Page 21«..10..20212223..3040..»

Microsoft releases quantum computing development kit preview …

At the Microsoft Ignite Conference in September, Microsoft let it be known it was going to be a player in the future of quantum computing, and today the company took another step toward that goal when it released a preview of its quantum computing development kit.

The kit includes all of the pieces a developer needs to get started including a Q# language and compiler, a Q# library, a local quantum computing simulator, a quantum trace simulator and a Visual Studio extension.

This is a preview, so its aimed at early adopters who want to understand what it takes to develop programs for quantum computers, which operate very differently from classical ones. Put in simple terms, with a classical computer, a bit can only exist in a binary state of on or off, whereas with quantum programs a qubit (the quantum equivalent of a bit) can exist in multiple states at the same time. This could open the door to programs that simply couldnt have existed before.

This is but one piece in Microsofts big vision for quantum computing that it discussed at Ignite. Microsofts Krysta Svore told TechCrunchs Frederic Lardinois in September that the idea was to offer a comprehensive full-stack solution for controlling the quantum computer and writing applications for it.

We like to talk about co-development, she said. We are developing those [the hardware and software stack] together so that youre really feeding back information between the software and the hardware as we learn, and this means that we can really develop a very optimized solution, she told Lardinois.

Microsoft clearly wants a piece of the quantum computing action, but they are hardly alone. IBM has had a quantum computing service available for programmers since last year, and last month it had a breakthrough with the release of a 20 qubit quantum computer. The company also announced a 50 qubit prototype.

Other companies working on quantum computing research include Google and Intel and a host of other established companies and startups.

We are still in very early days with this technology and it has a long way to go, but the potential is so great that all of these companies, including Microsoft, want to get in as early as possible to capture developer hearts and minds. Todays release is part of that.

See the rest here:
Microsoft releases quantum computing development kit preview …

Read More..

What Is Cloud Hosting? | GoDaddy – YouTube

What is cloud hosting? This video answers that question and explains what part cloud servers play in delivering quick and innovative cloud hosting. Learn more at: https://www.godaddy.com/pro/cloud-ser….

Are you wondering if your website should be hosted in the cloud? This video explains what cloud hosting is and how to determine if its the right solution for you.

When it comes to hosting, the term cloud can be confusing and misleading. Theres nothing airy or nebulous about it. Like all other types of hosting, cloud hosting relies on very real hardware servers.

But unlike shared and dedicated hosting, where everything thats needed to make your website or application function is housed on a single server or server stack, cloud hosting uses innovative technologies to spread the files, data, resources, bandwidth, and computing operations among multiple servers that are networked to act as one system.

This distributed solution eliminates any single point of failure, provides redundant data storage, and guarantees exclusive use of server resources, such as processing and memory.

Cloud hosting also provides great flexibility and scalability, making it easy to upgrade or downgrade your hosting environment and accommodate for periods of higher or lower traffic.

Another big bonus of cloud hosting is that you pay only for the resources you consume.

All of this makes cloud hosting a powerful solution for large, high-traffic internet sites and applications that require the highest level of performance.

You may have already guessed that managing a cloud hosting solution is not a simple process. It takes the skills of an experienced Linux server administrator or IT professional, so its not a good solution for most small businesses or do-it-yourselfers.

To recap, cloud hosting distributes the files, data, and resources of internet sites and applications among multiple connected servers that operate as a single system. It provides a very high level of flexibility, scalability and performance, but must be managed by an IT pro.

Before you opt for cloud hosting, be sure to weigh its pros and cons against your online needs, budget, and business goals.

See the article here:
What Is Cloud Hosting? | GoDaddy – YouTube

Read More..

Cloud Hosting by Perry Hosting

We are devoted to offering customercentric hosting services. This is why we give you the opportunity to pick your data center facility location, as per your online marketing strategies. The closer your websites are to your target viewers, the faster loading speeds youll be able to offer them and the higher youll rank in local search results.

