Ardor, Nxt, Ignis Social Feed

TWITTER

RT @madfox1234: Hey, only four words to go! Stay tuned guys! #nxterworddec2 $IGNIS @Nxter_org @Ardor_Nxt_Group @trifficworld https://t.co/…


Open Link
TWITTER

DYK: An #auction for original #artwork is being held on the #Ignis child chain RIGHT NOW?! Led by the creative team… https://t.co/FgSYgQnR3p


Open Link
TWITTER

RT @MrV_777: #Ardor Lite v2.1.0 being released for #Android now. • You can now guest login with an alias or send to an account's alias inst…


Open Link
TWITTER

RT @CryptoDemetrius: New release, new features! #Tokenization is going mainstream - you can now tag #blockchain assets w custom name/value…


Open Link
TWITTER

With #Ardor 2.2.1 released, we now have the major building blocks for #LightweightContratcs in place. Next we focus… https://t.co/qjBtX5XDY3


Open Link
RSS

Nxter News — Декабрь II: Отношение — это ньюанс, меняющий все по-крупному

Nxter News | Декабрь 2018 (II) Отношение — это ньюанс, меняющий все по-крупному Добро пожаловать, дорогие Некстеры и прочие последователи! Отношение. Если вы не разрабатывали что-либо, не тестировали и не игрались со всей функциональностью Ignis в тестнете, вы, возможно, забыли, что Jelurida недавно ускорила Ardor, и он теперь генерирует новые блоки каждые 10 секунд. Это ... Read more The post Nxter News — Декабрь II: Отношение — это ньюанс, меняющий все по-крупному appeared first on NXTER.ORG.

Dec. 15, 2018, 9:48 p.m.
Open Link
TWITTER

How times have changed: 2017 Open the code, get depressed, open CMC, be happy. 2018 Open CMC, get depressed, get back to coding, be happy.


Open Link
TWITTER

RT @wire_master: Keep in mind that #blockchain technology has improved dramatically since December 2017 #Ardor: scalable, green, Smart Tran…


Open Link
RSS

Thought provoking article.

Thought provoking article. Minor correction, the Bitcoin whitepaper was released by Satoshi Nakamoto on 31 of October 2008 and not as written above.

Dec. 15, 2018, 9:03 a.m.
Open Link
TWITTER

There's news for you! https://t.co/XzmQl7ZO9S #Ardor v2.2.1 released with Lightweight #SmartContracts and… https://t.co/t5aMtF9Pag


Open Link
RSS

Nxter News – December II: Attitude is a little thing that makes a big difference

Nxter News | December 2018 (II) Attitude is a little thing that makes a big difference Welcome, dear Nxters and other followers! Attitude. If you haven't been building, testing or playing around with all the Ignis functionality on testnet, you might have forgotten that Jelurida recently speeded up Ardor to generate new blocks every 10 seconds. ... Read more The post Nxter News – December II: Attitude is a little thing that makes a big difference appeared first on NXTER.ORG.

Dec. 15, 2018, 12:36 a.m.
Open Link
TWITTER

A boolean #blockchain power-up! Composite phasing (or "Smart Phasing") is a powerful #Ignis feature that allows joi… https://t.co/p6iBpWYCvZ


Open Link
TWITTER

We want to extend a warm welcome to our new followers🤩🚀💙. We will do our best to post informative news and articles… https://t.co/ty0D1e5raW


Open Link
TWITTER

RT @MooneyAndrea: For those tired of waiting on Ethereum to achieve proof of stake please see #ardor @Ardor_Nxt_Group @lioryaffe #blockchai…


Open Link
TWITTER

Again @MobsVideo and @Jelurida together in #HardFork2018. #Ardor solving a real world problem powering a user gener… https://t.co/rSfkMkqmmf


Open Link
TWITTER

Today we reached another important milestone for the #Ardor project with the 2.2.1 release. We welcome the MPG chil… https://t.co/ERrCaWxJdP


