Bitcoin Forum
May 09, 2024, 05:19:25 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [ANN] Tarush (TAS) Tron (TRC20)  (Read 339 times)
katak (OP)
Member
**
Offline Offline

Activity: 100
Merit: 10


View Profile
June 18, 2019, 02:43:24 PM
Last edit: June 27, 2019, 04:49:04 PM by katak
 #1

1715275165
Hero Member
*
Offline Offline

Posts: 1715275165

View Profile Personal Message (Offline)

Ignore
1715275165
Reply with quote  #2

1715275165
Report to moderator
1715275165
Hero Member
*
Offline Offline

Posts: 1715275165

View Profile Personal Message (Offline)

Ignore
1715275165
Reply with quote  #2

1715275165
Report to moderator
The Bitcoin software, network, and concept is called "Bitcoin" with a capitalized "B". Bitcoin currency units are called "bitcoins" with a lowercase "b" -- this is often abbreviated BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715275165
Hero Member
*
Offline Offline

Posts: 1715275165

View Profile Personal Message (Offline)

Ignore
1715275165
Reply with quote  #2

1715275165
Report to moderator
1715275165
Hero Member
*
Offline Offline

Posts: 1715275165

View Profile Personal Message (Offline)

Ignore
1715275165
Reply with quote  #2

1715275165
Report to moderator
1715275165
Hero Member
*
Offline Offline

Posts: 1715275165

View Profile Personal Message (Offline)

Ignore
1715275165
Reply with quote  #2

1715275165
Report to moderator
krinjah
Sr. Member
****
Offline Offline

Activity: 784
Merit: 256


View Profile
June 18, 2019, 02:49:57 PM
 #2

Any wallet to store the coins?
katak (OP)
Member
**
Offline Offline

Activity: 100
Merit: 10


View Profile
June 19, 2019, 09:49:59 PM
 #3

The Triad Of Security And TARUSH
If you are somehow related to the cybersecurity space, you must already know about the triad of security. Since it has a vital influence in the crypto sphere as well, it’s important to explore it in detail.

What is the CIA triad of security?
No, wait — I know where your mind is rushing. It has nothing to do with the Central Intelligence Agency. In fact, it is rather a framework for deriving policies in an organization or a network on the basis of these principles:

Confidentiality
Integrity
Availability
In order to avoid any confusion due to a mainstream concept about the CIA, it is also sometimes referred to as the AIC triad of security.

Basically, every crypto venture (willingly or unwillingly) runs on this triad due to the nature of the blockchain technology and the promises it offers to the customers. However, since TARUSH has made use of the MimbleWimble protocol, it implements the triad in quite a robust manner.

Confidentiality
It basically means that any classified or sensitive information is only available to the people who have a right to access it and at the same time, any unauthorized access is barred at any cost. If you look at it, confidentiality is basically the second name for privacy. Let’s see how well TARUSH has made use of it…

In order to guard user privacy, MimbleWimble gets rid of the following details before recording a transaction publicly:

Wallet addresses of both the parties (i.e. sender and receiver)
Value of the transaction
Intermediaries
There is a lot more to it. For instance, Bitcoin and most of the mainstream crypto tokens run on ‘gossip networks’. It implies that before recording any transaction on the ledger, it is broadcasted across the network. In some cases, this procedure may be exploited and the broadcast receivers might start recording transactions originating from a particular IP address. This could result in a major privacy issue!

In order to address the concern, particularly in the BTC network, a procedure called MimbleWimble was introduced. TARUSH also implements it and the aim is to hide or rather blur the IP address of the senders from broadcast recipients. MimbleWimble breaks down the process into two major steps:

Transaction details are sent (broadcasted) to just one node on the network, which then sends to another peer. This ‘hopping’ continues for a while until there are several individual peers in the chain. This is to ensure that the distance between last broadcast receiver and transaction originator is “significant”
The transaction is broadcasted to the entire network and a consensus is reached
Integrity
As the name suggests, it refers to maintaining the accuracy and consistency of data. In other words, users must be able to trust that the accessible data happens to be in its original and untampered form, whatsoever. Oftentimes, in traditional storage schemes, the data gets altered at the time of being stored, transferred or while receiving. However, the element of integrity in the CIA triad negates any such concept and demands that reasonable security measures must be implemented to prevent this from happening. Moreover, it also requires that the network or organization complying to the security protocols must implement the means to detect any data breach or tampering at its earliest.

