverage as he sees fit. But the higher the leverage the higher the risk involved. For simplicity a 10x leverage will be used to explain some parameters. Under the Buy/Long and Sell/Short there is cost, order value and available balance. Cost is the actual amount a trader risk on particular trade; order value is the amount being traded with leverage i.e. order value = cost × leverage and available balance is remaining balance after cost is deducted in original balance.
With leverage being explained it will be unfair to skip its risky aspect. At the point of executing an order with leverage a pop up box to confirm the order will be displayed. On the box are the order details: - Order value: Trade quantity with leverage - Cost: The actual capital of stake - Available balance: Balance remaining without the cost - Estimated liquidation price: If hit the price at which a trader’s position will be liquidated and result in loss of all cost price. So it is very important to look at the liquidation price before executing a particular trade.
Position section becomes very important after confirming an order. It is there the liquidation price unrealized PNL and active orders are monitored. The unrealized PNL shows percentage loss or gain of open positions while realize PNL indicates that of close position.
HOW TO USE STOP LOSSES In the last tab under place order section are stop losses. It consist of four different type - stop limit, stop market, trailing stop and take profit
Now that we’ve covered the essential part of BitMex trading, let’s scrutinize and look at success rate of some BitMex trading signal telegram channel. The best BitMex signal telegram channel I’ve come across so far is Bitmex Call t.me/bitmexcall. They roughly give 1 signal per day on their free channel. Their success rate is around 91% i.e. in 22 signal 20 hit their targets while remaining 2 hit stop losses. Other channels are Bitmex Lifestyle t.me/ bitmexlifestyle and Zcrypto trading t.me/zcrypto. Register and start BitMex trading via my affiliate link and enjoy 10% fee discount for the next 6 months. https://www.bitmex.com/registeiHcxly If comfortable you can also donate BTC for an ongoing trading signal app and website project I’m currently developing to: 1K4SLVq5QaC7F1VHWzsjp94LucXuRprU1C HAPPY TRADING Buy BTC from Coinbase via https://www.coinbase.com/join/57fa34df135663714e192d99 and enjoy bonus of 10 dollars Or from Remitano via https://remitano.com/ng?ref=mumeen
submitted by sb_order to cryptotrading [link] [comments]

New Expanse Luna wallet now PUBLIC!

New Expanse Luna wallet now PUBLIC!

https://preview.redd.it/oovy6heq07n11.jpg?width=1600&format=pjpg&auto=webp&s=3635b9ba40868587e00237645b36e70ac8a8ddd0
"Welcome to the seventeenth edition of the Expanse Newsletter for 2018. This publication is a bi-monthly newsletter issued on the 1st and 15th of each month to share happenings within our community. Here are a few highlights in this edition:
  • The PEX Airdrop Happened. What now?
  • New Expanse Luna Wallet Now Public
  • New Chinese Expanse Website
  • Gameboard – We Believe in a World Where People Want to Play
  • Slips Partnership – A Winning Proposition for EXP-holders
  • Call for Tokenlab Beta-Testers
  • SomosExpanse our Digital Magazine in Spanish
  • Community News – Current Crypto Market Conditions – What’s Happening?"

THE PEX AIRDROP HAPPENED. WHAT NOW?


https://preview.redd.it/hk28eq9127n11.jpg?width=1600&format=pjpg&auto=webp&s=810730752c392f0d61d50be03d3a0efa845fc8ca
As you know, the EXP team just airdropped a new token, PEX, to the Expanse and Tokenlab community. Airdrops are a straightforward way to bootstrap a user base for a new product, in this case, the Expanse Decentralized Exchange, EXPEX. The airdrop piloted the Tokenlab Airdrop module, one of the applications that comprise the Tokenlab self-service suite of products designed for ICO management. It went off without a hitch. (If you have not found your PEX, email [email protected].)
Expanse secured the services of an external development team to create EXPEX, and the final code has been delivered. We are in the process of branding the UI and will publish a launch date soon. So, hang onto your PEX!
Read more detail here about how it all works: https://expanse.tech/understanding-pex-token-utility/

NEW EXPANSE LUNA WALLET NOW PUBLIC

https://preview.redd.it/73unvd0627n11.jpg?width=1600&format=pjpg&auto=webp&s=79da74325d37b736dcfe871ab07fe510c99df9d8
The new Expanse wallet, Luna, is now public and ready for download. The download links are on the Expanse.tech website or you can use this link: https://expanse.tech/downloads/ The existing Expanse Mist wallet is a fork of the Ethereum Mist wallet. However, Luna is a wallet we developed with our own original code, and promises to be one of the most feature-rich wallets out there once all of the development is complete. For now, feel free to use either Mist or Luna. We will give you plenty of notice when or if we discontinue support of the Mist wallet version.
Many thanks to all of the Expanse Army 1st Lieutenants who participated in the beta-test. Please continue to report any bugs that may have not shook out during testing.

NEW CHINESE EXPANSE WEBSITE TO LAUNCH OCTOBER 1

https://preview.redd.it/dn4lu67b27n11.jpg?width=1600&format=pjpg&auto=webp&s=c853175c8b1cc1db939739c2ec381baef4a07daa
Our Chinese marketing team, led by Community Manager Alex Zhao, is putting the final touches on the Chinese version of the Expanse website. They project a 10/1 launch date.
Some of their other accomplishments include:
  • WeChat membership increased to 350.
  • QQ group increased to 500 members.
  • Submitted applications to two exchanges in China.
  • Participate as active beta-tester for Luna wallet.

GAMEBOARD – WE BELIEVE IN A WORLD WHERE PEOPLE WANT TO PLAY!

https://preview.redd.it/np2biwyg27n11.jpg?width=2560&format=pjpg&auto=webp&s=9ce86736109a837e4ab2d8a1d1b61bbf84846d28
Gameboard is an EXP.Grants partner. We asked their team to help us understand the gamification principles behind the Gameboard dApp. We learned that there are indeed scientific theories behind all of this play.
When talking about Gamification you automatically think about adding points to a platform to make it “fun.” However, there are many more factors that affect the degree of fun or interest in a game on the part of the players.
Many applications that have come onto the market use the basic principles of gamification as part of the design. We have covered them in other Expanse articles: Frameworks as Octalysis or 6D approach of gamification. It is important to establish that there are two important parts in the application of Gamification to a platform or system: Dynamics and Mechanics.
Dynamics consist of all the activities added to the game based on the actions of the players:
  1. Discovery phase: Listening, reading, observing and navigating to generate interest.
  2. Onboarding phase: In this phase, the user feels that he/she is advancing in a simple and orderly manner; he gets hooked.
  3. Scaffolding phase: After the user is already immersed in the game, he/she then seeks to improve and win. During this phase, users develop the greatest amount of challenges and require constant feedback.
  4. Endgame phase: Finally, we must give a closure to each activity. This is the end of the game, which is an important action—a huge challenge—that allows the user to feel that he/she has conquered the game. This phase is called Endgame. Just when the user is about to feel that he/she is finishing, we invite him/her to a new challenge, to a new objective—phase 2 or the next level.
In the design stage of a game (pertaining to the dynamics) the User persona is also established to model potential users. The needs, the objectives, the emotions and the feelings are also established during this phase of design.

