Wallets — Bitcoin

Small reviews of (I think) all incremental games I've ever played on Android

I don't know if this will be useful to anyone. So I write a line or two about every game I play, and decided to find all the incremental in my game journal and post them here. It starts with the latest games I've played and I think goes back to several years back. One thing I've realized is I have such a love-hate-hate relationship with this genre since I think I've hated 90% of the games and 100% of myself after each incremental phase. I usually angrily stop playing them for a while and restart them again, so this is more or less a journal of addiction, I suppose.
THE BEST GAMES I'VE PLAYED ARE THESE (no order):
  1. Kittens Game
  2. Antimatter Dimensions
  3. Oil Tycoon
Honorable Mention: Eggs, Inc
The rest: more or less hated it
Additional comment if you decide to scan through it, I complain a lot, so it is perfectly reasonable and normal to think, "why the fuck are you even playing these games, idiot??".

------
Time Idle RPG
This game was confusing. It tells me the game's resources is time, where you get 1 of it every second, but that's not really something as unique as I assumed. It would have been cool if time as resources meant you used it to deal with something related to time. Maybe time travel? Maybe slowing and speeding time?
Instead time as resource buys you stuff like a library. And then you buy a camp or something. Honestly, I wasn't really feeling it.
2
Path of Idling
The biggest cardinal sin for me when it comes to incremental is when a game has a lot of features and it just completely throws them all at you instantly. The joy of a great incremental is how things slowly open up and each new achievement feels progress.
The game is a RPG game and these are the things that opened up for me in the first few hours.
Combat which includes normal fighting, dungeon, raid, boss, PVP (locked, but it just needs an ascend, which I haven't done)
Skills
Hero upgrades which include Passive (strength, defence, stamina, intelligence), Train, and a huge Tree
Town which you can buy workers who get you various things like gold, orbs, knowledge, etc. You can upgrade stuff here.
Quest that also includes Perks and Skill quests.
Gear which 5 equipment slots, plus craft plus trade plus smelt
Also gear for your Pet, which is also another tab!
Now, here is the thing. Because I have all of this pretty much instantly, I don't really know which ones are helping me go past a well. How is adding 10 points in strength helping me? Should I have added five in strength instead and five in defence? I have already bought 20 or so upgrades in the Tree, but I have no idea if I am made the optimal choice. There is no real excitement with getting new gear. And so on.
The dev has added a lot of features, now it's time to rework the game, and have the features take their time.
2
Idle Slayer
The game is like a super simple platformer. Your character is running and any enemy it hits, it automatically slays it. There is no HP, and all enemies die in one shot. Your only active play is jumping occasionally to grab coins or hit the flying enemies. Also, you have a run skill that has a cool down.
With the coins, we get new weapons that give us more coins. Enemies give us souls which is used for the prestige system that provides us with an interesting skill tree which provides a lot of choices on the path you want to do in terms of upgrades.
So far excellent, however, the game has an extremely serious issue of pacing. The game initially progresses so fast that in the first hour or so, you get almost all the weapons aside from the last two, which then grinds down to a snail pace. You can upgrade your past weapons, but they never really get into play again. Reaching high levels of past weapons sometimes gave me upgrades of that weapon of 10,000% but they still did nothing to my overall coin per second. I think the pacing needs to be fully reworked. It would have been nice to get new weapons after certain prestige cycles, so that every new weapon feels like we have passed a significant wall. The best part of an incremental game for me is to face a wall, and when I finally break it, I feel powerful again for a while. This game feels like this though, powerful powerful powerful powerful WALL........break it....WALL. And so on. I'm still playing it as I want to get some of the skills, but I feel like it could have been so much better.
4
Exponential Idle
A very back to the foundation kind of incremental. The premise is that you are a student and working on a formula. There is a neat story where as you progress in the game, your character progresses through university. Each upgrade gives you more and more automation until I reached a stage where I would check back once every 2 or 3 days, click a 2nd layer prestige reset, and close it. Meaning the game was something like 5 seconds of game player every 2 days. I just opened it for this review and realized I had reached the end game. The story wraps up and it tells me "You can take a rest. Travel a bit. Go outside!" NO, DON'T TELL ME WHAT TO DO GAME.
