Subscribe to the latest project news!

Ardor, Nxt, Ignis Social News Feed

RSS

Nxter News – Октябрь 2018 (IV): Если сникнет парус, мы ударим веслами

Nxter News | Октябрь 2018 (IV) Если сникнет парус, мы ударим веслами Добро пожаловать, дорогие Некстеры и прочие последователи! Простите за некоторую задержку на этой неделе - встречайте новости! Или не совсем новости? Больше похоже на массированную атаку событий со всех сторон - паруса Ардора наполнены ветром. Пресс-релиз Jelurida на этой неделе представил определения их решений ... Read more The post Nxter News – Октябрь 2018 (IV): Если сникнет парус, мы ударим веслами appeared first on NXTER.ORG.

Oct. 29, 2018, 7:51 a.m.
Open Link
REDDIT

600 people since the beginning of 2018

This subreddit has grown by 600 people since the beginning of this year. Fact is, with proper management and development. 3 years from now you’ll own the absolute prime BAAS crypto. Talking a comparable ADP present future grade for business worldwide.

/r/Ardor
Oct. 29, 2018, 4:01 a.m.

Open Link
TWITTER

The Ardor multi-chain architecture means businesses can focus on what they do best: provide their services and ensu… https://t.co/W5AiwsNTDw


Open Link
TWITTER

Hey #Java developers! Want to showcase your #coding skills while taking a chance at winning a :dollar: prize? Join… https://t.co/DawL2kOUC9


Open Link
TWITTER

Your latest #Nxter $ARDR $IGNIS #blockchain news in #English: https://t.co/KYkhkM1mNB #Spanish:… https://t.co/JgSgtv1dyA


Open Link
RSS

Nxter新闻- 2018年10月(IV):山不转,水转

Nxter新闻| 2018年10月(IV) 山不转水转 带到桨上 欢迎,亲爱的Nxters和其他粉丝! 对你来 ... Read more The post Nxter新闻- 2018年10月(IV):山不转,水转 appeared first on NXTER.ORG.

Oct. 28, 2018, 8:12 a.m.
Open Link
RSS

Nxter News – Octubre 2018 (IV): Si el Viento No es Suficiente, Agarra los Remos

Nxter News | Octubre 2018 (IV) Si el Viento No Sirve Coge los Remos ¡Bienvenidos apreciados Nexteros y resto de seguidores! Lamentamos el retraso de esta semana - ¡aquí está por fin tu boletín! O, realmente no es un verdadero "boletín informativo", ¿verdad? Más bien es un ataque masivo de actualizaciones de todas partes, un monstruoso ... Read more The post Nxter News – Octubre 2018 (IV): Si el Viento No es Suficiente, Agarra los Remos appeared first on NXTER.ORG.

Oct. 28, 2018, 7:57 a.m.
Open Link
TWITTER

Check out the latest article about the #Ardor Lightweight Contracts as a very secure alternative to the existing "s… https://t.co/bLzfcLymAX


Open Link
TWITTER

#Ardor unique three layer architecture (1) Parent/Child POS blockchain (2) built-in contracts with messages,propert… https://t.co/5hARfm31Xs


Open Link
RSS

The Corda DJVM approach is similar in nature to the Ethereum EVM approach of the previous…

The Corda DJVM approach is similar in nature to the Ethereum EVM approach of the previous generation smart contracts. These contracts has to be run by every node (they do try to mask it but it is true) and therefore require metered execution and cannot interface with any external resources. Our lightweight contracts does not have these limitations, their execution is not metered and they can freely interface with external systems, therefore they do need such restrictions.

Oct. 27, 2018, 8:08 a.m.
Open Link
TWITTER

RT @Dominium_me: Chinese Arbitrator Reaffirms That Bitcoin Can Be Held, Privately Transferred as Property https://t.co/HJtWxTLAFB


Open Link
TWITTER

RT @TheCryptoWoman: @TravinKeith @Ardor_Nxt_Group @NxtFoundation It’s been quite a ride and we’ve only just begun!