Open Link
TWITTER

#Ardor v2.2.1 is released! This is a stable release and a mandatory upgrade for all nodes! #MPG #childchain and… https://t.co/EyT7ErQZPY


Open Link
TWITTER

Sometimes a public #blockchain needs #privacy. That's where #Ignis "coin shuffling" comes in. This feature enables… https://t.co/exTStfsHLt


Open Link
TWITTER

Are you in London to attend the #HardFork2018? I’ll be there and I would love to have a chat about how your company… https://t.co/OPhvXahb5R


Open Link
TWITTER

The #Ardor / #Nxt #cryptocurrency community is actively working with the #blockchain and writing about it. Find the… https://t.co/oI7xwWb9tC


Open Link
TWITTER

RT @AvdiuSazan: “Investigating Long Range Attack” by @lioryaffe Long-range attack against proof of stake is a theoretical threat effectivel…


Open Link
TWITTER

RT @tnwevents: Some great startups are pitching now at the Hard Fork Pitch Battle! 🚀 #HardFork2018 https://t.co/VU3rkWnMkv


Open Link
TWITTER

RT @albefero: @MobsVideo and @Jelurida on stage in 30 minutes for the start up pitch competition, #HardFork2018 So glad to be here with the…


Open Link
TWITTER

RT @trifficworld: Triffic uses geolocation to place augmented reality beacons anywhere in the world. These beacons can contain GPS Tokens,…


Open Link
TWITTER

RT @Bit_Swift: All aspects of #Bitswift are blooming. Our #Forging pool now has 20 active forgers and weight of 6.2 million $ARDR. Our cryp…


Open Link
TWITTER

RT @TarascaD: Third day of #auctions! Here you have a photograph of the #Tulpar painting. Waiting for your bid! #auctionsInArdor $ARDR $Ign…


Open Link
REDDIT

Will the Jelurida/Ardor team run out of cash?

With the deep decline of bitcoin and ether, I know of various high profile blockchain projects that have poorly managed their working capital (convert to fiat to pay operational costs). It would be good to hear from the Jelurida/Ardor team as to whether they have enough run-way to complete their development roadmap or whether they are seeking VC funding.

/r/Ardor
Dec. 12, 2018, 12:32 p.m.

Open Link
TWITTER

RT @johnvanrijck: Congrats to @ArdorPlatform & @Jelurida on Ardor being selected as our Whitepaper of the Week 🙌💯 Ardor is a full blockchai…


Open Link
TWITTER

#Ardor is Whitepaper of the week at the Largest #Crypto #Whitepaper Database thanks to @johnvanrijck!… https://t.co/Co6HuWpNFX


Open Link
TWITTER

Busy days ahead: #Jelurida was selected by IE Venture Network to pitch on Dec13 in Madrid and today we will present… https://t.co/L6exnUfGdf


Open Link
TWITTER

RT @efunkonline: @ChardyBTC Also good time to do some learning about t! https://t.co/ulQY2m6EXg https://t.co/X1oEsPF8cb


Open Link
TWITTER

RT @IGNISguide: The world is your oyster when using #Ignis Messaging. Send basic text messages between accounts, or use the "arbitrary" mes…


Open Link
TWITTER

What a beautiful morning for #crypto #xmasshopping. When our small kids have grown into adults, maybe regulations w… https://t.co/ZRjduDze3m


Open Link
REDDIT

My Investing Note on Ardor Jan 2018

In Jan 2018, I was doing research on most the top 100 coins to see what they had to offer and to see if I wanted to invest. Here were my notes about Ardor. It was around $2 at the time. Now it is around 5 cents. That is crazy. "ardor, 2b market cap, $2.00 ea, this one might have potential, but I'm having a hard time finding out more about it. everyone buys cryptos based on what they think they will be used for in the future, and how useful they might be, so it is always a gamble. see this chart [https://i.redd.it/k65zrj1xwz701.jpg](https://i.redd.it/k65zrj1xwz701.jpg). it is jan 2018 and i don't think they've launched for real yet. not sure. it seems to be a beta project. it is somehow related to nxt, which i don't know what that it is. these smart contract cryptos are too early in their development to make a proper decision" I didn't invest. The only coin I've ever invested in is NANO (but I've used BTC,LTC,BCH,ETH). I'm down a lot on that of course.