This is yet another area where crypto beats its rivals by all means. Basically, MimbleWimble, like any other blockchain, makes use of a cryptographic hash to ensure that the data present on the network happens to be in its most authentic or rather ‘pure’ form. While most of the data structures run on encryption, TARUSH utilizes hashing and the primary difference between these two is that the later mentioned cannot be reversed to determine the relationship between different entities involved.

Let’s talk about hashing for a while to understand it in a better way.

Basically, it is a one-way cryptographic function that takes all of the data present on the blockchain and generates a unique string of text against it. Please note that whatever be the length of the data, the string length never changes, but it’s always unique.

For instance, the hash string for the data “Transaction amount: $2.0” will be totally different from the data “Transaction amount: $2.1”. In plain English, both of them are quite easy to identify. However, since the hash function produces a completely unique string, it is really difficult to identify the pattern for tracing back any data.

Just a while ago, I mentioned that this hash function works in a single direction and you must have understood it by now. It implies that a string can be generated for any amount of information, but you cannot take a hash string and decode the data for which it was generated and nor can anyone tamper with it. This is how TARUSH and all other blockchain-based ventures guarantee an unparalleled extent of data integrity.

Availability
Its importance is often overlooked in traditional data structures, but blockchain, particularly MimbleWimble, takes this aspect very critically. As the name suggests, it means that whenever an authorized person tries to access the data or query the ledger (in blockchain World), the request should be answered immediately and the information must be made available.

Currently, the mainstream crypto networks are experiencing severe congestion and as a result, they have slowed down in the majority of the aspects. However, the MW optimizes the length of the chain and keeps the block size incredibly smaller. As a result, the network is highly efficient and whenever a user tries to submit a transaction or query the ledger, the request is responded without any delay.

Moreover, in order to make the data available even in the case of a cybersecurity event (e.g. breach), blockchain stores copies in a diversified manner, across the network. Therefore, even if someone takes down 99 nodes in a network of 100 users, the one remaining node can still function at its best.
katak (OP)
Member
**
Offline Offline

Activity: 100
Merit: 10


View Profile
June 19, 2019, 09:50:55 PM
 #4

The importance of cross-compatibility in the digital World and how Tarush caters to this demand
In a quarter of a century, more than 53% of the World’s population has started using the internet and the rate is increasing exponentially. Since the total number of users is about 4 billion, it is pretty rational to assume that collectively, they all use a different OS, apps and technologies for performing a variety of activities on the internet. With so much diversification, the latest systems and apps being rolled out in the market must be cross-compatible for connecting everyone across the Globe.

Talking about the new wave in technology (i.e. blockchain), most of the networks have their independent use cases, tokens, apps, and users. They operate in quite an isolated environment, which halts their exponential progress since users and apps from a variety of networks cannot interact.
Why is cross-compatibility important in blockchain?
See, blockchain is meant to offer scalability. But when a network grows without having any compatibility with its significant others, users are unable to transfer their assets from one chain to another and as you must have understood, smart contracts running on network A cannot execute a contract on network B.

There are a couple of solutions in the market allowing cross-compatibility, like Crowd Machine. Basically, they offer dApps which are interoperable with any blockchain. Despite being a wonderful initiative, the solution is rather centralized and robs the technology of its true spirit (i.e. decentralization).

Even though Bitcoin still enjoys a decent role in the market, it does not have a monopoly anymore. There are several coins and millions of users belonging to different networks. Therefore, the community needs a robust solution like Taursh, which allows efficient transactions between a variety of blockchains, without depending on a 3rd party.

Pros of cross-platform compatibility
Let’s talk about it from the perspective of a business. Your company does not have to create a wallet account on every network to accept more customers. With cross-platform compatibility, only one wallet account will allow you to receive payments from all the chains. As a result of this, you do not have to depend on the uptime of any 3rd party or pay any intermediary chain for receiving or sending the money.

