Bitcoin Anonymity Guide 2019: How to use BTC like a ...

Cryptocurrency

Verge is a decentralized currency designed for everyday use and for those who value privacy. It improves upon the original Bitcoin blockchain by using multiple anonymity-centric networks such as Tor and i2p. It utilizes multi-algorithm mining support to improve security and provide equal distribution of coins to miners. Verge is community driven and open source and is not funded by any pre-mines or ICO's.
[link]

VeriCoin

The home for the most innovative cryptocurrency, VeriCoin and Verium VeriCoin: Proof-of-Stake-Time Protocol. PoST Verified. Verium: Proof-of-Work-Time Protocol. PoWT Verified. CPU Mine-able (GPU and ASIC Resistant)
[link]

Dogecoin

The most amazing place on reddit! A subreddit for sharing, discussing, hoarding and wow'ing about Dogecoins. The new innovative crypto-currency.
[link]

On F-Droid apps and bitcoin donations

The recent post on FOSS android apps and how they can earn money made me curious about their bitcoin donations, so I slapped together a quick script, grabbed the donation addresses from the F-Droid metadata and queried their total received amount.
The result, sorted by total received and valued using some value of today (9366.36 EUR per BTC)

Package address total EUR
net.i2p.android.router 1BPdWwovytfGdBwUDVgqbMZ8omcPQzshpX 100.35295704 939941.92
net.i2p.android 1BPdWwovytfGdBwUDVgqbMZ8omcPQzshpX 100.35295704 939941.92
com.piratebayfree 1KeBs4HBQzkdHC2ou3gpyGHqcL7aKzwTve 76.80127006 719348.34
org.asnelt.derandom 1NZz4TGpJ1VL4Qmqw7aRAurASAT3Cq5S6s 60.84434648 569890.05
com.nononsenseapps.notepad 16DUL1X4yARfM88GN7TV6Y3wQwqrstJs7A 58.40632213 547054.64
ch.blinkenlights.android.vanilla 1adrianERDJusC4c8whyT81zAuiENEqub 52.62216723 492878.16
org.fdroid.fdroid.privileged.ota 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
org.fdroid.fdroid.privileged 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
org.fdroid.fdroid.ota 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
org.fdroid.fdroid 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
org.fdroid.basic 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
de.k3b.android.lossless_jpg_crop 15u8aAPK4jJ5N8wpWJ5gutAyyeHtKX5i18 52.00899644 487134.98
org.calyxinstitute.vpn 14wntQ8cBdnhUVfYmDjXz6PbpSSX8nCtkr 17.65221369 165336.99
de.tutao.tutanota 3MDrR5gaMvL8sphuQLX6BvPPKYNArdXsv6 10.30485934 96519.02
net.osmand.plus 1GRgEnKujorJJ9VBa76g8cp3sfoWtQqSs4 8.49212217 79540.27
me.tripsit.tripmobile 1EDqf32gw73tc1WtgdT2FymfmDN4RyC9RN 7.00970601 65655.43
player.efis.pfd 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.mfd 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.data.zar.aus 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.data.usa.can 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.data.sah.jap 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.data.pan.arg 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.data.eur.rus 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
player.efis.cfd 1KKWRF25NwVgNdankr1vBphtkLbX766Ee1 5.0014 46844.91
com.nutomic.zertman 1NUqm2kyaiRdssFaxYd7CQaWy4og19xH5g 5.0 46831.80
com.nutomic.ensichat 1DmU6QVGSKXGXJU1bqmmStPDNsNnYoMJB4 4.99995 46831.33
com.brentpanther.litecoinwidget 15SHnY7HC5bTxzErHDPe7wHXj1HhtDKV7z 4.29288259 40208.68
com.brentpanther.ethereumwidget 15SHnY7HC5bTxzErHDPe7wHXj1HhtDKV7z 4.29288259 40208.68
com.brentpanther.bitcoinwidget 15SHnY7HC5bTxzErHDPe7wHXj1HhtDKV7z 4.29288259 40208.68
com.brentpanther.bitcoincashwidget 15SHnY7HC5bTxzErHDPe7wHXj1HhtDKV7z 4.29288259 40208.68
im.vector.alpha 1LxowEgsquZ3UPZ68wHf8v2MDZw82dVmAE 3.65680571 34250.96
in.p1x.tanks_of_freedom 18oHovhxpevALZFcjH3mgNKB1yLi3nNFRY 3.59251169 33648.76
com.veken0m.bitcoinium 1yjDmiukhB2i1XyVw5t7hpAK4WXo32d54 3.49440553 32729.86
com.vuze.android.remote 15j7vKgJbixQFZ6AvEFw2BhtA4KG7E14JZ 2.52566983 23656.33
at.bitfire.nophonespam 1KSCy7RHztKuhW9fLLaUYqdwdC2iwbejZU 2.40361077 22513.08
at.bitfire.icsdroid 1KSCy7RHztKuhW9fLLaUYqdwdC2iwbejZU 2.40361077 22513.08
at.bitfire.gfxtablet 1KSCy7RHztKuhW9fLLaUYqdwdC2iwbejZU 2.40361077 22513.08
at.bitfire.davdroid 1KSCy7RHztKuhW9fLLaUYqdwdC2iwbejZU 2.40361077 22513.08
at.bitfire.cadroid 1KSCy7RHztKuhW9fLLaUYqdwdC2iwbejZU 2.40361077 22513.08
com.wireguard.android 1ASnTs4UjXKR8tHnLi9yG42n42hbFYV2um 2.36196229 22122.99
net.sourceforge.wifiremoteplay 1LKCFto9SQGqtcvqZxHkqDPqNjSnfMmsow 2.20225896 20627.15
net.sourceforge.opencamera 1LKCFto9SQGqtcvqZxHkqDPqNjSnfMmsow 2.20225896 20627.15
org.witness.sscphase1 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
org.torproject.android 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
org.havenapp.main 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.ripple 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.pixelknot 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.otr.app.im 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.orfox 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.notepadbot 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.locationprivacy 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.lildebi 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.gilga 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.courier 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.checkey 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.cacert 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
info.guardianproject.browser 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
at.or.at.plugoffairplane 1Fi5xUHiAPRKxHvyUGVFGt9extBe8Srdbk 2.00473917 18777.11
sk.baka.aedict 1KJyEutxrm3yL7chvsciMJTvXahXoWE3Pw 2.0 18732.72
byrne.utilities.pasteedroid 1L44pgmZpeMsWsd24WgN6SJjEUARG5eY6G 1.93771879 18149.37
byrne.utilities.hashpass 1L44pgmZpeMsWsd24WgN6SJjEUARG5eY6G 1.93771879 18149.37
byrne.utilities.converter 1L44pgmZpeMsWsd24WgN6SJjEUARG5eY6G 1.93771879 18149.37
com.zoffcc.applications.zanavi 1ZANav18WY8ytM7bhnAEBS3bdrTohsD9p 1.3792561 12918.61
eu.domob.shopt 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm 1.30931 12263.47
eu.domob.bjtrainer 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm 1.30931 12263.47
eu.domob.angulo 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm 1.30931 12263.47
eu.domob.anacam 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm 1.30931 12263.47
libretasks.app 193Xb3sySr2oEMuJC6bqAov444rSyVczW 1.24689782 11678.89
com.ymber.eleven 12aDckQC6YHEn75zReQWxXFCivBBNXfRjM 1.19375821 11181.17
si.modrajagoda.didi 1FU27EyocpFFhexjoakSe7Hxvf4jD2KmFh 1.05 9834.68
com.nononsenseapps.feeder 1PdmeeGxB2iktvmtkGqwUNmYq7L9tnxjwE 1.02972708 9644.79
