Bitcoin Forum
April 19, 2024, 09:07:14 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 »
401  Economy / Service Announcements / Re: [ANN] Unseen.is BETA, secure communications. FREE premium account giveaway. on: April 08, 2015, 07:13:32 PM
47/50 premium accounts left.  Smiley

Come and get them!
402  Economy / Service Announcements / Re: [ANN] Unseen.is BETA, secure communications. FREE premium account giveaway. on: April 06, 2015, 04:54:11 AM
Just PMed you over @ unseen :-)

Greetings, what is your username?

Culexevilman

48/50 premium accounts left.
403  Economy / Service Announcements / Re: [ANN] Unseen.is BETA, secure communications. FREE premium account giveaway. on: April 05, 2015, 06:02:32 PM
Very interesting & useful project. Will definitely keep watching this.

Good luck! Smiley

Thank you for your support and kind words, we believe everyone should have the freedom to communicate online without fear of being watched or snooped upon.

 Smiley

49/50 premium accounts left.

Culexevilman
404  Economy / Service Announcements / Re: [ANN] Unseen.is BETA 3, secure your privacy, secure your freedom. FREE premium on: April 05, 2015, 06:23:41 AM
Just so you know there is a rule about "giveaways" here:you can't offer anyone an incentive to post in your thread, this is to reduce spam. You will probably need to change this, perhaps ask users to PM you the username instead of posting it.

Ok sure.
405  Economy / Service Announcements / Re: [ANN] Unseen.is BETA 3, secure your privacy, secure your freedom. FREE premium on: April 05, 2015, 01:33:04 AM
just signed-up for account: much
nice interface, good luck!

Greetings, just upgraded you to a lifetime premium account. Enjoy!

49/50 premium accounts left.

Culexevilman
406  Economy / Service Announcements / Re: [ANN] Unseen.is BETA 3, secure your privacy, secure your freedom. FREE premium on: April 03, 2015, 07:58:04 PM
RESERVED
407  Economy / Service Announcements / [ANN] Unseen.is BETA, secure communications. FREE premium account giveaway. on: April 03, 2015, 12:15:00 AM
Are you still using this to communicate online with your family and friends or even conduct your business?


Well, if you are concerned with your privacy and freedom online. We have a solution for you...



To support for the community of Bitcointalk, we are giving away 50 premium accounts for FREE, to get your free premium account, simply signup for an FREE basic account at https://unseen.is/jasonk and pm me your username on unseen, reply here with your bitcointalk username, and you will be upgraded to PREMIUM! A review would be appreciated as well.

Also if in the future you would like to get premium accounts either for yourself, family and friends, coworkers etc.

Use my personal link to get 10% off your order. More discount for bulk orders!

https://unseen.is/payment.html?referrer=jasonk


We also have a competitive affiliates program and also private label version of our service, so PM me for detail discussion if you are interested.

Lets get down to the good stuff...

Features

State of the art encryption and security to protect your communications from hacking, snooping, surveillance etc.

Anonymous Chat and Calling feature right in your browser, no signups needed!

Superb call quality better than Skype etc.

Email (Premium Only), Chat, Video/Audio calls, conference calls fitting your every need.

Hosted in Iceland, with some of the strongest data privacy laws on the planet.

We take Bitcoins and process Credit card payments in Iceland.

About Unseen

Unseen brings both consumers and businesses strong, secure and private communications. Our skilled and experienced team have been building popular web sites and services since 1995. Before starting Unseen, we developed Before It’s News, a leading source of alternative news and information. Because of this, we’ve had numerous people share with us their concerns about internet communications security. We’ve been aware of most of the recent revelations for years.

Our premise is that everyone needs to be able to hear the truth so they can make a good choice for their future. If your communications isn’t secure, it could be monitored, blocked or changed without you knowing it. That’s not good for anyone.

With all the recent spying disclosures, we became concerned about the safety of our customer’s data, so we moved the company and servers to Iceland. Iceland has a good track record of doing the right thing for protecting privacy and their past behavior with the bankers and human rights. It’s a neutral country where during the height of the cold war, this is where Reagan and Gorbachev had their famous meetings. It’s a very developed country with state of the art data centers where your data is safe and under the protection of Icelandic laws. Our Icelandic director is firmly in control of any requests for data and will do everything legally possible to protect our customer’s communications.

In the future, expect many upgrades to our systems, as we stay abreast of the latest encryption and security technology and do everything we can to continue to earn your trust.

F.A.Q


Frequently Asked Questions

What does Unseen do?

Our services provide private and secure messaging, email and calling. We offer web, mobile and desktop apps that will allow secure communication wherever you are.

 

What is the mission of Unseen?

Open and free communications are critical in allowing the people to obtain truthful knowledge. Today, data is intercepted and snooped upon for various reasons and purposes. When someone can read your information while it’s in transit, it’s easy to block the recipient from ever receiving or change the content all without your permission. This is the reason Unseen was built. We also believe in giving full support for groups or individuals who needs security and privacy, like media reporters, whisle-blowers, people who are living under state-control and media-censorship. Especially heavily persecuted groups in Communist countries such as Falun Gong, Christians, Tibetans etc.

 

Where is Unseen based?

