Home » Blog

Category: Blog

Initial Coin Offering (ICO) : new crowdfunding model

ICO - Initial Coin Offering
Initial Coin offering (ICO) also called “token crowdsale” is currently a hot topic in the blockchain community.

What is an Initial Coin Offering (ICO) ?

Basically, it’s a new form of « crowdgiving » popular in the blockchain community to finance the development of projects.
Initially ICO appeared before a specific Blockchain network deployment, the step consists for the team in charge of project to pre-mine/pre-create a fixed number of tokens to finance the development of the project.

Today the mechanism for creating tokens is completely different and the process is done on existing Blockchain protocols, the best known for that is Ethereum. Indeed, the team in charge of the project creates an amount of tokens which will then be distributed to earlier investors by a preferential conversion rate. To participate supporters send an amount of participations mainly in Bitcoin and Ethereum.

In contrast to traditional funding methods such as share issuance by acompany which concede a part of its control and dividends, Initial Coin Offering enables the company issues tokens and redistribute them tothe investors in exchange of the invested cryptocurrencies such as Bitcoins or Ethers.

What is the use of tokens?

The ICO tokens may represents various digital assets with attached financial, political or product based rights, that the community has on the project.
In case of the raised amount does not meet the minimum funds required by the company, the fund raised is returned to the investors and the ICO is deemed to be unsuccessful. However, if the funds requirements are met within the predetermined timeframe, the fund raised will be used to build the project as disclosed in the ICO documentation .

Golem Network project was one of the first biggest successes. Build on Ethereum, the project raised $8.6 million in just 29 minutes end of 2016. Golem Network is a peer-to-peer network with no central server that allows both application owners and individual users to rent the resources of other users’ machines and be paid in cryptocurrency (GNT).
More recently Tezos Protocol raised over $230 million within two days.

The main benefit is the fact that the process doesn’t necessary makes the project holders to give up their equity.

In these cases, the platforms achieved mad bet to take up this crowdsale by establishing trust and opening up the roadmap, whitepaper and team information.
This form of P2P funding is possible thanks to the technical driven innovation of the blockchain vehicle.

All in all, it’s a far cry from frauds and scams happened in some projects.
Thereon, the platform smith&crown compiled information relative to ICOs. You can take a look if you wish to go deeper into the matter. However, naturally, keep in mind that the token crowdsale have its various levels of risk and requires technical skills to understand the project.

With token crowdsale, the project holders can directly address the Blockchain supporting community and the community can given them the expected hand up so they could make the project possible.

What are the precautions?

Indeed, it’s first necessary to ascertain that the project suits the ICO process. What blockchain related projects are eligible for an ICO?
How to position your project? What is the adequate ICO for your project, appropriate business and technical architecture? What blockchain to choose, to build one? What is my cap target?
It’s also a number of strategic decisions. What counterparty rights will you offer to the supporting community? Voting rights on the project, venal value, a product, a service, a discount?

The project holders and start-ups are subject to the due diligence procedure and are mentored, guided and supported in realisation of the relevant documentation such as white paper and roadmap because only the illegible projects audited on the objective and vérifiable criteria are supported.

The reason? The blockchain community confidence, it’s build with time and experience and every acquired token represents a capital trust for on-boarded participants.

Is Bitcoin vulnerable after SHA-1 encryption break?

SHA1 BITCOIN VULNERABLE

Security researchers from CWI and Google have achieved the first real-world collision attack against the SHA1 hash function, producing two different PDF files with the same SHA1 signature. It demonstrates this algorithm used for security-sensitive functions is vulnerable and has to be replaced as soon as possible.

According to Google, it was one of the largest computations ever completed:
– Nine quintillion (9,223,372,036,854,775,808) SHA1 computations in total,
– 6,500 years of CPU computation to complete the attack first phase,
– 110 years of GPU computation to complete the second phase.

After the news publication on the Shattered.it website, the 2.49 BTC reward of the collision challenge initiated by Peter Todd a cryptographer and bitcoin core developer has been claimed by a winner. The amount is more symbolic than incentive.
The same challenge exists on bitcointalk forum for SHA256 and perhaps some of you wish participating to increase the current reward by sending some bitcoins to the following bitcoin public key “35Snmmy3uhaer2gTboc81ayCip4m9DT4ko”.

Is Bitcoin SHA256 vulnerable?