/r/Ardor
Dec. 11, 2018, 4:38 p.m.

Open Link
TWITTER

RT @bajodayo: Definitely, the blockchain is needed in #Africa to help combat the Reich and Nazi cabinet of centralization and hidden atroci…


Open Link
TWITTER

#Korean $NXT & #Ardor news are back on https://t.co/UAOKVQFHAL. ☀️ Nxter 구독자 여러분 환영합니다. https://t.co/reOwopttuf… https://t.co/UUCtDD0OFg


Open Link
REDDIT

Will Ardor follow a similar strategy as melonport? If not, should they?



/r/Ardor
Dec. 11, 2018, 2:19 p.m.

Open Link
RSS

Nxter News – 2018년 12월 1주차: 햇수가 아닌 친구수로 나이를 세십시오. 눈물이 아닌 웃음으로 인생을 생각해보십시오.

Nxter News | 2018년 12월 1주차 햇수가 아닌 친구 숫자로 나이를 세십시오. 눈물이 아닌 웃음으로 인생을 생각해 보십시오. Nxter 구독자 여러분 환영합니다. 아이들은 기고나서, 발차기하고, 뛰어다니고 하면서 크게됩니다. 지난주 Nxter News에서 NXT의 5번째 생일을 축하 했었습니다. 그리고 조만간, 12월 25일이 되면 NXT의 또다른 클론의 탄생을 보실 수 있을 겁니다. 우수한 NXT의 유전자를 계승했지만, 완전히 다른 ... Read more The post Nxter News – 2018년 12월 1주차: 햇수가 아닌 친구수로 나이를 세십시오. 눈물이 아닌 웃음으로 인생을 생각해보십시오. appeared first on NXTER.ORG.

Dec. 11, 2018, 2:14 p.m.
Open Link
TWITTER

Great news! #Jelurida has been selected as a finalist to pitch #Ardor and its revolutionary POS-secured multi-chain… https://t.co/DhBiGImWHX


Open Link
TWITTER

The Marketplace & token creation functionality on #Ignis allows businesses like @EZYcountsuisse to manage digital s… https://t.co/ckWBLr9Zwz


Open Link
TWITTER

RT @madfox1234: Welcome our @Nxter_org Special Guest — @trifficworld ! Watch their tweets and look for the #nxterworddec2 ! Collect all 14…


Open Link
TWITTER

RT @bajodayo: And it was of course a great experience and privilege to present #Ardor ones again to #Africa as we open minds to endless pos…


Open Link
TWITTER

RT @MobsVideo: Big news! We've been selected by @tnwevents as one of top ten startups to compete at the Pitch Battle @HardFork Decentralize…


Open Link
TWITTER

Imagine the payout: just trick a #POS public #blockchain network into spending funds on a malicious fork using long… https://t.co/ZUdeDNS05o