Our company and servers are based in Iceland, protected by some of the strictest data privacy laws on the planet. We are a registered company within Iceland. You can check it out here http://www.firmaskra.is/search.php?q=unseen#

 

What platforms is Unseen available on?

We are currently in beta, and available for Web browsers like Firefox, Chrome and Opera. Apps for Windows, Mac OS X and Ubuntu Linux. Android and iOS app is available now as well.

 

Why do I need Unseen?

If you value privacy, security and freedom, then you need to start protecting your online communications today. Most sites rely on data mining to offer a free service. "You" are their product, and that's not private.

 

How does it work?

Encryption takes your data and applies a special formula to it, so it becomes a scrambled gibberish that are only readable by the sender and the receiver.

We provide end to end encryption for all transmissions of data. We do not have the key and can't read any of your messages. This is done in the background, it will feel and work the same way as if using regular email or chat services.

 

What kind of encryption does Unseen offer?

We utilize industry standard openPGP encryption for email and TLS 2048 bits for audio/video calls. For chat we use a much stronger xAES algorithm and NTRU for key exchange. You can read more about it here.

http://en.wikipedia.org/wiki/NTRU

http://en.wikipedia.org/wiki/Advanced_Encryption_Standard

 

How does Unseen prevent someone from getting access to my data?

You will generate your own key and only you have access to it. Data from each of your messages is encrypted separately with your key, so even we can’t decrypt your messages.

We take many steps in guarding access to the servers itself. Data from each account is encrypted separately so even if any data were stolen, it's very difficult to break in.

 

Do you offer encrypted file storage?

Not yet, we are working on this now.

 

Do I need a new email address or can I keep the one I have?

You can keep the one you have, and you’ll be given a new one at Unseen. Let’s say you get the Unseen account name Johan. The email will automatically be Johan@unseen.is.

It’s a secure and isolated email address compared with the rest of your accounts.

 

Can I send emails to people outside of Unseen?

Yes you can send emails to any valid email address. In most cases, emails sent to outside of Unseen will be unencrypted because you don't have the recipient's key. You can also send encrypted emails to third party addresses, but they would need to utilize the same level of encryption that we use and you would need your recipient's public key. Otherwise it would be impossible for them to decrypt the message.

It’s highly recommended for both of you to use Unseen, simply because the content will not be transmitted over the internet as regular email. It’ll go from your computer directly to our secured servers, then to the recipient’s computer in a heavily encrypted tunnel.

https://blog.unseen.is/2014/03/26/email-cant-be-completely-private-or-secure/#awesm=f8715e452f17b232e801f1ae55c07447

 

Can I send chat messages to people outside of Unseen?

No, the highly secure chat feature is only available from user to user with Unseen accounts. For chat we use a proprietary technology thats simply not compatible with other services.

 

For audio or video calling, do both sides need to be using Unseen?

Yes. for calling both parties have to use Unseen. It’s the only way we can guarantee your security and that things are compatible. Calls are cross-platform compatible between web, desktop and mobile apps.

 

Isn’t a web service less secure?

Our web services are developed to provide the highest level of security available. Apps specific to a particular operating system do offer more security than browser based system. The web app is extremely convenient because you can get your messages on any machine anywhere.

 

What’s the difference between Unseen Basic and Premium accounts?

Basic accounts provides messaging and calling features.

Premium accounts offers maximum security for your online communication needs, secure email account with 2GB of storage and the strongest tier of encryption available, also up to 100MB of file sharing, unlimited individual and group calling, plus the ability to generate and store your own private key.

 

What's this Lifetime account I am hearing about?

Lifetime was a limited offer for the first customers of Unseen, its no longer available. It was discontinued after March 1, 2015. We are now offering monthly and yearly subscriptions.

 

What is your data retention policy?

Its simple, we keep limited logs and backups for 2 weeks. After 2 weeks, they are overridden. We do not have anything beyond that point.

 

What if you get a request from the government to hand over information?

Because we’re based in Iceland, we are bound by Icelandic laws. We only follow orders from Icelandic courts. If we receive a valid warrant issued in Iceland, we will throughly evaluate the request. If it is a legally valid request, then the information we have will have to be turned over to the court. In Iceland, it's not permitted to create backdoors or to give bulk access to the data. We only have encrypted files and related logs.

 

How do I upgrade my basic account to premium?

To upgrade your account, just log into your account and click on the Upgrade to Premium button in the menu bar at the top of the page. From here you will be taken to a payment page. If you are only purchasing a single upgrade, the account you are logged into will be upgraded automatically after payment.

 

I have several accounts that I want to upgrade. Whats next?

If you are purchasing group upgrades, please contact us at support@unseen.is , so we can provide the best pricing available to you.

 

Do you offer private label version of Unseen?

Not yet, but we are working on a co-branded version. Please contact us if you are interested at support@unseen.is .

 

Do you offer an affiliate program?

Yes we do! We offer an highly competitive affiliate program for you. If you would like to sign up. Please contact support at support@unseen.is with subject affiliate.

 

I have forgotten my password and/or username, how do I retrieve them?