Bitcoin protocol uses the SHA256 algorithm, which is stronger than SHA1 by conception. The illustration of the difference in output size between SHA1 vs SHA256 can be seen below:

  • SHA1 – da39a3ee5e6b4b0d3255bfef95601890afd80709
  • SHA256 – e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

According to a post on bitcointalk by Satoshi the creator of Bitcoin “SHA-256 is very strong. It’s not like the incremental step from MD5 to SHA1. It can last several decades unless there’s some massive breakthrough attack.”

Bitcoin would be considered unsecure if the same scenario occurs for SHA256. Indeed, all transactions could be compromised and the entire system would be affected before the execution of a fork to upgrade the protocol algorithm.

Satoshi conclude:
If SHA-256 became completely broken, I think we could come to some agreement about what the honest block chain was before the trouble started, lock that in and continue from there with a new hash function.

If the hash breakdown came gradually, we could transition to a new hash in an orderly way. The software would be programmed to start using a new hash after a certain block number. Everyone would have to upgrade by that time. The software could save the new hash of all the old blocks to make sure a different block with the same old hash can’t be used.

Feel free to share this article if you found it interesting! Follow BlockTech / FinTech news with us on social networks!

How to secure and protect your bitcoins ?

how secure your bitcoins

Secure your bitcoin in 2017

In 2017, the price of the bitcoin unit reached the symbolic bar of 1000 dollars. The bitcoins’ and other cryptocurrencies’ owners should adopt some essential reflexes to ensure the security of their bitcoins.

1- Cold storage in case of an investment

If you store your bitcoins as an investment product and its value is or becomes significant, we strongly recommend you to choose one of the following two protection options:

You can use a USB hardware wallet like “Ledger Wallet” offered by the French start up named Ledger. It’s price largely worth the security of your assets.

Another method is called « bitcoin paper wallet », it’s free and consists in printing the Bitcoin addresses and private keys on a piece of paper. It is preferable to carry out the generation and printing of your paper wallet within a different computer that you used to acquire your bitcoins. While using this method, make sure that the environment of your computer is secured (without viruses, malware, etc…). You can afterwards import this paper wallet into the electronic wallet to realise your transactions at any time.

Finally, be aware that leaving your assets on an exchange platform is not advised due to the risks of bankruptcy and cyber attacks as we previously witnessed with MtGox, Bitfinex and others.

2 – Electronic wallet application for the regular use

For practical reasons, it’s more convenient to use an application that allows transfering or receiving your bitcoins in a few seconds. However, some precautionary steps are necessary to protect your bitcoins.

First, you should write down, preferably on paper, the recovery password of your electronic wallet. In case of loss of your device, this password will be required to recover your bitcoins. In addition, you could save it in the application such as 1Password, LastPass or KeePass (open source) to store and secure your passwords.

Secondly, we advise you to hold an amount of bitcoin that doesn’t exceed few hundreds of dollars if you frequently use your bitcoins to make purchases or short-term trading orders.
Furthermore, a number of applications allow two-factor authentication to reinforce the sign in process. The first factor is your existing password and the second is an algorithm that randomly generates a series of valid numbers during few seconds. These numbers are sent on your device as a text message or can be directly accessible via free application such as Authy or Google Authenticator.

Whatever your option is, do not skimp on protecting your bitcoins! You can check out the benefits of using bitcoins here 😉

Feel free to share this article if you found it interesting! Follow BlockTech / FinTech news with us on social networks!

Bitcoin mainstream adoption in 2017 ?

Bitcoin mainstream adoption in 2017 ?

2016 was a great year for Bitcoin

The public opinion evolved positively in 2016. A better understanding of the technology associated with Bitcoin (Blockchain / Distributed Ledger Technology) has contributed significantly to blurring the image of an anonymous currency of the Darknet.

A multitude of POC (Proof Of Concept) studies have been launched in various industries such as finance, energy and IoT. Moreover, the strong attractiveness of Ethereum perfectly illustrates the awareness of the industrial and institutional stakeholders of the technological potential and the risks. On the other hand, the emergence of cryptocurrenices guaranteeing the total anonymity of exchanges, such as Zcash, have also contributed to improve the understanding of the nature of Bitcoin and by the way changed the negative image often mistakenly relayed by the media.

In any case, the market capitalisation of the bitcoin increased from $ 6 billion to $ 12 billion (USD) this year. On December 19th, 2015, the price of one unit was approximately $ 435, compared to $ 788 today, representing approximately 81 % annual growth.
The growth of the number of the daily transactions also reflects  this enthusiasm. From an average of 200,000 transactions in December 2015 to nearly 280,000 today, which represents an increase of 40%.