org.projectmaxs.transport.xmpp bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.wifichange bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.wifiaccess bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.smswrite bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.smssend bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.smsread bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.smsnotify bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.shell bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.ringermode bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.phonestateread bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.notification bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.nfc bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.misc bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.locationfine bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.filewrite bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.fileread bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.contactsread bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.clipboard bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.bluetoothadmin bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.bluetooth bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.module.alarmset bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
org.projectmaxs.main bc1qu482c0tngkcvx3q7mrm8zmuldrh2f2lrh26ym0 0.9995 9361.68
com.eibriel.reddot 1MD8wCtnx5zqGvkY1VYPNqckAyTWDhXKzY 0.923361 8648.53
org.briarproject.briar.android 1NZCKkUCtJV2U2Y9hDb9uq8S7ksFCFGR6K 0.59356774 5559.57
eu.faircode.email 13nUbfsLUzK9Sr7ZJgDRHNR91BJMuDuJnf 0.51806696 4852.40
de.robv.android.xposed.installer 1uAEzZrfJt96UHYQheUUC8gSp2TJdwdw3 0.49531493 4639.30
org.kontalk 14vipppSvCG7VdvoYmbhKZ8DbTfv9U1QfS 0.48859802 4576.38
hashengineering.groestlcoin.wallet_test 3BCeMXVny1HbDc4NK64UZs9oFjKZdajBfx 0.48 4495.85
hashengineering.groestlcoin.wallet 3BCeMXVny1HbDc4NK64UZs9oFjKZdajBfx 0.48 4495.85
org.disrupted.rumble 1PXXMinxQgYUPXzZq6BixZpJTFeiCLqDqD 0.44804797 4196.58
se.manyver 3NNGfHL96UrjggaBVQojF1mnGnXNx1SXv7 0.44135235 4133.86
org.schabi.sharewithnewpipe 16A9J59ahMRqkLSZjhYj33n9j3fMztFxnh 0.40426632 3786.50
org.schabi.openhitboxstreams 16A9J59ahMRqkLSZjhYj33n9j3fMztFxnh 0.40426632 3786.50
org.schabi.newpipelegacy 16A9J59ahMRqkLSZjhYj33n9j3fMztFxnh 0.40426632 3786.50
org.schabi.newpipe 16A9J59ahMRqkLSZjhYj33n9j3fMztFxnh 0.40426632 3786.50
org.mariotaku.twidere 1FHAVAzge7cj1LfCTMfnLL49DgA3mVUCuW 0.33555159 3142.90
de.gabbo.forro_lyrics 1MDjHkXQud77UJk6TqmGkjeyhmz67NfE6g 0.32967373 3087.84
org.disroot.disrootapp 1GNmDSXxpU1zaxEopKCJK2TzLh3dbZAxEA 0.32853919 3077.22
com.dfa.hubzilla_android 1GNmDSXxpU1zaxEopKCJK2TzLh3dbZAxEA 0.32853919 3077.22
com.watabou.pixeldungeon 1LyLJAzxCfieivap1yK3iCpGoUmzAnjdyK 0.30544626 2860.92
ca.pr0ps.xposed.entrustunblocker 15jv7w1AdCMkNpDaAQrPtwK3Lfxx5ggAKX 0.2981067 2792.17
ca.cmetcalfe.xposed.flatconnectivityicons 15jv7w1AdCMkNpDaAQrPtwK3Lfxx5ggAKX 0.2981067 2792.17
ca.cmetcalfe.xposed.disablebatterywarnings 15jv7w1AdCMkNpDaAQrPtwK3Lfxx5ggAKX 0.2981067 2792.17
ca.cmetcalfe.locationshare 15jv7w1AdCMkNpDaAQrPtwK3Lfxx5ggAKX 0.2981067 2792.17
eu.faircode.netguard 13vtPytVVqCwojmohAqsK61Tk4yGXSWpJK 0.28845628 2701.79
org.totschnig.myexpenses 1GCUGCSfFXzSC81ogHu12KxfUn3cShekMn 0.26904759 2520.00
com.termux.window 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux.widget 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux.tasker 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux.styling 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux.boot 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux.api 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
com.termux 1BXS5qPhJzhr5iK5nmNDSmoLDfB6VmN5hv 0.2645677 2478.04
se.leap.riseupvpn 1F3KowUJBfvocr1H6DRvwFxfETJ18e8Dp6 0.25404247 2379.45
eu.siacs.conversations.voicerecorder 1AeqNAcg85APAZj9BZfAjdFCC5zesqXp2B 0.25226604 2362.81
eu.siacs.conversations.legacy 1AeqNAcg85APAZj9BZfAjdFCC5zesqXp2B 0.25226604 2362.81
com.morphoss.acal 1C7ChLNbwiQNWS6BLCPNU5TzX3ve7Xup2m 0.24548194 2299.27
com.b44t.messenger 18e3zwis2raitdZVhEhHHT7xG6oXsZte9L 0.24530249 2297.59
com.achep.acdisplay 1GYj49ZnMByKj2f6p7r4f92GQi5pR6BSMz 0.23828669 2231.88
net.alegen.android.netclip 1862EpKxs4BGUM6Td2Gs83QCkVC889Eqja 0.23149008 2168.22
com.simplemobiletools.voicerecorder 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.thankyou 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.smsmessenger 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.notes.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.notes 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.musicplayer 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.gallery.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.gallery 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.flashlight 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.filemanager.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.filemanager 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.draw.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.draw 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.dialer 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.contacts.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.contacts 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.clock 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.camera 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.calendar.pro 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.calendar 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.calculator 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
com.simplemobiletools.applauncher 19Hc8A7sWGud8sP19VXDC5a5j28UyJfpyJ 0.20711972 1939.96
cx.hell.android.pdfviewpro 1MLdh6uAPymWVJ4bmRde684uTcLJWwumkK 0.20361036 1907.09
cx.hell.android.pdfview 1MLdh6uAPymWVJ4bmRde684uTcLJWwumkK 0.20361036 1907.09
de.grobox.liberario 12JaQp8zfqRb83JfSwVjH4rZWsZnWRPoyG 0.18405547 1723.93
de.grobox.blitzmail 12JaQp8zfqRb83JfSwVjH4rZWsZnWRPoyG 0.18405547 1723.93
com.todobom.opennotescanner 1H5tqKZoWdqkR54PGe9w67EzBnLXHBFmt9 0.16962324 1588.75
org.libreoffice.impressremote 129jj3HiLfj3zCfqoro3sMTdovizXEdo8A 0.16380002 1534.21
org.eu.exodus_privacy.exodusprivacy 1exodusdyqXD81tS8SkcLhyFj9ioxWsaZ 0.15745937 1474.82
org.openintents.shopping 16MJeiftw9LRuvqoSH18v16kYTeNx7wJSZ 0.1507208 1411.71
org.openintents.safe 16MJeiftw9LRuvqoSH18v16kYTeNx7wJSZ 0.1507208 1411.71
org.openintents.notepad 16MJeiftw9LRuvqoSH18v16kYTeNx7wJSZ 0.1507208 1411.71
org.openintents.flashlight 16MJeiftw9LRuvqoSH18v16kYTeNx7wJSZ 0.1507208 1411.71
org.openintents.filemanager 16MJeiftw9LRuvqoSH18v16kYTeNx7wJSZ 0.1507208 1411.71
de.smasi.tickmate 18tub3juj26zyGwdpmGDLgtLEpfFf2Nvhu 0.14452004 1353.63
me.hda.urlhda 1N5czHaoSLukFSTq2ZJujaWGjkmBxv2dT9 0.142 1330.02
com.passcard 1N5czHaoSLukFSTq2ZJujaWGjkmBxv2dT9 0.142 1330.02
org.blokada.alarm 16rJ49uNKCohVhHvWNganP6Y48Ba9BTyKd 0.14151834 1325.51
org.floens.chan 1N7VtcNh8L8u4tF9CJ38GjnPbmxM4Vixi6 0.13177915 1234.29
press.condense.www 325oe18pc8npqHeBGozobnvWfXXe3pujXq 0.12791726 1198.12
org.quantumbadger.redreader 1874wapGxDo2vEp4avisda4gx3SCjsHCQJ 0.12570044 1177.36
wb.receiptspro 3MGikseSB69cGjUkJs4Cqg93s5s8tv38tK 0.12023971 1126.21
be.brunoparmentier.wifikeyshare 168utA5DWMVXLFVfQDahG5abEWUSk9Wcfm 0.11048893 1034.88
be.brunoparmentier.openbikesharing.app 168utA5DWMVXLFVfQDahG5abEWUSk9Wcfm 0.11048893 1034.88