I HAVE THE DYNAMICS, NOW WHAT?

This is the part where Gameboard comes into play and where the mechanics are necessary. The mechanics allow for establishing the points, levels, badges, challenges and other forms of measurement. The activities within the gamified process are recorded in this part. Without this, we would not have analysis of the information.
Gameboard saves and stores the information generated by the dynamics so that it can be analyzed and collaborate in the decision making. Even more important, it allows for recordkeeping and control of the actions of each player.
The fact that users can receive rewards is one of the most important features, especially because it is the way of measuring performance in terms of
  • Budget
  • How much the company has improved in performance (assuming that this was the goal)
  • Each award in time
  • Objects that have direct involvement with money

THE GAMIFICATION PLAYGROUND ON THE BLOCKCHAIN

By integrating Expanse blockchain technology, Gameboard safely stores each record of points earned by the player, these being value transactions that rely on the security and permanence of the blockchain to store and redeem points for the players.
There are two current lines of business for Gameboard:
  • Custom – The customized approach is based on integrations into existing platforms created by other companies or ventures. If they already have a system, Gameboard is integrated into this system and keeps track of points earned.
  • Standard – Add-ons, plugins or components in platforms that already exist in the market. We create these integrations to enter those markets. This will increase the number of transactions on the platform and users that interact in it.
For both options, Gameboard provides information analysis, progress, behavior and motivation across any of the different platforms. Gameboard respects the anonymity of the players, so it does not store sensitive information about its users.
Currently, we have finished the Gameboard base engine, the API that allows integration, and the user and administration platforms. Each section of the system is customizable so that it has the look and feel of your company or platform.
We are very close to launching the new functionalities including the integration with Expanse’s technology. So, stayed tuned!
We believe in a world where people want to play!!

SLIPS PARTNERSHIP – A WINNING PROPOSITION FOR EXP-HOLDERS

https://preview.redd.it/popiv4wl27n11.jpg?width=1600&format=pjpg&auto=webp&s=0e55807c2e29275cc4ec845054a3e5efbbba1e88
We continue to be excited about the potential of the Slips project, which was one of the first batch of projects to receive grant funding from Expanse.
Did you know that straight out of the gate, EXP (Expanse) is the only payment option for the Slips platform? When the platform launches, people will only be able to make real money bets with the EXP token. Now would be a very good time load up on Expanse in advance of their launch!
As one community member surmised, “This is a great example of what makes the Slips partnership so awesome—Slips gamers will have to settle bets in EXP. People who have never had any interest in crypto won’t have a choice but to buy EXP if they want to use the platform for something that has already been demonstrated as a need in the online gaming community.”

https://preview.redd.it/ipizbnuq27n11.png?width=1366&format=png&auto=webp&s=290bf96aa8649c934547509d0ccf07dc81285252
A quick reminder to those who aren’t up to speed on what Slips is hoping to achieve. The team are working on a project which will allow gaming fans to use the Expanse network to challenge each other to bets whilst watching their favorite streamers on platforms like Twitch.
In the last newsletter, we mentioned that it was possible for users to create channels and explore what was available on the Slips platform. Now you can even create your own profile. We decided to give the functionality a quick spin earlier and were amazed by how nice it looked!
As well as being able to make our profile look the way we wanted, we were able to post status updates, link our existing social media accounts, manage the official Expanse channel on Slips and even follow other users.
Take a look at the Expanse profile on Slips here https://slips.network/profile/EXP/home:

https://preview.redd.it/wlixpt1w27n11.png?width=463&format=png&auto=webp&s=94514a0d65e6646a05f52e253e98a02a1a01849b
If you are feeling adventurous (or curious!) why not register and make your own profile? The Slips team mentioned in an announcement in their Discord channel (https://discord.gg/mJHJ88U) that they are looking for help from users to iron out any bugs.
Meanwhile after successfully launching the profile feature, they are continuing to work hard to get the proof of concept released. They’ve spent the last week finalizing specifications and requirements for the next milestone in the project. The UI work has already begun and coding will also resume next week. We have a few sneak previews that we obtained below:
https://preview.redd.it/q04yd7v037n11.png?width=463&format=png&auto=webp&s=cd43786828fdb3d81cec32eafea2c36736bd3f29
https://preview.redd.it/ljwuyeg337n11.png?width=226&format=png&auto=webp&s=4aed4abd85126ff7fafcc5ca0edf51d1989cbc0a
https://preview.redd.it/wf6kkkp737n11.png?width=300&format=png&auto=webp&s=06279ed194782ea53192eb7c6366a3610ce96cd6
https://preview.redd.it/9cxe4a8b37n11.png?width=300&format=png&auto=webp&s=51e50b11fce44c8192dd34392c4f36f9169832b6
https://preview.redd.it/thw52i8d37n11.png?width=300&format=png&auto=webp&s=c1a7de653ed2cfe7f46f5361c23b221de8d03b61
https://preview.redd.it/67cx9gqf37n11.png?width=300&format=png&auto=webp&s=54526a93b0cec3fe84fe06412e1edad85f6dde73
We look forward to the launch of their dApp on the Expanse network.

CALL FOR TOKENLAB BETA-TESTERS

https://preview.redd.it/op9kr8un37n11.jpg?width=1600&format=pjpg&auto=webp&s=b8f5f2fcb6b7550a5ad2ba6c680a50b3f49dddc2
Per the dev team, we are close to releasing some of the applications that comprise the Tokenlab self-service suite of products designed for ICO management. Recently we put out a call for testers to try out the beta versions of the Luna wallet. The response was overwhelming, and we qualified nearly 40 testers. These same testers have access to the private channels for Tokenlab beta testing. If you did not apply and want to test Tokenlab, complete the application form here
Beta-testers receive a promotion to 1st Lieutenant in the Expanse Army.