When at the Unseen home page, click on the ’Forgot Password’ link. Enter your username or email id and click on the ’Reset password’. WARNING!: If you reset your password, you will lose all access to previous messages and data plus encrypted emails. This is done for your protection.

 

What payment methods do you accept?

We currently accept the following payment methods: Paypal, VISA and MasterCard, with credit/debit cards processed in Iceland, we also accept Bitcoin.

 

Can I get a refund?

Of course. While we hate to see you go, if for any reason you are not satisfied, please contact us at support@unseen.is and request a full refund within 30 days of purchase.

 

How do I delete my Unseen account?

If you don't plan to use your Unseen account ever again, you can always delete your account from the account settings. Please be aware that there is an irreversible removal procedure that can take up to 14 days, before account data is erased completely.
408  Alternate cryptocurrencies / Altcoin Discussion / Some thoughts regarding Safecoin Safe Network predictions on: February 25, 2015, 09:12:28 PM
OP here https://www.maidsafe.org/t/some-thoughts-regarding-safecoin-safe-network-predictions/3152



I was reading the prediction thread and started thinking, ends up much longer and decided to make a separate thread. Anyways...

Amazon S3 starts at $0.03 under 1TB, so it's about $30.00 for 1TB of cloud space. Assume worst case wiith safecoin at $0.01, and 4.3 billion of coins complete supply (not all available at once).

It's $43 million dollars for what could be the best Dropbox, box, iCloud, Amazon etc out there.

Assume with 43 million dollars spent ALL on infrastructure and storage and management of network , at $0.01 per GB, we would get about 4,300,000 TBs on the network.

If 4,300 people put 1TB drive space. Or...
If 43,000 people put 100GB drive space Or...
If 430,000 people put 10GB drive space. Then
We have just build and jump started the next AWS, cloud storage.

Now I am purely going at it assume safenetwork is just an AWS and cloud storage service with most cutting edge security and innovations.

Take a look at the following list of investments/revenue/market cap of company many of whom you would known and/or use sometime in your life.

Amazon: est. $10 Billion revenue in cloud services alone. 2015

IBM: est. $7 Billion revenue in cloud computing alone. 2015

Facebook an complete personal and business database of most detail about ones life has a market cap of $219.15 billion as of now. With about $247 per person. (Stop selling your privacy for dirt people .)

Google an massive big brother overseeing more than you can imagine or conceive has a market cap of $365.88 billion dollars.

Dropbox an leader in cloud storage has investments of ~$500 million valued at $10 billion

Slack one of the hottest startup focusing on enterprise communications started with $43 million dollars and recently gotten $120 million, value approaching $1 billion.

They are the 1 percent, we are the 99.

I could go on the list for quite a while but you guys should see the point I am illuminating here.



The cloud computing industry is an est. of $160 Billion dollars.

What are most businesses and consumers going to spend on computers here and out?

http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computing-forecasts-and-market-estimates-2015/

Global SaaS software revenues are forecasted to reach $106B in 2016, increasing 21% over projected 2015 spending levels.  A Goldman Sachs study published this month projects that spending on cloud computing infrastructure and platforms will grow at a 30% CAGR from 2013 through 2018 compared with 5% growth for the [...]

We have been in the information technology or IT age since the late 90s. It's an age that created Giants and Mongols of enterprises an age where we the people make a few strong. But for the future, we are ushering in the new age, welcome to the world of data technology or DT age. It's an age where we empower each other to be strong as a whole. We the people become the massive cyber brain of the data, like ants that covers the planet.
(10,000 trillion ants roam the earth at any time.+ 50 million member per superorganism working in hive mind is VERY DAMN powerful)

Fun facts:

http://io9.com/5880539/10-frightening-facts-you-probably-didnt-know-about-ants

Anyways...

Now the key difference in IT and DT is not really about the technology aspect of things. Even we are experiencing game-changing, highly innvovative technology advances. It's about the mentality of the people that has changed.

For the next twenty years, oil will not longer be the "commodity" it surely will be data. I mean we are eventually all getting something like tesla that requires no gas and IOT of everything we use. Certainly it will further expand the data supply and demand in a exponential way.

The future is bright, so even in the most pessimistic thoughts I could come up with, what could be worst case scenario of $0.01 per safecoin a lot of people would still be proud the the community and progress we have now and will advance to build.

5 years from now, while most people will talk achievements and wonders. We will look back upon and reflect on the dumb mistakes we have made in the early days...

I think mine would be to talk about how I sold my coins at a quarter. How I should kept farming etc. Not buying more at 3 cents. FML lol

So embrace the future, it's about to get crazy real soon.

See you on the other side.

JK
409  Economy / Scam Accusations / Re: Charlie Shrem is scammer, watch out on: January 23, 2015, 07:05:49 AM
Wow, I did not know this coin I brought had such an story behind it. Undecided
410  Alternate cryptocurrencies / Altcoin Discussion / Even though its NOT an altcoin, my recommend buy letter for Jan 2015 on: January 21, 2015, 04:01:00 AM
Maidsafecoins, proxy token for Safecoins when the SAFE network is launched.


Fellow Bitcoiners and friends

Its my recommend BUY for Jan 2015. I will try to illuminate the reason why you should consider looking at this project with a fresh blank mind, without any previous notion regarding what you think you may or may not know about this project.

