28.3.18

CRYPTO CURRENCY BANNED BY MAJOR SOCIAL MEDIA

Google twitter and Facebook are looking foward toward  close up cryptocurrency Advisements on their platforms with different reasons on which  It may be thinked  of being their biggest issued is that being part of as supporter service recognition, this  from analaysis of cryptocurrycy and  bitcoin News,other supportive reason for their innitiative is reliability of the firm concerns with cryptobusiness as market continue to be strong and increased number of participants many firms arises and it had being very hard to recognise real ones and scammer as part of protect their reputations and services, they think action shuold be taken although losing of money  from their action  can not be avoided by lose those adverstisements.
What could be the business warning among these social network is other social media may entervine to accumulate users by allowing the cryptobusiness on their platforms as they being payed earned may increase their popularity to the social media community based on Blog analysis.

27.3.18

South Korean exchanges

This article does not contain investment advice or recommendations. Every investment and trading move involves risk, you should conduct your own research when making a decision
Korea’s largest multi-billion dollar conglomerates in various sectors including insurance, telecommunications, gaming, and Internet are entering the cryptocurrency market by funding up-and-coming exchanges.
The country’s leading corporations have funded such exchanges as Korbit, Bithumb, and Upbit to be involved in the South Korean cryptocurrency exchange market, and be at the forefront of Blockchain development.

NHN and OKCoin

NHN Entertainment Corporation, better known as NHN, is a $1.2 bln company founded in 2013 which operated under the name Hangame Communications from 1999 to 2013. Alongside Nexon, NHN remains the largest gaming conglomerate in South Korea, with a market valuation of 1.29 trln Korean won.
On March 21, local cryptocurrency-focused media outlets reported that the NHN funded OKCoin  - formerly the biggest cryptocurrency exchange in China prior to the country’s cryptocurrency trading ban in 2017 - was to launch OKCoin Korea.
In an interview with Blockchain Media Korea, OKCoin Korea president Cho Jeong-hwan stated that the company is finalizing plans and infrastructures to expand its cryptocurrency exchange to South Korea. Cho noted that OKCoin Korea would likely open within March and that the exchange would enable 60 cryptocurrency-to-Korean won pairings, which is far more than on Bithumb, which currently has the most cryptocurrency listings at 12.
Cho emphasized that all of the sophisticated technologies utilized to run OKEx, the third largest cryptocurrency exchange in the global market behind Binance and Huobi, would be integrated into the underlying system of OKCoin Korea.
The OKCoin Korea team is said to start with full-time employees and developers, and the company plans to expand its team aggressively as it grows rapidly within the South Korean market. NHN Investment Partners, a subsidiary firm of NHN Entertainment, has invested an undisclosed amount in the project, to ensure that OKCoin Korea can focus on its launch and sustaining its platform without financial struggles.
Initially, the original OKCoin trading platform, which operated in China before moving to Hong Kong was advanced by 100 developers. Because of this, President Cho and the multi-billion company in NHN acknowledge that the current team of 20 developers is not sufficient to run a major cryptocurrency exchange, and the team’s capacity would increase exponentially in the future.

