Page 4,425«..1020..4,4244,4254,4264,427..4,4304,440..»

6 of the Largest Cryptocurrency Premines in History – The Merkle

There have been several dozen premined cryptocurrencies throughout the past few years. Not all of these projects amounted to much, although some of them successfully gained some traction in one way or another. Below are six currencies with significant premines, although not all of them used this concept for nefarious purposes.

It has to be said, the Gulden project had a 10% premine reserved for development, marketing, and other miscelaneous expenses. With a premine of 10% 170 million coins out of a total 1.68 billion there is somereason for concern. Despite the premine, however, Gulden ticker NLG has managed to gain some traction in the real world, although its success is limited to The Netherlands. Gulden is still under active development to this very day, according to their bitcointalk thread. Gulden has a US$8.655m market cap with 342,46 million NLG in circulation

FuelCoin is a fully premined coin for redistribution. The bitcointalk thread mentions how the 50 million coins were held by a trusted third-party for a fair distribution. 10 million of those coins wereused for charity donations, the remaining 40 million coins were to be used for marketing efforts. Fuelcoin also maintains a 2% annual inflation through its proof-of-stake system. It appears Fuelcoin is no longer actively developed, even though the currency still has a US$272,000 market cap with over 100million coins in circulation.

Startcoin is the second project to be linked to Max Keiser, who is quite a popular figure among cryptocurrency enthusiasts. Unfortunately, Startcoin also came with a 50% premine, which immediately raised a red flag. Despite developing the StartJOIN platform which uses StartCoin the currency never amounted to much. It is anything but surprising to see Startcoins market cap drop to US$164,488 with over 45 million START in circulation.

When Auroracoin was first introduced, a lot of people seemed to be on board with the idea. The cryptocurrency is designed to serve as a new currency for anyone living in Iceland. Its 50% premine was distributed through an airdrop in 2014, which put AUR into the hands of every Iceland resident. Even though most recipients decided to sell their Auroroacoin right away, the currency still holds some value today. Its market cap sits at US$1.244 million, with 8,658,439 AUR in circulation.

Curecoin is a very different project from the rest, as it is an effective reward for protein-folding. This process is used to aid scientists in researching cures for diseases and other illnesses. A total of 28,692,524.32 coins will be in circulation, of which 23,226,284.65 were premined. These coins are distributed to all participants, regardless of the mining hardware used. Close to 95% of all coins are issued to folders, whereas the rest of the funds areused forproject development donations and developers. Curecoin has a market cap of US$1,485,223 with 26,431,310 CURE in circulation.

Perhaps the biggest scamcoin of all time is Paycoin. It is not surprising to find out Paycoin also had a significant premine, as 12 million coins were kept in control of the developers. Considering there were only 12.5 million XPY to be issued at it speak, it was evident this project would not get very far. Paycoin was involved in many different controversiesand eventually turned into a complete scam. Despite this rocky history, the currency still has a US$28,176 market cap with 11,671,263 XPY in circulation, quite surprising to say the least.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

View post:
6 of the Largest Cryptocurrency Premines in History - The Merkle

Read More..

Cloud Security: 8 Things You Need to Know When Choosing a … – Cloudwards

When you decide to start using a cloud storage or online backup provider, you may have some worries about security: weve all seen the sensational headlines about starlets having naked pictures of themselves stolen from their online accounts. The power that the U.S. Senate has recently granted to ISPs may also inspire worry.

However, with proper security measures, your stored files can be just as safe in the cloud as they are on your laptop if not safer. In this article well talk a little about the most common ways cloud services protect your data.

With cloud storage, you dont have to worry about the physical security of your data: even if your laptop or tablet gets stolen, you wont have lost your documents and images. Most cloud storage breaches were actually facilitated by users who gave away their passwords, often as the victims of phishing.

Your introduction to the world of cloud storage is likely to be through the services of Dropbox, Google Drive or OneDrive. These services are backed by big corporations that can offer storage space free of charge.

The slick advertising of these big businesses mean that they manage to grab the attention of many potential cloud storage customers. However, thanks to the security blunders of these major players, specialist providers have found opening in the market. Good examples are Sync.com for storage and Carbonite for backup. Cloudwards.net also has a list ofsecure Dropbox alternatives.

Lets take a look at some of the most common terms youll see when shopping for a cloud storage or backup provider.

HTTPS stands for Hypertext Transfer Protocol Secure. HTTP (without the secure) is a standard of messaging that all Web servers use to transfer Web pages to browsers. HTTPS adds a layer of security to these procedures and it is the bedrock of ecommerce.