Nevertheless, the whole system has almost reached its limits and will have to evolve quickly in order to absorb a higher transactional load. The improvement proposals subject to the approval of the community as the “Segregated Witness” will allow to do it in the coming months.

Bitcoin, 2017 the year of the regulation?

This new year will undoubtedly be marked by the emergence of the regulation at national, European and / or international level. Indeed, the establishment of a legal framework is necessary to promote investment, education and the use of cryptocurrencies as well as the associated technology.

A very large number of countries have become aware of the disruptive potential of this technology, .The majority adopted a position of attentive observers. Indeed, many have chosen to follow up the evolution of the ecosystem in order to promote the innovation while studying the actions taken by their neighbors.

All economic stakeholders will have to overcome together the numerous challenges of this major innovation in order to the enable the massive adoption.

Feel free to share this article if you found it interesting! Follow BlockTech / FinTech news with us on social networks!

Ethereum 4TH Hard Fork within 4 months

ethereum-logo_landscape_black

“Spurious Dragon” the 4TH Ethereum Hard Fork

Ethereum is a public blockchain-based distributed computing platform, featuring smart contract functionality. It provides a decentralized virtual machine (EVM), which executes peer-to-peer contracts using a cryptocurrency called ether.

“Spurious Dragon” is the forth hard fork in the history of Ethereum and the second of the two-round hard fork response to the DoS attacks on the Ethereum network since few months. The previous hard fork “Tangerine Whistle” is meant to address urgent overload for the execution for the execution of the code operations (see “Ethereum Improvement Proposal 150”).

However, the network is still filled with pending transactions which is causing users delays in processing their transactions. The attacker performed a DoS attack by repeatedly calling certain operation codes (opcodes) in their smart contracts that are computationally difficult for clients to process, but very cheap to add to the network.

This hard fork will improve the Ethereum protocol

  • EIP 155: Replay attack protection – prevents transactions from one Ethereum chain from being rebroadcasted on an alternative chain.
  • EIP 160: EXP cost increase – adjusts the price of `EXP` opcode so it balances the price of `EXP` with the computational complexity of the operation, essentially making it more difficult to slow down the network via computationally expensive contract operations.
  • EIP 161: State trie clearing – makes it possible to remove a large number of empty accounts that were put in the state at very low cost as a result of earlier DoS attacks.
  • EIP 170: Contract code size limit – changes the maximum code size that a contract on the blockchain can have.

Our advice

Download the latest version of your Ethereum client
 Latest version of Ethereum Wallet/Mist (v0.8.6)
Latest geth client (v1.4.18)
Latest Parity client (v1.3.8)
Latest ethereumJ client (v1.3.6)

Feel free to share this article if you found it interesting! Follow BlockTech / FinTech news with us on social networks!

Zcash, new cryptocurrency launched the 28th October 2016

zcash

What is Zcash ?

Zcash is a decentralized anonymous network using a public blockchain and ZEC coins its associated cryptocurrency.

What are Zcash characteristics ?

Basically, Zcash borrows partly from the Bitcoin blockchain DNA :
• Proof Of Work algorithm that provides the robustness and the security level required for its evolution,
• Same economic model with a 21 million units an emission of of Zcash (ZEC) in total,
• Multisignature transaction function (multisig) that allows electronic signature of a single transaction by multiple parties,

The main evolution present in Zcash is the complete anonymity of transactions based on the zero knowledge proofs.
Unlike Bitcoin, Zcash transactions can be anonymise the sender, recipient, and value of all transactions (excluding multisig) on the blockchain due to zk-SNARK, recent cryptographic method. Only the private key holder can see the content.

Who is Zcash creators ?

A team of cryptographers, developers, engineers and Bitcoin / Ethereum experienced consultants. The majority of these members are part of the Zcash Fundation, which is a non-profit foundation whose objective is to control the maintenance and upgrades of Zcash protocol with the support of their community.

What future for this cryptocurrency ?

In the world of cryptocurrencies, it might be considered as another anonymous token (ZEC coins). However, zk-SNARK is a major cryptographic innovation imported on Blockchain and open source.
We can imagine making this privacy innovation for smart contract on blockchain Ethereum and allow only the parties involved in the transaction to be aware of the whole contractual information exchanged in the Blockchain.

Feel free to share this article if you found it interesting! Follow BlockTech / FinTech news with us on social networks!