2/ The fact that Ethereum has an account-based transaction system (vs. UTXO) means that all Ethereum wallets must have an incrementally increasing 'nonce' value; the downside here is that this requires one to 'sync' with a node / API running *somewhere* on planet earth
3/ More so to that API point that I made above, the disadvantage here for Ethereum users (in comparison to Bitcoin; don't worry I'll bring up an advanage).
Metamask users, for instance, have their wallets pointed at Infura(.)io's API endpoint.
4/ Afri (in tweets that are now deleted for some reason), stated that he took issue with the use of such services like Infura(.)io ; unfortunately, he was punished by the heads of Ethereum via community manufactured anti-sentiment against what he was saying.
5/ In fact, when you think about it - most of the services on Ethereum that are so-called 'decentralized' (which is an interesting word to use for reasons I'll discuss later), are later re-centralized via the general lack of available tools / guides for one to bootstrap the same.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1/ Once upon a time, CZ promised us that he would never list 'shitcoins'.
Not even if they "pay 400 or 4,000 BTC".
He forgot to mention (about the coins that he did list on his exchange "without fee", that he has extensive ties with each project's community)
2/ $NEO was probably listed because of @cz_binance's relationship with Da Hongfei (head of NGC Capital whom is also a seed investor in Binance); these guys go way back - maybe that's why @binance tends to list *almost all* of Da Hongfei's projects.
2a/ Attached, we can see Da Hongfei listed as one of the seed investors in Binance (source: Binance exchange whitepaper ; not the exchange token, but the actual exchange itself)
1/ This article enumerates the inefficacy of modern wallet solutions (and why I recently wrote a three-part series titled, 'Why You Don't Need a Hardware Wallet' <-- being released today in an hour or so).
2/ If you read the quoted tweet above and thought to yourself, 'Wait a minute, I thought that Bitcoin & blockchain were supposed to be unhackable!', then you're on the right track.
Its more so that the *cryptography* used for Bitcoin cannot be reasonably cracked.
3/ However, these cryptographic primitives (i.e., ecdsa) are only as strong as their implementation and only as secure as their execution environment.
The idea of encrypting 'wallet.dat' files (a default standard for $BTC by Core), is unnecessarily dumb & unnecessary.
1/ Since nobody has mentioned this, figured it should be said here : "JPCoin" / J.P. Morgan's digitized bank note (which is essentially what it is), completely fried Ripple's supposed value offering as a blockchain.
2/ For years, @Ripple has fed us all the narrative that their token $XRP will one day become the *dominant* solution for cross-border payments by financial institutions.
3/ They espoused the same logic in one of their recent blog posts (published September 2020), titled, 'Why Real-Time Cross-Border Payments Are Poised To Breakthrough'
1/ Recently we decided to look at $USDT / #Tether - an entity that consistently outdoes itself with the level of rampant fraud that perpetrated by them in the blockchain space.
2/ Specifically, we want to look at the troubling number of Tether tokens that have been 'minted' over the past two months.
Specifically, from mid-April to mid-May (just one month) - over *3 billion tokens were minted*.
2a/ Perhaps even more troubling is the fact that over one 24-48 hours span, we saw the supply for USDT increase by 2.5 billion.
1/ After looking deeper into this issue, there is *enormous cause for concern* as the entity in question on the Bitcoin Cash blockchain essentially has full control over the chain at this point in time. (thread)
1/ We decided to waste no time in heading directly to the documentation of Hedera Hashgraph - found here: docs.hedera.com/docs/
Specifically, we're going to look at 'key generation'
Ed25519 > secp256k1 (ECDSA) [what Bitcoin uses]
2/ Providing an eclectic range of signatures is somewhat worrisome because the biggest source of compromise among users as it pertains to key generation using these signatures is user error / incorrect implementation.