Kakao and Upbit

Essentially, the ambitious plan of OKEx to expand its services into South Korea is the company’s only path to directly compete with Upbit, the forth largest cryptocurrency exchange in the world, and the biggest exchange in South Korea.
Upbit is operated by Dunamoo, a subsidiary company of Kakao that runs KakaoStock, the most popular stock brokerage application and index in South Korea. In the beginning, Kakao, being the largest Internet company in South Korea, refrained from directly entering the cryptocurrency market, possibly due to regulatory uncertainty.
As such, Kakao dove into the cryptocurrency market through Dunamoo by launching Upbit in October 2017. Upbit is a cryptocurrency-only exchange which adopts cryptocurrency trade pairings from US-based exchange Bittrex. Within months after its launch, Upbit started dominating the local market as the first cryptocurrency-only trading platform in South Korea.
As Upbit grew exponentially, Kakao executives joined the Upbit team in order to lead the company into the global cryptocurrency market. In February 2018, South Korean newspaper Chosun reported that Kakao communications director moved to Upbit to facilitate the company’s growth.
The unforeseen success of Upbit led Kakao to aggressively target the local cryptocurrency market. As Cointelegraph previously reported, Kakao has already talked to regulators about its plans to integrate cryptocurrencies to serve more than 12,000 merchants and over 100 mln users, and to launch its own initial coin offering (ICO).
However due to the current ban on domestic ICOs, Kakao may conduct its token sale outside of South Korea -  a plan which local financial authorities including the Financial Services Commission (FSC) Chairman Choi Jong-ku have criticized.
FSC Chairman Choi said:
“Even if there is no prohibition on cryptocurrency or digital asset trading, there is a possibility that it [Kakao ICO] may be regarded as fraud or multi-level sales according to the issuance method. Since the risk is very high in terms of investor protection, the government has a negative stance on the ICO.”
Consequently, the South Korean government could legalize ICOs in the future as hinted by several authorities, to ensure that its Blockchain sector demonstrates a growth rate that is on par with other regions like Japan and the US.

SK Telecom, Nexon, and Korbit

Nexon, the largest gaming company in South Korea with a $11.5 bln valuation, acquired Korbit, the third largest cryptocurrency exchange in the local market, for $120 mln. NXC, the parent company of Nexon, purchased 65.19 percent of Korbit, becoming the majority owner of the company.
“NXC has been reviewing and investing in startups with digital idea and technology and this investment was made with our positive view on the growth cryptocurrency industry.”
SK Telecom, South Korea’s biggest telecommunications company with a valuation of $17 bln, was the first major investor in Korbit alongside billionaire investor Tim Draper. NXC likely purchased just over 65 percent of the company because SK Telecom and other angel investors like Draper were not willing to sell their shares of the company.
BREAKDOWN OF OWNERSHIP IN SOUTH KOREAN CRYPTO EXCHANGES

Korean exchanges and conglomerates

Currently, South Korea’s largest cryptocurrency exchanges Korbit, Bithumb, Upbit, and up-and-coming exchange OKCoin are all invested or owned by the conglomerates who have close ties with regulators and the South Korean government. The backing of multi-billion dollar companies decrease the possibility of cryptocurrency exchanges South Korea of becoming insolvent and being non-compliant with local regulations.
Conclusively, the stability of leading cryptocurrency exchanges could allow the South Korean market to continue growing at an exponential rate with sufficient capital and resources to compete against the global cryptocurrency market.

17.3.18

HOW TO CREATE MYETHERWALLET

HOW TO CREATE  MYETHERWALLET
Note: This is a step by step guide on how to create a Ethereum wallet so you can send / receive tokens. This wallet can also be used after to store all your cryptocurrency tokens / coins.

In this step by step guide, we will show you how to create a new Ethereum wallet. You will need a wallet to participate in the Pre ICO/ICO and if you want to know more about what a wallet is (In regards to cryptocurrency) or how they works.Also it is not essential that you make a wallet created through MyEtherWallet, as long as it is ERC20 compatible. 
The reason decided to use myetherwallet in this guide is because it’s very quick, easy, free and the most common wallet.So let’s get started!
Step 1
To start the process of creating a wallet, go to the website http://www.myetherwallet.com, where you will be greeted with the landing page. Please make sure you are on the correct website, and we advise you check the URL. Once you are on this page, it is time to create a password.We suggest you pick a long password ( 20  characters). Note this password down somewhere.
Once you have done this click on “Create New Wallet”.