SOMOSEXPANSE. OUR DIGITAL MAGAZINE IN SPANISH


https://preview.redd.it/sdttio2u37n11.jpg?width=1600&format=pjpg&auto=webp&s=68f0d199ad5b7ee2f47430d095266578e7465f13
Spanish is the second-most spoken language in the world. The market continues to grow—especially for the Expanse community. To that end, we have created SomosExpanse (We are Expanse).
SomosExpanse is a digital magazine whose purpose is to inform and educate about blockchain technology. The project is born from a motivated community, integrated and growing. To accomplish this, we have added a dedicated Spanish-speaking communications team to the Expanse infrastructure.
All of the Expanse project content routinely created in English (news, blogs, newsletters, social media posts) is translated and placed on the SomosExpanse platform. We also integrate articles from reliable sources, such as Criptonoticas and CoinCrispy, in order to offer more robust content.
We are focused on creating an interactive media strategy with valuable content, as well as constant updates about Expanse and the world of the blockchain. We developed a progressive APP for you to have it directly on your phone with notifications and amazing content.
This strategy is complemented by postings to social networks, including Diiscord, Instagram, Twitter and Steemit. We invite you to follow (and like) us on these social networks:
We have plans to replicate this communication strategy in many other languages, including Chinese and Japanese. We invite you to participate by suggesting other languages for the concept or by serving as an ambassador to help provide content. If you are interested or have any suggestions, please write to [email protected].
We are Expanse.

COMMUNITY NEWS

https://preview.redd.it/7hepf0jy37n11.jpg?width=1600&format=pjpg&auto=webp&s=27ef8affac87473f2703af2f11460f4f38af6c00
Usually, we provide a list of compelling quotes gathered from community discussions. This time, we decided to feed back a narration of an important discussion that took place last week regarding the current crypto market conditions. In case you missed it, I’m sure you’ll agree that we have one of the most insightful, clever communities around.

CURRENT CRYPTO MARKET CONDITIONS – WHAT’S HAPPENING?

“What’s happening to crypto?” “What’s causing the prices to tank?” These are obvious questions on everybody’s minds these days as prices begin to tumble. Bitcoin lost close to $1000 in the last 10 days and Ether has lost almost 25% of its value in the last month. The situation is even grimmer for other altcoins. So what is really happening?
The Expanse Discord channel, if you know, is one of the most vociferous and active crypto communities out there and most of its members are astute students and passionate followers of the crypto phenomenon It was only fair that similar questions arose during an avid round of discussions and there were some interesting points of view from across the aisle regarding what was happening.
It started with a member saying that he thought that the end of crypto is near. He was worried that too many scams had taken their toll on a fascinating and promising phenomenon that has the ability to change our lives forever. However many projects gave false hopes and people lost a lot of money and in turn, their faith. The negativity that is being experienced in the market was a result of this disappointment and people trying to cash out their crypto assets as fast as possible. This would probably signal the collapse of a lot of altcoins. The member went on to predict that most coins will stop all development or activity before the year is over because cryptocurrencies just won’t be able to hold their value and people are seeing this more clearly with each passing day, fuelling the circle of fear and mass dumping.
To this, another member had an interesting observation. He said that what was currently happening to crypto is similar to what happened to dotcom in 2000. After the “dotcom bubble” burst, what was left were companies with real value, like Google that came out with a few bruises but emerged winners. Many companies followed what Google had done – build real value, rather than hype – and made a fortune for themselves, while transforming the industry.
A member observed that nobody is buying anything and he was surprised people are still selling at these prices. He thought it was kinda late in the game to think people are going to save what they have left.
The EXP token has also bore the brunt of this haphazard volatility. Market and volume patterns suggest that someone is buying EXP from the sell side just to sell into the buy side to strip the market of its BTC. Unfortunately, this strategy seems to be working pretty successfully.
A member, however, dismissed that people were specifically targeting EXP and said that while he agreed that there was a repeating pattern, it was market-wide. Most of the top coins have already lost around 88-95%of their January high values and many coins, especially the lower value ones, are hitting their introductory prices or even less.
He went on to further say that some people were dumping not just Exp, but everything from the lowest coin on the list all the way up to Ethereum. He called this action as a “purge” because it is likely that some of the projects will fail economically or just fail completely. To understand the severity of the situation, consider this. A project that raised $10M worth of Ethereum in an ICO in January 2018, now only had around $1.2M if they didn’t liquidate immediately. Most projects held their Ethereum reserves and have seen a severe erosion of their funds. Likewise, the value of the projects coins themselves are becoming worthless.
If you look at wallet balances on most projects, the top 100 wallets hold well over 90% of the total coins in any given project. Keeping in mind that some of these wallets are exchange wallets, that is still a little disheartening. The bitcoin whales are alive and are absorbing this tirade pretty well. They have so much BTC, they can’t cash it out so for them it is more of a game.
A member had an interesting take on the scenario. In his opinion, manipulators periodically use BTC to harvest altcoins from weak hands. Blockchain IS the future and some of them will become zillionaires sooner or later. Since blockchain is the future, there probably are governments, 3-letter agencies, armies, secret societies, hackers and criminals involved. In his opinion, anyone mining EXP currently and selling it is obviously a moron!
To this a member added a personal experience that he stopped mining EXP in April, because at the current price, with 1.1GH/s, he made 90¢ per day, after paying for electricity costs. This is obviously unviable. So the question he had is that if everybody bought EXP at a higher rate, who’s selling them at these rates? It is quite likely that they are selling at a huge loss.
There, apparently, are people who sold recently at 8¢ on the dollar to exit the market completely. They are done. They think the crypto market is dead. This was what is known in financial terms as “market capitulation.”
By definition, capitulation means to surrender or give up. In financial circles (from Investopedia), this term is used to indicate the point in time when investors have decided to give up on trying to recapture lost gains as a result of falling stock prices. Suppose a stock you own has dropped by 10%. There are two options that can be taken: you can wait it out and hope the stock begins to appreciate, or you can realize the loss by selling the stock. If the majority of investors decides to wait it out, then stock price will likely remain relatively stable. However, if the majority of investors decides to capitulate and give up on the stock, then there will be a sharp decline in its price. When this occurrence is significant across the entire market, it is known as market capitulation.
The longer a market stays in a state of capitulation, the longer it takes for investors to regain enough trust in that market to jump back in. This is what causes recessions. Once a recession has run for an extended period and market confidence is still low, it becomes a depression. This is when people like Warren Buffet would swoop in and buy anything and everything people were selling. His now famous adage says, “Be fearful when people are greedy and be greedy when people are fearful.” While it is difficult to agree with his brand of investing, but when it comes to financial advice, this one line reigns supreme. And this is exactly what’s going on right now.
One member found it funny when BTC purists say that BTC was created to replace the “corrupt” fiat system. They then look down at altcoins but at same time practically beg investors like Goldman Sachs or Buffet to invest in crypto. BTC forums are full of people like that, and you even get 50 merit points for simply saying “BTC rocks, all alts are shitcoins!”
At the end of the discussion, there was some sage and positive advice from a veteran – “Just gotta keep developing. Eventually crypto will have utility, it’s just taking forever because it’s so new. Right now people are buying on promises. We need promises to be kept in this space so that people have to buy out of necessity.”
Another member ended the discussion saying that while the crypto markets certainly look grim right now, everybody needs to understand that all markets move in cycles. What goes up will come down and judging from previous cycles, the crypto markets will certainly go back up again. Of course, not everything will go back up, but projects like Expanse, that have active development and goals they are working toward, will. The question is how long are you willing to wait?