Our data center facilities correspond to all industry standards. If you want a reliable Cloud Hosting USA service, you can pick the cuttingedge data center facility in Chicago, USA. If you want a topclass Cloud Hosting Australia service, do check out the data center facility in Sydney, Australia. If you want an excellent Cloud Hosting United Kingdom service, simply choose our Londonbased data center facility. Should you wish to popularize your company on the Russian marketplace or perhaps in the countries in the North of Europe, have a look at our data center in Finland. If you are looking for a good East European cloud hosting service, check our Eastern Europe datacenter in Sofia, Bulgaria. No matter which facility you choose, youll be given a 99.9% network uptime guarantee with all cloud web hosting plans.

Read more here:
Cloud Hosting by Perry Hosting

Read More..

Quantum Computing Is the Next Big Security Risk | WIRED

The 20th century gave birth to the Nuclear Age as the power of the atom was harnessed and unleashed. Today, we are on the cusp of an equally momentous and irrevocable breakthrough: the advent of computers that draw their computational capability from quantum mechanics.

US representative Will Hurd (R-Texas) (@HurdOnTheHill) chairs the Information Technology Subcommittee of the Committee on Oversight and Government Reform and serves on the Committee on Homeland Security and the Permanent Select Committee on Intelligence.

The potential benefits of mastering quantum computing, from advances in cancer research to unlocking the mysteries of the universe, are limitless.

But that same computing power can be used to unlock different kinds of secretsfrom your personal financial or health records, to corporate research projects and classified government intelligence.

Its more than just theoretical: An algorithm formulated by mathematician Peter Shor demonstrates that quantum computers are able to factor large numbers more efficiently than classical computers. Large-number factoring is the foundation of todays encryption standards.

The impact of quantum on our national defense will be tremendous. The question is whether the United States and its allies will be ready.

The consequences of mastering quantum computing, while not as visual or visceral as a mushroom cloud, are no less significant than those faced by the scientists who lit up the New Mexico sky with the detonation at the Trinity test site 72 years ago. In the same way that atomic weaponry symbolized power throughout the Cold War, quantum capability is likely to define hegemony in todays increasingly digital, interconnected global economy.

Unlike traditional computers, which process information in binary bits, quantum computers exploit the ability of quantum bits (qubits) to exist in multiple states simultaneously. This allows them to perform incredibly complex calculations at speeds unimaginable today and solve certain classes of problems that are beyond the grasp of todays most advanced super computers.

Today, quantum computers are beginning to move out of research labs in search of broader investment and applications. In October, Google announced that by the end of this year it expects to achieve quantum supremacythe point at which a quantum computer can outperform a classical computer.

Because nations around the world, including China, are investing heavily in research and development, the world is likely less than a decade away from the day when a nation-state could use quantum computers to render many of todays most sophisticated encryption systems useless.

From academics to the National Security Agency, there is widespread agreement that quantum computers will rock current security protocols that protect global financial markets and the inner workings of government.

Already, intelligence agencies around the world are archiving intercepted communications transmitted with encryption that’s currently all but unbreakable, in the hopes that in the future computing advances will turn whats gibberish now into potentially valuable intelligence. Rogue states may also be able to leverage the power of quantum to attack the banking and financial systems at the heart of western capitalism.

Everyone has seen the damage individual hackers can do when they infiltrate a system. Imagine a nation-state intercepting the encrypted financial data that flows across the globe and being able to read it as easily as you are reading this. Quantum computers are so big and expensive thatoutside of global technology companies and well-funded research universitiesmost will be owned and maintained by nation-states. That means the first quantum attacks are likely to be organized by countries hostile to the US and our allies. Rogue states could read military communiques the way the United States and its allies did after cracking the Nazi Enigma codes.

In short, quantum computing presents both an unprecedented opportunity and a serious threat. The United States must lead this transition, in collaboration with its allies around the world. Whether lawmakers want to think of it as a new Manhattan Project or a race to the moon, the US cannot abdicate leadership in scientific discovery or international security.