Open Link
RSS

Investigating Long Range Attack

Theoretical attack against proof of stakeLong Range — Photo by William Daigneault on UnsplashFor my dedicated readers, I guess you already know what I’m about to say about long-range attacks … but if you need more convincing, read on.Long-range attacks are a popular reason to discredit proof of stake algorithms together with the concept of “Weak Subjectivity”. The idea is that at some point of time (most likely at the Genesis block), an attacker can use the existing state of the blockchain, together with a significant stake of the token balance, to create a chain that is indistinguishable from the real chain. The attacker then tricks users into using his malicious chain instead of the real one.As I previously observed in my article about the “Nothing at Stake” attack, this seemingly simple attack has never been observed in practice. This is of course a strange oddity given what is at stake.Our friend evil Bob, inspired by articles on the subject, decides to launch a long range attack against Nxt. Bob can easily reproduce the state of the chain at any given block height by simply downloading the blockchain up to this height. Now, he needs to get significant stake of the Nxt token at this block height to create a chain with a better difficulty than the real chain.If Bob is a large stake holder and has more than 50% of the stake he can always attack Nxt using a normal 51% attack. So, let’s assume for a start that Bob has no significant Nxt balance at the moment.Luckily for Bob, when Nxt was distributed back in 2013 it was distributed to only 72 lucky stake holders. All Bob has to do is track down these guys and get their account passphrase. In fact, Bob does not need to track all of them - he just needs to get a stake higher than the forging stake at the time of the Genesis block, which was only around 20% of the stake. Finding give or take 5 of the large genesis stake holders and getting their passphrase would be sufficient. Most of these stake holders already moved their funds to another account or sold it, so giving these old account passphrases to Bob would come with little risk. That said, Bob can’t brute force entry to these accounts. This entire attack could end right here if Bob fails to acquire the necessary passphrases to exceed the Genesis staking balance.Consider that the Nxt distribution is a relatively simple case, most proof of stake tokens were distributed to many more accounts at the Genesis block. Ardor, for example, was distributed to more than 100,000 Nxt holders back in 2016. Still, I assume that getting a stake in the blockchain token larger than the forging power at the time of the Genesis block release is possible for a well-funded and powerful attacker like Bob against any proof of stake coin.Equipped with the Genesis block that is available to anyone after installing the Nxt software, and 20% of the stake at the time of the genesis block, Bob starts to forge his own malicious chain. Alas, nothing happens, all other Nxt nodes blacklist his node and any other node already using Bob’s fork. New users never connect to Bob’s node.It appears that the Nxt software implements several simple layers of protection against long-range attacks:The software itself is distributed with a list of bootstrap nodes known to be on the right fork at the time of the release.The Nxt software implements checkpoints of the state of the blockchain at given block heights. Any fork that does not reproduce this exact state is rejected.Transactions use pointers to existing blocks when submitted to the blockchain. These pointers prevent multiple forks from including the same transaction with different block histories.Nodes will never switch to another fork whose chain differs for more than 720 blocks. You can think of it as a rolling checkpoint.As we will see, none of these features provide foolproof protection alone, but put together, they make it very difficult to implement a long-range attack.In my previous article, I explained that it will be very difficult for Bob to create a new version of Nxt which does not implement these protections. Even if he does, other users are very unlikely to use his modified version of the software. Therefore, I conclude that Bob can use a modified version on his own nodes, but to effectively implement any attack against Nxt, he will need to cheat users using the official Nxt software without his modifications.With some effort, Bob can circumvent protection #1 and get his nodes into the list of bootstrap nodes provided with the product. He will need to setup some central nodes and follow the normal chain for a while until some of his nodes make it into the bootstrap list. It would be even more difficult to prevent other nodes from blacklisting his nodes once he starts his attack. Perhaps he can maintain two forks, one honest fork he will show existing nodes connecting to his node, and one malicious fork he will show new users. Implementation of this will be very tricky but still possible.This way, Bob can attract some new users to his malicious fork. Next, Bob will need to circumvent protection #2 - the built in checkpoints. This is impossible unless he can convince new users to use his version of the software, which we assume is unlikely. To workaround this, Bob can try to start his fork after the latest built-in checkpoint. Assuming the latest checkpoint is not too recent this might still be possible using some of the techniques above.Another weakness of Bob’s fork is that it won’t be able to accept existing transactions due to protection #3, which means his fork history will differ significantly from the real chain and this will be simple to detect using any block explorer.Finally, Bob won’t be able to trick existing nodes to move into his malicious fork due to protection #4, the rolling checkpoint.The worst damage Bob can cause is if he is able to convince a large exchange or business to use his fork. But exchanges and businesses can easily protect against this by checking their fork against a well-known block explorer, which is guaranteed to be on the right fork.Which brings up the question, can Bob implement a long-range attack in less than 720 blocks to override protection #4, the rolling checkpoint?For Bob’s attack against the Genesis block or some very old block height, users did not lose much by revealing old account passphrases to Bob. The problem with the short-range attack on recent blocks is that Bob cannot expect anyone to give up their current passphrase without payment. To create the short-range version of the long-range attack, Bob will need to purchase more tokens than the current forging stake, but if he does this, he can just implement a simple 51% attack.To summarize, long-range attack against proof of stake is a theoretical threat effectively mitigated using simple practical steps.PostfaceA common procedure for creating a private/public key pair is to base it on 12 words selected randomly from a dictionary of 1626 words. This is how the Nxt wallet generates a passphrase for a new account. There are roughly 3.41*10³⁸ combinations, slightly more than 2¹²⁸. In cryptographic terms, this provides 128 bits of security which is considered safe, even against quantum computers, forever.However, if someone can create memory cells from all the 10⁴⁹ Silicon atoms on Earth and use them to store a pre-image of all possible word combinations and their hashes, they can crack every private key based on its public key in a split second. Still, it is considered safe to use 128 bit keys and rightly so. The point is, we tend to accept algorithms as secure even when theoretical attacks against them exist. The same goes for the Nxt’s proof of stake algorithm.Investigating Long Range Attack was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.

