Mechanism of commissions in Bitcoin and why make friends with the ministers

Mechanism of commissions in Bitcoin and why make friends with the ministersIn this article we will try to describe in detail the main task of the commissions in Bitcoin, how they work and what they influence. We will explain the reasons for the volatility of commissions, delays in confirming transactions and describe approaches to solving these problems. In addition, we will clarify exactly how the Segregated Witness update helps to reduce the cost of transactions. And as a bonus, we will share our thoughts on how friendship with miners reduces commissions to zero and what this trend may lead to in the future. So, let's get started.
 
 
[h2] Full transaction confirmation ...[/h]
+ 0 -

Public Key Infrastructure: GnuPG /SMIME and PKCS # 11 tokens with support for Russian cryptography

 
Public Key Infrastructure: GnuPG /SMIME and PKCS # 11 tokens with support for Russian cryptography The hour "Ч" inexorably approaches: "the use of the signature scheme of GOST R ???-2001 for the formation of a signature after December 3? 2018 is not allowed!". And finally, on July 1? 2018 at site The federal e-government situation center appeared The notice on the commencement of the issuance of certificates for the verification of electronic signatures of the subordinate certifying centers at the head certification center in accordance with GOST R ???-2012. However, all the same it is not clear when the issue of old certificates will stop. But "the process has gone" and it pleases. ...
+ 0 -

As the manufacturer of the video card affects the profitability of GPU-mining

As the manufacturer of the video card affects the profitability of GPU-mining  
With the advent of ASIC-solutions for bitcoin mining, many experts asserted that the production of crypto-currency with the help of video cards will go down in the air just as it happened with the mining on the CPU.
 
 
However, the growing popularity of altcoyins on non-SHA256 algorithms has made some adjustments. Conditionally, the mining split into ASIC and a GPU segment. Most modern blockbusters have ASIC-resistant encryption algorithms: this is true for Ethereum, Monero and other popular coins. At the same time, such an approach is a conscious policy of the developers of these crypto-currencies...
+ 0 -

Principles of operation and features of the use of atomic swap

Principles of operation and features of the use of atomic swapThis article highlights issues related to the relevance of the atomic exchange of different coins among themselves without the participation of intermediaries. We have tried to describe the features of the work of such an exchange and the requirements for digital currencies to maintain this functionality. In addition, the topical issues of designing and launching decentralized exchanges based on the atomic swap were analyzed, as well as the shortcomings and risks of their use.
 
 
By definition, the owner of a crypto currency works with his coins without the participation of a trusted third party...
+ 0 -

Synchronization of wallets with Bitcoin network

Synchronization of wallets with Bitcoin networkLet's talk about synchronization of digital wallets with Bitcoin network. Let's designate the basic approaches, the principles of their work and complexity. The material can be useful not only to developers, but also to ordinary users for acquaintance with features of the device of digital purses and aspects of safe work with purses.
 
" is recorded. Synchronization of wallets with Bitcoin network ".
 
 

The basic functions of the purse are


 
Let's start with the basic functionality of the digital wallet:
 
 
 
backup of private keys;
 
acceptance of payments;
 
balance display;
 
display ...[/h]
+ 0 -

A guide to owning accounts and contracts in Ethereum

A guide to owning accounts and contracts in Ethereum
 
The material, which we decided to publish today, was born about 6 months ago and has still not lost its relevance (maybe it had to be refreshed a little). Then we were still able to be surprised, looking at businessmen and start-ups, intending to conduct ICO, but not being able to make a transaction with the translation of one ether. Today we are no longer surprised, but these characters are not much less.
 
In general, understanding the importance of secure storage of your secret keys and the ability to do this is the basis of a decentralized economy, which, we hope, will soon substantially push the classical ...
+ 0 -

High-Mining: the newest version of PoW-blockade protection against "51% attack"

High-Mining: the newest version of PoW-blockade protection against "51% attack"
 
 
Fork developers Litecoin Cash presented a preprint of technical document ' The Hive: Agent-based Mining in Litecoin Cash ', in which they described their proposal for the protection of a crypto-currency blockage operating on the basis of the proof-of-work algorithm from the "51% attack". Their solution combines mining with outdated ASIC devices (SHA-256) and democratic virtual mining using "working bees" (HiveMine). In the case of a competent implementation, the LCC block will decide one of the biggest problems of modern block projects (from Bitcoin to Ethereum): the threat of an attack when more ...
+ 0 -

Analysis of the use of digital signatures: 10 of the top 15 crypto-currencies do not sign software

Analysis of the use of digital signatures: 10 of the top 15 crypto-currencies do not sign software Reading the news about the implementation of one of the projects in the infrastructure, I asked myself: how are things at all with the use of digital signatures in the foothold of the fintech revolution. Actually, only by curiosity it did not end. Totally low security in the cryptosphere is an oxymoron and fact, therefore, so that this article does not turn into a beating lying, I took the crypto-currencies from the TOP-15 site of CoinMarketCap released in the release and analyzed for correctness the procedure for signing the code in these projects. Results under the cut.
...
+ 0 -

How the multi-signature works in Bitcoin

Within the framework of this article, we will look at how the multi-signature works in the Bitcoin protocol. Note that in other crypto-currencies and digital currencies, these mechanisms can be implemented differently - it depends on the transaction model. We will define a multi-signature, schematically analyze its structure using the example of a transaction, consider its use and precautions when working with it. We will try to open the topic of proposed improvements, P2SH, and also on the scheme we will disassemble the mechanism of sending payment to the address with a multi-signature. We believe ...
+ 0 -

Public Key Infrastructure: Certification Center based on OpenSSL and SQLite3 (PostScript)

Public Key Infrastructure: Certification Center based on OpenSSL and SQLite3 (PostScript) In one of the comments sent by the participant garex , in response to application :
But today in the standard version of openssl there is no support for both GOST R ???-2012 and GOST R ???-2012. Moreover, in version 1.? GOST support for cryptography is excluded from the standard delivery ("The GOST engine was out of date and therefore it has been removed.")
it was said:
 
Than does not suit here this , which "was removed?" github.com/gost-engine/engine
 
...
+ 0 -