submitted by tkeycoin to Tkeycoin_Official [link] [comments]
Version 1.3.0 is a powerful update to TkeySpace that our team has been carefully preparing. since version 1.2.0, we have been laying the foundation for implementing new features that are already available in the current version.
Who cares about the security and privacy of their assets is an update for you.
TkeySpace — was designed to give You full control over your digital assets while maintaining an exceptional level of security, which is why there is no personal data in the wallet: phone number, the email address that could be compromised by hackers — no identity checks and other hassles, just securely save the backup phrase consisting of 12 words.
Briefly about the TkeySpace 1.3.0 update :
Code optimization and switching to AndroidXA lot of work has been done on optimizing the code to speed up the application, improving the logic, synchronization speed, calculating the hash of cryptocurrencies, and successfully switching to AndroidX.
New section: Privacy
TORStarting with the current update, the TkeySpace wallet can communicate via the TOR network, includes new privacy algorithms, and supports 59 different currencies.
Tor is a powerful privacy feature for those who own large assets or live in places where the Internet is heavily censored.
Tor technology provides protection against traffic analysis mechanisms that compromise not only Internet privacy, but also the confidentiality of trade secrets, business contacts, and communications in General.When you enable TOR settings, all outgoing traffic from the wallet will be encrypted and routed through an anonymous network of servers, periodically forming a chain through the Tor network, which uses multi-level encryption, effectively hiding any information about the sender: location, IP address, and other data.
This means that if your provider blocks the connection, you can rest easy — after all, by running this function, you will get an encrypted connection to the network without restrictions.
In TOR mode, the wallet may work noticeably slower and in some cases, there may be problems with the network, due to encryption, some blockchain browsers may temporarily not work. However, TOR encryption is very important when Internet providers completely block traffic and switching to this mode, you get complete freedom and no blocks for transactions.
Confidentiality of transactions (the Blockchain transaction)The wallet can change the model of a standard transaction, mixing inputs and outputs, making it difficult to identify certain cryptocurrencies. In the current update, you can select one of several modes for the transaction privacy level: deterministic lexicographic sorting or shuffle mode.
Mode: Lexicographic indexingImplemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data;
We understand that information must remain confidential not only in the interests of consumers but also in higher orders, financial systems must be kept secret to prevent fraud. One way to address these privacy shortcomings is to randomize the order of inputs and outputs.
Lexicographic ordering is a comparison algorithm used to sort two sets based on their Cartesian order within their common superset. Lexicographic order is also often referred to as alphabetical order or dictionary order. The hashes of previous transactions (in reverse byte order) are sorted in ascending order, lexicographically.In the case of two matching transaction hashes, the corresponding previous output indexes will be compared by their integer value in ascending order. If the previous output indexes match, the input data is considered equal.
Shuffle Mode: mixing (random indexing)To learn more about how “shuffle mode” works, we will first analyze the mechanisms using the example of a classic transaction. Current balance Of your wallet: 100 TKEY, coins are stored at different addresses:
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
Addresses in the blockchain are identifiers that you use to send cryptocurrency to another person or to receive digital currency.In a classic transaction, if you need to send, for example, 19 TKEY — 100 TKEY will be sent to the network for “melting” coins, 19 TKEY will be sent to the Recipient, and ~80.9 TKEY will return to the newly generated address for “change” in your wallet.
In the blockchain explorer, you will see the transaction amount in the amount of 100 TKEY, where 80.99999679 TKEY is your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee. Thus, in the blockchain search engine, most of your balance is shown in the transaction.
How does the shuffle mode work?Let’s look at a similar example: you have 100 TKEY on your balance, and you need to send 19 TKEY.
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
You send 19 TKEY, the system analyzes all your addresses and balances on them and selects the most suitable ones for the transaction. To send 19 TKEY, the miners will be given coins with x2. Addresses, for a total of 20 TKEY. Of these, 19 TKEY will be sent to the recipient, and 0.99999679 TKEY will be returned to Your new address as change minus the transaction fee.