The window is closing, fast. It took more than five years and nearly half a trillion dollars for companies and governments to prepare for Y2K, which resulted in a non-event for most people. But, the US is not ready for what experts call Y2Q (Years to Quantum), and the time to prepare is now. Even in a pre-quantum era, the need for quantum-safe encryption is real. Banks, government agencies, insurers, hospitals, utilities, and airlines all need to be thinking now about how to implement security and encryption that will withstand a quantum attack.

On complex, large-scale networks, it can take years to roll out even a relatively straightforward update. Quantum-safe encryption relies on mathematical approaches that even quantum computers have difficulty solving. The challenge is ensuring that every point through which data flows, and even the data itself, is wrapped in quantum-safe security.

Private sector research and development are happening in pockets across North America and among the US’s allies. Google and IBM both have well-publicized programs to build viable quantum computers. At the same time, though, the US and its allies must take practical steps to prepare for the quantum threat. The National Institute of Standards and Technology is working to evaluate quantum-safe cryptographic candidate algorithms. Other organizations like the European Telecommunications Standards Institute and the United Nations International Telecommunications Union are working to ensure our standards for connecting systems continue to evolve to be quantum safe. Companies like ISARA are among a small cadre of cryptographers and programmers building quantum-safe security solutions to help high-risk industries and organizations begin protecting themselves.

Its these kinds of efforts that the US and its allies must collaborate on to align the goals of scientific discovery, technological advancement, and national security. As companies build powerful quantum machines, leaders must simultaneously understand the risks those machines pose and the counter-measures required. Executives in every industry need to understand the implications that quantum computing will have on their legacy systems, and take steps to be ready. At a minimum, that means retrofitting their networks, computers, and applications with encryption that can withstand a quantum attack.

Nowhere is it more vital to begin preparations than with the vast network of governmental systems that do everything from processing Social Security checks to analyzing vast amounts of electronic intelligence.

Whether it was the discovery of fission or the launch of Sputnik, the United States has responded to scientific challenges of the past century with resolve and determination. The US must do the same with quantum computing.

WIRED Opinion publishes pieces written by outside contributors and represents a wide range of viewpoints. Read more opinions here.

Read the original here:
Quantum Computing Is the Next Big Security Risk | WIRED

Read More..

Cryptocurrency Definition | Investopedia

What is a ‘Cryptocurrency’

A cryptocurrency is a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of this security feature. A defining feature of a cryptocurrency, and arguably its most endearing allure, is its organic nature; it is not issued by any central authority, rendering it theoretically immune to government interference or manipulation.

The anonymous nature of cryptocurrency transactions makes them well-suited for a host of nefarious activities, such as money laundering and tax evasion.

The first cryptocurrency to capture the public imagination was Bitcoin, which was launched in 2009 by an individual or group known under the pseudonym Satoshi Nakamoto. As of September 2015, there were over 14.6 million bitcoins in circulation with a total market value of $3.4 billion. Bitcoin’s success has spawned a number of competing cryptocurrencies, such as Litecoin, Namecoin and PPCoin.

Cryptocurrencies make it easier to transfer funds between two parties in a transaction; these transfers are facilitated through the use of public and private keys for security purposes. These fund transfers are done with minimal processing fees, allowing users to avoid the steep fees charged by most banks and financial institutions for wire transfers.

Central to the genius of Bitcoin is the block chain it uses to store an online ledger of all the transactions that have ever been conducted using bitcoins, providing a data structure for this ledger that is exposed to a limited threat from hackers and can be copied across all computers running Bitcoin software. Many experts see this block chain as having important uses in technologies, such as online voting and crowdfunding, and major financial institutions such as JP Morgan Chase see potential in cryptocurrencies to lower transaction costs by making payment processing more efficient.