Although may agree or disagree here, with all of the crap/s#!t coins out there, the recent plummeting of Bitcoin price can actually be seen as a positive thing amidst all the blood on the streets. Like it or not, its what we need, a wakeup call of the greed inside of us. The spectacle of recent Paycoin and its crew, feeding and preying upon people's hope for profit and victory amid the chaos and nightmare that seems never ending. Along what we dont see in the media is the countless pumps and dumps that had occurs under our sights. We ignored and forgotten the pains of the past, maybe it never mattered in person, but ignore long enough and pain will come.

"the Great Cleansing" thats what I foreseen in the times when Feathercoin was the only major altcoin picking up peoples attention time, resource, talent, etc.
with the introduction of altcoins increasing at an ever alarming level almost two years ago. This day was bound to happen.

With the low bitcoin prices, people are once again daring to try and touch the once forbidden beast priced at a point most stared in awe as it went from 100 to 1000+ within a very short time.

Through watching the community evolve through out the years, seen many come and go. Some of the bitcoin community I knew has turned narrow-minded, hind-sighted, oblivious and ignorant to all the other possibility on the planet.

Wake up fellow Bitcoiners, you tossed your self into the bitcoin world for what reason? I know I did in search of freedom, true freedom also profits. Which I luckily did bestow upon through out the years. With most of the prominent figures and companies in bitcoin merely trying to bring Wall street over to the new found land. Bitcoin quickly turned sour and lost its luster.

But Satoshi's ideals will not die. As the introduction of Bitcoin showed us the way. A strong and open mind is what we need, to go and do the things most will say crazy and point with laughter, but in my eyes they are the innovators, so bear with me as the light shed on the project as time passes by, to use the saying in Bitcoin, "get on the train, before its too late.

We need not the fancy documents and websites to market our-selfs to make a quick buck, we have been on our own and fought the fights, as dawn nears the end of the wait and victory is in sight, join us in hand as we embrace the newly found land, a realm where we can breath and think without fear of flight. To see listen watch content and words alike. Once again mankind will have its freedom again.

To share with you all with a famous quote that I am deeply fond of.

“Here’s to the crazy ones.
The misfits. The rebels. The troublemakers.
The round pegs in the square holes.
The ones who see things differently.
They’re not fond of rules.
And they have no respect for the status quo.
You can praise them, disagree with them, quote them,
disbelieve them, glorify or vilify them.
About the only thing you can’t do is ignore them.
Because they change things.
They invent. They imagine.
They heal. They explore. They create. They inspire.
They push the human race forward.
Maybe they have to be crazy.
How else can you stare at an empty canvas and see a work of art?
Or sit in silence and hear a song that’s never been written?
Or gaze at a red planet and see a laboratory on wheels?
While some may see them as the crazy ones, we see genius.
Because the people who are crazy enough to think they can change the world,
are the ones who do…”



I will not try to explain this project on this thread, as its simply too large to comprehend with a few paragraph, I encourage you to take sometime to dive in to the materials and realize for your-self to what I am illuminating to you.

But do note, Bitcoin was meant for the people, however now its only the large corporations who partake in the creation, how many of you still mine in strong belief of the network? Looked at what happened to Litecoin, its the sum of all greed of the men I once knew. Do not fear. As SAFE Network is meant for all to participate, without race to see who solves the problem first get the reward. WE exist together in this system and coop in the prosperity for all participants. AS it was designed with those ideals from the core.

http://docs.safenetwork.io/

Culexevilman

SAFE Pod San Francisco
411  Alternate cryptocurrencies / Altcoin Discussion / Re: The Best Coin To Purchase For a 1+ year hold? on: January 21, 2015, 03:31:18 AM
Maidsafecoins +1

proxy coins for Safecoin when the network is launched

This should give you a better understanding of the project, its really huge in terms of sheer monstrous size of the codebase.

http://docs.safenetwork.io/

More specifically for double spending. long thread...

https://www.maidsafe.org/t/how-does-maidsafe-solve-double-spending/257
412  Alternate cryptocurrencies / Altcoin Discussion / Re: MaidSafe -- how can it find my files, without a blockchain? on: January 21, 2015, 03:17:04 AM
Hi,

I'm looking at advanced Crypto 2.0 platforms.
And so far StorJ is building decentralized, incentive-based file storage system, based on StorJ blockchain, that I can understand.

But Maidsafe seems to offer similar functionality (coin + app platform + file storage), without a centralized ledger, without a blockchain !

Anyone understands how can it possibly work?
If a client connects to the network, how the network can find his files? Or his coins?

This should give you a better understanding of the project, its really huge in terms of sheer monstrous size of the codebase.

http://docs.safenetwork.io/

More specifically for double spending. long thread...

https://www.maidsafe.org/t/how-does-maidsafe-solve-double-spending/257
413  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] IPO of MaidSafe:  Entering the Future of the Decentralized Internet on: January 15, 2015, 08:33:03 AM
Can anyone confirm MAID blockchain is moving? The bex is stuck on block 00000000000000001779b320a7cece695022edb4b42282f722e55c0106a9bf79 since several hours ago https://masterchest.info/transactions.aspx

Is there another block explorer so I can compare data? I have transactions not reaching the destination Sad

Any bitcoin block explorer should work but to check MaidSafeCoin balances go to https://www.omniwallet.org/


It works, but it is really not the same, I need a block explorer to be able to check transactions made to an address, the BTC chain is not helpful either because the data is display in a way that it is not possible to pin point exactly how much was send to where. This is very strange that the block explorer is offline in a moment where the coin price is rising.