In the blockchain explorer, you will see the transaction amount in the amount of 20 TKEY, where 0.99999679 TKEY is Your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee.
The shuffle mode has a cumulative effect. with each new transaction, delivery Addresses will be created and the selection of debit addresses/s that are most suitable for the transaction will change. Thus, if you store 1,000,000 TKEY in your wallet and want to send 1 TKEY to the recipient, the transaction amount will not display most of your balance but will select 1 or more addresses for the transaction.
Selecting the recovery method for each digital currency (Blockchain restore)Now you can choose the recovery method for each currency: API + Blockchain or blockchain.
Note: This is not a syncing process, but rather the choice of a recovery method for your wallet. Syncing takes place with the blockchain — regardless of the method you choose.https://preview.redd.it/gxsssuxrttx41.png?width=1080&format=png&auto=webp&s=cd9fe383618dda0e990e86485652ff95652a8481
What are the differences between recovery methods?
API + BlockchainIn order not to load the entire history of the blockchain, i.e. block and transaction headers, the API helps you quickly get point information about previous transactions. For example, If your transactions are located in block 67325 and block 71775, the API will indicate to the node the necessary points for restoring Your balance, which will speed up the “recovery” process.
As soon as the information is received, communication with the peers takes place and synchronization begins from the control point, then from this moment, all subsequent block loading is carried out through the blockchain. This method allows you to quickly restore Your existing wallet.
‘’-’’ The API server may fail.
BlockchainThis method loads all block headers (block headers + Merkle) starting from the BIP44 checkpoint and manually validates transactions.
‘’+’’ It always works and is decentralized. ‘’-’’ Loading the entire blockchain may take a long time.
Why do I need to switch the recovery method?If when creating a wallet or restoring it, a notification (!) lights up in red near the selected cryptocurrency, then most likely the API has failed, so go to Settings — Security Center — Privacy — Blockchain Restore — switch to Blockchain. Syncing will be successful.
Selecting the address formatYou can choose the address format not only for Bitcoin but also for Litecoin. Legacy, SegWit, Native SegWit. Go to Settings — Manage Wallets — Address Format.
Working at the code level
Enhanced validation of transactions and blocks in the networkDue to the increased complexity in the Tkeycoin network, we have implemented enhanced validation of the tkeycoin consensus algorithm, and this algorithm is also available for other cryptocurrencies.
What is the advantage of the enhanced validation algorithm for the userFirst, the name itself speaks for itself — it increases the security of the network, and second, by implementing the function — we have accelerated the work of the TkeySpace blockchain node, the application consumes even fewer resources than before.
High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.
SynchronizationThe synchronization process has been upgraded. Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.
Checking for double-spendingTkeySpace eliminates “double-spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks.
For example, using another application, you may be sent a fake transaction, and the funds will eventually disappear from the network and your wallet because this feature is almost absent in most applications.Using TkeySpace — you are 100% sure that your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.
The bloom filter to check for nodesAll nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain.
In practice, this verification is not available in applications, Tkeycoin — decided to follow a new trend and change the stereotypes, so new features such as node verification using the bloom filter and double-spending verification are a kind of innovation in applications that work with cryptocurrencies.
Updating the Binance and Ethereum librariesUpdated Binance and Ethereum libraries for interaction with the TOR network.
Function — to hide the balanceThis function allows you to hide the entire balance from the main screen.
Advanced currency charts and charts without authenticationDetailed market statistics are available, including volumes, both for 1 day and several years. Select the period of interest: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years.
In version 1.3.0, you can access charts without authentication. You can monitor the cryptocurrency exchange rate without even logging in to the app. If you have a pin code for logging in, when you open the app, swipe to the left and you will see a list of currencies.
NewsIn the market data section — in the tkeyspace added a section with current news of the cryptocurrency market.
Blockchain Explorer for TkeycoinTransaction verification for Tkeycoin is now available directly in the app.