You will see https:// at the beginning of some addresses in the bar at the top of your browser. That means the Web page that you are looking at was transferred to your computer with the secured version of HTTP. You dont need to worry too much about the security behind HTTPS; its the system that protects your credit card details when you pay for things online.

SSL means Secure Socket Layer and this protocol contains the procedures that put the S in HTTPS. In 2008, after running for a while, SSL was discovered to have some security weaknesses.

The protocol was open to spoofing, which means that hackers were able to forge the security certificates that formed the heart of the SSL verification system. These certificates contain the encryption key that the client is supposed to use in order to secure connections. Soon after, Transport Layer Security (TLS) protocol was designed to replace SSL.

Further weaknesses were discovered over the years and they caused the International Engineering Taskforce to deprecate the protocol in 2015, which effectively told everyone not to use SSL for security. Although no one implements SSL any more, the term is still often used: in reality, services that say they use SSL actually use TLS.

Although banks used to rely on HTTPS for security when they provide online banking, most have kicked their privacy features up a notch with two-factor authentication, which you often will see written as 2FA.

As with most logins, you need a username and a password, but 2FA requires some other method of identification on top of that. This should be something that only the user has and it can be a physical possession, or a secret piece of information. Some banks give clients a special card reader which generates a second pass code, while others will send you an access code by SMS.

iCloud uses a keychain device that generates a code. However, that keychain fob quickly disappeared when Apple integrated 2FA code generation into their standard products.

The U.S. National Institute of Standards and Technology commissioned the creation of the Advanced Encryption Standard, or AES, to create a secure method of encryption that could be used by government agencies.

The encryption process involves transforming blocks of numbers by organizing them into a series of grids and then adjusting each number in the grid by applying a cryptographic key. The specifications for AES allows for different lengths of encryption keys. The shortest key used for encryption is 128 bits long and is often used for encryption on mobile devices. The most common length of key for cloud storage data encryption is 256 bits.

The length of the encryption key is important because the specifications of AES are publicly available. That means that anyone who knows the formula could crack the encryption simply by guessing the key.

You may remember some TV cybercrime thriller where the hackers use a computer program that whizzes through a series of numbers until it hits the right key, flashes, goes beep, and then one of the young hackers says, Were in. Thanks to 256-bit encryption keys, that scene would end up being really long and boring.

There are 1.1 X 1077 possible key combinations. It would take 3.31 X 1056years to guess right. To write that number out in full, you would have 33,100 followed by 53 more zeros. To make decryption even more time consuming, the AES encryption method transforms each grid of numbers 14 times over.

The AES system is so reliable that it has become the touchstone for security all over the Internet. However, thanks to the revelations of Edward Snowden and other leaks regarding the NSA tampering with encryption systems, some worry that even AES may not be completely secure.

If you just keep pictures of yourself on the beach in Cancun on your cloud account, then you should be more worried about TMZ getting them especially if you are Jennifer Lawrence. For most people AES provides ample security.

Those who worry about an encryption system that was created for the U.S. government should look out for cloud storage systems that use the Blowfish security standard. This is older that AES and it had never been cracked until 2016 when the Sweet32 birthday attack was created. Even now, Blowfish is still thought to provide strong enough security for files smaller than 4GB.

The encryption system specification was published in 1993. As with AES, the definition allows for a range of key lengths, which each developer can choose from. The key specs range from 32 bits to 448 bits in length. As with AES, the longer the key, the stronger the security, so check out this stat when selecting a cloud storage provider, like CrashPlan, that uses Blowfish.

Stephen Haunts

Both AES and Blowfish are symmetrical key systems. That means that the cipher used to encrypt the data is also needed to decrypt it. You may already have thought of a flaw with these methods when used for communicating data. How do both sides in a connection get the same key? If one sends the common key to the other, then that message cannot be encrypted because until it has the key, the corresponding computer would not be able to decrypt it.

The answer to this problem lies with asymmetric key systems, such as RSA. These encryption methods are also known as public key. The key that decrypts the protected message is not the same as the one that encrypts it.

It does not matter if a hacker gets hold of the encrypting key because all she will be able to do with it is encrypt messages that only the holder of the corresponding private key could ever decrypt. You cannot derive the private decryption key from the public encryption key.

RSA is named after its creators Rivest, Shamir and Adelman. Most Internet encryption systems use a public key system to distribute the encryption ciphers needed for symmetric key systems, such as AES and Blowfish. RSA is the most frequently used private key system used for key exchange and it is used for key distribution in TLS methods, including HTTPS.

RSA has a 1,024-bit key, which is four times longer than the most commonly used AES key length of 256 bits and eight times longer than the minimum-length AES key of 128 bits.