However, because cryptocurrencies are virtual and do not have a central repository, a digital cryptocurrency balance can be wiped out by a computer crash if a backup copy of the holdings does not exist. Since prices are based on supply and demand, the rate at which a cryptocurrency can be exchanged for another currency can fluctuate widely.

Cryptocurrencies are not immune to the threat of hacking. In Bitcoin’s short history, the company has been subject to over 40 thefts, including a few that exceeded $1 million in value. Still, many observers look at cryptocurrencies as hope that a currency can exist that preserves value, facilitates exchange, is more transportable than hard metals, and is outside the influence of central banks and governments.

The rest is here:
Cryptocurrency Definition | Investopedia

Read More..

Altcoin Exchange Performs First Atomic Swap Between Bitcoin …

On October 7, 2017, the decentralized cryptocurrency trading platform Altcoin Exchange announced the team performed the first atomic swap between the Ethereum and Bitcoin blockchains. The exchange says this is the startups first step towards creating a trustless exchange process.

Also Read: Bitcoin Illegal in Nepal? Police Arrest Seven Individuals for Trading Operations

In the cryptocurrency space, atomic swaps are a pretty hot topic, and there are only a few blockchains that have exchanged this way. Atomic swaps allow two parties to transact between two blockchains in a trustless manner without counterparty risk. So far only a few altcoins have performed this function with bitcoin; including currencies like litecoin, decred, and vertcoin. On October 7th the Altcoin Exchange development team processed a swap between both bitcoin and ethereum networks.

We have completed the very first Ethereum Bitcoin atomic swap! More details coming soon, the Altcoin Exchange team announced this week.

The Altcoin Exchange team transferred 0.12345 ETH for 0.12345 BTC using an on-chain open source process. Altcoin Exchange plans to launch the projects Github repository this Tuesday, the companys CEO Andrew Gazdecki told news.Bitcoin.com.

Gazdecki tells us that decentralized exchanges are the future of cryptocurrency trading and atomic swaps will be a big part of the business model. Altcoin Exchange believes the teams demonstration of an atomic swap between ethereum and bitcoin means the centralized trading model is soon to be a memory of the past. Gazdecki explains that atomic swaps will replace traditional exchange transactions with a more secure method and just as speedy.

The team at Altcoin Exchange says they still has some work to do with the code as far as privacy and order matching comes. The group says they are also thankful for the decred development team and Litecoins Charlie Lee for help pioneering the atomic swap effort.

Since June of 2011, 26 exchanges have been compromised, resulting in the loss of millions of dollars worth of coins. To prevent more of these types of hacks, decentralized exchanges are needed, and atomic swaps bring us one step closer to achieving this goal, Gazdecki explains to news.Bitcoin.com.

What makes the technology behind Atomic Swaps so exciting is it allows for nearly instant direct trades between cryptocurrencies. We believe this to be a critical component for creating a truly decentralized exchange that executes transactions at the same speed in which centralized exchanges are able to but without the risk of hacking and theft.

The atomic swaps performed by Altcoin Exchange between the bitcoin and ethereum blockchains can be viewed here with the swap initiation, the participation, and redeem A and redeem B.

What do you think about the first atomic swap between bitcoin and ethereum? Let us know in the comments below.

Images via Shutterstock, the Altcoin Exchange, and Pixabay.

At news.Bitcoin.com all comments containing links are automatically held up for moderation in the Disqus system. That means an editor has to take a look at the comment to approve it. This is due to the many, repetitive, spam and scam links people post under our articles. We do not censor any comment content based on politics or personal opinions. So, please be patient. Your comment will be published.

Disclaimer: Bitcoin.com does not endorse nor support this product/service.Readers should do their own due diligence before taking any actions related to the mentioned company or any of its affiliates or services. Bitcoin.com is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Excerpt from:
Altcoin Exchange Performs First Atomic Swap Between Bitcoin …

Read More..

What Is Encryption? | Surveillance Self-Defense

Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn’t be read by anyone besides the intended recipient.