Open Link
TWITTER

We are looking for talent! Take a look at the Ardor Online Hackathon (ending on Dec. 6). It's an open call for deve… https://t.co/yTHdcEnzzn


Open Link
TWITTER

Have a #crypto newsletter and a great weekend! Just published: https://t.co/QHPY1GUeo0 Join the #Ardor #hackathon… https://t.co/qImlcm7IDq


Open Link
RSS

Nxter News – October 2018 (IV): If the Wind Will not Serve, Take to the Oars

Nxter News | October 2018 (IV) If the Wind Will not Serve Take to the Oars Welcome, dear Nxters and other followers! And a good Friday to you, sorry for the delay this week - here's finally your newsletter! Or, it really isn't a real "newsletter" is it? More like a massive attack of updates from ... Read more The post Nxter News – October 2018 (IV): If the Wind Will not Serve, Take to the Oars appeared first on NXTER.ORG.

Oct. 26, 2018, 3:45 p.m.
Open Link
TWITTER

RT @TheCryptoWoman: @MrV_777 and I are retiring the #cryptocurrency chart we worked on - he is maintaining a chart that is more timely. htt…


Open Link
TWITTER

RT @CryptoDemetrius: Looking forward to demoing @ArdorPlatform at a private meetup in Malta this upcoming Tuesday morning before the @Block…


Open Link
TWITTER

RT @citijohn: @TravinKeith discusses benefits of #Blockchain application for medical organ registration in Europe https://t.co/FpeThSgEC3


Open Link
TWITTER

RT @NxtCommunity: Rya - a decentalized monetary system project, has announced an upcoming airdrop to $NXT holders! The snapshot will be tak…


Open Link
TWITTER

RT @RyoOfficial2: We are pleased to announce that we have published the Rya code under the @Jelurida Public License. This is a massive step…


Open Link
TWITTER

RT @XendBit: We are excited to be collaborating with Fransisco of Jelurida, Frank with @GraftonTruedis and Prince of Comedy, Ebiye Victor (…


Open Link
TWITTER

#Ardor #Lightweightcontracts security model is explained here https://t.co/nwkHm89T7f spoiler - we did not develop… https://t.co/bY1qcNW0Gu


Open Link
RSS

Ardor Lightweight Contracts Security Model

Ardor Lightweight Contracts Security Model, photo by Victor Garcia on UnsplashAs I discussed in my previous articles, lightweight contracts provide a very secure alternative to existing “smart” contracts frameworks. Our Ardor based contracts are executed only by specific contract runner nodes and do not store any state, making them secure against bugs which might allow hackers to steal or freeze funds. As long as the contract runner node trusts the contract developer and/or took reasonable measures to review the contract code, the node can run contracts under much better security guarantees compared to other frameworks.However, to reach the full potential of the technology, we would like contract runners to run contracts developed by 3rd parties they do not fully trust. Supporting this would provide an “App Store” like marketplace experience for contracts, where any node runner can choose to run any contract without having to trust the developer of the contract much the same way apps run on smartphones. We achieve this by granting permissions per contract and sand boxing of contract execution.Let’s discuss the potential risks of running untrusted contract code downloaded from the blockchain. Doing so opens up several attack vectors that we need to protect against.Note that any node by default does not run contracts so is not exposed to the risks listed below. Even a node acting as contract runner does not run any contract by default. It first needs to set an explicit contract reference from the contract runner account to the contract it wants to run.Let’s assume you already setup your node as a contract runner and choose to run a contract by setting a contract reference. What risks is your node exposed to?Let’s list the risks and then see how Ardor lightweight contracts protect against them.Operating System Access — contracts downloaded from the blockchain can in theory read any file on your local drive or delete any file. It can access environment variables, run programs on the local workstation, kill your node etc. Clearly we don’t want to allow contracts to perform these operations without our permission.Query node information — even if we block direct access to the local workstation resources, we still don’t want a contract to be able to access it indirectly using the node itself, for example, the contract runner’s properties file, may store a passphrase or admin password. We also don’t want a contract to be able to tell the node process id or other environment information about the contract runner since this might help attacking the node using a side channel.Misuse the node — a malicious contract can try to use the node’s peer connections to DDOS other nodes, or otherwise attempt to misuse the node resources and reputation to attack other nodes or end users.Corrupt the node internal state — a malicious contract can change the state of the contract runner node, for example, by altering the internal account balances table in a way that messes up the internal state of the node. This is more of a nuisance than a real problem since this node will be blacklisted by other nodes at some point, but it can be used to attempt to somehow mislead the node operator or other contracts running on the same node.To mitigate these risks and protect the contract runner node against attacks issued by untrusted contracts it chooses to run, a sophisticated sandbox is used to run contracts in their own reduced permissions environment. Our solution is based on the Java Authentication and Authorization Service (JAAS), which is arguably one of the most robust security frameworks available.Based on this solution. contracts are loaded using their own class loader. Contract permissions are assigned to contracts by the contract runner using the standard Java policy tool and policies can be assigned per contract developer account or per specific contract. Security is enforced by the Java class libraries themselves.We did not invent this permissioned sandbox solution. Instead, we choose to integrate the Java permission system into the internals of our code. We trust the Java engineers and the 20-year legacy of mission critical Java applications to provide the best possible security framework for our contracts.To summarize, lightweight contracts are stored on the blockchain but their execution is not part of the blockchain consensus. Their output is normal blockchain transactions. Therefore, they cannot systematically harm the blockchain itself. Since they are stateless, the risk of a contract losing or locking user funds is much smaller compared to other solutions.Contract runner nodes run their contracts in a protected sandbox, which protects the local node from any malicious activity attempted by the contract. This is backed by the built-in Java security framework. We did not role our own security system, instead we are leveraging one of the best security frameworks available.