Internet-based encryption systems rely on client software that communicates with the server. The server is the remote computer that holds the files the cloud storage facility. The client is at the other end of the connection. In the case of your access to cloud storage, the client is your computer.

When you sign up for a service such as Dropbox, the first thing that will happen is that the website will download an installer file for you to run. This installs the client software. Some Internet security systems will include the key for communication with the server in this download.

A potential problem with keys that are reused is that once someone learns that key, they can decrypt all the communications that your computer has with the server and get access to your private files. Perfect Forward Secrecy(PFS)is a methodology by which a new encryption key is used for each session.

If anyone out there has a system to snoop on your connection and capture the encryption key, they would be wasting their efforts because the next time you connect they would have to start their tasks all over again to get the new key.

Perfect Forward Secrecy adds an extra layer of protection to your privacy because it limits the amount of disclosure that any single security breach can deliver.

The specialist storage providers now operate zero-knowledge encryption. You may search the Web and discover information on the Zero Knowledge Protocol. That is something else: zero knowledge encryption simply means that all of the encryption of your files takes place on your computer before they are uploaded to the cloud.

The client software uses a separate process to scramble the files using a key that is resident on your computer. Files are then transferred using a standard method, such as TLS.

The employees of a zero-knowledge providercan never get to the raw files, only the encrypted version. As they also could not get access to the key, you are better off with zero-knowledge encryption than with ciphers that are applied during the transfer or when the files reach the server.

Zero-knowledge encryption is still not good enough for some. The security-conscious argue that the encryption software and keys all originate from the cloud storage provider, so there is still one central location that is vulnerable to attack.

If anyone wanted to get into all the files on a server that operates a zero-knowledge system, they would just need to hijack the key distribution stage.

If the software on your computer uses an encryption key that the hacker knows, then it really doesnt matter where the encryption takes place, he can still get access to all the files on that cloud storage server.

If you install encryption software from another company on your computer, you increase your privacy. You can encrypt all of your files manually and then let the cloud storage client software re-encrypt and transfer the data. That way, if some miscreant has got into the cloud storage servers encryption system, all she can do is decrypt a file to reveal another layer of encryption beneath.

Cracking a security system like that would entail breaking into every encryption software company in the world and manipulating their key distribution procedures. No one has the resources to achieve such a feat.

The degree of privacy that you need for your files greatly depends on the type of information you are storing. There is a wide range of cloud storage options out there and they vary from consumer-friendly free services, such as Dropbox, through to business systems that even the NSA could not crack.

Sign up for our newsletter to get the latest on new releases and more.

Combining services can give you stronger security. Encrypting your files with completely separate software before you move them anywhere can give you the strongest possible levels of security.

Now you understand the terminology and issues behind security measures, you are better equipped to find the best cloud serviceto fit your needs. What security measures do you take? Let us know in the comments below, thank you for reading.

The rest is here:
Cloud Security: 8 Things You Need to Know When Choosing a ... - Cloudwards

Read More..

Cloud Computing, App Migrations Still Stump Corporations | Fortune … – Fortune

Given the rampant chatter in Silicon Valley about companies moving software and data from their data centers to a shared public cloud, you might expect they considered what that would mean for their critical business software applications.

But you would be wrong, according to one expert who helps corporations and government agencies make this journey.

"When companies move to the cloud, they're often not doing a basic engineering task which is to look at all their applications and figure out what happens if they fail," Vishwah Lele, chief technology Officer at consulting firm Applied Information Sciences, tells Fortune .

Most big companies are aware of basic best practices for cloud computing. For example, it is recommended they distribute applications and data across different data centers within one locationor "availability zone" in Amazon Web Services parlance. That means if there's a power failure in one facility, the application will keep running from another. This applies across different geographic regions as well, say from data centers between Oregon and Northern Virginia.

But because these massive data centers rely on tens of thousands of servers, the chances of a hardware failure are inevitable. The key is to figure out which of a company's applications are most critical to its ongoing operations and "build a reliability bubble" around them, Lele says.

In a blog written in the wake of two cloud outages earlier this month (one at Amazon Web Services ( amzn ) and another on Microsoft Azure ( msft ) ), Lele wrote:

Unfortunately, we cannot eliminate such cloud failures. So what can we do to protect our apps from failures? The answer is to conduct a systematic analysis of the different failure modes, and have a recovery action for each failure type.

"You look at each application, see what can go wrong, and create a check list," Lele tells Fortune now. "Then you look at the potential for failure, and figure out how to mitigate it for the most important applications."