3
Factoid
Factoid & Spark should have the same review as they are almost the same game with only small differences. The games are the most basic kind of incremental, where you buy something with resources, until you get the next thing which gives you more of the resources. Both give you upgrades to speed things up, and finally prestige and it's own prestige upgrades. That's it. It's nice little change of pace from all the recent incremental that sometimes do too much, but obviously due to the very simple nature of it, it does eventually feel pointless, specially after you more or less open up everything and the prestige upgrades just keep repeating.
3
Spark
Factoid & Spark should have the same review as they are almost the same game with only small differences. The games are the most basic kind of incremental, where you buy something with resources, until you get the next thing which gives you more of the resources. Both give you upgrades to speed things up, and finally prestige and it's own prestige upgrades. That's it. It's nice little change of pace from all the recent incremental that sometimes do too much, but obviously due to the very simple nature of it, it does eventually feel pointless, specially after you more or less open up everything and the prestige upgrades just keep repeating. 3
Antimatter Dimensions
Easily top 5 incremental on mobile. Does everything perfectly. You progress nicely, and when new features open it, not only is it rewarding but more importantly, it keeps adding new dimensions (lol) to the game. I'd at the end game as I write this, and I realize that there was no point in the game where it felt stale. Each new prestige layer made the game feel fresh and almost like a new incremental game.
5
Melvor Idle
It seems this game was mainly aimed at Runescape players, which is probably why it didn't click for me. It also run extremely slow on my phone which also played a part in me not really getting into.
2
A Girl Adrift
The animation is really pretty and is a nice change of pace for incrementals, but I didn't really like the too much active play. Really had to keep going back and forth to different areas to do the fishing which got too repetitive for me.
You travel to different areas of the map to catch fish, which you get points and then you upgrade stuff, but I didn't really find any real excitement about the upgrades because I kept having to go back to previous areas to fish similar creatures.
3
Archer: Danger Phone
I'm really annoyed how terrible of a game this was. Two things I like, the TV show "Archer" and incremental games, and it's done in the most lazy manner. The game is the worst aspect of idle games where it's just a straight path of clicking the next upgrade with absolutely zero decision making. Every once in a while there is a mini game where Archer gets to shoot others but it's done in the most basic form of early 2000s flash games, where the animation budget is probably 3 dollars. Same static background and both enemies and Archer have just two animation frames. The absolute laziness of it is almost insulting to the player, because it feels like we aren't even worth the effort.
There is an Archer story in the game which develops really fast, which is the only positive part, but no voice acting is again another evidence that the creators of the game weren't given any budget for this.
1
Home Quest
This game is way too slow. You have to collect materials to build your settlement but everything takes time, so you click for a few seconds, and then you have to leave the game. Which I'm fine with, but the problem isn't the idle part of it, it's how the idle part of it combines with constant checking of the game which annoys me. I like an idle game where you forget to start the game for a day, you come up to a lot of resources, but this is a game which needs you to check back in every 30 minutes or an hour to really get anywhere. I felt that the micromanagement was getting worse as I progressed (without any actual thing to do when I am active in the game) that made me give up.
2
Idle Industry
This is probably an interesting game, but I gave up because the one thing I really disliked was the amount of resources and manufacturing that very quickly opens to you. You can buy raw materials, and you can either sell these raw materials or turn them into finished goods and sell them either. And each of these has several upgrade options (increase selling price, increase production, etc). Without even really getting too deep into the game, I have around 20 raw materials and around 30 finished products. A satisfying part of this genre is to have things slow open up for you, which gives me a decent feeling of satisfaction. But the money I got would quickly open up new products, so I would just jump ahead and purchase more expensive ones, and after a while I had a lot of materials and products at zero, and was instead focusing on latter ones.