Independent Commission entry for BitcoinTaking into account the large volume of the Bitcoin network, we have implemented independent Commission entry — you can specify any Commission amount.
For other currencies, smart Commission calculation is enabled based on data from the network. The network independently regulates the most profitable Commission for the sender.
New digital currenciesThe TkeySpace wallet supports +59 cryptocurrencies and tokens.
CryptocurrenciesTkeycoin (TKEY), Bitcoin (BTC), Litecoin (LTC), Ethereum (ETH), Bitcoin Cash (BCH), DASH, Binance (BNB), EOS.
StablecoinsTrueUSD (TUSD), Tether USD (USDT), USD Coin (USDC), Gemini Dollar (GUSD), STASIS EURO (EURS), Digix Gold Token (DGX), Paxos Standard (PAX), PAX Gold (PAXG), Binance USD (BUSD), EOSDT, Prospectors Gold (PGL).
ERC-20, BEP2, and EOS tokensNewdex (NDX), DigixDAO ERC-20 (DGD), Chainlink ERC-20 (LINK), Decentraland ERC-20 (MANA), EnjinCoin ERC-20 (ENJ), the Native Utility (NUT), 0x Protocol ERC-20 (ZRX), Aelf ERC-20 (ELF), Dawn DAO ERC-20 (AURA), Cashaaa BEP2 (CAS), Bancor ERC-20 (BNT), the Basic Attention Token ERC-20 (BAT), Golem ERC-20 (GNT), Mithril ERC-20 (MITH), MEETONE, NEXO ERC-20, Holo ERC-20 (HOT), Huobi Token ERC-20 (HT), IDEX ERC-20, IDEX Membership ERC-20 (IDXM), Bitcoin BEP2 (BTCB), Waltonchain ERC-20 (WTC), KuCoin Shares ERC-20 (KCS), Kyber Network Crystal ERC-20 (KNC), Loom Network ERC-20 (LOOM), Ripple (XRP), Everipedia (IQ), Loopring ERC-20 (LRC), Maker ERC-20 (MKR), the Status of the ERC-20 (SNT), Ankr Network BEP2 (ANKR), OmiseGO ERC-20 (OMG), ^ american English ERC-20 (^american English), Polymath ERC-20 (POLY), Populous ERC-20 (PPT), Pundi X ERC-20 (NPXS), Parser ERC-20 (REP), Revain ERC-20 (R), Binance ERC20 (BNB-ERC20), Gifto BEP2 (GTO).
Exchange of cryptocurrencyThe “Limitless Crypto Exchange” tab is available for a quick transition to an unlimited exchange in 200 digital currencies — 10,000 currency pairs.
How do I update TkeySpace to version 1.3.0?
Binance: Binex News Bip-91(segwit) Bip91 Bison Bit Vids BitBay BitBoy BitCoinBling.com BitCoiny BitConnect BitGo BitLicense BitMex BitNews BitSler BitThumb BitTipz Bitcion Bitclub Bitclub Brisbane Bitclub Network Bitcoin and Cryptocurrency Bitcoin 1337 Bitcoin Altcoin Trades Bitcoin And Crypto Store Bitcoin Australia Bitcoin Bites Bitcoin Caffè Bitcoin Cracker Bitcoin CryptoWorldMania Bitcoin ... This entry was posted in Binance, bitcoin, Bitcoin News, Bitmain, Bittrex, Crime, Cryptocurrency, exchange, hack, hacker, John Doe, MANA, Markets, News on November 10, 2018 by adminbtc. Sim Swapping Victims Sue T-Mobile and AT&T. Leave a reply. The Silver Miller law firm, which has been on the forefront of cryptocurrency lawsuits including the class action lawsuit against YouTube regarding ... Bitcoin is not anonymous. As we explain below, it is pseudonymous — an important distinction. It is also a decentralized, peer-to-peer digital currency, having no third-party intermediary (for instance, a credit card issuer, merchant processor or bank) that is involved to verify a transaction between a buyer and seller. Since there is no third party, there must be another way to verify a ... This can be used to perform a double spend attack, where a hacker sends a transaction to someone on the original chain, and then creates a longer chain where the transaction doesn’t exist, making the transaction disappear. Bitcoin and Ethereum have far too much hashing power for any real possibility of a 51% attack, however, many smaller cryptos have small enough hash rates where 51% attacks ... Binance Confirms Hacker Obtained Its Users' KYC