IT professionals can think ahead to avoid a small cloud glitch from spiraling. They can, for example, add what Lele calls "reply logic" to an important application. If the application hits a snag, this logic triggers an automatic retry. It's similar to hitting reboot on your computer before calling the help desk. This logic means that if a resource is temporarily unavailable to an application, the application will know enough to retry in a few seconds instead of shutting down. This, he continues, is something that IT pros don't have to do when running applications in-house, where they manage all the systems.

Tim Crawford, a strategic advisor with AVOA, a Los Angeles-based consultancy, agreed, noting that the problem is not that public cloud services fail but that many people mistakenly think that they won't fail.

"Many enterprises assume that cloud infrastructure is resilient in away that's similar to their corporate data centers," he noted. However, in-house data centers are built with resiliency at many levels whereas public cloud infrastructure is not.

Thus cloud applications need to be smarter and more aware of what's going on around them than they had to be when running in corporate server rooms. Hence the need to add things like reply logic to the mix.

On the other hand, some industry watchers argue that companies shouldn't overthink any cloud move, but just do it.

"I think companies do enough due diligence moving to cloudsometimes even too much if they hesitate too long," says Holger Mueller, an analyst with Constellation Research. The real issue, in his view, is that once companies are already using a public cloud, they do not necessarily build and deploy their applications in a way that can adapt to unexpected outages.

The lesson from the recent AWS outage, he says, is that many new "born to the web" businesses do not write code to ensure high-availability and disaster recovery. "Even Amazon's own dashboard didn't work in this case," Mueller says. "There is too much talk before moving to the cloud and too little work once they're already in the cloud to take advantage of the cloud's capabilities and requirements."

He also points to the failure of the DYN's domain name system (DNS) last October, which took down many popular web sites, including Twitter ( twtr ) , Etsy ( etsy ) , Spotify, GitHub, SoundCloud, and Salesforce-owned Heroku ( crm ) . (A DNS serves as a directory for Internet sites and converts human-recognizable Internet domain nameslike Twitter.cominto numbers readable by the computers running the Internet. If the DNS system fails, sites can become inaccessible.)

Get Data Sheet , Fortunes technology newsletter.

The lesson: "You can't rely on a single DNS provider or you have a single point of failure," Mueller says. Avoiding single points of failure is cloud computing lesson 101.

There has long been a difference in perspectives between older companies moving key existing applicationsthink an insurance company's underwriting softwareto the cloud and "newbies" that were born there.

Holger's overriding point is that big, older companies that are moving stuff have to work carefully take advantage of cloud but even born-to-the-cloud companies can screw things up.

And both groups need to give lots of thought to how their applications can make best use of a massive shared infrastructure and mitigate the risk of hardware or other failurebecause it will happen.

See more here:
Cloud Computing, App Migrations Still Stump Corporations | Fortune ... - Fortune

Read More..

Tencent Will Outfit Its Public Cloud with Latest NVIDIA Tesla GPUs … – TOP500 News

NVIDIA has revealed that Chinese internet giant Tencent will deploy Tesla GPUs in its public cloud infrastructure. The GPUs are being deployed to help enterprise customers develop machine learning services.

Based on revenue, Tencent is Chinas largest internet company, offering a variety of social media, e-commerce, and gaming services for the worlds fastest growing online market. The company took in $15 billion in revenue in 2015, trailing only Amazon ($107B), Google ($75B), and Facebook ($18B). Tencents market value that year was $206 billion.

The companys public cloud is aimed at online businesses and other enterprise customers that have turned to the utility model for their computing infrastructure. The Tesla GPUs including both the P100 and P40 will be made available to these customers via the Tencent cloud, who are building machine learning services, either for their own customer base or for internal use. These include such things as natural language processing, facial recognition, automated customer service, and supply chain logistics.

"Tencent Cloud GPU offerings with NVIDIA's deep learning platform will help companies in China rapidly integrate AI capabilities into their products and services," said Sam Xie, vice president of Tencent Cloud, in prepared statement. "Our customers will gain greater computing flexibility and power, giving them a powerful competitive advantage.

Tesla GPUs have become the de facto standard for machine learning workloads for hyperscale companies. The P100, in particular, is NVIDIAs most powerful neural network training processor to date, and is being deployed in both AI-oriented supercomputers and public cloud infrastructure. Its general-purpose enough to handle both machine learning workload and more traditional HPC and data analytics applications.

The P40 is more precisely targeted to the machine learning space, and is specifically aimed at the inferencing side of those applications. In December 2016, Tencent had launched servers with M40 GPUs, the Maxwell-generation version of the P40.