Without a working bex there is no way to proof a transaction with X MAID happened and is at Y address or not, this is very unsettling, I hope the developer is aware and working on the bex.


http://omnichest.info/

here you go! Smiley
414  Economy / Currency exchange / Re: [WTS] BTC stash selling thread. on: January 12, 2015, 06:32:43 AM
+5-7% flat rate fee for trades depending on the payment methods used and market volatility.
Are you flexible on your rates?

I am open to negotiations. As long as its reasonable.

Culex
I sent you a PM

Replied.

Thanks

Culex
I think the OP is still selling :/

Yes, coins are still available, and will be replenished when its sold out, as I do not want to liquidate in large quantities.
415  Economy / Currency exchange / Re: [WTS] BTC stash selling thread. on: January 12, 2015, 06:26:56 AM
+5-7% flat rate fee for trades depending on the payment methods used and market volatility.
Are you flexible on your rates?

I am open to negotiations. As long as its reasonable.

Culex
I sent you a PM

Replied.

Thanks

Culex
416  Economy / Currency exchange / Re: [WTS] BTC stash selling thread. on: January 12, 2015, 06:03:27 AM
+5-7% flat rate fee for trades depending on the payment methods used and market volatility.
Are you flexible on your rates?

I am open to negotiations. As long as its reasonable.

Culex
417  Economy / Currency exchange / Re: [WTS] BTC stash selling thread. on: January 12, 2015, 05:46:17 AM
I have a thread here https://bitcointalk.org/index.php?topic=921482.0 if you ever want to unload coins. My conditions apply. Smiley

Thanks for the offer, but unfortunately I can't entertain that offer.

Culex

Understood. Best of luck to you.

Same to you as well. Wink
418  Economy / Currency exchange / Re: [WTS] BTC stash selling thread. on: January 12, 2015, 05:36:28 AM
I have a thread here https://bitcointalk.org/index.php?topic=921482.0 if you ever want to unload coins. My conditions apply. Smiley

Thanks for the offer, but unfortunately I can't entertain that offer.

Culex
419  Economy / Currency exchange / [WTS] BTC stash selling thread. on: January 12, 2015, 05:09:30 AM
Hello bitcointalk, ran into a few scams on localbitcoin.com lately and decided to try selling BTC here instead.

[CURRENT STASH] BTC18


+5% flat rate fee @ Bitfinex

I am selling BTC. I live in the United States (SF) but most payment methods are available for other countries. If you have any questions feel free to PM me. Thanks!
 

Instantly Exchange Bitcoins

Cash in Mail
Western Union/MoneyGram
Cash Deposit to Wells Fargo

(Minimum purchase/sale depends on payment method)

All Bitcoin exchanges are based off of Bitfinex's current rate (www.bitfinex.com)

+5% flat rate fee for trades depending on the payment methods used and market volatility.

Forum status considered when initialing trades but not absolute. Escrow is accepted through a trusted source. I retain the right to refuse service to anyone considered suspicious based on past or present activities, information etc.

Thank you for your interest.
420  Alternate cryptocurrencies / Announcements (Altcoins) / Re: MaidSafeCoin deserves better, however we cordially invite you to checkout... on: December 27, 2014, 04:37:59 AM
I recommend anyone who wish to understand more about this phenomenal technology to read this guide, it is a 15-20 minute read, however after reading this you will get the essence of MaidSafe.

Introduction to MaidSafe: what it is, how it works, and how it compares to Bitcoin

Content:


Preface

Bitcoin

What is MaidSafe?

MaidSafe Advantages

How does MaidSafe work?

Conclusion



Preface

Like many others, the discovery of Bitcoin in early 2013 led me down the rabbit hole of decentralized applications, and got me thinking of a world that enables true freedom of speech, personal privacy, sound money, and much more, all powered by trustless apps, free from human manipulation and corruption. The only problem is that current decentralized applications, including Bitcoin, are built upon an insecure, centralized system: the internet as we know it, and thus they are putting band-aids on a much bigger problem. MaidSafe3 is a project I came across recently whose lofty goal is to reverse this approach: build a decentralized, secure internet infrastructure upon which all apps will automatically be secure and decentralized.

I couldn't find any good easy-to-understand resource that explains the ins-and-outs of MaidSafe, and the information that does exist is dispersed on various websites, forums, and videos. I've seen a lot of misinformation about it floating around, so I hope to not only clarify how it works to others, but to also solidify my own understanding while writing this. Since many researching MaidSafe come from a Bitcoin background, I will bring it up throughout the post and will explain the major differences. Let's get started.