Data from 3rd-Party Vendor ... Launched in October 2016, Zcash is a privacy-oriented cryptocurrency that claims to be more anonymous than Bitcoin, as the sender, recipient, and value of transactions remain hidden. In a blog post published today, the Zerocoin Electric Coin Company—the startup behind Zcash—revealed that one of its employees ... Bitcoin was developed by programmers under anonymous Satoshi Nakamoto. Nakamoto himself once claimed to be a 37-year-old male living in Japan. However, because of his perfect English and his software not being labeled in Japanese, there are reasonable doubts about this. Around mid-2010, Nakamoto moved on to other things, leaving Bitcoin in the ... Bitcoin is an “electric peer-to-peer cash system” according to its anonymous creator, Satoshi Nakamoto. The goal behind Bitcoin’s creation was to create “a system for electronic transactions without relying on trust“. Bitcoin succeeded in this task through a combination of ingenuity, determination, and technological prowess. It’s hard to imagine a world without Bitcoin. It would be impossible to discuss trading cryptocurrencies without taking a moment to look at the popular exchange Binance. Binance has been the largest cryptocurrency exchange in terms of market capitalization since 2018. According to the company’s CEO, Changpeng Zhao, a combination of factors including experience, skill, and “luck” helped the platform achieve its legendary […] There was a quote by Andreas Antonopoulos (Mastering Bitcoin) saying something about the cost vs. risk and how you can afford to sell a cup of coffee instantly without fearing a double-spend attack. You might wait for one or two blocks to be confirmed before you sell a laptop. That scales exponentially for six blocks being so expensive to double-spend past that it'd cost you a hangar ship.
[index]          
Bitcoin Hack - Alles weg !!! Was ist passiert ? Leider muss ich euch mitteilen das ich gehackt worden bin. Ich selber habe nicht gut genug aufgepasst und auch gibt es bei Blockchain im Moment noch ... The Bitcoin Gold (BTG) blockchain has suffered a 51% attack resulting in over $70,000 worth of BTG being double spent. According to a GitHub post by James Lovejoy, a researcher at MIT’s Digital ... You can use any bitcoin wallet to deposit and withdraw. You can double or triple one time per day. Min deposit is 0.01 BTC to double and 0.50 BTC to triple. Max deposit to triple is 0.80 BTC. You ... In this video we talk about the channel's current profit that we got from using basic beginner technical analysis, saving money, budgeting, and investing in Bitcoin and Cryptocurrency, Bitcoin ... There are many misconceptions regarding 51% attack or majority hash power attack in bitcoin ( or other similar cryptocurrencies ) Also what is double spend a... #bitcoin #blockchain #bitcoinearning #2020 #hacked #hack #blockchain #wallet #btc #how #to #free #crypto #generator #coinbase #script #bitsler #new #coin #binance #eth #hacking #withdraw #proof # ... Explained W/ Bitcoin & ZenCash Double Spend Hack by VoskCoin. 7:12. Ethereum Upgrade, New IOTA Partner, KIN Tips And Bitcoin SV Double Spend by The Modern Investor. 25:47. What is the double ... Bitcoin ATM’s have recently been targeted in Canada, and thieves made away with $200,000 in cash because of a double spend exploit. The Bitcoin core code has a replace by fee tool which allows a ... #2020 #bitcoin #hacked #hack #blockchain #wallet #btc #how #to #free #crypto #generator #coinbase #script #bitsler #new #coin #binance #eth #hacking #withdraw #proof #giveaway #official #litecoin ...