be.brunoparmentier.dnssetter 168utA5DWMVXLFVfQDahG5abEWUSk9Wcfm 0.11048893 1034.88
be.brunoparmentier.apkshare 168utA5DWMVXLFVfQDahG5abEWUSk9Wcfm 0.11048893 1034.88
org.smssecure.smssecure 1LoKZXg3bx6kfwAhEFQqS9pgeCE1CFMEJb 0.10927359 1023.50
mobi.boilr.boilr 1PHuSWfuAwR6oz9qV93rTdMVozfM85Qqxx 0.101 946.00
com.morlunk.mountie 1ySD4UzFDtPLq9agRg9eiFtWmz6DJ7bBf 0.09228972 864.42
org.lf_net.pgpunlocker 18ii4wvKxPFvKoGk7MXLngq9yWNsp7ABPd 0.08827862 826.85
com.orpheusdroid.sqliteviewer 1Cbf61y8XNx3BLWvoZB71x4XgBKB7r8BuB 0.07990648 748.43
com.orpheusdroid.screenrecorder 1Cbf61y8XNx3BLWvoZB71x4XgBKB7r8BuB 0.07990648 748.43
com.biglybt.android.client 1BiGLYBT38ttJhvZkjGc5mCw5uKoRHcUmr 0.06538094 612.38
net.gsantner.markor 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
net.gsantner.dandelior 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
io.github.gsantner.memetastic 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
io.github.froodyapp 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
de.live.gdev.timetracker 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
de.live.gdev.cherrymusic 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
com.github.dfa.diaspora_android 1B9ZyYdQoY9BxMe9dRUEKaZbJWsbQqfXU5 0.06195393 580.28
org.woltage.irssiconnectbot 12Xe9L8Kam2F838RipTstT1BAxWLZjWRxh 0.05900001 552.62
dev.ukanth.ufirewall 1LBUdALwYXDv38wvnUSGvsFjituaWAHvFo 0.05663316 530.45
org.totschnig.sendwithftp 1Dmj6keLGgNHBUD5unsbZz5vnk9wRinRAy 0.05247253 491.48
com.github.yeriomin.yalpstore 14HvYHKe6joHbQjVdAPd1Ha1yXaGS2pVTW 0.05018261 470.03
com.github.yeriomin.smsscheduler 14HvYHKe6joHbQjVdAPd1Ha1yXaGS2pVTW 0.05018261 470.03
com.github.yeriomin.dumbphoneassistant 14HvYHKe6joHbQjVdAPd1Ha1yXaGS2pVTW 0.05018261 470.03
org.ethack.orwall 1Kriu9owRhEsFkj8Lc6Wr5xTv8YTNphhXn 0.04385552 410.77
org.indywidualni.fblite 1JUaZytkub2CP5jhRYQDDY6pibqrUUSp2y 0.04214968 394.79
com.anthony.deepl.openl 3DetrDfft3ChjXMQUsTwQL1ozQvBXwGSsQ 0.04 374.65
org.jamienicol.episodes 149XkMSs84ZyzNMqiQeJLt5DbPru16amwA 0.033 309.09
io.github.powerinside.syncplay 16E1hn96zg9h16VCrxSG6p7b72vyNh64ft 0.03048045 285.49
io.github.powerinside.scrollsocket 16E1hn96zg9h16VCrxSG6p7b72vyNh64ft 0.03048045 285.49
nya.miku.wishmaster 1LaumSD5Y9npHxsq9Cqo3esmWiytqv95QW 0.03 280.99
am.ed.importcontacts 14FPuKQfmV31Fx4uxwXvehmM189nxaQpKB 0.02695857 252.50
am.ed.exportcontacts 14FPuKQfmV31Fx4uxwXvehmM189nxaQpKB 0.02695857 252.50
org.tasks 136mW34jW3cmZKhxuTDn3tHXMRwbbaRU8s 0.02141326 200.56
com.moonpi.tapunlock 1NZGAU1rEs1zBpwdjmnBjiyRsJHfycWhSF 0.02106 197.26
com.moonpi.swiftnotes 1NZGAU1rEs1zBpwdjmnBjiyRsJHfycWhSF 0.02106 197.26
org.telegram.messenger 1McafEgMvqAVujNLtcJumZHxp2UfaNByqs 0.02006732 187.96
eu.faircode.xlua 1GePXhRPgLhwQmBwRHhX1nSCgvfnCY97Gg 0.01687755 158.08
org.decsync.sparss.floss 1JWYoV2MZyu8LYYHCur9jUJgGqE98m566z 0.01598957 149.76
org.decsync.cc 1JWYoV2MZyu8LYYHCur9jUJgGqE98m566z 0.01598957 149.76
org.asdtm.goodweather 1FV8m1MKqZ9ZKB8YNwpsjsuubHTznJSiT8 0.01510861 141.51
org.asdtm.fas 1FV8m1MKqZ9ZKB8YNwpsjsuubHTznJSiT8 0.01510861 141.51
com.nma.util.sdcardtrac 16bxTv1fP8X2QN5SWXc1AcKhhA1tJQKcTa 0.015 140.50
com.kunzisoft.keyboard.switcher 1DSwXCk7Sob24sNsofywNoRQw2f5Qj5t2F 0.01473243 137.99
com.kunzisoft.keepass.libre 1DSwXCk7Sob24sNsofywNoRQw2f5Qj5t2F 0.01473243 137.99
fr.kwiatkowski.ApkTrack 19wFVDUWhrjRe3rPCsokhcf1w9Stj3Sr6K 0.01440284 134.90
com.stripe1.xmouse 17DaqbcEEG3Hn5jBv3sRjPTUUCW1eBp1Wg 0.01358135 127.21
org.nutritionfacts.dailydozen 3GQUrb9sw36MoQeZNJ4g16CCNqgr3Va6bx 0.0118 110.52
com.stoutner.privacybrowser.standard 1Jiooc5L238VnhiWtkdYEkwm7kRNWQspSC 0.01159484 108.60
org.sufficientlysecure.termbot 1LY6Hs6SurATjfxnihzLMDUMUuMxvQ4aEi 0.01151042 107.81
org.sufficientlysecure.keychain 1LY6Hs6SurATjfxnihzLMDUMUuMxvQ4aEi 0.01151042 107.81
com.zeapo.pwdstore 1H1Z1NPTrR5Cej9bKV3Hu4f5WJZYtkbpox 0.01141762 106.94
pk.contender.earmouse 1FdwmPaKhE6pmPRxNHcWh3yFDo3mdtMPy 0.01041024 97.51
im.quicksy.client 3KAD8vew6tPZDjiUJNnZ3YUoUxrCEVNwFL 0.01024848 95.99
eu.siacs.conversations 3KAD8vew6tPZDjiUJNnZ3YUoUxrCEVNwFL 0.01024848 95.99
org.hoi_polloi.android.ringcode 18FLvxn8Vgz5DTgVH1kT4DRJoaANpWhqvP 0.01 93.66
at.linuxtage.companion 1GLTBBirbj8GZ8uY1gwovZ1QEMjfWu3rWT 0.01 93.66
com.jarsilio.android.waveup 16DXeCxxKGvepYLehyHSr3M1nv1s1eUotZ 0.00789495 73.95
com.jarsilio.android.scrambledeggsif 16DXeCxxKGvepYLehyHSr3M1nv1s1eUotZ 0.00789495 73.95
com.jarsilio.android.pocketup 16DXeCxxKGvepYLehyHSr3M1nv1s1eUotZ 0.00789495 73.95
com.jarsilio.android.drowser 16DXeCxxKGvepYLehyHSr3M1nv1s1eUotZ 0.00789495 73.95
se.leap.bitmaskclient 1Fze6GLjoxFnwAGNreYLK8ktFdGJdPRxeY 0.00763591 71.52
com.saha.batchuninstaller 3GRYNKRUFsefuvKuTycgbMjB4DFxUXVys4 0.007 65.56
org.sufficientlysecure.viewer.fontpack 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.sufficientlysecure.viewer 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.sufficientlysecure.standalonecalendar 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.sufficientlysecure.localcalendar 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.sufficientlysecure.ical 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.shortcuts 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.ntpsync 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.fastergps 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
org.birthdayadapter 12Y6zbBYoRxf8kBrjau3WedjtzvcACvPMk 0.00666289 62.41
com.moez.QKSMS 3ELLdraJTuJB2CtQACZiAuf1X3udeAsRgP 0.00403494 37.79
org.xposeddownloader 16VEzu37BePgR3o9hAciZkGK2VCAQFE28r 0.0035 32.78
org.opengappsdownloader 16VEzu37BePgR3o9hAciZkGK2VCAQFE28r 0.0035 32.78
org.basketbuilddownloader 16VEzu37BePgR3o9hAciZkGK2VCAQFE28r 0.0035 32.78
org.afhdownloader 16VEzu37BePgR3o9hAciZkGK2VCAQFE28r 0.0035 32.78
com.gianlu.aria2app 18rrPNGgz8UkzUYgAnqVye83xEe5fB7XfY 0.00330638 30.97
com.gianlu.aria2android 18rrPNGgz8UkzUYgAnqVye83xEe5fB7XfY 0.00330638 30.97
com.oriondev.moneywallet 1J3APoaFT2jcqRzpb8bEt2rwUn3mDpWE5U 0.00290149 27.18
com.omegavesko.holocounter 19J43UNjckM9Q2M59ZM8ptCW5kA1dWdHdp 0.00277121 25.96
ir.hsn6.turo 1PUJ5sFWxvbx5Np2CjFmhHFnzPe2GPvinj 0.00271154 25.40
com.fr3ts0n.stagefever 19UApzsc5eDJ5VNDNYCA1bpszPnkcpWeFP 0.00235526 22.06
com.fr3ts0n.ecu.gui.androbd 19UApzsc5eDJ5VNDNYCA1bpszPnkcpWeFP 0.00235526 22.06
com.fr3ts0n.androbd.plugin.sensorprovider 19UApzsc5eDJ5VNDNYCA1bpszPnkcpWeFP 0.00235526 22.06
com.fr3ts0n.androbd.plugin.mqtt 19UApzsc5eDJ5VNDNYCA1bpszPnkcpWeFP 0.00235526 22.06
com.fr3ts0n.androbd.plugin.gpsprovider 19UApzsc5eDJ5VNDNYCA1bpszPnkcpWeFP 0.00235526 22.06
de.tadris.fitness 3BSbGRbJaiSxVg3D6nVRK5C1SZEezhjtK5 0.00214369 20.08
eu.uwot.fabio.altcoinprices 353x3kNMUaAt3i79kQTf3KCJWRAVXSRGpW 0.00213 19.95
ch.bailu.aat 3GK4KLiqKqGg5UQxdkkGXhhDZkdFFicy5T 0.002 18.73
org.elijaxapps.androidxmrigminer 37GpugVZNiof2DzWQX5aivHewc4wZLxATL 0.00189005 17.70
io.oversec.one 16tan5fBNJ6n1QmVxwvvondyvuwgx1W6fE 0.00177442 16.62
com.goltzkiste.guessaday 1Guessas8CtCA9S9ZA9p9fCFAD3VZTE9ey 0.00176227 16.51
net.khertan.forrunners 1s38rpyuJvfvcRFaESZmVSp6EYpVLEDWU 0.00134051 12.56
de.schildbach.oeffi bc1qxm9r8n3pe47r30e04gs2xsalxef55zrfvelvln 0.0012577 11.78