JOIN OUR DISCORD

https://preview.redd.it/ci5d1m5447n11.jpg?width=800&format=pjpg&auto=webp&s=94ae4c46d6eb25afa9c2f108b4d363a7b88510a0
Expanse Discord is live and kicking! Discord is a great communication platform, better than Slack. Join our growing community on Discord and you can also speak directly with the Expanse team or others in the Expanse community. Sign up for Discord today!. Thank you.
https://Discord.me/expanse

https://preview.redd.it/fr63knk947n11.jpg?width=640&format=pjpg&auto=webp&s=8c5716c2e402d6f1f76d0529ad97d1f2d7cca844
The Expanse Ambassador Program is designed to provide support and guidance for those of you who would like to help us spread the word about Expanse by hosting local meet-ups—wherever you are in the world.
Getting involved is easy. Simply download and complete the Ambassador Program application at this link: https://expanse.tech/join-the-ambassador-program/
The Expanse team are available to answer your questions and will also assist you by:
  • Providing Expanse-branded apparel for the meet-up host (the ambassador).
  • Guiding you through the process of selecting a location.
  • Supplying Expanse giveaways for drawings or contests.
  • Assisting with presentation materials.
  • Providing a small allowance for food and libations for your meet-up guests.
Expanse is thrilled to have you in the Expanse Army. Be sure to join Discord if you are not already part of it at this link: https://Discord.me/expanse – and grateful to all who would like to join the Ambassador Program!

This is the latest newsletter from EXPANSE. Must read it to know more about their latest news!
submitted by Lilmarianne to ExpanseOfficial [link] [comments]

Blindspot Whitepaper: Specialized Threat Assessment and Protection (STAP) for the Blockchain

