Subscribe to the latest project news!

Ardor, Nxt, Ignis Social News Feed

TWITTER

RT @AvdiuSazan: @Jelurida My winter setup ❄️ #Ardor $NXT Full Nodes on Odroid XU4/C2 ✌️ https://t.co/Gk2LUOkGY1


Open Link
TWITTER

RT @XendBit: @XendBit is an open protocol for exchanging cross chain cryptos using an off-chain order relay and on-chain settlement. XendB…


Open Link
TWITTER

RT @AvdiuSazan: Just received 12 $IGNIS forging reward #Ardor #PoS #staking NxterBridge Explorer https://t.co/qVvw8xsC8f via @nxter_org h…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop No, not without 3rd parties. I told you - 3rd parties are unavoidable. S…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop There are 13 checkpoints now + the genesis (verify in the link I sent ea…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop No, I never said that Bitcoin doesn't solve the double spend problem - h…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop It's pretty obvious that there are many 3rd parties between you and the…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 4. ISP or mobile data provider. They can collude with the sender and ecl…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 5. Hardware manufacturers - you have no idea how anything in your PC or…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 6. Any drivers, operating system, virtual machines, etc. software which…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop I don't think that anyone claims that Bitcoin can work with absolutely n…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop Not sure why the checkpoints are the drop that makes the glass overflow…


Open Link
TWITTER

RT @madfox1234: $IGNIS USE CASE 7: Suppose you are an #artist who wants to solve some practical problems in the registration and commercial…


Open Link
TWITTER

The newest addition to our office hardware - happily running a full node and #forging on both #Nxt and #Ardor… https://t.co/peQkt5bT9C


Open Link
TWITTER

RT @Nxter_org: @staked_us @onchainfx @MessariCrypto #Nxt $NXT since 2013. #Ardor $ARDR since 2018. https://t.co/ULRnSXZh5A


Open Link
TWITTER

RT @TarascaD: We are finalizing the web design of the card collection. We still have details, but the Public Test is closer than ever. Stay…


Open Link
TWITTER

Hear the man speak. https://t.co/93zfVMamBd


Open Link
TWITTER

RT @CryptoDemetrius: Wondering what the team behind @ArdorPlatform has been up to? Check out the latest #WeeklyWins from the team at Jeluri…


Open Link
TWITTER

#Nxt. The first pure #ProofOfStake #blockchain. Proven stability since 2013. No delegated PoS, a real… https://t.co/QSlQILzcFu


Open Link
TWITTER

Our weekly update! https://t.co/pDK9sN5nUp #Ardor #Nxt #Ignis #blockchain #crypto https://t.co/atuJghv91C


Open Link
RSS

Jelurida’s Weekly Wins - February 1, 2019

Jelurida’s Weekly Wins - February 1, 2019 Winners Announced for the Online Lightweight Contracts Hackathon; Ardor Ramps Up Trainings at LongHash Blockchain Incubator; Jelurida Expands its Team; Video of Jelurida’s Blockshow Asia 2018 Pitch is Online Now; Branding Talks Scheduled Read more about Jelurida’s Weekly Wins - February 1, 2019

Feb. 1, 2019, 4:44 p.m.
Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop It's not true that Bitcoin is fully objective and does not depend on 3rd…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 1. The Clock. Following the FPL result, distributed consensus cannot be…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 2. Protocol Rules. It is true that a dedicated user can read the whole B…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop 3. Checkpoints. Bitcoin clients do need checkpoints, no matter how objec…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop So what we say in NXT: all this subjectivity is unavoidable, so we explo…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop half of the stake since the last checkpoint. Practice confirms it: no m…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop So please stop repeating the mantra that PoW is objective while PoS is n…


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop Not true. Full nodes need checkpoints for the same reasons SPV clients n…


Open Link
TWITTER

RT @jrgros: Take a closer look at @Jelurida’s projects. Look deep into $Nxt, $Ardr, and $Ignis. Overthrowing the State of Smart Contracts:…


Open Link
TWITTER

Congratulations to the 2018 #Ardor Online Hackathon winners! Thanks to everyone who took the time to be the first t… https://t.co/2FBcPIEtXM


Open Link
TWITTER

The exchange of #Nxt's Currencies works differently than the #decentralized asset exchange: instead of placing bid… https://t.co/M24qHsgaC5


Open Link
TWITTER

RT @ArdorBlockchain: Winners announced for the Online #Hackathon to develop real use applications on the Ignis #blockchain of #Ardor platfo…


Open Link
REDDIT

Ryacoin Rewards

Hi guys the Rya wallet is available for download from the official website. All participants in the NXT snapshot (occurred on block 2,110,000 ) can claim their Rya. There will be a Rya distribution of 10% of the Initial supply to the Rya Holders in early May and another in early August. Details will be announced soon @RyaCommunity

/r/Nxt
Jan. 31, 2019, 5:04 p.m.