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you. A private key also lets you place unforgeable digital signatures on messages you send to other people. A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you. Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.

Another extremely valuable concept to understand is a security certificate. The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names(like http://www.google.com, http://www.amazon.com, or ssd.eff.org). Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website. It is also common to see an error because of a bureaucratic mistake in the system of certificates. But occasionally, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection.

Unfortunately, it is extremely difficult to tell the difference between these cases. This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

The word “fingerprint” means lots of different things in the field of computer security. One use of the term is a “key fingerprint,” a string of characters like “342e 2309 bd20 0912 ff10 6c63 2192 1928” that should allow you to uniquely and securely check that someone on the Internet is using the right private key. If you check that someone’s key fingerprint is correct, that gives you a higher degree of certainty that it’s really them. But it’s not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.

Go here to read the rest:
What Is Encryption? | Surveillance Self-Defense

Read More..

GitHub – ander7agar/altcoin-rpc: A modern Bitcoin Core REST …

A modern Altcoin Core REST and RPC client to execute administrative tasks, wallet operations and queries about network and the blockchain.

Install the package via npm:

The network will automatically determine the port to connect to, just like the bitcoind and bitcoin-cli commands.

By default, when ssl is enabled, strict checking is implicitly enabled.

For compatibility with other Altcoin Core clients.

Since version v0.14.0, it is possible to send commands via the JSON-RPC interface using named parameters instead of positional ones. This comes with the advantage of making the order of arguments irrelevant. It also helps improving the readability of certain function calls when leaving out arguments for their default value.

For instance, take the getBalance() call written using positional arguments:

It is functionally equivalent to using the named arguments account and minconf, leaving out include_watchonly (defaults to false):

This feature is available to all JSON-RPC methods that accept arguments.

Due to JavaScript’s limited floating point precision, all big numbers (numbers with more than 15 significant digits) are returned as strings to prevent precision loss. This includes both the RPC and REST APIs.

By default, all methods are exposed on the client independently of the version it is connecting to. This is the most flexible option as defining methods for unavailable RPC calls does not cause any harm and the library is capable of handling a Method not found response error correctly.

However, if you prefer to be on the safe side, you can enable strict version checking. This will validate all method calls before executing the actual RPC request:

If you want to enable strict version checking for the bleeding edge version, you may set a very high version number to exclude recently deprecated calls:

To avoid potential issues with prototype references, all methods are still enumerable on the library client prototype.

Start the bitcoind with the RPC server enabled and optionally configure a username and password:

These configuration values may also be set on the bitcoin.conf file of your platform installation.

By default, port 8332 is used to listen for requests in mainnet mode, or 18332 in testnet or regtest modes. Use the network property to initialize the client on the desired mode and automatically set the respective default port. You can optionally set a custom port of your choice too.

The RPC services binds to the localhost loopback network interface, so use rpcbind to change where to bind to and rpcallowip to whitelist source IP access.

All RPC methods are exposed on the client interface as a camelcase’d version of those available on bitcoind.

For a more complete reference about which methods are available, check the RPC documentation on the Altcoin Core Developer Reference website.

Batched requests are support by passing an array to the command method with a method and optionally, parameters. The return value will be an array with all the responses.

Note that batched requests will only throw an error if the batch request itself cannot be processed. However, each individual response may contain an error akin to an individual request.

Support for the REST interface is still experimental and the API is still subject to change. These endpoints are also unauthenticated so there are certain risks which you should be aware, specifically of leaking sensitive data of the node if not correctly protected.

Error handling is still fragile so avoid passing user input.

Start the bitcoind with the REST server enabled:

These configuration values may also be set on the bitcoin.conf file of your platform installation. Use txindex=1 if you’d like to enable full transaction query support (note: this will take a considerable amount of time on the first run).

Given a block hash, returns a block, in binary, hex-encoded binary or JSON formats.

Given a block hash, returns amount of block headers in upward direction.