Oct. 26, 2018, 9:22 a.m.
Open Link
RSS

Ardor Lightweight Contracts Security Model

Ardor Lightweight Contracts Security Model, photo by Victor Garcia on UnsplashAs I discussed in my previous articles, lightweight contracts provide a very secure alternative to existing “smart” contracts frameworks. Our Ardor based contracts are executed only by specific contract runner nodes and do not store any state, making them secure against bugs which might allow hackers to steal or freeze funds. As long as the contract runner node trusts the contract developer and/or took reasonable measures to review the contract code, the node can run contracts under much better security guarantees compared to other frameworks.However, to reach the full potential of the technology, we would like contract runners to run contracts developed by 3rd parties they do not fully trust. Supporting this would provide an “App Store” like marketplace experience for contracts, where any node runner can choose to run any contract without having to trust the developer of the contract much the same way apps run on smartphones. We achieve this by granting permissions per contract and sand boxing of contract execution.Let’s discuss the potential risks of running untrusted contract code downloaded from the blockchain. Doing so opens up several attack vectors that we need to protect against.Note that any node by default does not run contracts so is not exposed to the risks listed below. Even a node acting as contract runner does not run any contract by default. It first needs to set an explicit contract reference from the contract runner account to the contract it wants to run.Let’s assume you already setup your node as a contract runner and choose to run a contract by setting a contract reference. What risks is your node exposed to?Let’s list the risks and then see how Ardor lightweight contracts protect against them.Operating System Access — contracts downloaded from the blockchain can in theory read any file on your local drive or delete any file. It can access environment variables, run programs on the local workstation, kill your node etc. Clearly we don’t want to allow contracts to perform these operations without our permission.Query node information — even if we block direct access to the local workstation resources, we still don’t want a contract to be able to access it indirectly using the node itself, for example, the contract runner’s properties file, may store a passphrase or admin password. We also don’t want a contract to be able to tell the node process id or other environment information about the contract runner since this might help attacking the node using a side channel.Misuse the node — a malicious contract can try to use the node’s peer connections to DDOS other nodes, or otherwise attempt to misuse the node resources and reputation to attack other nodes or end users.Corrupt the node internal state — a malicious contract can change the state of the contract runner node, for example, by altering the internal account balances table in a way that messes up the internal state of the node. This is more of a nuisance than a real problem since this node will be blacklisted by other nodes at some point, but it can be used to attempt to somehow mislead the node operator or other contracts running on the same node.To mitigate these risks and protect the contract runner node against attacks issued by untrusted contracts it chooses to run, a sophisticated sandbox is used to run contracts in their own reduced permissions environment. Our solution is based on the Java Authentication and Authorization Service (JAAS), which is arguably one of the most robust security frameworks available.Based on this solution. contracts are loaded using their own class loader. Contract permissions are assigned to contracts by the contract runner using the standard Java policy tool and policies can be assigned per contract developer account or per specific contract. Security is enforced by the Java class libraries themselves.We did not invent this permissioned sandbox solution. Instead, we choose to integrate the Java permission system into the internals of our code. We trust the Java engineers and the 20-year legacy of mission critical Java applications to provide the best possible security framework for our contracts.To summarize, lightweight contracts are stored on the blockchain but their execution is not part of the blockchain consensus. Their output is normal blockchain transactions. Therefore, they cannot systematically harm the blockchain itself. Since they are stateless, the risk of a contract losing or locking user funds is much smaller compared to other solutions.Contract runner nodes run their contracts in a protected sandbox, which protects the local node from any malicious activity attempted by the contract. This is backed by the built-in Java security framework. We did not role our own security system, instead we are leveraging one of the best security frameworks available.Ardor Lightweight Contracts Security Model was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