BlindSpot™
Stop attacks before ”zero day” and stop the Advanced Persistent Threat (APT)
We live in a dangerous world — our information technology systems face that danger every single day. Hackers are constantly attempting to infiltrate systems, steal information, damage government and corporate reputations, and take control of systems and processes.
Hackers share and use a variety of tools and techniques to gain access to, and
maintain access to, IT systems, including groups and techniques so dangerous
they have their own category - the Advanced Persistent Threat (APT). At the
center of the APT are sophisticated techniques using malware to exploit vulnerabilities in systems. Traditional cyber security technologies use file signatures to locate these tools and hacker malware, but hackers are now actively camouflaging their tools by changing, customizing, and “morphing” them into new files that do not match any known signatures (‘Polymorphic Malware’). This introduces a massive gap in malicious file detection which leaves the enterprise open to exploitation — and it’s just not possible for traditional signature-based systems to keep up. In fact, signature-based anti-virus and anti-malware systems are only around 25% effective today. BlindSpot™ sees through it all, even as the files morph and change in a futile attempt to remain camouflaged.
Digital File Fingerprints
Any File Type, Any Language, Partial Matches, Exact Matches
BlindSpot™, the adaptive security solution from BlindSpot™, can see through the
Polymorphic camouflage used by the worlds most advanced hackers by utilizing
digital file fingerprints and our proprietary adaptive BlindSpot™ ‘brain’ that constantly analyzes the fingerprints of known malicious files and tools to locate partial matches within the files on your systems - servers, laptops, desktops, USB drives, and even mobile devices. BlindSpot™ can cut right through the Polymorphic files, revealing the true hacking tools underneath, even if they are only fragments or pieces of a more complete set of hacking tools and technologies.
Most cyber attacks happen weeks or even months after their initial penetration and access to a network or system, and even the simplest attacks tend to have a fuse that is typically several days. It takes them time to map out a system, probe for the information they want, and obtain or forge credentials with the type of access they need. But from the moment their tools first land on your network and systems, BlindSpot™ sees them. If fact, BlindSpot™ can see them sitting on a newly inserted USB drive even if the files are not copied to your systems. This means BlindSpot™ can identify and alert you to malicious files and potential illicit activities before the attack happens - before zero day!
How does BlindSpot™ work? BlindSpot™ sits on the endpoint and continuously monitors file activity. Digital fingerprints, which can be used to find partial matches of any file type in any language, are reported back where they are kept forever in a temporal repository.
BlindSpot™ looks through all of the digital fingerprints — both those from files on your systems and those in a constantly updated database of known malicious files and hacking tools, to locate and alert you to any indication of hacking, malicious files, or illicit activity. BlindSpot™ is a disruptive technology that can see polymorphic malware and stop attacks before zero day.
Digital File Fingerprints are created from a file or a piece of digital data/information by using advanced mathematics to look at all of the small pieces of data that make up the file to create a very small, unique piece of mathematical data — a digital file fingerprint. Files may be of any file type and in any language - digital fingerprints can find partial and exact matches regardless of what is in the file itself.
Just like with humans, once a fingerprint has been taken, you no longer need the
person to identify them. The fingerprint is enough. Even a partial fingerprint is
enough, and sometimes a smudge will do. Digital fingerprints work on the same
principle. Once BlindSpot™ has taken a digital fingerprint of a file, the file is no longer needed to identify it or to compare it with other files. And because digital fingerprints are tiny, they are easy to store. Even a multi-gigabyte file has a digital fingerprint that is no larger than 10k bytes.
Once you have two sets of digital fingerprints, you can compare them. Because BlindSpot™ starts with full fingerprints of known malicious files, it can identify matching files even when the digital fingerprint is only partially there. And with BlindSpot™’s advanced processing capabilities, file fragments, recovered data from a hard drive, partially downloaded documents, damaged files (both intentional and accidental) and other incomplete file structures can be properly fingerprinted in a way that still allows matches to be found.
Other technologies and software use static signatures, which do not work if any part of a file, regardless of how small, is different from another, or if the file is damaged in any way. BlindSpot™ and digital fingerprints enable partial matching, and can see through the camouflage that has become the industry standard for hackers across the globe. Static signature based solutions simply cannot do this.
Imagine your favorite detective drama on TV. The prosecutor says “This partial
fingerprint was found at the crime scene and the video camera across the
street recorded a perfect image of the person’s face.” The jury deliberates and
compares the picture and fingerprints of the defendant that were taken the day
before. They conclude, because the fingerprint was not all there and was not 100% identical, and because one picture showed a mustache that looked identical but was one millimeter longer than the other picture, that the two people were not identical - and set the criminal free. Well, that show wouldn’t be on TV long because crime would run rampant. Now imagine they had BlindSpot™. Criminals would be caught, the town would be a much safer place, and the show would be on for years to come.
Now imagine your network and systems without BlindSpot™, where traditional
exact match signature software is on your front line of defense. All kinds of
malicious files could walk right through and sit down on your hard drives, just
waiting for hackers to activate them. But you don’t have to imagine what your
systems would be like with BlindSpot™ — instead, simply contact us, get BlindSpot™ in place, and we’ll work with you to show you what’s really on your systems and help you keep those systems safe.
Ensuring System Compliance
Take the guesswork out of compliance assessment
All Government systems go through Certification and Accreditation. BlindSpot™ can help you with malicious code protection, for both security considerations and required compliance. Guidelines found in NIST 800-53 Revisions 3+ Security Requirements for System Integrity, SI-3 Malicious Code Protection, state that malicious code protection mechanisms must be employed at information system entry and exit points, including workstations, notebook computers, and mobile devices, to detect and eradicate malicious code.
BlindSpot™, with its continuous monitoring of the files on your endpoints and its
continuous updating of its known malicious file repository, will provide the
required real-time and full monthly re-scans of your files, will alert your
administrative staff when malicious code is found, will provide reports on
potential malicious files, illicit activity, and follow-up with very short false positive reports. BlindSpot™’s false positive rate is less than 0.01%. BlindSpot™ helps organizations meet the security requirements set forth and ensure compliance.
Intellectual Property Protection
Track sensitive information as it changes and moves around the enterprise
BlindSpot™ uses digital file fingerprints to identify partial and exact matches between files, regardless of file type or language. This ability can be used to track movements of and changes to files on a network of computers.
Government entities and corporations need to addresses the issue of monitoring
documents and files that contain sensitive information intellectual property, and it
is no longer sufficient to simply store them on a secure server and require specific credentials to access the information. People, both unintentionally and sometimes with malicious intent, copy and paste parts of documents, move files to USB drives, and otherwise edit and transfer files in order to get them on to a laptop, share them with a co-worker, or exfiltrate confidential information to outside networks and systems. BlindSpot™ carefully watches all of the files on your network, including what’s going with USB drives. If someone copies part of a file that has sensitive data to another file, BlindSpot™ sees it. Furthermore, BlindSpot™ can alert you when it sees questionable activity with certain documents/files or with specific computers/individuals.
Your sensitive files now have a watchdog that catches both unintentional and
malicious exposure to non-secure systems. Use BlindSpot™ to set up a custom
database of the locations where your sensitive files are stored, and BlindSpot™ will create a set of digital file fingerprints that can be used to track those files across your network and systems. This ensures that an organization can know where its proprietary and sensitive information is 365/7/24, in real-time.
Supervisory Control and Data Acquisition (SCADA) Systems
Supervisory Control and Data Acquisition (SCADA) is a system for remote monitoring and control that operates with coded signals over communication channels (using typically one communication channel per remote station).
SCADA networks contain computers and applications that perform key functions in providing essential services and commodities (e.g. electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. They are part of the nation’s critical infrastructure, provide great efficiency, are widely used, and require protection from a variety of cyber threats.
One of the most significant threats is benign files residing on the computers on
the network that morph into tools that hackers can use to gain access to the
network and the equipment it monitors and/or controls. These files might be part
of the operating system (binary files), might be a normal file that includes
scripting, or can even be a general data file moved onto the computer through a
network or a USB drive. By morphing, these files circumvent detection and
countermeasures. This is just one example of how a hacker can compromise and
exploit the system and the worst part is that you will never know until it is too late!
The recent Department of Justice announcement charging Iranian hackers
believed to be tied to the 2013 hacking of a New York dam illustrates this threat
clearly.
Enter BlindSpot™’s BlindSpot™ Adaptive Security — BlindSpot™ monitors all files of all types (any format or language) without the requirement of a translator or human operator. BlindSpot™ can see right through the hacker’s camouflage of
morphing files to quickly identify problems and threats before hackers have the
opportunity to active and use their tools. For U.S. and foreign based systems,
BlindSpot™ is a must have cyber security solution.