Returns various state info regarding block chain processing.

Returns transactions in the transaction memory pool.

Returns various information about the transaction memory pool. Only supports JSON as output format.

Given a transaction hash, returns a transaction in binary, hex-encoded binary, or JSON formats.

Query unspent transaction outputs (UTXO) for a given set of outpoints. See BIP64 for input and output serialisation.

This client supports SSL out of the box. Simply pass the SSL public certificate to the client and optionally disable strict SSL checking which will bypass SSL validation (the connection is still encrypted but the server it is connecting to may not be trusted). This is, of course, discouraged unless for testing purposes when using something like self-signed certificates.

Please note that the following procedure should only be used for testing purposes.

Generate an self-signed certificate together with an unprotected private key:

On Altcoin Core

On Altcoin Core >0.12, use must use stunnel (brew install stunnel or sudo apt-get install stunnel4) or an HTTPS reverse proxy to configure SSL since the built-in support for SSL has been removed. The trade off with stunnel is performance and simplicity versus features, as it lacks more powerful capacities such as Basic Authentication and caching which are standard in reverse proxies.

You can use stunnel by configuring stunnel.conf with the following service requirements:

The key option may be omitted if you concatenating your private and public certificates into a single stunnel.pem file.

On some versions of stunnel it is also possible to start a service using command line arguments. The equivalent would be:

Then pass the public certificate to the client:

By default, all requests made with altcoin-rpc are logged using uphold/debugnyan with altcoin-rpc as the logging namespace.

Please note that all sensitive data is obfuscated before calling the logger.

Example output defining the environment variable DEBUG=altcoin-rpc:

A custom logger can be passed via the logger option and it should implement bunyan’s log levels.

Currently the test suite is tailored for Docker (including docker-compose) due to the multitude of different bitcoind configurations that are required in order to get the test suite passing.

To test using a local installation of node.js but with dependencies (e.g. bitcoind) running inside Docker:

To test using Docker exclusively (similarly to what is done in Travis CI):

MIT

Link:
GitHub – ander7agar/altcoin-rpc: A modern Bitcoin Core REST …

Read More..

Comodo Disk Encryption Download – softpedia.com

Comodo Disk Encryption is a reliable application that protects your sensitive data by encrypting your drives using complex algorithms.

It provides you with two different methods of securing your information. Either you encrypt any drive partition that contains personal information using combinations of different hashing and encryption algorithms or simply mount the virtual partitions in your hard drive, then save your data.

Since the encryption process can be carried out with two different authentication types, namely Password and USB Stick, the application helps you to add an extra layer of security, thus protecting your critical data from unauthorized users.

When you launch Comodo Disk Encryption for the first time, you will notice that all your drives are automatically recognized (after a restart has been performed). When you click on a random partition, detailed information such as file system, free space, encryption method and total size are displayed in the bottom pane of the program.

The right-click menu enables you to easily encrypt or decrypt the selected partition, edit the available settings, as well as format it by modifying the file system to NTFS, FAT32 or FAT and the allocation unit size.

By accessing the Encrypt option, you are able to choose one of the available authentication types, then set the properties according to your whims such as hash algorithm and password.

The ‘Virtual Drives’ tab enables you to view all the mounted drives in your system and create, mount, remove or unmount them, as well as edit the encryption settings effortlessly.

In case you want to decrypt a drive, you will just have to choose the proper option from the context menu and bring back the partition to its original form so that the drive becomes accessible for any user.

Overall, Comodo Disk Encryption keeps all your sensitive data protected from hackers, thieves and online scammers by encrypting your hard disks with ease.

More here:
Comodo Disk Encryption Download – softpedia.com

Read More..

Altcoins – BTCMANAGER

Category: Altcoins, Bitcoin, News, Regulation

The Philippines Securities and Exchange Commission (PhSEC) and the Bangko Sentral ng Pilipinas (BSP) have been conducting conversations which may lead to the legalization of cryptocurrencies. Following similar moves towards legislation and regulation in the US, Malaysia, Hong Kong, and Thailand, the Philippines is now seeking to declare cryptocurrencies as securities and put them under the supervision of the PhSEC.