Step 2
Once you have created your password, you will be asked to download your KeyStore file. This is a very important file, so make sure to the save the file somewhere safe and also to back it up in another location (we suggest not on the same computer, or writing it down and storing it somewhere in your household). The file will start with a UTC — 2018 (the year it was created) and will contain a long string of numbers and letters in both lowercase and uppercase.
Step 3
After saving the keystore file, click on “I understand continue” located underneath where you can download your keystore file.
The following page will show your private key information. The private key can unlock your wallet if you forget your password. It is vital that you store this information, if you lose access to your private key you will not be able to access your tokens.
For this reason, we suggest printing out the key so you have it in paper form which you can easily do by clicking the print button. Also do not share this information with anyone. Whoever has your private key will be able to access your wallet even without your password. You will never be asked for this information in a transaction either, the private key is only for you. Once you have printed your private key, click on “save your address”.
Congrations, you have created your wallet. You have just completed your first steps into the cryptocurrency ecosystem!
Accessing your wallet
Wherever you want to access your wallet, simply come back to this page and you will be greeted with the options to unlock your wallet. If you ever want to access your wallet, you will need to unlock it first. Quick reminder please make sure that you are on the correct site.
To unlock your wallet, you will need the keystore file you previously downloaded earlier in the tutorial. Simply choose “Keystone File (UTC / JSON)” from the list of options. In the middle column, you will see “SELECT WALLET FILE”. Click on that button and upload the keystone file you downloaded. Once this has been selected, you have to enter your password (The one you created at the very start) If the data matches, the unlock button will appear.
To check your balance, you will have to select “View Wallet Info” on the top of the page next to “check tx status”, you will have to re-enter your information, after that process you can see your wallet information.
We hope this guide has helped you, in the next part we will show you how to purchase Ethereum (The cryptocurrency you will need to participate in ICOs) Especially in token Erc 20. 

12.3.18

MINING AND EARN BITCOIN BY CHROME EXTENSION

CRYPTO TAP EARNING BITCOIN FOR YOUR CROME/FIRE FOX BROWSER
Since the invented new  method of payment discovered Crypto-currencies people happen to finds new ways on how to obtain those crypto-currencies due to it capability of some of these mining pool which give out crypto-currency when you intergret your resource in fastering  the block-chain transaction or blocks 
yah happen to work sometimes regard too many associate people involve in mining process normally require high technological equipment for best result but other simplify the technology by allowing other simple devices such as phones and laptop in  process  HERE COMING  CRYPTO TAP EXTENSION ALLOWING  MINING BITCOIN USING YOUR LAPTOP WHENEVER THE GOoGLE CROME IS AT WORKING JOIN LINK  https://getcryptotab.com/295003