org.gdroid.gdroid 1J2bbhJYksSjeynGGhuSPN9aTEaxiGm4nR 0.001 9.37
com.gitlab.ardash.appleflinger.android 1J2bbhJYksSjeynGGhuSPN9aTEaxiGm4nR 0.001 9.37
org.zamedev.gloomydungeons2.opensource 1BkmsNEeW5A2YketBaa4pDFSAcDwnDuyDp 0.00099 9.27
net.fabiszewski.ulogger bc1qt3uwhze9x8tj6v73c587gprhufg9uur0rzxhvh 0.00097941 9.17
ir.hsn6.trans 1MkJyXh8y3ViXTAFhKUpXfgfECEfnZmLGY 0.00080184 7.51
net.frju.flym 3DprwFMg5bXGz8QimyiaoEE7mmCkj2DGf5 0.00068 6.37
com.zeusln.zeus 3Lbz4vdt15Fsa4wVD3Yk8uGf6ugKKY4zSc 0.0006 5.62
de.schildbach.wallet bc1qedxd9jssgw2fferdmjyyh6fm8jax75q7drfnd4 0.00059521 5.57
com.zoffcc.applications.trifa 1TRifA7eNLHZEcCTj43eYVWHBbLqTuXkS 0.00028782 2.70
com.notecryptpro 1MHEbHt4sBeqGoriwAq1MsXZaZJinoUeLH 0.00027552 2.58
ir.hsn6.defendo 16D7Nroenpx4QDNqfq3Js7sdAVhew2NzGp 0.00018749 1.76
org.proninyaroslav.libretorrent 1Af9DgxtWvVp6bFiYQw2MeWtRzTXshRYpB 0.0001747 1.64
me.shrimadhavuk.numselapp 13csS5SByVR4e3tJ9c4gjC18Lua8dXDp9A 0.00010397 0.97
com.wesaphzt.privatelock 1GCkvAg9oG79niQTbh6EH9rPALQDXKyHKK 5.773e-05 0.54
com.wesaphzt.privatelocation 1GCkvAg9oG79niQTbh6EH9rPALQDXKyHKK 5.773e-05 0.54
ru.glesik.nostrangersms 1DbZjPqe4uaBv32deNqwbWUTrCempo2Wqk 5e-05 0.47
ru.ttyh.neko259.notey 1Lh7a1tx7EREENawQyHhiKoCRF6u6TzVrD 0.0 0.00
re.jcg.playmusicexporter 1NdzpDWPQ53xWT5fraGPZX5F9XrKiPBXjp 0.0 0.00
pl.sanszo.pcis 1PbH84rewi34Ffgr3C5NutMdvEzSQ13wUt 0.0 0.00
pl.net.szafraniec.NFCTagmaker 17E32x5ygXkqf5EWJkryZuarUDUFrb8UqQ 0.0 0.00
pl.net.szafraniec.NFCKey 17E32x5ygXkqf5EWJkryZuarUDUFrb8UqQ 0.0 0.00
org.valos.isolmoa 1LbgYALbkQ2Trgh4yXqdBnbdQosGard5hd 0.0 0.00
org.thecongers.mtpms 1Pg54vVnaLxNsziA6cy9CTefoEG5iAm9Uh 0.0 0.00
org.pacien.tincapp 152t9TEBBhEescQx5gG7T5wHaJVeupAXQm 0.0 0.00
org.opengemara.shiurim 19p5TXDfMksHjUstFEp2PUt383Cy7JdmLa 0.0 0.00
org.nuntius35.wrongpinshutdown 1LSs1BR4ktQcW8DrCjrSrWUvBD6h2rqNJm 0.0 0.00
org.nick.wwwjdic 1DXhWFS9SL78GGyX7Luao9EuP5SxtDiPG1 0.0 0.00
org.miamplayer.autoairplanemode 39RBokXr4V9FPpuF7v1bM6PYcbgRRApp9W 0.0 0.00
org.mbach.lemonde 39RBokXr4V9FPpuF7v1bM6PYcbgRRApp9W 0.0 0.00
org.kost.nmap.android.networkmapper 1588ArbHPcb5VtpZPQgue9iPZ9LiA1eEjF 0.0 0.00
org.kost.externalip 1KbtLnxp6mhkGznFNZZQdcaCUQHmrTtLm4 0.0 0.00
org.kaqui 12bnT7epKmf9ztkAeuM8dHCcoc76r9rgVX 0.0 0.00
org.emunix.unipatcher 16coztryz7xbNNDNhhf98wuHmi3hEintsW 0.0 0.00
org.emunix.insteadlauncher 16coztryz7xbNNDNhhf98wuHmi3hEintsW 0.0 0.00
org.chickenhook.startflagexploit bc1qvll2mp5ndwd4sgycu4ad2ken4clhjac7mdlcaj 0.0 0.00
org.androidpn.client 13MjTPDFQtxv1u1sWURkDduFSw97KbMfsS 0.0 0.00
org.amoradi.syncopoli 1DT8ijBkGUAvW9VZqfCQBJFS62vvw5E7QK 0.0 0.00
net.schueller.peertube 1LoTXo728HzYTtyfbkaf5ewSRvu8ABTDPm 0.0 0.00
net.mabako.steamgifts 1NQBKppWPZiE5PshLxqfFW4pgsnAv9irEu 0.0 0.00
name.gdr.acastus_photon 1NjjuTxXm3ezpnVUGk4VmdEZUcym3SKZ8z 0.0 0.00
me.dbarnett.acastus 1NjjuTxXm3ezpnVUGk4VmdEZUcym3SKZ8z 0.0 0.00
me.danielbarnett.addresstogps 1NjjuTxXm3ezpnVUGk4VmdEZUcym3SKZ8z 0.0 0.00
it.reyboz.screenlock 16oHee3jeENnN6fPxFq6LpNP6SZG9rimRD 0.0 0.00
it.reyboz.minesweeper 16oHee3jeENnN6fPxFq6LpNP6SZG9rimRD 0.0 0.00
it.reyboz.chordshift 16oHee3jeENnN6fPxFq6LpNP6SZG9rimRD 0.0 0.00
it.reyboz.bustorino 16oHee3jeENnN6fPxFq6LpNP6SZG9rimRD 0.0 0.00
it.andreascarpino.hostisdown 1Ph3hFEoQaD4PK6MhL3kBNNh9FZFBfisEH 0.0 0.00
is.zi.huewidgets 1FdGg777eP4cqMrJVMRQiMXEHE2Ee6F62T 0.0 0.00
ir.hsn6.tpb 12SL5VgtjozKTXMgpX7w4MjKvvcFAHbTks 0.0 0.00
ir.hsn6.k2 1iNMJMFqDgYp7iUMd4qkP79CiCLSwLPyp 0.0 0.00
io.github.tjg1.nori 1NHUsSzj3N7TE8rykUYk8rqqLWWSmTVzdp 0.0 0.00
in.shick.lockpatterngenerator 1JscvZEbchRUpCXYX13bJb3aF6U1yT9BwG 0.0 0.00
ga.testapp.testapp 3NUiJXDCkyRTb9Tg7n63yK6Y7CexADtSEh 0.0 0.00
fr.renzo.wikipoff 1BAaxTvK1jkoFKf7qWF2C6M4UX1y86MxaF 0.0 0.00
fr.cph.chicago.foss 13WUmCX1AePEKFGv5U1qRgBockFahsm21o 0.0 0.00
fr.corenting.traficparis 3JmaEkuviReVdCG8fjqCs5LwQkaEGcTMtZ 0.0 0.00
eth.matteljay.mastermindy 14VZcizduTvUTesw4T9yAHZ7GjDDmXZmVs 0.0 0.00
design.codeux.authpass.fdroid 3NcBacCmJbYWpwxj6rWzpM7sx48etMrPtc 0.0 0.00
de.yaacc 1MUvbfNgunNCUtitCkoEEMgmQGZJJg4isj 0.0 0.00
de.vanitasvitae.enigmandroid 1EqhcKs1pZJhEmyCtbH3qtkHT3Y48MCoAT 0.0 0.00
de.schildbach.wallet_test bc1qglkj2svuu3xsktup5xla8u2wjzlu8mfzk6509r 0.0 0.00
de.naturalnet.zahnarztgeraeusche 1EAytSwn1u7tKTZ9sMDVCzDqe2nwVf4Pra 0.0 0.00
de.naturalnet.mirwtfapp 1EAytSwn1u7tKTZ9sMDVCzDqe2nwVf4Pra 0.0 0.00
de.k4ever.k4android 1KiwFPGCunGXF53DBTBf32cNTPXq9FbX5H 0.0 0.00
de.jkliemann.parkendd 1HBFDdz7dJeBE2c3zQmWnzeWCbHoZQ64dd 0.0 0.00
de.Cherubin7th.blackscreenpresentationremote 18QSJmV6Liia7Cau65JnEj2JyxEUCGE2oz 0.0 0.00
com.tritop.androsense2 1Dj4Xkz5KtsarmioEKuuZCBVjahr14dih4 0.0 0.00
com.toxtox.philosopherstonewidget 1KvYjRx1VozqUpiYSCMrEL6mo9LvmpCcNN 0.0 0.00
com.sanskritbasics.memory bc1q3xasvfn2c84dprkk2mxj5g7n6ujwylphu8qsf3 0.0 0.00
com.rockbyte.arxiv 1jokQaTneW1KCbCWsMdVtvPv6oSJ1H3tF 0.0 0.00
com.rigid.birthdroid 1BLEeqwXnJJbpaLHiskZ5WyJJRyEWqCAQZ 0.0 0.00
com.readrops.app bc1qlkzlcsvvtn3y6mek5umv5tc4ln09l64x6y42hr 0.0 0.00
com.onetwofivegames.kungfoobarracuda 1MVNsgRmLqgMoEoQu918ozFFiTaepF8Ti5 0.0 0.00
com.mdroid 18BqyV9mNbFLi5HNNnfUprnPJyJDFP59Xh 0.0 0.00
com.mareksebera.simpledilbert 1FpGN3kcZ3GQsaJgBa8rxGRJjBjJavu78g 0.0 0.00
com.marceljurtz.lifecounter 1HDdKd3uoxdvS8pBKKKxEkjoJqUuBiEjkL 0.0 0.00
com.llamacorp.equate 15KCzAPJvSJLUfjuTQgAgSiSwQu6uLiexC 0.0 0.00
com.kn.paper_foss_theme 1CYiRF6AncdNkxcWTRFf5Mxi7UaFhC3jFG 0.0 0.00
com.ideasfrombrain.search_based_launcher_v2 1NapZs8brWNifGk7QFemqTByczdBAAg9cA 0.0 0.00
com.gmail.anubhavdas54.whatsdeleted bc1qs50wst8x53ud5lr80wukhjcy6l7zpxf5mz5rtm 0.0 0.00
com.github.igrmk.smsq 32JdGEVP42WiVxsADa3Z65qn1xe2K7Yg3S 0.0 0.00
com.genonbeta.TrebleShot 1DBsq8aZjn54hnDYsRY7pTLb3HfsE1mSv8 0.0 0.00
com.example.root.analyticaltranslator 15WVb3LZWCsdZGjkNFBuELwt3U4zpnSgwa 0.0 0.00
com.emmanuelmess.simpleaccounting 1HFhPxH9bqMKvs44nHqXjEEPC2m7z1V8tW 0.0 0.00
com.easwareapps.marbleone_ad_free 1PNwD199whFao1rjMX82Zi5A7M5B6KB7be 0.0 0.00
com.easwareapps.g2l 1PNwD199whFao1rjMX82Zi5A7M5B6KB7be 0.0 0.00
com.easwareapps.f2lflap2lock_adfree 1PNwD199whFao1rjMX82Zi5A7M5B6KB7be 0.0 0.00
com.danhasting.radar 1EwgjPGYiChJ5vyBndt9ugzd963FiVc6gj 0.0 0.00
com.atop 15G2T13emQnJRMvA74Zr6Q71bBcaYBn71v 0.0 0.00
com.aptasystems.dicewarepasswordgenerator 1PbHGv88KH6SXw6d66uSFTUzW2aeqxvQ7V 0.0 0.00
com.andreasgift.totalzero 1Q9TinY9kWoNMWuiToHiGC9uxCk6Vd41Gb 0.0 0.00
com.anddevw.getchromium 188RxvRnSXSZZnjuDdLwNirHDfNusVPobh 0.0 0.00
at.tacticaldevc.panictrigger 1EVr5tm2kugffNy3RWPGFoug6X9v3GTxuJ 0.0 0.00
im.vector.riotx 1LxowEgsquZ3UPZ68wHf8v2MDZw82dVmAEa -1.0 -9366.36
im.vector.app 1LxowEgsquZ3UPZ68wHf8v2MDZw82dVmAEa -1.0 -9366.36
I know this is flawed, I found it interesting nonetheless
The post which inspired this: https://www.reddit.com/fossdroid/comments/hyral2/are_there_fossdroid_apps_that_are_making_money/
submitted by prcrst to fossdroid [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to privacycoins [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to CryptoCurrencies [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethtrader [link] [comments]