The BlindSpot™ team has extensive experience with SCADA systems and critical infrastructure. Our BlindSpot™ solution is critical to the overall security framework of such systems as it was designed to find the morphing, malicious files and associated illicit file activity that can lead to compromise of the integrity, confidentiality and/or availability of the system. Threats loom on both the inside and outside, and the dynamic nature of these systems require continuous, temporal monitoring to stop cyber attacks before they happen.
Stop Ransomware
Identify and remove Ransomware before it encrypts your files
Ransomware attacks are on the rise and affect Fortune 500 companies, Federal
organizations, and consumers. This vicious type of attack affects your user’s ability to get their work done and prevents users from accessing files on a device or network by making the device or network unusable, by encrypting the files your users need to access, and/or by stopping certain applications from running (e.g. the web browser). A ransom is then demanded (an electronic payment of currency or bitcoins) with the promise that your data will be unencrypted and accessible again following the payment.
If the ransom payment is made, there is no guarantee that the data will be
unencrypted or returned to a state of integrity and/or availability. Furthermore,
there is also no guarantee that the people behind the ransom will not re-infect
your systems again with a variant of what was initially used. Payment encourages future attacks because they know you cannot detect it and will pay again next time. Surprisingly, there are only a handful of known ransomware files in use today (e.g. Crowti, Fakebsod). Safeguards exist that use static signatures to find exact matches for these known files, but the moment these files morph or are changed in any way they become undetectable by these solutions. BlindSpot™ digs deeper with digital file fingerprints and can find the new files, enabling you to analyze, quarantine, or delete them before they activate. This pro-active approach can be the difference between a system being protected and a system being made completely unavailable with encrypted data being held hostage for a ransom. The image below is an actual Fakebsod notification message.
BlindSpot™ uses digital file fingerprints to detect the ransomware by looking at
both partial and exact matches and can report the problem before it happens.
Ransomeware of the past attacked your personal computer and today’s variant
attacks the servers — BlindSpot™ can detect both.
Case Study: March 2016 - Two more healthcare networks are hit by ransomware targeting servers. Advice from law enforcement — pay the ransom! (They did). File backups are insufficient. Paying ransoms is costly and only encourages repeat attacks.
BlindSpot™ is the most comprehensive solution available to detect and root out
ransomware. Take charge of the situation and put BlindSpot™ to work continuously monitoring your systems.
Get BlindSpot™ Now
Commercial or Government, with multiple contract vehicles available
How Can I Get BlindSpot™?
CYBR develops and sells its adaptive enterprise cyber security software product, BlindSpot™, and provides professional services and support for BlindSpot™ implementations.
Product
BlindSpot™ Adaptive Security is a continuous monitoring enterprise solution that tracks file-based activity on the endpoint using digital file fingerprints, can identify problems and cyber threats before zero day, and can see through morphing, camouflaged (polymorphic) files to make accurate determinations of malicious files and illicit activity.
Deployment Options
BlindSpot™ can deployed as a secure cloud application for maximum flexibility, a standalone Enterprise implementation for maximum security, or the two combined in an Enterprise implementation augmented through a secure cloud gateway.
Professional Services and Training
BlindSpot™’s team of cyber security experts have the expertise to support
you by creating a holistic, enterprise security framework that consists of people,
policy, procedures and technology that will ensure a security posture that implements the best risk management strategies, tactics and operations available.
Email us at [[email protected]](mailto:[email protected]) for more information.
BlindSpot Solution Brief
June 29, 2018
POC: Shawn R. Key CEO, President
[[email protected]](mailto:[email protected])
Executive Summary and Estimated Pricing
CYBR’s BlindSpot is an enterprise cyber security solution that pro-actively identifies unknown and known malicious files and circumventive activity on endpoint devices. It is designed to interact with the CYBR Ecosystem and associated Web Portal. Distributed clients serve as the connection to the various BlindSpot server tiers.
BlindSpot identifies Illicit File Activity (IFA) and associated hacker activity via perceptive, industry standard algorithms. BlindSpot identifies exact AND similar files regardless of file type and/or language. This applies to ALL file types (e.g. documents, images, audio and video, carrier, etc.). Currently implemented safeguards and counter measures (such as anti-virus (AV), content filters and malware analysis tools) cannot address polymorphic/adaptive files and emerging threats. This introduces a massive gap in illicit file detection and leaves the enterprise open to exploitation. BlindSpot fills that void.
Additionally, corporations and government entities have a need to address known files and associated activity with regards to content and data management. The uncertainty of Intellectual Property (IP) location and propagation poses significant risk to the organization. The ability to identify the life cycle of a file (origin, source, destination, attributes and proliferation) ensures an organization knows where its proprietary, sensitive and privacy information is 365/24/7, in near real-time.
BlindSpot, is significantly different from solutions in the emerging Specialized Threat Assessment and Protection (STAP) marketplace, as it scales to meet the needs of enterprise organizations and the commercial marketplace. BlindSpot’s proprietary database consists of millions of unique, digital identifiers (hash values) that identify exact AND similar, modified files. This ensures that files existing in their original state or those which have been intentionally modified, do not circumvent detection. Our algorithms ensure near zero false positive return rates. The combinatory effect and the rare expertise of our executives and development thwarts potential competition as BlindSpot is an enterprise solution; not a tool.
The enterprise solution is provide as a license per IP address with associated appliance and/or server hardware requirements.
CYBR BlindSpot Technical Deep Dive
CYBR’s BlindSpot product is currently available as a Software as a Service) (SaaS) deployment blockchain solution and will be available as a full enterprise-install by Q2 2019. In both implementations, end-point agent software monitors the hard drive(s) of a computer or server, analyses any files that change, and reports [multiple] file hashes back to the main system. This enables the main system to effectively monitor which files could be malicious or represent intellectual property on the computers and servers within the customer’s network. By using fuzzy hashing algorithms, the system can detect polymorphic malware and intellectual property that has been partially hidden or obfuscated.
Applications
End-point (client) agent: native to each major OS as a fat client. Currently we have end-point agents for Microsoft Windows-based systems using MS .NET c# 2.0/4.5 and C++, although the c# portion will be replaced with all c++ code to increase scalability, efficiency, and security, in Q1 2016. End-point agents for Mac OS (written in Objective-C) and popular Linux platforms (written in c++) will ship in Q1/Q2 2016. Development work on the CentOS linux agent will begin in December 2015.
The Control Application enables system administrators to configure each end-point agent, the system itself, and to actively monitor and access reports on files that have been identified by the system as problematic or of interest. At this time the Control Application is able to provide configuration and monitoring services but is not yet ready for customer on-site deployment and is therefore only available in a SaaS model.
The middle-tier of the system, the Portal sever, currently runs in MS .NET and is written in c#. This tier will be upgraded to a full c++ implementation to increase scalability, efficiency, and security, in Q1 2016, and will run as a standard web server extension on a Linux platform (CentOS/Apache).
The data-tier of the system currently is running in MS SQL Server 2008/2012 and uses transact-SQL tables, but does not use any stored procedures or transactions. Although this tier is sufficient for scalability through mid to late 2016, a no-SQL version of the data tier will be developed in 2016.
The Crush server (hashing services) currently runs on MS Server 2008/2012, is written in c#/c++ and is a) being ported to run as a (c++) daemon on a standard Linux (CentOS) server, and b) being re-engineered to function as a massively parallel application (c/c++) running on NVIDIA Tesla GPU accelerated systems. The Crush server communicates with the data-tier directly and the C2 server indirectly. Multiple Crush servers can run simultaneously and are horizontally scalable and fault-tolerant.
The C2 (Command and Control) server, written in c# and being moved to c++, communicates with the data-tier directly and the Crush server and Control Application indirectly to provide scheduling, system health and integrity, and prioritization services, as well redirecting jobs to maintain fault tolerance of the back-end server components. Multiple C2 servers can run simultaneously and are horizontally scalable.
Hardware and Network:
The basic architecture of the system has two different stacks of software. First, a typical 3-tier approach isolates data storage from end-point and Control Application access with a middle-man protocol altering Portal server. In the SaaS model, the end-point and Control Application software reside on-site with the customer, and the remaining stack components reside at the SaaS hosting datacenter. The second stack consists of multiple horizontally-scalable server components that run entirely in the backend as daemons and interact primarily through the data area to provide the services that are being marketed and sold to the customers. The two stacks are kept somewhat separate from each other in order to buffer one against the other in times of extreme load and for enhanced security.
Following is a description of each software module in the system and how it relates to the others:
The system has one component for data collection (the end-point agent software, which resides on the desktop computers and servers within a deployed customer site), one component for system administration (the Control Application, which resides on a desktop computer that the customer has access to or that an analyst can access through the SaaS system), and a collection of software processes/daemons and a data storage area that comprise the back-end.
The end-point agent collects data from the end-point computer, passes it to the Portal server, which in turn stores it in the data area.
The C2 server monitors the in-flow of data from the end-points, and tasks the Crush server(s) to analyze the data and compare it to databases of known good, known bad, and watch list files, in an efficient manner.