7.3.18

BITCOIN ARTICLE


Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.orgBitcoin:A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org 
Abstract. 
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone. 
1. Introduction Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model. Completely non-reversible transactions are not really possible, since financial institutions cannot avoid mediating disputes. The cost of mediation increases transaction costs, limiting the minimum practical transaction size and cutting off the possibility for small casual transactions, and there is a broader cost in the loss of ability to make non-reversible payments for nonreversible services. With the possibility of reversal, the need for trust spreads. Merchants must be wary of their customers, hassling them for more information than they would otherwise need. A certain percentage of fraud is accepted as unavoidable. These costs and payment uncertainties can be avoided in person by using physical currency, but no mechanism exists to make payments over a communications channel without a trusted party. What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud, and routine escrow mechanisms could easily be implemented to protect buyers. In this paper, we propose a solution to the double-spending problem using a peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions. The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes. 
1 2. Transactions We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. A payee can verify the signatures to verify the chain of ownership. The problem of course is the payee can't verify that one of the owners did not double-spend the coin. A common solution is to introduce a trusted central authority, or mint, that checks every transaction for double spending. After each transaction, the coin must be returned to the mint to issue a new coin, and only coins issued directly from the mint are trusted not to be double-spent. The problem with this solution is that the fate of the entire money system depends on the company running the mint, with every transaction having to go through them, just like a bank. We need a way for the payee to know that the previous owners did not sign any earlier transactions. For our purposes, the earliest transaction is the one that counts, so we don't care about later attempts to double-spend. The only way to confirm the absence of a transaction is to be aware of all transactions. In the mint based model, the mint was aware of all transactions and decided which arrived first. To accomplish this without a trusted party, transactions must be publicly announced [1], and we need a system for participants to agree on a single history of the order in which they were received. The payee needs proof that at the time of each transaction, the majority of nodes agreed it was the first received. 
3. Timestamp Server The solution we propose begins with a timestamp server. A timestamp server works by taking a hash of a block of items to be timestamped and widely publishing the hash, such as in a newspaper or Usenet post [2-5]. The timestamp proves that the data must have existed at the time, obviously, in order to get into the hash. Each timestamp includes the previous timestamp in its hash, forming a chain, with each additional timestamp reinforcing the ones before it. 2 Block Item Item ... Hash Block Item Item ... Hash Transaction Owner 1's Public Key Owner 0's Signature Hash Transaction Owner 2's Public Key Owner 1's Signature Hash Verify Transaction Owner 3's Public Key Owner 2's Signature Hash Verify Owner 2's Private Key Owner 1's Private Key Sign Sign Owner 3's Private Key 
4. Proof-of-Work To implement a distributed timestamp server on a peer-to-peer basis, we will need to use a proofof-work system similar to Adam Back's Hashcash [6], rather than newspaper or Usenet posts. The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits. The average work required is exponential in the number of zero bits required and can be verified by executing a single hash. For our timestamp network, we implement the proof-of-work by incrementing a nonce in the block until a value is found that gives the block's hash the required zero bits. Once the CPU effort has been expended to make it satisfy the proof-of-work, the block cannot be changed without redoing the work. As later blocks are chained after it, the work to change the block would include redoing all the blocks after it. The proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-IP-address-one-vote, it could be subverted by anyone able to allocate many IPs. Proof-of-work is essentially one-CPU-one-vote. The majority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. If a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains. To modify a past block, an attacker would have to redo the proof-of-work of the block and all blocks after it and then catch up with and surpass the work of the honest nodes. We will show later that the probability of a slower attacker catching up diminishes exponentially as subsequent blocks are added. To compensate for increasing hardware speed and varying interest in running nodes over time, the proof-of-work difficulty is determined by a moving average targeting an average number of blocks per hour. If they're generated too fast, the difficulty increases. 
5. Network The steps to run the network are as follows: 
1) New transactions are broadcast to all nodes. 
2) Each node collects new transactions into a block. 
3) Each node works on finding a difficult proof-of-work for its block. 
4) When a node finds a proof-of-work, it broadcasts the block to all nodes. 
5) Nodes accept the block only if all transactions in it are valid and not already spent. 
6) Nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash. Nodes always consider the longest chain to be the correct one and will keep working on extending it. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they received, but save the other branch in case it becomes longer. The tie will be broken when the next proofof-work is found and one branch becomes longer; the nodes that were working on the other branch will then switch to the longer one. 3 Block Prev Hash Nonce Tx Tx ... Block Prev Hash Nonce Tx Tx ... New transaction broadcasts do not necessarily need to reach all nodes. As long as they reach many nodes, they will get into a block before long. Block broadcasts are also tolerant of dropped messages. If a node does not receive a block, it will request it when it receives the next block and realizes it missed one. 
6. Incentive By convention, the first transaction in a block is a special transaction that starts a new coin owned by the creator of the block. This adds an incentive for nodes to support the network, and provides a way to initially distribute coins into circulation, since there is no central authority to issue them. The steady addition of a constant of amount of new coins is analogous to gold miners expending resources to add gold to circulation. In our case, it is CPU time and electricity that is expended. The incentive can also be funded with transaction fees. If the output value of a transaction is less than its input value, the difference is a transaction fee that is added to the incentive value of the block containing the transaction. Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation free. The incentive may help encourage nodes to stay honest. If a greedy attacker is able to assemble more CPU power than all the honest nodes, he would have to choose between using it to defraud people by stealing back his payments, or using it to generate new coins. He ought to find it more profitable to play by the rules, such rules that favour him with more new coins than everyone else combined, than to undermine the system and the validity of his own wealth. 
7. Reclaiming Disk Space Once the latest transaction in a coin is buried under enough blocks, the spent transactions before it can be discarded to save disk space. To facilitate this without breaking the block's hash, transactions are hashed in a Merkle Tree [7][2][5], with only the root included in the block's hash. Old blocks can then be compacted by stubbing off branches of the tree. The interior hashes do not need to be stored. A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore's Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. 4 Block Block Block Header (Block Hash) Prev Hash Nonce Hash01 Hash0 Hash1 Hash2 Hash3 Hash23 Root Hash Hash01 Hash2 Tx3 Hash23 Block Header (Block Hash) Root Hash Transactions Hashed in a Merkle Tree After Pruning Tx0-2 from the Block Prev Hash Nonce Hash3 Tx0 Tx1 Tx2 Tx3 
8. Simplified Payment Verification It is possible to verify payments without running a full network node. A user only needs to keep a copy of the block headers of the longest proof-of-work chain, which he can get by querying network nodes until he's convinced he has the longest chain, and obtain the Merkle branch linking the transaction to the block it's timestamped in. He can't check the transaction for himself, but by linking it to a place in the chain, he can see that a network node has accepted it, and blocks added after it further confirm the network has accepted it. As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nodes when they detect an invalid block, prompting the user's software to download the full block and alerted transactions to confirm the inconsistency. Businesses that receive frequent payments will probably still want to run their own nodes for more independent security and quicker verification. 
9. Combining and Splitting Value Although it would be possible to handle coins individually, it would be unwieldy to make a separate transaction for every cent in a transfer. To allow value to be split and combined, transactions contain multiple inputs and outputs. Normally there will be either a single input from a larger previous transaction or multiple inputs combining smaller amounts, and at most two outputs: one for the payment, and one returning the change, if any, back to the sender. It should be noted that fan-out, where a transaction depends on several transactions, and those transactions depend on many more, is not a problem here. There is never the need to extract a complete standalone copy of a transaction's history.  Full article see link source  https://bitcoin.org/bitcoin.pdf