ColossusXT Q2 2020 AMA Ends!

Thank you for being a part of the ColossusXT Q2 2020 AMA! Below we will summarize the questions and answers. The team responded to 46 questions! If your question was not included, it may have been answered in a previous question or AMA. The ColossusXT team will do a Reddit AMA at the end of every quarter.
The winner of the AMA contest is: ookhimself
Congratulations. I will send you a DM on Reddit.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Why does your blockchain exist and what makes it unique?
A: ColossusXT exists to provide an energy-efficient method of supercomputing. ColossusXT is unique in many ways. Some coins have 1 layer of privacy. ColossusXT and the Colossus Grid will utilize 2 layers of privacy through Obfuscation Zerocoin Protocol, and I2P and these will protect users of the Colossus Grid as they utilize the grid resources. There are also Masternodes and Proof of Stake which both can contribute to reducing 51% attacks, along with instant transactions and zero-fee transactions. This protection is paramount as ColossusXT evolves into the Colossus Grid. Grid Computing will have a pivotal role throughout the world, and what this means is that users will begin to experience the Internet as a seamless computational universe. Software applications, databases, sensors, video, and audio streams-all will be reborn as services that live in cyberspace, assembling, and reassembling themselves on the fly to meet the tasks at hand. Once plugged into the grid, a desktop machine will draw computational horsepower from all the other computers on the grid.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: What is the Colossus Grid?
A: ColossusXT is an anonymous blockchain through obfuscation, along with utilization of I2P (Armis). These features will protect end-user privacy as ColossusXT evolves into the Colossus Grid. The Colossus Grid will connect devices in a peer-to-peer network enabling users and applications to rent the cycles and storage of other users’ machines. This marketplace of computing power and storage will exclusively run on COLX currency. These resources will be used to complete tasks requiring any amount of computation time and capacity, or allow end-users to store data anonymously across the COLX decentralized network. Today, such resources are supplied by entities such as centralized cloud providers which are constrained by closed networks, proprietary payment systems, and hard-coded provisioning operations. Any user ranging from a single PC owner to a large data center can share resources through Colossus Grid and get paid in COLX for their contributions. Renters of computing power or storage space, on the other hand, may do so at low prices compared to the usual market prices because they are only using resources that already exist.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Is there any estimated date for the grid? What will set you apart from the opposition?
A: We are hoping to have something released for the community in Q4 this year. The difference between other competitors is that ColossusXT is putting consumer privacy first and we’re actively in the process of working with federal and state agencies in the United States.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How do you plan to get people to implement the technology? At your current rate of development, when do you foresee a minimum viable product being available?
A: We have been strategically networking with businesses, and we are currently undergoing the verification process in the United States to make bids on federal and state projects. We are working on an MVP and our goal is to have at least a portion of the Colossus Grid ready by Q4 2020.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: When we can expect any use-case for COLX? A company or service that uses COLX for its activities/tasks.
A: We’re aiming for Q4 of this year to have an MVP, throughout 2021 we will be strategically making bids on federal and state contracts in the United States with a goal to expand operations exponentially.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Are there any plans to be listed on the more prominent exchanges e.g binance, kraken?
A: Yes, we have applied to some of these exchanges that are considered Tier 1 or Tier 2 exchanges. Many of them upfront will tell you there are no fees associated with the listing, that is not entirely true most of the time. Regardless, have applied and are awaiting more responses as we move forward. Listing on these exchanges often requires that we cannot announce this information until ColossusXT is live on its platform.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Partnerships are the norm these days in crypto world. Which partnership would you consider feasible, if any, in order to grow the Colossus Grid project?
A: The Colossus Grid is a huge undertaking both in development and business partnerships. We are moving in both these directions strategically. One of the most important partnerships is not really a partnership but approval to bid on state and federal contracts. Working with the governments around the world will be a big part of the Colossus Grid use-case.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: If the ability to annonymise coins is turned off, can CLX still be marketed as a privacy coin? Do we have a date we can start using this feature again?
A: Yes and No. It’s frustrating right now having a lack of privacy for consumers as we don’t see privacy as a feature but a right. EVERY platform online should have some levels of privacy for their consumers, especially as technology continues to evolve and bad actors continue to use your personal information for their own nefarious purposes. Obfuscation will be implemented in the coming weeks, and Armis will follow suit shortly thereafter.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: When can we expect the grid to come out?
A: We are looking at releasing an MVP towards the end of the year. Stay tuned during Q3 and Q4 as we ramp on technical and business developments.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Can you tell the current budget for development work?
A: Much of the development work budget comes from Core team member's disposable income, we also use the self-funding treasury that Masternode owners vote on each month.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Will cold staking be implemented somedays? I like the model of Cardano. Hope you will implement kind of Cardano staking in our wallet. I would love the easiness.
A: ColossusXT staking has been enabled since 2017. We have calculators on the website that will estimate your average staking returns and you can join numerous pools to increase your staking power within the pools. Cold staking is on our radar and will make it into the roadmap when our budget allows us.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Which part of grid technology are you planning first to go live? Storage/RAM/CPU/GPU/all at once? Separately?
A: We will be rolling the Colossus Grid out in two phases. The first phase will be storage, and then we will roll out computing power (RAM/CPU/GPU).
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Is Armis I2P technology in development testphase I mean, I have read something like that… If Armis goes live, will there be some kind of option in deskopt wallet to transfer anonymous or will every transaction be fully anonymous like e.g. monero?
A: We recently had a testing phase with the community earlier this year, there will be another test phase with community participants who sign up. If you’re interested in this stay tuned on our socials and apply when the next testing phase happens All transactions will be fully anonymous behind Armis.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: What programming languate is being used for developing COLX? How well this programming language do you think is more suitable for developing crypto, in comparison with other programing languages?
A: C++ is what we’re using at ColossusXT. Each crypto project is different but with what we're developing at ColossusXT. We are best suited to utilize C++.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: What is the second biggest milestone other than launching the grid network for the team. What do you think of your competition like Golem network?
A: Armis will be a big milestone, and I don’t think we go back to our Polis partnership which allows users in Europe and Mexico (they do plan to expand to the US and other countries) the ability to spend their ColossusXT (COLX) wherever Mastercard is accepted. I don’t think the Golem network is taking consumer privacy far enough, in the blockchain industry I also see a lack of drive to push adoption within the United States. This is likely due to unclear regulations right now. ColossusXT is at the forefront of these issues and we intend to lead blockchain through these somewhat murky waters.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: I don’t have a lot of knowledge about crypto-technology… but are there any risks of sensitive data-hijacks through Colx infrastructure? Will the Colx-grid be available for individuals or only larger corporations, and how would one get access to the computing power?
A: There are always risks with technology. We are doing extensive testing and more testing prior to releasing anything. Consumer privacy is apart of the foundation of what we’re building at ColossusXT and we want to ensure any and all of your personal information is secure and private. As technology evolves, we will be right here evolving with it to ensure that consumer privacy protections are always in place.
The Colossus Grid will be available to anyone with a computer. You will access it through the desktop wallet.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Do you have any new exchange listings planned in the near future?
A: Yes, but unfortunately with these things, every day it’s not something we can often say before the exchange makes their own announcements. If you have certain exchanges that you prefer, do not be shy and tag us on Twitter letting us and the exchange know. You can also reach us everyday at all hours of the day and night on Discord and Telegram.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Given that Colx had no ICO, are we able to ramp development efforts in case we have potential partnership deal on the table?
A: It really depends. We strategically spend every dime we spend on development. We do not like even a single penny to be waisted, so we don’t move as fast as the projects that raised millions of dollars, but we continue moving none the less. Ramping up our development is something we are working on by securing additional funding and we’re currently working on securing funding. 😊
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How is the project development advancing? What are your plans for the next 5 years and what more can we expect from ColossusXT?
A: Our development is continuing on at a steady pace, we’re looking to ramp this up over the next year as the Colossus Grid will take much of our time but we’re excited. Over the next 5 years, you can expect the Colossus Grid to be live in all forms (storage and computing power), Armis will be released and we will share many technical details on how this consumer privacy protection rivals some of the other privacy protections in the blockchain industry. We expect to be verified and approved to work with the agencies in the United States long before then as well and will be aggressively pursuing federal contracts to utilize the computing power of the Colossus Grid. In 5 years, we plan to be a key player not just in the blockchain industry, but throughout the world. If you do not know ColossusXT now, expect to in 5 years or less.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Users often care less about technology, but rather the value of the token. How do you manage to strike a balance between developing the technology and also improving the value of COLX? There are so many privacy coins now, all of them claiming to have better features that ColossusXT. Moving forward, what do the next 10 years look like for ColossusXT in navigating the wave of privacy projects coming. How can ColossusXT continue to shine in the midst of seemingly legit projects that have come to challenge ColossusXT like mimblewimble projects and Monero, Zcoin, ect.?