Open Link
TWITTER

CONGRATULATIONS to the winners of the Online #Hackathon using Lightweight #smartcontracts on the $IGNIS #blockchain… https://t.co/EfKemTXT4v


Open Link
TWITTER

And the winners are....! https://t.co/q8OVIDyYTK #Ardor #Ignis #LightweightContracts #blockchain https://t.co/4ooWzgHDvC


Open Link
TWITTER

Happy to see projects adopt the proven $NXT proof of stake algorithm. Welcome back to #POS @ProximaXio & @2017Lon! https://t.co/SH10CNil1v


Open Link
RSS

Jelurida Announces Winning Ignis Lightweight Contracts from the 2018 Ardor Online Hackathon

Jelurida Announces Winning Ignis Lightweight Contracts from the 2018 Ardor Online Hackathon Jelurida is proud to announce the 2018 Ardor Online Hackathon winners. Read more about Jelurida Announces Winning Ignis Lightweight Contracts from the 2018 Ardor Online Hackathon

Jan. 31, 2019, 12:02 p.m.
Open Link
TWITTER

You can earn #Ignis for actively forging w/ your $ARDR tokens? There's a Lightweight #SmartContract incentivizing a… https://t.co/2vVIOLnn3U


Open Link
TWITTER

The #blockchain shouldn't be intimidating. We are building #Ardor to be simple to adopt and easy to use - but somet… https://t.co/qOiHLjJJi7


Open Link
TWITTER

RT @petkodp: @JohnJRambouts @AvdiuSazan @Ruben_Rotterdam @aantonop Proof-of-Stake means that you are allowed to generate generate a block a…


Open Link
TWITTER

RT @CryptoDemetrius: @binance Someone w/ big ideas releasing real solutions that match, like #Ardor platform's @lioryaffe. Just in the last…


Open Link
TWITTER

More currency types are available on #Nxt: Reservable and Claimable - use them for an #ICO or regular crowdfunding;… https://t.co/nn77fyOomV


Open Link
TWITTER

RT @ZarkMuckerbarn: The people who argue that Java cannot be secured are obviously the ones that are not good enough at securing it properl…


Open Link
TWITTER

Get your #Ardor, #Nxt and #Ignis crypto swag and use it as a starting point to let the world know about the $ARDR,… https://t.co/1Wr9bfG0Bf


Open Link
TWITTER

Make your Monetary System currency Exchangeable if you want it to be traded to $NXT; make it controllable if you wi… https://t.co/mVFe5DDunQ


Open Link
TWITTER

RT @Ardorgate: 1 year ago $AEUR child chain and @Ardorgate service started on @ArdorPlatform . Thank you all users! https://t.co/MwbTkwzXBR