Bitcoin

Let's have a quick primer for how bitcoin works (skip this section if you're already well-versed). Bitcoin is a currency that solves difficult problems inherent to all digital currencies: how could it be that a digital currency is not controlled by any person or organization? If it's just software, what's to stop someone from hacking it to make it seem like they have more than they have, or making infinite copies of coins? The genius technology behind it is a public ledger (the blockchain) that everyone has a copy of. In other words, every node in the network is aware of every wallet balance and transaction. So if you attempt to send more money than your wallet (or address) has, not a single node in the Bitcoin network will approve the transaction or include it in the blockchain.

But what if your bitcoin address has 1 bitcoin in it, and you simultaneously send it to two addresses at once? Which one will be approved by the network? It is the Bitcoin miners' job to approve the transactions and add them to the ledger. Each miner will take a list of recent transactions (and only one of yours) and continuously add random characters to it (a nonce) to compute a unique hash (digital fingerprint) that meets a certain criteria. On average it takes miners 10 minutes of generating literally quadrillions of hashes per second around the world to find one that meets the minimum criteria (difficulty). The consequence is that the transactions that were used to calculate the correct hash are now approved by all the nodes of the network and added to the ledger, and the reward to the miner that discovered the hash is all the transaction fees, as well as freshly minted bitcoins. Because it takes time and hard work for computers to do this, there is enough time for all nodes to reach a consensus on the current state of the ledger, and it's practically impossible to maliciously reverse transactions that are in it.

What is MaidSafe?

While Bitcoin's purpose is a currency, MaidSafe, according to its homepage, is "a fully decentralized platform on which application developers can build decentralized applications. The network is made up by individual users who contribute storage, computing power and bandwidth to form a world-wide autonomous system." Users will be able to store any kind of information in a decentralized manner on the network, whether files, text, websites, or applications. An example application is a basic file-storage service like Dropbox. When you upload a file using an app powered by MaidSafe, behind the scenes it will break up your file into small chunks, encrypt2 each chunk such that no one knows what they are, and send them to the network. At least 4 copies of each chunk will be stored on nodes on the network around the globe. If a node or chunk becomes unavailable, the nodes connected to it immediately detect this and make another copy from one of the others. This same process is used for all data stored on the network. This also means that there are not any centralized hosting providers, such as AWS, where your data will be stored. MaidSafe is your cloud provider.

MaidSafe will have a single app already built-in: a currency named Safecoin. Like Bitcoin, it can be used to make any kinds of purchases, but more importantly, to facilitate payments for storage and services on the MaidSafe network. Unlike Bitcoin, however, there is no blockchain. It takes an entirely new approach that will be discussed in detail in the next section. There are absolutely no transaction fees, and transactions are confirmed and irreversible at network speed, usually less than a second. Any users can become farmers that will offer a portion of their hard drives as storage for the network, and will get paid in Safecoin when files are added and retrieved from their computers. The rank of a farmer's node(s) increases over time using the factors of availability, disk space, cpu, and speed (bandwidth). In this network, the farmer also acts as the miner of safecoins: the higher the rank of a farmer, the more he will earn freshly minted safecoins. Thus, similarly to Bitcoin, the network is bootstrapped by monetary incentives to provide value to the network. The total number of safecoins that will be created is capped at 4.3 billion.

Although mining plays an important role in Bitcoin, a major downside is that a) it requires expensive, specialized hardware, b) it continuously expends a lot of energy to compute hashes, and c) most importantly, it serves no other function than to validate Bitcoin transactions. On MaidSafe, anyone can join the network with existing computers and earn money for providing real value to the network by sharing their hard drives and bandwidth.

File storage is but a single use for the network. Most of what can be done with the current internet can be done with MaidSafe. Facebook, Twitter, and LinkedIn-type social websites can be built upon MaidSafe, as can real-time communication (chat/email), e-commerce stores (eBay/Amazon), media/streaming (YouTube/Twitch), news (CNN), mobile/desktop apps, and anything else you can think of. The MaidSafe network inherently provides the decentralized database, authentication system (logging in/out of apps), and security system (automatically encrypting data at rest and in transit).

Another major innovation is the incentive to create useful applications on the network. In addition to earning safecoins for proving storage and bandwidth, application developers will earn safecoin simply for creating applications used by others. In other words, it will now be possible to earn money for creating useful open-source applications. The more an application is utilized on the network, the more the developer is rewarded safecoin. Additionally, there are no ongoing hosting costs that the developer needs to worry about. All of that is already taken care of by the network, making it much more compelling to innovate on MaidSafe than the conventional internet. This opens the gates to an entirely new business model that rewards creators who love what they do.

MaidSafe Advantages

How do we benefit from all of this?

Privacy. Everything is automatically encrypted end-to-end. Developers are not burdened with encryption overhead inside their applications. It is already taken care of for them. The network is resistant to IP address identification.
Reliability. Due to the redundancy built into the network, the chances of your data being erased is near zero. This is currently not the case where your data is stored on centralized computers that are prone to malfunction or become corrupt/erased due to human intervention and error.
Easy authentication to services. It will no longer be necessary to sign up separately for every website you use; your authentication on the MaidSafe network itself will work for most services.
New business model that rewards application developers.
Sony-type hacks2 are not possible.
Your data is yours. The Facebook-like website you use on MaidSafe cannot use your private information to track you or sell your information to others.
You will not experience any down-time for popular websites and files, such as the famous "reddit hug of death" (no possibility of overloading centralized servers).
Due to the decentralized nature of the network, all apps are inherently censorship-free. Because there are no centralized servers and all information is encrypted before it even touches the network, it is impossible for an oppressive government to shut it down, let alone pinpoint the location of any data on the network. A major step-up for freedom of information and speech in the 21st century.
How does MaidSafe work?