A: The Colossus Grid and Masternodes will have a strong relationship with each other. When the Colossus Grid goes live we expect the masternode demand to continue to rise. Masternodes are a great incentive mechanism to increase network strength and will play an important role within the Colossus Grid. The more masternodes online, the less available coins in the circulating supply; which we expect will eventually reflect ColossusXT (COLX) coin value.
Over the next 10 years, ColossusXT (COLX) will solidify itself as a key player in the blockchain industry, and outside the blockchain industry. Following our strategic business plans, we intend to be one of the first, if not the first to truly bring government and other businesses into the blockchain industry through the Colossus Grid. Armis will be our defining privacy feature, which we expect in time will begin to be adopted by other projects. --------------------------------------------------------------------------------------------------------------------------------------------------
Q: How have the number of Masternodes (MNs) increased/decreased over time/in the past few years? What proportion (%) of MNs actively take part in Governance? How do you see the number of MNs increasing/decreasing in the next couple of years? Is there a trend upwards or downwards?
Is there a specific number (or range) of MNs the team would like to attain ideally? Is it better to have as many MNs as possible or is there a point at which too many MNs start to have an adverse effect on the performance of the blockchain?
Hope this wasn’t too many questions in one :), Ahmed

A: The number of masternodes in the active network is more or less the same, fluctuating around 200-220. About 40% - 50% of masternodes participate actively in governance (see https://governance.colossusxt.io). We expect a number of masternodes to grow as they will have additional benefits with Colossus Grid (see business plan: http://bit.ly/COLXBPLive).
As the team had no premines, only the dev fund can be used for masternodes which is hard to maintain due to actual budget flow. It’s better to have as many masternodes as possible for the network, there is no adverse effect.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Of all the milestones that $COLX has achieved since your humble beginnings, which do you consider to be the best of it all? What achievements do you feel proud most?
A: It’s often not mentioned but I’m very proud of our partnership with PolisPay, which allows ColossusXT community members to purchase Amazon, Spotify, and other gift cards with ColossusXT (COLX) through the Polis platform. You are also able to spend your COLX anywhere Mastercard is accepted, the card is available only for EU citizens right now and the Polis team hopes to bring in other countries in the future.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: There are problems that can slow down the course of a project such as the emergence of globalization, given the tighter budget, shorter implementation time requirements. My question is, How does $COLX resolve the issue?