Oct. 26, 2018, 9:22 a.m.
Open Link
REDDIT

Developer | I want to help Project with bots and utilities

Hey There! *I'm developer. I'm looking for a project for cooperation.* I developed a lot of telegram bots, airdrop bots, bounties platform, web pages, monitorings, slack bots, discordapp bots, reddit bots with auto-posting and etc. Developed a popular bot to protect groups from spam attacks, which consists of more than 25 groups. I automated bounty system to auto claim users bounty on steemit/golos when users do actions like following/resteem/upvote/comment and etc. **I already helped to:** * **WINGS** with bots, monitorings and utilities. Helped community to get quick access to the required information. * **PTOY** with the telegram, twitter and slack bots. Developed bot to sync messages between telegram and slack which allowed users to communicate with each other without any problems. If you'll need help, write me in PM and we'll discuss conditions. My contact in telegram: **@vsnation** *^(This message sent by vsnation bot)*

/r/Ardor
Oct. 26, 2018, 6:50 a.m.

Open Link
TWITTER

RT @CryptoSterni: @rzr_road_dreams @SilverBulletBTC I do not know to be honest. Just did some fundamental analysis for ~ 30-40 coins in the…


Open Link
TWITTER

RT @CryptoDemetrius: 개나소나(아마존, 마이크로소프트, @IBMBlockchain 등) 사용하는 용어 BaaS란? Full BaaS 모델을 이용시, 기업은 블록체인 개발 과정의 세가지 요소를 모두 아웃소싱 함으로써, 시간과 자원을 절…


Open Link
TWITTER

Remind! Our general email list has been deleted thanks to #GDPR so we need to start collecting your emails again. T… https://t.co/Bl3cMfEA7G


Open Link
TWITTER

Our general email list has been deleted thanks to #GDPR so we need to start collecting your emails again. To receiv… https://t.co/LpGHwWUoAB


Open Link
REDDIT

Nxter Puzzle - October IV: The Spider Web

​ [Nxter Puzzle - October IV: The Spider Web](https://i.redd.it/6jm1mlcxecu11.jpg) ## In the spirit of undead kids begging for candy, zombies, rattling bones, pumpkins, and the resurrection of IGNIS, the theme of this week's Nxter Puzzle is ... All Hallows' Eve! The Nxter Puzzle prize is kindly sponsored by the [**Ardor / Nxt Group**](https://ardornxt.io/)**.** You'll find **200 IGNIS** in the prize account this week. The Account ID is [ARDOR-2GRF-FH6B-9EH4-9M3FU](https://www.nxter.org/explorer/ARDOR-2GRF-FH6B-9EH4-9M3FU/). Best wishes. [https://www.nxter.org/the-spider-web/](https://www.nxter.org/the-spider-web/)

/r/Ardor
Oct. 25, 2018, 2:38 p.m.