Who owns what data? How it is possible to have instant-confirmation, zero-fee safecoin transactions? How is double-spending prevented without a blockchain? What if a file undergoes a DDoS attack? Let's dive in and look into how the network works in order to answer these questions.

When you join the MaidSafe network, a public key-pair2 is created for you. Each node you create will have its own public key-pair based off this one (so that they all belong to "you"), and your master key-pair can invalidate any of them at any time. For the average user, your personal computers and devices will be your only nodes. As soon as one of your node comes online, it will automatically be assigned a completely random ID in addition to the key-pair. The pool of available IDs is astronomically large: (2512 - 1) to choose from! That's more than all the atoms in the universe combined! Your personal identity is not tied to this ID in any way, thus you remain anonymous.

When you log into the network, a virtual hard drive will be mounted on your computer. All the files that you add to the network will display here. Although it will look like all your data is there, in reality it is all broken up, encrypted, and dispersed throughout the network, ready for you to call it up when you need it. All data will be shared at the file system level, which means there will be no need for HTTP, FTP, SMTP, etc.

You will have the option to specify how much of the network's data you're willing to store on your hard drive, thus becoming a farmer and turning your node into a vault. You will earn safecoin in two ways: 1) by responding to PUT (store) and GET (retrieve) requests on your hard drive, and 2) by creating mining requests to the network. Farmers will generate safecoins according to a set algorithm, whose speed will fluctuate according to the demands of the network. This algorithm is set to decrease the rate of mining as time goes by, eventually stopping at the 4.3 billion safecoins mark. As time goes by, your vault will be ranked higher by the network according to your uptime, cpu, diskspace, and bandwidth (speed). The higher your rank, the more safecoins you will be paid. If you provide less resources to the network than you consume for your own data, you will need to pay for the excess using purchased safecoins. There are discussions under way deciding whether or not to give away some free space for new accounts.

When your node is ranked highly enough, it is considered to be validated as a trustworthy node. At this time, your vault can take on one or more other personas: a client manager, data manager, vault manager, or transaction manager. All personas manage each other in the network. Let's go over exactly what happens when you upload a file to the network:

The MaidSafe software on your computer will split up your file into chunks no larger than 1MB in size. Each one is hashed and encrypted. To further obfuscate each chunk, every chunk is passed through an xor function1 using the hashes of other chunks. Each chunk is then broken into 32 pieces in a smart way that requires any 28 pieces to recompile the chunk. Key -> value pairs are added to a table on your computer that serves as a data map, i.e. that described the locations of each chunk on the network. The key is the original hash of a chunk, and the value is the xor'ed value, which I'll refer to as the chunk's ID (which also acts as its location, as you'll see). At this point, the files cannot be accessed by anyone except the holder of the private key (you). All of this happened before it even left your computer.
All of your pieces are then passed to your 32 client manager nodes. These are 32 machines that are the closest to your node ID in xor distance. In layman's terms, if your node has an ID of, say, 100, the existing nodes closest to you may be nodes with IDs of 96, 98, 99, 101, 103, etc. (Note that when we talk about distance here, we mean it in the mathematical, not geographical, sense. Nodes 100 and 101 may actually be on opposite sides of the globe.) Their job is to take your chunks and send them out to the network.
A minimum of 28 out of 32 of these client manager nodes will then pass their chunk pieces to groups of 32 data managers whose IDs most closely match the chunk IDs (which is why the chunk ID also acts as its location, as mentioned above), using xor networking2 (described later). In this way the transfer of info can withstand small loss (up to 4 pieces) without retransmitting the whole data again (this is used in many places). This process is called the scatter <-> gather approach and uses Rabin's Information Dispersal Algorithm5. The data managers' job is to distribute the chunk they received to nodes on the network (with vault ranks always being under consideration), and to continuously make sure there are always at least 4 copies available. At this point, each broken up chunk is now in its own data manager group. The data managers recompile the pieces into whole chunks at this point.
The data managers will choose four vaults to send their chunk to, but not before getting a 28-of-32 consensus from group. Instead of communicating directly with the vaults, however, the data managers will communicate and send the chunk to each vaults' group of 32 vault managers that are responsible for the chosen vault (again, they are the nodes closest to the vault in xor distance). All 32 data managers store the IDs of the four vaults holding their chunks. Only they know the locations of the chunks; not even you!
The 32 vault managers' jobs are to send the chunk to the vault for storage and continuously communicate with it to make sure it's online, and that the file has not become corrupt. They do this by asking for the hashes of random chunks, which are created using the chunk's hash + random string. The correct value can only be returned if the correct version of the file exists. As soon as the vault managers detect that the node or a chunk has gone offline, they immediately inform the chunk's data managers, who will proceed to duplicate one of the other copies to another vault.
The vault receives the chunk and gets paid in safecoin for every GET request on the chunk. There are now 4 copies of each chunk distributed throughout the network.
All of the above happens seamlessly in the background. Retrieving the uploaded file will follow the same kind of route. To the average user, it'll look like a file is uploaded or retrieved in a matter of seconds, or less.