A: Given the current situations around the world the Colossus Grid has more value than it ever has, and that value will continue to grow once we have released the Colossus Grid for consumers to share and utilize resources. You can already see from the [email protected] initiative that people are eager to share their computing resources to help researchers simulate different COVID19 simulations. We’ve always worked on a very small budget at ColossusXT starting with 0$ in funding and no pre-mine or ICO/IEO. This project was built for the community by the community, and as of lately we’ve actually been ramping up our business strategies and developments. Since we have all already worked remotely before the COVID19 pandemic, it interestingly allowed us more time to focus and achieve these goals as our day jobs allowed us to spend more time on ColossusXT.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How will you fight with regulators who are trying to stop privacy coins?

A: We have an amazing legal team at ColossusXT, and they are on top of any new law or regulation that comes out. We’re not afraid of regulators and our legal team makes sure that everything we do for ColossusXT is law-abiding. It's time the world stops looking at privacy as a feature and as a right, especially when you read about different applications and platforms using your personal DATA for their benefit. ColossusXT will continue to push this, and we're prepared to lobby this to lawmakers. --------------------------------------------------------------------------------------------------------------------------------------------------
Q: What type of utilities can $COLX give to users over its competitors like GOLM (computation) or STORJ (Data)?

A: The Colossus Grid has some major differences between Golem and Storj. One we’re a privacy-focused project. If you take a look at many of these applications and platforms today, in some way or another you’re giving up personal information, and/or geographic information. ColossusXT is focused on protecting consumer information, we do not look at privacy as a feature, we see privacy as a right, especially in the tech world today.
The second part of this question is that we’re currently in the verification process of registering with the United States federal and state governments so that we can legally bid on federal and state projects and work with different agencies. This will ensure that as the community members are sharing their idle resources, large corporations and businesses are using it. I’m not aware of the mentioned projects being registered in the United States or taking steps to work with the United States government.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How will computing power and storage sharing look like, for an average user (marketplace, program download)? What are you currently working on, when can we expect MVP? TY
A: The marketplace and Colossus Grid will be inside the ColossusXT desktop wallet that you currently have now. The UI/UX will change some to allow the additional settings and tabs that will become available and we’re preparing an MVP right now and we hope to share those details with you over the next few months, ask us again in the Q3 AMA if you haven’t seen anything yet :)
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: What would you say is the $COLX killer feature that sets it apart from the rest of the competition.
A: We believe that Armis is our killer feature. We recently had a beta this year with the community and will be moving forward later this year with Armis. ColossusXT consumers will have their geographic location and IP fully hidden behind the Armis layer for further security and anonymity for the transactions which will also take place in the Colossus Grid resource marketplace in the future.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: I have been a silent follower of $COLX and I must say that I'm truly impressed with how the team has been diligently working on the project. It'd be nice to have the community be part of something like a bounty or a social awareness contest. As this will not only attract more users to the platform but would also strengthen the bond within the community. When can we possibly expect a community project of this level? #spreadthegrid
A: We currently have a Gleam competition ongoing for social awareness, and we just hired a community manager to spread more community awareness and will be rolling on competitions more regularly. Every quarter we have an AMA on Reddit for the community to ask questions, or just gripe at us, and one person each quarter is awarded 100,000 COLX for participating in the AMA. As we deliver our targets and grow, we will shift more funds from development funds to marketing funds to raise further awareness.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: "Our main competitor is crypto adoption. We are all here to make it happen together.", this is quoted from a founder of a known crypto wallet. Do you see competition as something that strengthens the project as a whole or as a possible distraction due to pressure to be at the top of the crypto ecosystem?