The C2 server also provides notification to the customer of any problematic or watch-list files following the completion of the Crush server tasks.
The Crush server monitors the data area, and performs batch or real-time processing of data as instructed to by the C2 server.
Technology
CYBR’s BlindSpot software is a commercially available product that combines a small footprint end-point agent with a centralized monitoring and management system to track files and file changes on the end-point using partial-match digital fingerprints rather than rigid full-match-only file signatures. As files and data buffers are created, edited/altered, and moved either through the network or via removable media devices including USB drives, the product uses its unique and proprietary technologies in combination with industry standard technologies to identify and locate both known malware and unknown [polymorphic] malware on end-points that are continuously monitored by the product. Staff is notified, depending on the urgency or type of digital fingerprint identified, through integrations with 3rd party SIEM solutions, email/SMS transmissions, and reports that are available using the central management system. A false positive rate of partial digital fingerprint matching of ~1 in 10-12 means staff will not be bombarded with unnecessary alerts, maintaining staff efficiency.
Overview: Traditional anti-malware products use static file signatures to locate known malware but have no means of detecting unknown malware, CYBR’s product uses digital file fingerprints that can identify both partial file matches as well as full file signature matches and in doing so can locate and identify both known and unknown malware within the deployed enterprise. A combination of industry standard and publicly available algorithms and CYBR’s own proprietary algorithms, trade secrets, methods, optimizations, and intellectual property for which a patent is currently pending (which is owned solely by CYBR) are combined to form a comprehensive anti-malware platform and continuous end-point monitoring product that is completely unique in the marketplace. Through the use of our proprietary algorithms and optimizations, the product has the ability to scale to the enterprise level and can track desktops/servers as well as mobile/phone/tablet/Internet of Things (IoTs) devices.
Project Implementation: The implementation of this product would include both the commercially available BlindSpot product as well as prototypes of integration packages to connect with the on-site Security Information and Event Management (SIEM) and other systems and prototypes of end-point agents running on operating systems that are not yet available in the currently available version of the product. Both the integration and end-point agent prototypes would be based on existing modular code/functionality and would extend functionality past the currently available modules to ensure the full needs and requirements of the project are met. A full version of BlindSpot would be deployed on servers at/on the enterprise site, and prototypes of both SIEM integrations and new end-point agents would be deployed to augment the full production system. Information flow between all areas of the full system and prototypes would be tested and verified with increasing scale to ensure the level of performance required is available prior to the completion of the project.
End-point Agents: Each end-point is installed with native low-profile proprietary agent software that minimizes both its file system footprint and CPU use. The current product has a native end-point available for Microsoft Windows OSs (both desktops/tablets and servers) in production, and has native end-point agents in development/prototype stage for iOS, Android, MacOS, and RHEL/CentOS, with additional popular Linux derivatives to follow. The main job of the end-point agent is to communicate with the OS and monitor the file system for any changes in files that occur. When changes are detected, a digital file fingerprint of the file is taken and reported to the centralized data store, or cached until a later time if the centralized data store is unreachable (e,g, no cell coverage, laptop not connected to internet). The agent normally runs in “stealth-mode” and uses minimal CPU, RAM, and file system footprint so as not to disrupt the end-user’s workflow or impact system performance. Taking a digital fingerprint of a file and reporting it is very fast and thus the main job of the end-point agent is not system resource intensive. The “heavy lifting” is done on the back-end and does not burden the users or the end-point devices. Configuration of each end-point agent is conducted through the centralized management system, and changes in configuration are transmitted to the end-point agent within a few seconds (provided there is network connectivity).
Central Data Store: A collection of databases on the back end store file watch lists, known good and known bad digital file fingerprints (whitelists and blacklists containing digital file fingerprints of known malware), priority lists and configurations, end-point configurations, last-seen lists, and the full temporal accounting of all digital file fingerprints reported by end-point agents. As new threats are identified they are added to the central data store. As files on end-points change or are edited, their new digital fingerprints are added to the central data store as well. As new threats are identified though polymorphic partial matching, they are added to the known bad list as well.
Identification of Known and Unknown Malware: By comparing the databases of digital file fingerprints of known malware and digital file fingerprints of files on end-points, the product’s Crush server(s) use sophisticated algorithms to compare the partial digital file fingerprints, regardless of content of the files themselves. The product looks at the raw data (bytes) in the files when creating the digital file fingerprints and as such all file types/formats/languages are handled. This means that all file types and data in any and all languages can be compared with similar files. Binary DLLs, MS Word documents and spreadsheets (MS Excel, csv, …), JPEG images, Javascript, HTML, Executable files (.exe) — all of these files are handled by the product and known/unknown malware within them can be located using the digital file fingerprints in the centralized data store and Crush server’s analysis.
Scale, System Throughput, and Priority: A single Crush server can serve a small enterprise (100s or 1,000s of end-points), and a horizontally scalable array of Crush servers can be used to provide identification of malware for large enterprises. Similarly, databases in the central data store can be split and maintained/mirrored on several servers or run in a monolithic configuration. This makes the system highly scalable and able to be adapted to enterprises of varying sizes/scales while maintaining a good price/performance ratio. Priority lists can be designated for Crush servers such that high-priority end-points and/or high-priority malware fingerprints can be compared and identified in real-time, and similarly, low-priority lists (e.g. malware fingerprints that have not been seen in months or years) can be run in the evenings or when the system is running below normal load to ensure both immediate analysis of high-priority threats and comprehensive analysis of low-priority threats.
Integration: Several modular integration points within the product enable the straight-forward integration with 3rd party SIEM software and other reporting/management tools and systems. Distinct “notification channels” within the product are used based on the type of threat detected, the priority level of the specific threat detected, the confidence of the match (low percentage match of digital fingerprint vs high), and the location of the match (specific end-point list). Each notification channel has integration points that can be linked in with 3rd party systems so that staff are notified using software and procedures they are already familiar with and trained on (i.e., through a SIEM solution that is already begin monitored by dedicated, trained staff). Prototypes of each specific integration would need to be developed as a part of this project to match/communicate with the exact SIEM (or other) system that is in use at the deployment site in the mannemethod desired. Such a prototype would be developed for the purpose of evaluating the technical interconnectivity between systems to meet the requirements of the deployment, and following the prototype testing period, would be load-tested and stress-tested to ensure it’s performance meets the demands of a highly scalable environment, leading to a mature integration over a period of 3-6 months following the initial prototype period of 1-3 months.
Technology Section Summary: With end-points being continuously monitored by the product, both known and unknown malware threats delivered by the network and removable media will be detected and reported through SIEM system integration and direct email/SMS messages with minimal impact to the end-point (on all major OSs, including desktop and mobile). Centralized management and temporal monitoring of digital fingerprints enables the system to proactively locate and identify malware threats before zero day as well as enabling the staff to conduct their own investigations of systems either in the present or the past for forensic investigations. This makes CYBR’s BlindSpot a complete product that reaches all of the end-point devices to ensure safety and security from all types of malware threats.
Defense Utility
The blockchain’s cyber security posture will be greatly enhanced by BlindSpot. CYBR’s executive team works with various military and federal organizations and has a deep understanding of the cyber security challenges that face the enterprise today including advanced persistent threat (APT), polymorphic and pleomorphic malware, zero day attacks and the need to locate white and black files in real time. These threats have now permeated to the blockchain and must be secured.
Company and Customers
The proposed team includes CYBR, Inc. executive management and staff. The company is a works closely with its sister company, 21st Century Technologies, Inc. (21CT), which is a HUBZone certified, Small Business entity. 21CT serves as a value added reseller (VAR) for CYBR, Inc. and is currently a teammate on the DOMino classified DHS contract as a subcontractor to Raytheon.
Existing, paying customers include Stratford University, Test Pros and Devitas. The company also has integrator and VAR partner relationships with Anomali (formerly Threatstream), Lockheed Martin (Cyber and Space) and various commercial entities, which the company believes will become paying customers in 2019.
Transition and Commercialization
Our technology is a commercially available product and commercial sales have been made. The company is actively working to scale this solution to hundreds of thousands of users, which the company has deemed do-able and is in the process of horizontally scaling.
Data Rights Assertions
CYBR, Inc. currently holds a provisional patent and incorporates other trade secrets into the solution. No unreasonable restrictions (including ITAR) are placed upon the use of this intellectual property with regards to global sales.
submitted by CYBRToken to u/CYBRToken [link] [comments]