Tencent, by the way, has also deployed IBM Power servers in its hyperscale datacenters for big data workloads. Theoretically, Tencent could deploy the NVIDIA Tesla GPUs in such servers, which would leverage the built-in NVLink support included in the latest Power processors. This would accelerate data communications between the host CPU (Power8) and the GPU (the P100), and offer Tencents enterprise customers a premier platform for machine learning.

More likely though, the GPUs are being hooked up to Intel Xeon processors in a more traditional server setup. According to NVIDIA, the Tencent cloud servers will incorporate up to eight GPUs in order to maximize performance for these machine learning workloads. Deployment is scheduled for the first half of this year.

See more here:
Tencent Will Outfit Its Public Cloud with Latest NVIDIA Tesla GPUs ... - TOP500 News

Read More..

Cloud Native Computing Foundation (CNCF) Adds Linkerd, gRPC, and CoreDNS to Growing Portfolio – InfoQ.com

Since the beginning of 2017 the Cloud Native Computing Foundation (CNCF), an open source foundation dedicated to advancing the development of cloud native services, has added three new projects to their portfolio for hosting and stewardship, including: linkerd, a transparent proxy 'service mesh' that provides service discovery, and communication failure handling and visibility; gRPC, a language agnostic, high performance RPC framework; and CoreDNS, a fast and configurable cloud native DNS server.

The CNCF is an open source Linux foundation organisation dedicated to advancing the development of cloud native applications and services. The CNCF Charter states that 'cloud native' systems will have the following properties: container packaged - running applications and processes in software containers as an isolated unit of application deployment; dynamically managed - actively scheduled and managed by a central orchestrating process; and micro-services oriented - loosely coupled services with dependencies explicitly described (e.g. through service endpoints).

In according with the stated mission, role and values, the CNCF has begun to host and steward several 'cloud native' technology projects, including the initial project, Google's Kubernetes container orchestration and scheduler platform. Since inception the foundation has also began hosting: Prometheus, an open source monitoring solution that focuses on time series data, flexible querying, and extensive integration options for both client libraries and third-party data consumption; OpenTracing, a vendor neutral open standard for distributed tracing; and fluentd, an open source data collector for creating a unified logging layer. Since the beginning of 2017, the foundation has accepted three additional projects at various 'graduation stages': linkerd (at inception stage), gRPC, and CoreDNS (at inception stage).

Linkerd is an open source, resilient 'service mesh for cloud-native applications'. At its core, linkerd is a transparent proxy that can be used to implement a dedicated infrastructure layer for service communication that adds service discovery, routing, failure handling, and visibility to software applications without requiring invasive application integration. Linkerd was created by Buoyant founders William Morgan and Oliver Gould in 2015, and builds on the work that Twitter started with their Scala-based Finagle extensible RPC system.

gRPC is a modern, open source, high performance remote procedure call (RPC) framework that was originally developed by Google. The current implementation is being used in several of Google's cloud products and externally facing APIs. CoreOS's etcd a distributed key/value store uses gRPC for peer to peer communication, and Docker's containerd portable container runtime exposes functionality through gRPC (containerd is also to be donated to the CNCF). gRPC allows service interfaces to be defined using Protocol Buffers, a powerful binary serialisation toolset and language. gRPC also integrates with multiple languages, and idiomatic client and server stubs can be automatically generated.

CoreDNS is the successor to the original SkyDNS server, and aims to be a fast and flexible DNS server, allowing users to access and use DNS data via a variety of methods. It is built as a server plugin for the Caddy webserver, and each feature of CoreDNS can be implemented as pluggable middleware (which can be 'chained' together to create a customisable pipeline of functionality), for example, logging, file-based DNS, and support for multiple backend technologies. CoreDNS has also been extended to operate directly with Kubernetes to access the service data, exposing the client-facing behavior as KubeDNS.

Additional information on all of the CNCF projects can be found on the foundation's website. The CNCF also will be running the CloudNativeCon and KubeCon conferences in Berlin, Germany, during 29th-30th March 2017.

More here:
Cloud Native Computing Foundation (CNCF) Adds Linkerd, gRPC, and CoreDNS to Growing Portfolio - InfoQ.com

Read More..

Op-Ed: Will Bitcoin’s High Transaction Fees Open the Door for Altcoin Adoption? – CoinJournal (blog)

Altcoins have long been ridiculed as useless aspects of the bitcoin ecosystem that dont offer much in terms of real value to anyone who uses them. While they often make vague promises about how they are bitcoin with feature X or Y, the number of them that offer any real use cases today approaches zero.

Having said that, the increasingly higher transaction fees on the bitcoin network may have opened the door for a few of them to achieve some sort of purpose in the form of low-value payments. Its unclear how how many people desire this particular use case, but lets take a closer look.