A: This is a two scenario situation. Competition is good for ColossusXT, and we look at our main competitor in blockchain as Golem (GNT), having said that though too much competition or sometimes maximalist behavior isn’t good for crypto, many of these projects should be coming together to lobby lawmakers for laws and regulations that are good for the blockchain industry, as this is still an emerging market and the laws and regulations aren’t exactly in place at this time.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: "For people to believe in crypto, they need to understand the tangible benefits it offers to our society.", a remark made by a crypto project in the past. What exactly would be $COLX real life global benefits? And how do you plan on achieving this?
A: ColossusXT vision will be achievable when the Colossus Grid is released. We are currently in the process of registering with state and federal agencies in the United States, once we are registered to work with these agencies we will pursue contracts with the government, cybersecurity firms and colleges all around the United States, and the world to utilize the resources on the Colossus Grid. We’ve already started building business relationships for this very purpose.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: According to you how much time will it take for $COLX to get into mainstream adoption and execute all the plans set for this project?
A: It’s almost impossible to set a timeline on when the world/people will begin to adopt ColossusXT (COLX) and the Colossus Grid. We don’t believe that adoption for ColossusXT will happen before the Colossus Grid is live, and if I gave you an exact timeline for when or how long it will take you for the Colossus Grid to be adopted I would be lying to you, but we are already forming business relationships and making strategic moves to be able to bid, and work with state and federal agencies in the United States.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Does Tokens.net plan any kind of staking ($COLX or other coins)?
A: We will reach out to the tokens.net team and see if they have any plans to allow staking.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How will you try to boost adoption of #COLX, how do you think you will motivate programmers to join opensource project?
A: The Colossus Grid will be available for anyone to use, or share their idle resources for other consumers to use. We will be focusing on providing these resources to state and federal governments, cybersecurity firms, and researchers all across the world. Certainly, we expect some community members to use these resources to mine different PoW cryptocurrencies, but the team at ColossusXT will be focused on bringing in large colleges and universities as well as big cybersecurity businesses that may need supercomputing power at 1/10th of the current prices. Our programmers are our only paid team members, and we pay them at a competitive rate. We’re looking to bring in some more programmers later this year.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Do you have any special development funds for programmers?
A: Sometimes we pay our programmers out of our own pocket, sometimes we pay them in ColossusXT. It really depends on what kind of agreements have been made. We have been aggressively pursuing different funding opportunities throughout 2020 so that we can expand our development team and in the future, we may have incentives to drive programmers into joining our team. Right now we just stick to a competitive pay scale within the industry.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Why Android Wallet Revision hasn't been done? Any problems?
A: The Android wallet revision took some time to be approved in the Google Playstore, but it has been released and live since June 15, 2020.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Whats the second biggest milestone other than the grid network for COLX team?
A: Armis is likely to be considered our second biggest milestone this year, although as I mentioned above this can easily be overshadowed by our Polis partnership which allows you to spend ColossusXT (COLX) anywhere Mastercard is accepted. Although the epay debit card ownership is currently restricted to certain countries (EU zone only), these restrictions will lift in time.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How is COLX team going to contribute to crypto adoption, other than building a robust network?
A: We’re already in the process of verification to work with state and federal agencies. Adoption for blockchain projects isn’t going to move fast. I read a report just a few days ago about how scammers in the crypto industry stole over 2 million dollars worth of crypto just from the “Elon Musk” impersonations on Twitter.
We will continue to build our network, and seek out state and federal agencies as well as private cybersecurity firms that can utilize the Colossus Grid, we’re not just focused on making noise on social media, we intend to make noise throughout the entire world.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Are their industry partners to COLX that are awaiting your network to go live?
A: Yes, although I hesitate to go into too much detail here. We are talking with business leaders.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: The ongoing crisis affected the market badly, making many projects far from their targets. What is $COLX strategy in order to survive and pass through this crisis?
A: I agree it affected the market badly, especially the projects that raised hundreds of millions of dollars in crypto and held it through the entire market correction. ColossusXT strategy is different from those affected, we’ve always had a smaller budget than these large projects. We spend the money we have available very wisely, and we’re not in a hurry to grab something that sounds good without doing our due diligence. We make our moves very strategically.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: I gotta ask, what made $COLX decide to get listed on Tokens.net? What beneficial advantage does $COLX get in doing so? How about Tokens.net?
A: Tokens.Net is one of the best exchanges ColossusXT is listed at the moment in comparison to others in terms of volume.
  1. Tokens.net is one of the most secure and transparent exchanges out there, registered in the UK.
  2. The team behind the exchange has deep roots in the crypto/blockchain space, it was co-founded by Damian Merlak, a crypto-pioneer and co-founder of Bitstamp.
  3. Tokens.net provides free auto-trading tool / Market Making Bot. Their Dynamic Trading Rights concept adds transparency to trading volumes.
  4. They allow the community voting option of only truly decentralized projects after a thorough screening.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Hey everyone! What is the main purpose of the coin $COLX, does it have its own chain or is it some sort of an ERC-20 token? Thank you for the answers.
A: ColossusXT has never been an ERC-20 coin. We have been operating on our own mainnet since 2017. The purpose of ColossusXT (COLX) is to be the native currency of the Colossus Grid. This will allow users to share their idle resources on their computers, and consumers will rent/buy those resources to complete whatever they intend to use them for, from processing large DATA to running scientific simulations, to even mining PoW cryptocurrencies.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: When we can expect any usecase for COLX? A company or service that uses colx for its activities / tasks.
A: There are currently use cases now if your location allows you to utilize the Polis Pay app, or if you have a Polis Pay card you can buy things with ColossusXT (COLX). I myself have tested the card buying gas at a gas station. These are not ColossusXT’s primary focus though and much of our use case will not start until the Colossus Grid is live.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: What pairs will colx have to trade with on tokens.net // Will you connect #COLX with USDT EURS or BTC?
A: ColossusXT will be initially paired with Bitcoin (BTC). If the community would like different pairs, they can certainly request them and we will reach out to tokens.net and work to facilitate requests.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Will you try to convince users to trade on tokens.net if so how will you do it?
A: There is currently a gleam competition for users to sign up and trade on tokens.net. We “shill” tokens.net accordingly through social media to the ColossusXT community, but can’t really convince anyone to use a certain exchange, although we will try to push as many members to tokens.net as we can. We have many masternode holders who reside in the United States and they are not yet allowed to trade on tokens.net.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How will you try to create liquidity for your pairs?
A: We would like to increase the adoption rate with real-world partnerships such as our partnership with PolisPay for the use of gift/debit cards. As the liquidity is linked with the use cases, supply/demand mechanics, we are also preparing to provide additional use cases of COLX for the crypto world in an innovative & pioneering way; for the time being, we can hint this as a side business till we deliver fully operational Colossus Grid.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: How big is a development team of #COLX?
A: The ColossusXT team is probably bigger than some people realize, partly because many of the team members are very private. We have 9 core members, 2 in-house developers, 3 Colossus Grid architects, and 2 Colossus Grid developers.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Do you have some security guys in the team?
A: Yes, although I’m hesitant to share too many personal details about team members. We have core team members who have been working in different fields of IT security for several years.
--------------------------------------------------------------------------------------------------------------------------------------------------
Q: Since #COLX is planning on having some sort of a marketplace where you can take advantage of computing resources and the blockchain as well, are there any plans on introducing smart contracts? Will it help the grid? Is there a place for it?
A: This has been mentioned a few times in the past so it’s something on our radar, it’s currently not in the development timeline as the Colossus Grid is a massive amount of work. There may be a place for it as the blockchain industry evolves, and I can certainly see some cases where a smart contract can add some value to the Colossus Grid.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Important Information:
Website
Whitepaper
Roadmap
Business Plan
Wiki
Governance
Partners
GitHub
What is ColossusXT? (YouTube)
---------------------------------------------------------------------------------
Follow ColossusXT on:
Twitter
Facebook
Telegram
Discord
Forums
---------------------------------------------------------------------------------
AMA History:
2018 Q1 2018 Q2 2018 Q3 2018 Q4
2019 Q1 2019 Q2 2019 Q3 2019 Q4
2020 Q1
submitted by PioyPioyPioy to ColossuscoinX [link] [comments]

Realistic Bitcoin Price Prediction by the end of 2020 and ... TIP260: BITCOIN MATH & VALUE – W/ PLAN B BITCOIN PRICE PLUMMETS IN MINUTES!  WHAT IS NEXT FOR BTC? Will Verge be the Bitcoin Destroyer? BITCOIN PRICE BREAKOUT IMMINENT!!!!!  THIS CHART ...

What is I2P. I2P is the next level up from Tor. I2P works similar to Tor in that it sends transactions using a peer to peer style routing method. Both also operate using heavy encryption. However, unlike Tor which uses internet-based relays to bounce transactions around, I2P uses its own private network, creating a private network within the ... AnonCoin offers complete obscurity for all its users. The cryptocurrency was launched in the year 2013 at one point of time when Bitcoin and other cryptocurrencies were not operating enough to achieve anonymity. AnonCoin is presently the only cryptocoin operating in market that supports the i2p dark-net. AnonCoin is also completely TOR compatible. Imagine receiving several Bitcoin that had been used in an online drug marketplace, and then trying to deposit that Bitcoin into an exchange only to have it rejected due to its past use. If, on the other hand, Bitcoin was completely private, then tracking that history wouldn’t be possible, resulting in a currency that is more fungible. Bitcoin is a digital currency, which is supported by a P2P network of computers across the internet that act as servers to process the financial transactions of this currency. Some believe Bitcoin is a Scam, or Ponzi scheme, but once one understands the concept of Bitcoin, it is clear that it is not. Up Next. Curaleaf Q1 Shows Company May Have to Test Market’s Tolerance for More Borrowing

[index] [13132] [7862] [18624] [27444] [27817] [34098] [34915] [24242] [15820] [18839]

Realistic Bitcoin Price Prediction by the end of 2020 and ...

bitcoin is finally breakout from the long lasting down trend channel. Could this be a new begging in bitcoins price? I will address this question in this vid... Anyone that has had any dealings with Bitcoin will have experienced a lot of frustration. Transactions can take hours, they are becoming increasingly expensive and exchanges can suspend trading at ... Lets talk about Bitcoin and what I THINK caused the recent jump in price - enjoy! Add me on Instagram: GPStephan The YouTube Creator Academy: Learn EXACTLY h... Bitcoin price drops 15% in a matter of minutes. What does this mean for bitcoin bulls? Is btc even bullish anymore? Here is what you can look out for on the bitcoin charts. Tim Draper predicts the price of bitcoin after the halving! - Duration: 49:17. Crypto Finder 267,379 views. 49:17. RandomCoin Mining Show LIVE! ⛏ - MicroBitcoin (MBC) - DMD-GR - Duration: 30:51.

#