Dec. 10, 2018, 5:23 p.m.
Open Link
RSS

Investigating Long Range Attack

Theoretical attack against proof of stakeLong Range — Photo by William Daigneault on UnsplashFor my dedicated readers, I guess you already know what I’m about to say about long-range attacks … but if you need more convincing, read on.Long-range attacks are a popular reason to discredit proof of stake algorithms together with the concept of “Weak Subjectivity”. The idea is that at some point of time (most likely at the Genesis block), an attacker can use the existing state of the blockchain, together with a significant stake of the token balance, to create a chain that is indistinguishable from the real chain. The attacker then tricks users into using his malicious chain instead of the real one.As I previously observed in my article about the “Nothing at Stake” attack, this seemingly simple attack has never been observed in practice. This is of course a strange oddity given what is at stake.Our friend evil Bob, inspired by articles on the subject, decides to launch a long range attack against Nxt. Bob can easily reproduce the state of the chain at any given block height by simply downloading the blockchain up to this height. Now, he needs to get significant stake of the Nxt token at this block height to create a chain with a better difficulty than the real chain.If Bob is a large stake holder and has more than 50% of the stake he can always attack Nxt using a normal 51% attack. So, let’s assume for a start that Bob has no significant Nxt balance at the moment.Luckily for Bob, when Nxt was distributed back in 2013 it was distributed to only 72 lucky stake holders. All Bob has to do is track down these guys and get their account passphrase. In fact, Bob does not need to track all of them - he just needs to get a stake higher than the forging stake at the time of the Genesis block, which was only around 20% of the stake. Finding give or take 5 of the large genesis stake holders and getting their passphrase would be sufficient. Most of these stake holders already moved their funds to another account or sold it, so giving these old account passphrases to Bob would come with little risk. That said, Bob can’t brute force entry to these accounts. This entire attack could end right here if Bob fails to acquire the necessary passphrases to exceed the Genesis staking balance.Consider that the Nxt distribution is a relatively simple case, most proof of stake tokens were distributed to many more accounts at the Genesis block. Ardor, for example, was distributed to more than 100,000 Nxt holders back in 2016. Still, I assume that getting a stake in the blockchain token larger than the forging power at the time of the Genesis block release is possible for a well-funded and powerful attacker like Bob against any proof of stake coin.Equipped with the Genesis block that is available to anyone after installing the Nxt software, and 20% of the stake at the time of the genesis block, Bob starts to forge his own malicious chain. Alas, nothing happens, all other Nxt nodes blacklist his node and any other node already using Bob’s fork. New users never connect to Bob’s node.It appears that the Nxt software implements several simple layers of protection against long-range attacks:The software itself is distributed with a list of bootstrap nodes known to be on the right fork at the time of the release.The Nxt software implements checkpoints of the state of the blockchain at given block heights. Any fork that does not reproduce this exact state is rejected.Transactions use pointers to existing blocks when submitted to the blockchain. These pointers prevent multiple forks from including the same transaction with different block histories.Nodes will never switch to another fork whose chain differs for more than 720 blocks. You can think of it as a rolling checkpoint.As we will see, none of these features provide foolproof protection alone, but put together, they make it very difficult to implement a long-range attack.In my previous article, I explained that it will be very difficult for Bob to create a new version of Nxt which does not implement these protections. Even if he