Open Link
TWITTER

Happy Birthday @Ardorgate! $AEUR $ARDR #blockchain https://t.co/OYtakIEm7r


Open Link
TWITTER

#Ardor #Ignis #Nxt passphrase secret sharing https://t.co/zSrYhd1GwY


Open Link
RSS

Passphrase Security Improvements

Using Shamir Secret Sharing in ArdorThe Ardor and Nxt blockchain products use what BCNext, the developer of the first Nxt release, used to call a “Brain Wallet.” What he meant was that a single hard to crack passphrase (with 128 bits of entropy or more) is used to protect your account. The account private and public keys and the account address are all derived from this single passphrase.Anyone holding the account passphrase can submit transactions from the account. If the passphrase is lost, the funds in the account are lost forever. If the passphrase is compromised, the attacker can steal all the funds.Faced with these initial risks, we built several layers of protection into Ardor and Nxt. Let’s review them first. Then, I’ll explain an innovative application of cryptography that can be used to secure the passphrases themselves for enterprise and/or mainstream use.Local SigningSigning transactions can be done locally inside the client browser when connected to a remote node. It works like this: the wallet submits the transaction by sending the transaction data and the account public key to a remote node. The remote node composes the transaction bytes after performing the necessary validations and returns the unsigned bytes to the browser. The browser parses the transaction bytes and validates that they indeed represent the transaction data it submitted to the remote node, then signs the transaction using the account passphrase and broadcasts the signed transaction bytes/json to the remote node.Local signing works remarkably well as long as you download the wallet itself from an honest node. It does not protect against downloading the wallet from a compromised node or a phishing site, which will likely just modify the wallet code directly bypassing any protections.Offline SigningIt goes further, if you are not sure your browser is not compromised, you can perform the actual transaction signing using an offline device by scanning a QR code of the unsigned transaction bytes, signing it, and sending the transaction signature back to the online workstation to be broadcast. But then again, if your wallet is compromised, perhaps someone is able to generate a malicious QR code sending you malicious transaction bytes to the offline device to sign.Most blockchain protocols support similar variations of transaction signing, but what is common to all of them is that at some point a single passphrase or private key has to be revealed to sign the transaction.However, power users cannot just keep their passphrase locally all the time. Essential uses of the passphrase include signing blocks when forging, and submitting transactions automatically from batch processes like bundling, shuffling, account monitoring and running contracts. For these functions, the passphrase has to be kept on the remote node or submitted to the remote node after each restart to trigger these processes.Faced with these risks, you might choose to store your funds on an exchange. But we know how secure this is. Exchanges with their large crypto reserves are always a lucrative target for hackers much more so than a single user.Can we secure the passphrase itself?It turns out that we can and it’s not even too difficult. On November 1979, MIT Cryptography Professor Adi Shamir, also known as the “S” in RSA (the first public key encryption protocol), published an iconic article named “How to Share a Secret”. In this article he introduced a (relatively) simple method for protecting private keys, known as SSS. Unlike many of the newer cryptographic protocols, the math behind this elegant idea is rather simple.Like almost any other cryptographic algorithm, SSS also translates the problem into mathematics. We know that between two points there is only one straight line. Therefore, if we choose three points on the same line, any two of these points can reproduce the line - providing the scaffolding for a 2 out of 3 secret sharing. Using the same principals and using higher degree polynomials, we can easily extend this to any “k” pieces out of a total of “n” pieces generated from a given passphrase.Given SSS, all we need to do is somehow convert the existing account passphrase into an integer number, which of course can be very long, then feed it into SSS to generate three secrets, which are roughly the same length, any two of them can reproduce the original passphrase, but one alone is useless.To reproduce the passphrase, we feed any two of the secrets into SSS to receive back the numeric representation of the passphrase, which we then convert back to the original passphrase.Use CasesAssuming you split your passphrase into three pieces you can use it as follows:Client side redundancy — place one piece in cold storage, one in a password manager, and the 3rd stored in your wallet account settings. Instead of typing, or more likely copy/pasting the whole passphrase, you would need to only copy/paste the piece from the password manager. The browser will internally combine this with the piece in its account settings and into the original passphrase before using it. This protects against key loggers and copy/paste buffer exploits since an attacker would also need to compromise the browser’s local storage to get the 2nd piece. Additionally, if you lose one of the pieces, for example due to a disk failure, you can still use the 3rd one from the cold storage to reproduce the passphrase.Node security — place one piece in cold storage, one in a password manager, and the 3rd stored in your node’s configuration file. Instead of submitting the whole passphrase to the server, you can now submit only the piece from the password manager. The node itself will combine this piece with the one in its configuration to reproduce the passphrase. This protects against eavesdropping of your communication and against exploits that access your remote node file system without taking full control of your node itself.But remember, if an attacker takes full control of your node or tricks you into connecting to a malicious remote node, no amount of cryptography or advanced architecture can help.Notes:Internally, Ardor and Nxt derive the 256 bit account private/public keys from the passphrase. The account address is derived from the first 64 bit of the SHA256 hash of the public key converted using Reed-Solomon error correction code into the familiar ARDOR-* and NXT-* addresses.Conversion between a 12-word passphrase generated by the wallet into the 128 bit random number from which it was generated can be done using a reverse lookup of the indexes in the original words array. If instead you use a randomly generated character string passphrase, it can still be converted to a number, albeit much longer one. Either way, SSS of 2/3 can be used efficiently.For example, using the 12 words passphrase: trail rather enter mass radio confuse jeans mix relax talk cease scary the word trail has index 931 in the 1626 words array. The resulting 12 array positions are concatenated in a special way to form the 128 bit number 24464197503848153035650162909985934977 from which the three secret pieces are derived and converted back to 12 words passphrase pieces. Any two of these pieces can reproduce the original passphrase.

Jan. 29, 2019, 10:02 a.m.
Open Link
More ...