Quick summary: 1. Your machine (client) breaks a file into chunks (let's say 3 chunks) which are encrypted and broken up. 2. All pieces are passed to client managers (nodes closest to you). 3. They send the appropriate chunk pieces to their respective data managers (each chunks will each be sent to its own group of data managers.) 4. Each data manager group compiles pieces and chooses four vaults to store their chunk on. 5. They send the chunk to the chosen vault's vault managers, who then forward the chunks for storage on the vaults. 6. From now on, the vault managers will be keeping an eye on the vault and the chunk. If it disappears, they tell the data managers to make another copy.

As you've probably noticed, there is a pattern here: all communications are done through groups of 32 nodes. This prevents a rogue node from creating problems on its own. This is the foundation of security on the MaidSafe network. It is impossible to choose the ID of your own nodes, or to decide which data you store on them, as that is all decided with the help of the network. Every time a node disconnects from the network and reconnects, it is assigned a totally new, random ID. Again, a) it takes a 28-of-32 node consensus to do anything with data, and b) it's impossible to decide which roles and IDs your nodes take on. It is for this reason that you'd need to control 88% of the network in order to reliably attack it (compared with Bitcoin's 51% attack). The larger the network, the stronger it becomes.

By now, you may already have an understanding of how safecoin works without a blockchain. Instead of everyone having a copy of every transaction like in Bitcoin, every address will be handled by a group of 32 transaction managers. The only difference with transaction managers is that there is an additional layer of security: there is a 7-group chain; the first group of transaction managers must get permission from another group of 32 nodes, and so on. This means that, to get a balance of an address or send money, a limited amount of nodes needs to be involved for each step of the process. This methodology is extremely scalable, as scalable as the network itself. While bitcoin is currently limited to 7 transactions per second, safecoin is only limited by the number of nodes in the network, and can easily scale to the thousands, and eventually, hundreds of thousands per second.

Further enhancements are implemented in MaidSafe which make the network faster and increase overall security. Some include:

Network caching. Intermediate nodes continuously retrieving the same chunk (due to popularity) will cache the chunk themselves, bringing it closer to requesting nodes.
Flood prevention. A node that sends too much information to overwhelm other nodes gets disconnected by the nodes closest to them. This helps prevent DDoS attacks.
Churn is an advantage. Nodes throughout the network are constantly going offline and coming online. This increases security as the IDs of nodes throughout the network are constantly changing.
Protocol rule enforcement. If any node, no matter the persona, breaks the rules by trying to do something that's not allowed, it is immediately de-ranked or disconnected.
Holes fill quickly. When any node becomes overwhelmed and unreachable, it is immediately replaced with another one. This also mitigates DDoS attacks. As you can see, the network is very capable of self-healing!
It may seem that sending and receiving files over the network would be a time consuming process with so much going on, but routing over the network is quite efficient using a Kademlia3-like distributed hash table (see below). With millions of nodes, it seems impossible to find a node closest to a certain ID. However, the amount of hops required to find a node closest to a particular address is O(log n), where n is the total number of nodes in the network. Put simply, in the absolute worst case scenario it will take 23 hops to locate a node with a particular ID in a network of 10 million nodes! Once located, they can communicate directly with each other.

A brief explanation on how a node can find any other node in the network quickly, using Kademlia: every node has its own list of nodes at varying, increasing degrees of distance from it. For example, node #1 will have the information for nodes #2, #4, #8, #16, and #32. If he's looking for node #19, he'll contact the closest node in his list, #16, and ask him if he knows about #19. Node #16 may have #17 and #20 in his list (since he's closer to them), so although he doesn't have information on #19, he'll ask #20 for the info. #20 will have #19's information (due to being as close as possible to the node). Thus, in only a few hops #19's information is returned to #1.

More Resources

MaidSafe.orghttp://maidSafe.org - Official MaidSafe discussion forums. Feel free to join in and ask questions!
MaidSafe.net http://maidSafe.net - Official MaidSafe website.
SystemDocs http://maidsafe.net/SystemDocs/ - A book that explains the details and benefits of using the SAFE Network.

Conclusion

I hope this article gave you a good understanding of what MaidSafe is and how it functions, and at least one precious "aha" moment. Although we covered a lot, there is still a lot to learn before the network goes live in early 2015. Just for fun, here are a couple bullet points to think about for the (distant?) future:

When the network becomes large, it can be made to function similarly to AWS: you'll be able to buy a virtually unlimited supply of on-demand servers.
Connections currently rely on IPv4/6, but eventually, as mesh networks1 become larger and more usable, nodes will be able to communicate solely using MaidSafe IDs.
A big thank you to Nick Lambert and David Irvine from MaidSafe for proofreading this post and explaining many of the details, and a big thanks to the community for the ongoing support!

This post was taken from my blog at http://blanshey.com12. I will try to keep both the blog and this post updated as time goes on.

Credits: eblanshey from Maidsafe.org
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!