does, other users are very unlikely to use his modified version of the software. Therefore, I conclude that Bob can use a modified version on his own nodes, but to effectively implement any attack against Nxt, he will need to cheat users using the official Nxt software without his modifications.With some effort, Bob can circumvent protection #1 and get his nodes into the list of bootstrap nodes provided with the product. He will need to setup some central nodes and follow the normal chain for a while until some of his nodes make it into the bootstrap list. It would be even more difficult to prevent other nodes from blacklisting his nodes once he starts his attack. Perhaps he can maintain two forks, one honest fork he will show existing nodes connecting to his node, and one malicious fork he will show new users. Implementation of this will be very tricky but still possible.This way, Bob can attract some new users to his malicious fork. Next, Bob will need to circumvent protection #2 - the built in checkpoints. This is impossible unless he can convince new users to use his version of the software, which we assume is unlikely. To workaround this, Bob can try to start his fork after the latest built-in checkpoint. Assuming the latest checkpoint is not too recent this might still be possible using some of the techniques above.Another weakness of Bob’s fork is that it won’t be able to accept existing transactions due to protection #3, which means his fork history will differ significantly from the real chain and this will be simple to detect using any block explorer.Finally, Bob won’t be able to trick existing nodes to move into his malicious fork due to protection #4, the rolling checkpoint.The worst damage Bob can cause is if he is able to convince a large exchange or business to use his fork. But exchanges and businesses can easily protect against this by checking their fork against a well-known block explorer, which is guaranteed to be on the right fork.Which brings up the question, can Bob implement a long-range attack in less than 720 blocks to override protection #4, the rolling checkpoint?For Bob’s attack against the Genesis block or some very old block height, users did not lose much by revealing old account passphrases to Bob. The problem with the short-range attack on recent blocks is that Bob cannot expect anyone to give up their current passphrase without payment. To create the short-range version of the long-range attack, Bob will need to purchase more tokens than the current forging stake, but if he does this, he can just implement a simple 51% attack.To summarize, long-range attack against proof of stake is a theoretical threat effectively mitigated using simple practical steps.PostfaceA common procedure for creating a private/public key pair is to base it on 12 words selected randomly from a dictionary of 1626 words. This is how the Nxt wallet generates a passphrase for a new account. There are roughly 3.41*10³⁸ combinations, slightly more than 2¹²⁸. In cryptographic terms, this provides 128 bits of security considered safe, even against quantum computers, forever.However, if someone can create memory cells from all the 10⁴⁹ Silicon atoms on Earth and use them to store a pre-image of all possible word combinations and their hashes, they can crack every private key based on its public key in a split second. Still, it is considered safe to use 128 bit keys and rightly so. The point is, we tend to accept algorithms as secure even when theoretical attacks against them exist. The same goes for the Nxt’s proof of stake algorithm.

Dec. 10, 2018, 5:23 p.m.
Open Link
TWITTER

RT @Ardorgate: Thank you @Nxter_org for adding us to https://t.co/wR6bfWfuOi


Open Link
TWITTER

RT @trifficworld: https://t.co/nCQ1HZmQ3Z Triffic is a groundbreaking augmented reality app that utilizes the Ardor blockchain to issue loy…


Open Link
TWITTER

RT @jrgros: Take a closer look at @Jelurida’s projects. Look deep into $Nxt, $Ardr, and $Ignis. https://t.co/i6VeG3oPYV


Open Link
TWITTER

Just watched research director from @coindesk defend #blockchain #cryptocurrency and $BTC in particular on… https://t.co/vE3y0uzgIf


Open Link
More ...