Moreover, it would also allow a slow performing network to shift its intensive computation to another network, get it done, and then retrieve the result — at no cost!

Let’s explore the pros categorically now.

Multi-token transaction
Multi-token wallet system is vital for cryptocurrencies and with its help, investors, HODLers and daily users won’t have to trust a 3rd party (usually an exchange) for possessing their tokens. As a result, the transactions and conversions will be performed much more efficiently without risking your assets.

Interoperability
We have already discussed it above. Just like any other cross-platform technology, blockchains will also be able to interact with each other and exchange their assets without being reliant on any intermediary, thus cutting off the delays and excessive transaction costs.

Value transfer
If you look at it, all digital systems, particularly the ones dealing with financial activities, merely transfer the numeric ‘value’ from one place to another. For instance, if you transfer 1BTC to your friend’s wallet, does a real coin move across the chain? No, just a number is deducted from your wallet and added to your friend’s wallet.

With cross-platform blockchain, this value transmission can get a whole new meaning.

Factors to consider
Cross chain compatibility is a very fascinating term and sounds like a great thing. However, there are a couple of factors that must be scrutinized before making your solution go live.

First of all, since we are talking about moving funds or other digital assets from one chain to another, there must be enough security for establishing a channel between the chains. Plus, it should also be guaranteed that if funds are being transferred from network A to network B, then the later mentioned does not get hold of the private keys of the other. This issue is quite decently addressed in FUSION (a cross chain platform) which implements DCRM to share the private keys of the network and it guarantees that none of the nodes possesses an entire key. As a result of this implementation, FUSION ensures that a single node is not authorized to take control of all the digital assets.

Conclusion
In any blockchain network, either data or value gets exchanged. There are some solutions in the market that allow interoperability based on token compatibility and a very few 3rd party blockchains offer cross-compatibility for either value or data based chains. However, considering the exponential growth of the industry, it is crucial that we create more solutions like Tarush that offer comprehensive feasibility and cover a wide range of networks.

Moreover, it is also crucial that we encourage different organizations and people to implement their ideas on a wide variety of blockchains, instead of funneling down on Ethereum, Hyperledger Fabric, Waves, etc.


A decentralized technology is difficult to implement than a centralized one and there are a variety of challenges that must be catered in order to make a network successful. In recent years, we have seen a sheer focus on privacy and scalability, but cross-compatibility is somewhat… lost! If this issue is not addressed heads on, like Tarush has taken an initiative by implementing MimbleWimble, the industry might end up in a pit of fragmentation and inefficiency in the next 5–7 years.

So it is very important to persuade developers, investors and innovators to focus on a variety of chains while developing interoperable systems.
mmmmyah
Full Member
***
Offline Offline

Activity: 157
Merit: 100


View Profile
June 19, 2019, 10:30:32 PM
 #5

Any wallet to store the coins?

It seems to be a download link ....
Rafiq786
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
June 20, 2019, 01:13:26 AM
 #6

rev
Exadro
Jr. Member
*
Offline Offline

Activity: 194
Merit: 1


View Profile
June 20, 2019, 01:27:17 AM
 #7

after installing the wallet I could not see it, and also I saw it in my cpu task manager he said it was running. this might be malware Shocked
katak (OP)
Member
**
Offline Offline

Activity: 100
Merit: 10


View Profile
June 22, 2019, 04:31:17 PM
 #8

Join Up
https://medium.com/tarushtech
https://t.me/TarushChannel
katak (OP)
Member
**
Offline Offline

Activity: 100
Merit: 10


View Profile
June 27, 2019, 04:50:00 PM
 #9

The role of CoinJoin in making TARUSH more efficient
Well, the name says everything — it has something to do with ‘joining’ or rather merging cryptocurrency transactions. Please note that TARUSH makes use of MimbleWimble blockchain in order to offer enhanced privacy, scalability, and efficiency to its customers. Promising such big things in an industry that is already being considered ‘brittle’ takes a lot of effort and MW makes use of several algorithms and protocols offer these 3 things. Moreover, in various instances, it just picks up a basic blockchain and crypto concept and makes it even more robust by tweaking as per the current requirements of the industry.