While its clear that some bitcoin users are interested in switching to altcoins for lower-value payments, its unclear how much adoption will take place here. Using bitcoin for small-value payments has mostly been something done by people who were already bitcoin users up to this point, so its unclear if any altcoin will be able to bring new people to the cryptocurrency ecosystem around this use case.

In short, the people who wish to use a cryptocurrency for small-value transactions are mostly driven by ideology than anything else. As early bitcoin adopter and entrepreneur Erik Voorhees explained on Twitter, hes interested in using an altcoin for small-value transactions because he simply refuses to use US dollars for philosophical reasons.

For better or worse, most people are fine with paying back their friend for a beer at the bar via something like Venmo.

Those who like bitcoin as a currency can choose to make small payments via centralized bitcoin banks, such as Coinbase or Xapo, and improvements that lower the amount of third-party trust involved in these sorts of transactions can be implemented with no further alterations to the bitcoin protocol (more on this later).

Lack of liquidity is another issue for altcoins. For example, longtime bitcoin angel investor Roger Ver recently tweeted that he made his first transaction on the Dash network for an amount of around $100,000 worth of Dash. The price collapsed by a third of its initial value in a matter of six hours on the same day Ver made his tweet, which illustrates the volatility risks that come with these sorts of coins.

One of the common responses to the price volatility issues when it comes to bitcoin is that the price volatility is in the upwards direction over the long term. Altcoin proponents will undoubtedly use this argument as well, but the fact that bitcoin may eventually usurp this low-value transaction use case puts this argument into question (again, more on this later).

Network effects are another issue when moving to different cryptocurrencies. The fact of the matter is that every cryptocurrency that isnt bitcoin has roughly zero real-world users. This could obviously change in the future if enough people decide they wish to make small-value transactions on these networks. For example, Coinbase is currently looking into allowing merchants to accept alternative cryptocurrencies.

One last point to make here is that bitcoins digital gold or store of value use case is mostly not threatened by altcoins. The liquidity in bitcoin makes it a preferred store of value, and those who wish to store value in an incorruptible digital bearer asset are willing to pay high fees relative to where bitcoins transaction fees have been in the past. If youre looking to put $10,000 into bitcoin, youll likely be willing to pay $5 or more to bitcoin miners to do so.

Ironically, an altcoins usefulness for low-value payments declines as the exchange rate of that altcoin increases (much like the current case with bitcoin).

Read the original:
Op-Ed: Will Bitcoin's High Transaction Fees Open the Door for Altcoin Adoption? - CoinJournal (blog)

Read More..

SpectroCoin Announces Altcoin Support for Bitcoin Debit Cards – PR Newswire (press release)

LONDON, March 22, 2017 /PRNewswire/ --Starting March 2017, the leading Bitcoin service providerSpectroCoinextends support to over 41 different cryptocurrencies. Users can now choose from a range of altcoins to load their SpectroCoin Wallet and Bitcoin debit cards. They can even use these supported altcoins to top up their mobile phones, buy gift vouchers or withdraw money using a variety of available methods. The 41 supported cryptocurrencies on SpectroCoin includes the existing Bitcoin and DASH options, along with the likes of Ethereum, Monero, LiteCoin, ZCash, Augur, and others.

The latest announcement takes SpectroCoin one step closer to its vision of becoming a service provider for a spectrum of alternative cryptocurrencies used for payments. The team behind SpectroCoin is consistently working from the past three years to make the company's vision a reality. The company started offeringbitcoin debit cardsto make it easier for people to spend cryptocurrency for their daily needs. These cards act as an alternative to standard fiat debit cards and can be used at any ATM or Point of Sale terminals accepting Visa or MasterCard cards across the world. Currently, SpectroCoin debit cards are the fastest and easiest way to spend the preferred cryptocurrency anywhere. It is also the most inexpensive prepaid debit card option available in the cryptocurrency industry, starting at as less as US$ 0.5 with no loading fee.

Since its inception three years ago, SpectroCoin began creating solutions around Bitcoin, the most widely used cryptocurrency at the time. Met with great success, the Bitcoin debit card is currently available in over 120 countries globally. The platform gradually started extending its services to include other cryptocurrencies, starting with DASH. The inclusion of DASH Wallet allowed users to send, receive payments and top-up the prepaid debit cards using DASH. SpectroCoin also offers DASH merchant solutions, allowing shops and businesses to accept DASH payments from customers and receive settlements in relevant fiat currencies (USD, EUR, GBP and more) over SpectroCoin merchant API and shopping cart plugins.