Live Bitcoin, Ripple, Ethereum, Litecoin - FREE Buy Sell ... IQ OPTION indicator 100% perfect signal indicator 2020 ( FREE DOWNLOAD) Best Bitcoin (BTC) Indicators To Use On Tradingview! EARLY BIRD FOREX SIGNAL SCRIPT 2019 FREE DOWNLOAD Best IQ Option 90% Signal Option Indicator Free Download

Bitcoin Hash Ribbons, an oscillator or metric based on BTC miners just confirmed a Bitcoin buy signal. More read: Craig Wright, The Fake Satoshi Nakamoto Failed To Prove He Invented Bitcoin, Again. Hash Ribbons is one the most lucrative bitcoin signals indicator in the short history of the first cryptocurrency coin. Bitcoin has historically Get your revolutionary FREE Bonus Bitcoin Signal Indicator by Fapturbo 2.0 => Fapturbo 2.0 Official Website. To get this strong tool of no cost go to Fapturbo 2.0 Official Website and download it instantly. you will love it ! RSI DIVERGENCE is a difference between a fast and a slow RSI. Default values are 5 for the fast one and 14 for the slow one. You can use this indicator in 2 different ways: normal RSI : check double or triple top/bottom on a chart meanwhile RSI is descending/ascending (check the example on chart) signal line : when RSI Divergence cross zero line from... Bitcoin. Download MT4 Trend Indicator With Free Signals (no-repaint) This Technical Pattern Suggests Bitcoin is Ready to Push Towards $14,000. The Forex system for success. Start Here – Easy Money Blackjack. RichDad Summit. A huge collection of 3500+ free indicators, oscillators, trading systems & expert advisors for MT4 and MT5 trading platforms. 1000+ reviews & ratings.

[index] [23635] [16186] [12678] [18386] [25636] [7761] [14209] [27879] [16939] [8142]

Live Bitcoin, Ripple, Ethereum, Litecoin - FREE Buy Sell ...

early bird forex signal script 2019 free download ultimate trading tools ... #freetradingindicators #freeforexsignals #forexsignalsystem #bitcoin #cryptocurrency #ethereum # ... indicators - never ... Free Forex And Binary Options Live Signal https: ... 🔔 For Free Download Indicator Join Telegram Channel https: ... Bitcoin Algo Trading on Deribit. BTCUSD Price Chart. In today's video, we talk about a Bitcoin super indicator that has just flashed a signal that predicts Bitcoin entering an uptrend extremely soon. Time Stamps: 0:00 Intro 2:01 Bitcoin Technical ... Live Bitcoin, Ripple, Ethereum, Litecoin - FREE Buy Sell Analysis (22 in 1 Indicators) Signals Live Stream Plus Live Bitcoin Signals Analysis Dashboard (1,029 indicators in 1 signals). Bitcoin Live Stream - Live BTC charts for price targets, pivots, pumps & dumps - NO MIC! ... Epic Secret Indicator Signal For Free Download - Duration: 7:20. Proven Indicators 846 views.

Flag Counter