Open Link
TWITTER

Don't let the spider win, pumpkin man! Grab 200 $IGNIS from the #Halloween #crypto account. All unsolved puzzle… https://t.co/HIAZwXRQAY


Open Link
TWITTER

The answer to this weeks @Nxter_org #puzzle can be found in the spiders web! #Halloween theme brought to you by… https://t.co/dfoVyyMCoj


Open Link
TWITTER

RT @YoustartIT_MITA: An event not to be missed is happening on Wednesday 31 October 7pm at @thirstybarber in Paceville. Special guests incl…


Open Link
TWITTER

RT @coineventchart: #Ardor #ARDR $ARDR 2018-11-22 - Hackathon Submissions "Opening Date for Submissions: November 22nd. Step-by-ste…


Open Link
TWITTER

RT @XendBit: Check out this snippet of an interview with our CEO Bolaji Onibudo with Francisco from NXT/Ardor! #DEX #blockchain #decentrali…


Open Link
RSS

The Spider Web

In the spirit of undead kids begging for candy, zombies, rattling bones, pumpkins, and the resurrection of IGNIS, the theme of this week's Nxter Puzzle is ... All Hallows' Eve! Madfox wrote: This font with small webs inside is looking nice hidden long phrase is there) Go get scared: The Nxter Puzzle prize is kindly sponsored by ... Read more The post The Spider Web appeared first on NXTER.ORG.

Oct. 25, 2018, 12:35 p.m.
Open Link
TWITTER

RT @AvdiuSazan: Ardor Online Hackaton November 22nd - December 6th, 2018 ONLINE LIGHTWEIGHT CONTRACTS COMPETITION https://t.co/H91RB166NS…


Open Link
TWITTER

RT @AvdiuSazan: Ardor Lite v2 released for Android Transactions are signed locally just like the #Ardor NRS client, so your passphrase is n…


Open Link
TWITTER

We are excited to be at @BlockchainMT next week! Come meet us at our boot (Number 260) 👋 let's talk about the best… https://t.co/nk0OZvd12H


Open Link
TWITTER

RT @efunkonline: Attention #ardor people: I deployed a lottery lightweight contract on the testnet. Send Ignis testnet tokens to the addres…


Open Link
TWITTER

#Ardor users, fixes today, based on your feedback: 1.getSupportedContracts API reports runner config problems. 2.Co… https://t.co/WG0x7ip2j4


Open Link
REDDIT

Cryptocurrencies in the Top 100 With Working Products That Are In-Use



/r/Ardor
Oct. 24, 2018, 7:34 p.m.

Open Link
REDDIT

Ardor recruitment

I'd like to see the Ardor/Jelurida team recruit someone with global enterprise experience like Bloq has..... https://www.coindesk.com/fidelitys-blockchain-incubator-lead-just-went-full-crypto/

/r/Ardor
Oct. 24, 2018, 7:32 p.m.

Open Link
REDDIT

How to install Ardor on Ubuntu



/r/Ardor
Oct. 24, 2018, 4:34 p.m.

Open Link
TWITTER

We are looking for talent! Take a look at the Ardor Online Hackathon (ending on Dec. 6). It's an open call for deve… https://t.co/CljtAGCmgr


Open Link
TWITTER

RT @BlockchainNG: We are grateful to our sponsors/ partners at Abuja Blockchain & AI Round-Table 2018 #ABAR @Jelurida @Bitdepositary @Digit…


Open Link
TWITTER

If you want to explore the #blockchain world, this is the place to start! #Jelurida has launched the #Ardor Learnin… https://t.co/72vkK4DszM


Open Link
TWITTER

Our general email list has been deleted thanks to #GDPR so we need to start collecting your emails again. To receiv… https://t.co/fQFRvKlB4O


Open Link
TWITTER

RT @AvdiuSazan: Global Blockchain as a Service Market Key participants operating in the global blockchain-as-a-service market are #Microsof…


Open Link
TWITTER

RT @madfox1234: Major players operating in the global blockchain-as-a-service market are @IBM , @Microsoft , @HPE , @Ardor_Nxt_Group , @SAP…


Open Link
More ...