The addition of new altcoins is a result of the positive response and significant traction gained by the platform's DASH solutions. Users can now fund their SpectroCoin wallets with the supported altcoins and then use it to top-up the debit cards or exchange and withdraw it using one of the many withdrawal methods offered by the company. SpectroCoin will extend full support to these altcoins including wallets and payment processing solutions, on par with those currently available for Bitcoin and DASH.

SpectroCoin will continuously monitor the developments in the cryptocurrency industry and understand the ever-changing requirements of the community to create and deploy new solutions and extend support to new altcoins.

About SpectroCoin

Spectro Finance Ltd is developing innovative solutions for electronic payments. Currently, its portfolio consists of SpectroCoin.com Bitcoin exchange, wallet and payment processor and SpectroCard.com prepaid MasterCard solution for a link between cash and Internet. The SpectroCoin team consist of professionals in IT and Finance sectors with experience from institutions such as Bloomberg LP and Cambridge University.

Learn more about SpectroCoin at https://spectrocoin.com Get SpectroCoin Prepaid Debit Card at https://spectrocoin.com/en/bitcoin-debit-card.html SpectroCoin signup https://spectrocoin.com/en/signup.html SpectroCoin on YouTube-https://www.youtube.com/channel/UC5cWUFTcU7_vWwX1dX2to_Q

Media Contact

Contact Name:Ruta Cizinauskaite Contact Email:info@spectrocoin.com Location:London, United Kingdom

SpectroCoin is the source of this content. Virtual currency is not legal tender, is not backed by the government, and accounts and value balances are not subject to consumer protections. This press release is for informational purposes only. The information does not constitute investment advice or an offer to invest.

Related Links

Bitcoin PR Buzz

SpectroCoin

This content was issued through the press release distribution service at Newswire.com. For more info visit: http://www.newswire.com

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/spectrocoin-announces-altcoin-support-for-bitcoin-debit-cards-300427726.html

SOURCE SpectroCoin

https://spectrocoin.com

Read the rest here:
SpectroCoin Announces Altcoin Support for Bitcoin Debit Cards - PR Newswire (press release)

Read More..

All the Evidence You Need That Bitcoin Is Turning Into a Real Currency – Futurism

Whether or not you know what blockchain is, you have probably heard of the seemingly mysterious cryptocurrency Bitcoin. Bitcoin and its underlying blockchain network are quietly making headlines around the globe. The recent success of Bitcoin and thesecurity of blockchainmay have some consumers considering an investment in the new denomination, but others are still wary. Newly released data further legitimizing the currency could be just the thing to push the undecided into the realm ofBitcoin proponents, however.

In 2008, Bitcoin was introduced by an anonymous group of programmers under the name of Satoshi Nakamoto, and then itwas released to the public as an open-source software in 2009. Unlike other online payment services like PayPaland Venmo, Bitcoin is a peer-to-peer network that takes place privately between two users there is no intermediary involved. The virtual currency is completely decentralized from any external influence, and all transactions are accounted for through a blockchain ledger.

While Bitcoin is thoroughly anonymous, all transactions on the blockchain ledger are available publicly. Using the time and date of a particular transaction, individuals could potentiallymatch someones online address to their identity. However,all transactions made through Bitcoin are encrypted with military-grade cryptography, ensuring that the deals are secure.

Sending and receiving bitcoins is already as easy as sending an email, and its poised to get even easierthanksto BitPay.

Bitpay is a payment processing service that allows users to spend bitcoins within a largernetwork of merchants. With Bitcoins unexpected rate of growth leading to longer delays in transactions and higher fees, Bitpay developers were pushed to accommodate the sudden popularity of Bitcoin.

This friction is making us get more creative in how we do user experience design for delayed payment states on the BitPay platform, co-founderStephen Pairexplained at theDistributed: Markets 2017conference.Our designers and engineers are constantly attuned to how we can make using Bitcoin intuitive, he added.

The frequent updates appear to be paying off as the company recently released a series of charts revealing a positive trend in Bitcoin usage. The data shows a significant increase in the number of Bitcoin payments being processed daily and in the value of the payments being processed.

Experts attribute this to the wealth effect. Essentially, people who bought Bitcoin when it was significantly cheaper want to spend it now that the value is high. The trend also affects what people are buying with bitcoins.Bitpay merchantCheapAir, a site that sells plane tickets, hotel reservations, and car rentals, has noticed a higher upper limit in the spending of their Bitcoin customers.

With bitcoin we tend to generate more sales in premium cabins like business class or first class, CheapAir founder Jeff Klee told Quartz. Certainly the average spend for the bitcoin customer is higher than a non-bitcoin customer.