BOT (BANK OF TANZANIA) STILL ARGUE ON CRYPTO-CURRENCY

BOT (THE BANK OF TANZANIA),STILL ARGUE ON THE CRPTO-CURRENCY CRAZE AS IT ASSUME DUE IT BEHAVIOR OF FAST CHANGING IN ITS VALUE AND CAUTION TANZANIAN INVOLVED WITH IT DOES ALL TANZANIAN SEE CRYPTO-CURRENCY MUCH CONCERN IS ABOUT BITCOIN THE BIGGEST CRYPTO AND FIRST. .Bitcoin is A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.https://bitcoin.org/bitcoin.pdf

6.3.18

KRIPTON THE BITCOIN OF AFRICA



KRIPTON THE BITCOIN OF AFRICA
It's true African  missed the Fruitiness of BITCOIN When was just 5$ Now its ranges in  10,000$ Do u regret it Answer it's normally *YES*
Here Coming the *KRIPTON THE BITCOIN OF AFRICA* and Your Not  late to grow with it Take The Opportunity
L-PESA THE MICRO FINANCE PLATFORM FOR DEVELOPING COUNTRIES AND UNBANKED PEOPLE
* Give  u a  Chance to participate in The Crypto-Currency Revolution in Africa when the price is still low
*KRIPTON TOKEN DEVELOPMENT*
journey started in November when   price   was 0.01$ per token  then 0.015$ to 0.017$  Now it's About 0.02$ it grow faster  💥💥
join Here
https://l-pesa.com/landing_page/landing_5?referral=b0NlSkZKaWJQNldDN2RQ

After join visit The kripton  Telegram Group Meet fellow investors
https://t.me/LpesaKriptonICO

Kripton Trading exchange
https://t.me/kriptonsocialexchange
KRIPTON THE BITCOIN OF AFRICA

CT + LOTIONS

CT + is a  CLEAR THERAPY True clarifying therapy, CT + reveals a luminous complexion and flawless in daily use. CT + combines the action of ...

HOT POSTS