READ MORE

Category: Altcoins, Bitcoin, Mining, News

For many years now, Bitcoin mining has been dominated by the Application-specific Integrated Chip (ASIC), and long gone are the days of mining Bitcoin for profit with a central processing unit (CPU), a graphics processing unit (GPU), or even a field-programmable gate array (FPGA). However, thanks to increasingly popular altcoins such as Ethereum (ETH), Zcash (ZEC) and the recently forked

READ MORE

Category: Altcoins, News, Tech

At the time of publication, the following warning appears on bitcoingold.org welcome page: According to the associated Critical Warning description, Bitcoin Golds (BTG) official GitHub repository served unsigned wallet software for almost five days: Anyone who downloaded the Windows Wallet file between November 21, 2017, 09:39 UTC, and November 25, 2017, 22:30 UTC, should not use the file in any

READ MORE

Category: Altcoins, Bitcoin, News, Regulation

President Alexander Lukashenko is expected to sign a decree which will legalize bitcoin and other cryptocurrencies in Belarus. Once this new law is passed, citizens of Belarus will be able to circulate and mine cryptocurrencies, as well as engage with ICO (initial coin offering) tokens. As large bitcoin and altcoin mining companies are on the horizon; many investors are planning

READ MORE

Category: Altcoins, Bitcoin, Finance, News

BillDesk, one of Indias largest payment gateways, announced the release of their own cryptocurrency exchange on November 24, named Coinome. Touted as the countrys first open order book exchange, BillDesk aims to combine its expertise in online payments with the digital currency market. At the time of its release, Coinome will only support bitcoin and bitcoin cash trading. BillDesk is

READ MORE

Category: Altcoins, Bitcoin, Commentary, News

Alexander Abramov, Roman Abramovich, Roman Trotsenko, and Igor Rybakov are among the many Russian billionaires who are jumping on the crypto-train, prior to the upcoming introduction of the first state-backed cryptocurrency, the CryptoRuble. This should not come as a surprise. To date, Russia has consistently taken a rather hardline on cryptocurrencies and Bitcoin in particular: 2015 Russian authorities impose

READ MORE

Category: Altcoins, News

Ripple, the blockchain focused company, has announced the addition of Benjamin Lawsky to its Board of Directors and the appointment of Ron Will as the companys Chief Financial Officer (CFO). So far, Ripples popularity has been mainly due to their payment protocol, which is essentially a real-time gross settlement (RTGS) system that leverages blockchain technology and is based around an

READ MORE

Category: Altcoins, Bitcoin, Blockchain, News

2017 may go down as the year of the eight times return bitcoin has delivered, but it will also likely be remembered as the year of the hard fork. First, we had Bitcoin Cash, then Bitcoin Gold, and even Bitcoin Clashic but the forks are not quite finished yet. Say hello to Bitcoin Diamond. Bitcoin Fork #4 Bitcoin Diamond

READ MORE

Category: Altcoins, Mining, News

November 20 witnessed the release of a new miner allows you to mine both aeon and monero (XMR), two altcoins based on the Cryptonote protocol. The XMR-Stak 2.0.0 update makes it easier for users to become accustomed to the two privacy-focused altcoins and kill two birds with one stone. The combined AEON-XMR miner is the fruit of fireice_uk and psychocrypts

READ MORE

Category: Altcoins, Bitcoin, Mining, News

The Russian government is considering Siberia and other Far East regions to lure large-scale cryptocurrency mining companies. With time, the country hopes to base an entire town or city around this economic model. Cryptocurrency mining is the process that involves performing trillions of calculations per second using a relatively powerful computer. In exchange for these calculations, miners receive a reward

READ MORE

Continued here:
Altcoins – BTCMANAGER

Read More..