This increased movement of bitcoins from consumers to companies highlights an important moment in the history of the cryptocurrency. While people initially saw bitcoinsas something they could hoard, theyre now seeing them as something to spend.Bitcoin [is being used] as a store of value, as a currency hedge, and as a payment method for economies without widespread credit card or banking access, James Walpole, BitPays marketing manager, told Quartz.

If these trends continue, the increased acceptance of the cryptocurrency as an alternative payment method might be enough to push it all the way into the mainstream.

See the article here:
All the Evidence You Need That Bitcoin Is Turning Into a Real Currency - Futurism

Read More..

Beware of Bitcoin Scams – WealthManagement.com

As the price of Bitcoin has surged along with its growing integration with established financial markets, so are the scams surrounding the digital currency. Security firm ZeroFox has reported a surge of Bitcoin-related crimes in March, with 3,618 URLs linked to scams, shared over 8,742 social media posts, The Vergeis reporting. The scams ranged from basic phishing attempts to elaborate pyramid schemes, all using the Bitcoin logo to lure unsuspecting victims. They're pretty basic, according to ZeroFox, either tricking users into installing malicious apps or promising free money in exchange for an initial payment. The rise in scams coincides with Bitcoin reaching all-time highs in price, including being worth more than an ounce of gold for the first time. In the end Bitcoin, just like social media, depends on community-based trust, ZeroFox data scientist Phil Tully said. When certain members of these communities violate that trust, it can ruin a good thing for everyone.

Helicopter Parents Hurt Children's Financial Aptitude

It can be tempting for parents to over-focus on their kids and go with the so-called helicopter parenting style. But that style of parenting can have a negative impact on childrens financial habits, according to T. Rowe Prices 2017 Parents, Kids & Money Survey. Rather, kids who have the freedom to manage their own money have better money habits, found T. Rowe Price, which surveyed 1,015 parents of 8- to 14-year-olds and their kids. The 44 percent of parents who let their kids manage their own money were less likely to: have kids who spend their money as soon as they get it (40 percent versus 53 percent for parents who dont let kids control);have kids who lieabout what they spend their money on (29 percent versus 49 percent); have kids who expect their parents to buy them what they want (52 percent versus 65 percent); and have their children feel ashamed because they have less than other kids (30 percent versus half). Kids who control their own finances are also more likely to say that they talk to their parents about money, at 76 percent, and that they have learned about money from their grandparents (55 percent), teachers (45 percent), or other family members (32 percent). Giving them real life money experiences brings finances out of the conceptual and puts it into practice, said Roger Young, a senior financial planner at T. Rowe Price and father of three.

Sizable Morgan Stanley Team Leaves for Merrill Lynch

A Morgan Stanley team with $343 million in client assets under management has left to join Merrill Lynch. Michael Greenstone, John Araneo, Margie Manning and Anita Srivastava will be part of the thundering herd in the Glen Rock, N.J. office. All of the advisors moving have many years of experience, led by Greenstone, who became an advisor in 1980.

Visit link:
Beware of Bitcoin Scams - WealthManagement.com

Read More..

JCC bomb threat suspect, named Michael Kaydar, reportedly used Bitcoin, Google Voice – Jewish Telegraphic Agency

The JCC bomb threat suspect, identified as Michael Kaydar by The Daily Beast, leaving court in Rishon Lezion, Israel, March 23, 2017. (Jack Guez/AFP/Getty Images)

(JTA) The Israeli-American teenager suspected of perpetrating more than 100 bomb threats against Jewish institutions used technologies including Google Voice, acall forwarding service, and Bitcoin, a digital currency, to make the threats.

According to an article in The Daily Beast, the 19-year-old suspects name is Michael Kaydar. Israels anti-fraud squad arrested Kaydarat his home in southern Israel and searched the premises on Thursday.

He also is accused of a series of threats made in Europe, Australia and New Zealand in the past six months, according to reports in Israel, and is reported to have called in threats to the Israel Police two months ago regarding Israeli educational institutions.

To hide his identity, Kaydar used a technology called SpoofCard that masks a numbers caller ID, according to the Daily Beast. When police subpoenaed SpoofCards parent company to trace the calls real number, they learned that he had called from a disposable Google Voice number.

He paid for SpoofCard through Bitcoin, also untraceable, and routed his internet through proxies, making his IP address untraceable as well. In addition, he masked his voice in the calls to sound like a woman.

Kaydar was caught after he forgot to trace his internet connection through a proxy server, allowing police to trace his IP address, which led to his home.

Originally posted here:
JCC bomb threat suspect, named Michael Kaydar, reportedly used Bitcoin, Google Voice - Jewish Telegraphic Agency

Read More..