Let’s get back to CoinJoin now, but before digging into the specifics, it is important to understand the problem for which it was introduced.
The Problem
Privacy is very important in today’s technological landscape and that is exactly what cryptocurrencies, like Bitcoin, offered in the first place. However, with the passage of time, the level of anonymity and confidentiality has become shady and the reasons are quite understandable — crypto is a tech and people want to get as deep in it as possible. If certain limitations and procedural checks are not implemented, user privacy may be compromised.
You may not like it, but let’s just accept the truth — Bitcoin is not anonymous, period. I know it is hard to believe and a lot of people also debate that since BTC wallet holders have encrypted addresses, their ID is secure. Well, that just hides your real World identity, but still, you can be monitored pretty easily on the network.
From the perspective of security agencies and KYC policies, revealing identities is a norm. However, users often feel betrayed as due to a lack of privacy. Not many of us want the public to know about spending habits and where our money goes or comes from. A solution to address this major concern is known as CoinJoin and is quite decently implemented in MimbleWimble as well.
The core BTC network is the same (w.r.t technology) as it was a decade ago. However, we can implement or rather integrate other protocols with the main chain in order to facilitate the customers.
How Does MimbleWimble Fit into the Scenario?
As you might have guessed, MW makes use of CoinJoin in order to merge multiple transactions into a single block, cryptographically. The underlying idea is very simple. Suppose a thousand users send payments to 500 users. Now typically, a ledger would record all the transaction details together with the information related to senders, receivers and even all the intermediaries! This is not only a risk to user anonymity but makes the process far less efficient than it should be. However, with the help of CoinJoin, MW allows its users to enjoy an escalated level of privacy by ensuring that “sensitive” details are never put on the ledger. So several payments from a variety of senders are literally “squeezed” into one major transaction and are then sent to respective receivers.
Since minimum user details are required and every transaction gets merged, it is quite difficult for anyone to guess the sender, recipient or the amount being transferred. Not only that, but MimbleWimble also saves an immense amount of block space since it only takes the “most important” data from the users. If you are curious about double spending, please note that MW has a pretty robust way in which it subtracts the sum of total outputs from total inputs. If the answer is zero, it means that there is no double spending and the financial activity is happening perfectly within the network. Contrary to this, Bitcoin takes a long way to verify a transaction by engaging the entire chain for validation. This is not feasible and is a serious blow to scalability as well.
So it is pretty evident that with the help of CoinJoin and a variety of other procedures, MimbleWimble does not only guarantee scalability by diminishing the amount of data carried in transactions (hence entertaining a greater volume in a given time), but it also boosts user privacy by getting rid of the wallet and IP addresses before broadcasting a transaction. Furthermore, it also “jumbles up” the inputs and outputs, hence thwarting the probability of constructing a transaction graph and tracing the users.
The situation begs a question — is MimbleWimble greater than all other blockchains in the market? Well, I won’t boast about it but yes, as of yet, MW happens to be the best protocol when we talk about privacy, scalability, fungibility, and efficiency. One of the most noticeable factors is that it gets rid of signatures which are required to authenticate a transaction in traditional blockchain networks. Rather, it uses a couple of blinding factors to ensure that the coin being transferred belongs to the sender. It ensures that even after a transaction is recorded in the ledger, no one can find the parties at either end.

Now if you look at it, the feasibility is huge and it gives TARUSH a major edge when we compare it with other sidechains designed for the BTC network. Currently, there are only a few users involved. But with the passage of time, when the network becomes even dense, it would become significantly difficult to create a transaction graph for a given user. Therefore, no one will be able to derive any relationships.
It should also be noted that while offering such a great solution, TARUSH does not compromise on either privacy or scalability. It offers both an incredible technological advancement. It is also worth mentioning that in the entire process, the MW protocol cancels out the new and old transactions. As a result, when a new node is added on the network, it does not have to sync with the entire transaction history, hence keeping the chain light.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!