2
Masters of Madness
Somewhat neat atmosphere and visuals, but too much active clicking. Click, upgrade to get more per clicks, get minions to get you some points without clicking, typical clicker, but with the added benefit of almost no idling. I like idling incrementals but clickers is a hard no from me.
1
Soda Dungeon 2
Basically similar to the first one, as far as I could tell. I did "finish" it but maybe I shouldn't have, since it really is the same thing from early on, specially once you get all the heroes and you kind of sort out which characters work best, then it's just the same. But because it was somewhat short and no real wall, it was at least easy to stick to it to the end.
2
Bacterial Takeover
Played for a decent amount and was actually more interesting that I thought, given the buttload of ad incentives. You create and upgrade bacteria, attack planets, and eventually go into a blackhole to prestige. Most of the game was good, but the part that killed it for me was the prestige system. Once you prestige, planets get super easy to attack, which becomes a lot of active play. I realized that each prestige was taking me at least 30 minutes to get to where I was, and it was just meaningless clicking. It got to a point where I was putting off prestige because it seemed like it would be a hassle so I stopped.
2
LogRogue
Cute graphics. The hero sort of hopping to hit the tiny monsters is cute to look at, but how long can you look at it and do nothing before you realize that it's boring? I suppose this is a game where it's just not for me. I don't like to have my phone open on a game and just watch it like a crazy person and do nothing. My rule is simple for incrementals. While the app is open, be active, if there isn't any choices to make, close the app while resources build up or whatever. I don't like it being open while I do nothing.
3
A Kittens Game
Incremental games are so strange. I get in and out of the phases. I loved this for so long and so obsessively that I wanted to only play incremental games. And then, just like that, I was wondering why the fuck I was wasting my time with this. Has happened countless times before.
But still probably the best incremental ever.
5
A Dark Room
An incremental cult classic of sorts but I don't find it really matches the genre. There is a bit of incremental at the beginning with people huts and stuff but then its just a ascii exploring game, which wasn't interesting to me.
2
Little Healer
Saw it mentioned in the Reddit incremental forum in one of the posts and thought it was a healer themed incremental which sounded neat. But it's like being a healer in a raid in World of Warcraft without any if the extras. Just a couple of bars representing your team mates and you healing them while they fight the boss. I didn't even like playing the healer in WoW so no way would I play this game.
1
Clickie Zoo
Started playing for a few days until I realized there a beta released with the dev reworking the game completely from scratch and releasing it as "Idle Zoo Tycoon". So, played that instead but this seemed like a game I would enjoy anyway.
4
Idling to Rule the Gods
The UI and one drawing if your character is really ugly enough to be distracting to me. The game, seemed interesting and I eventually was into it, but seems like a game that has been constantly being updated, which is not always a good thing, because features are obviously updated regularly to it, making the whole thing a bit bloaty.
I guess, this is the problem with this game for me, it's too fat. Also, one main part of the game is that your character creates Shadow Clones up to a maximum limit. Which is fine except the clones can't be made in offline mode. This might not be a big deal in its original web browser game but that doesn't work as well in a mobile format.
2
Realm Grinder
This is one of the really popular incremental and it's fanbase seems to love it for it's depth, but to be honest, I don't play these games for the depth, I play it for the simple dopamine rush of doing the same thing over and over again. It relaxes.
Although, I didn't even get to the depth part because I dislike games where it rushes in the beginning. I constantly bought buildings, got spells, and got upgrades without even looking at the description. Apparently, later on, we can get complicated race upgades, which seems not what I'm looking for in such a genre.
2
Spaceplan
A short (!!) incremental with an actual story (!!!). That's two cool points for it but unfortunately, the game mechanics of increment genre isn't so good. It's a space game with nice visuals and a great ending (cool music set to cool graphics) but the game itself wasn't really that fun. This same exact game would have been better in a different genre (maybe something like "Out There"?)
3
Zombidle
Felt like idle games again and this is the kind of examples that kept me away. Too much clicking and seems like advancement will start to get irritating since it relies on IAPs
2
Eggs, Inc
While I was playing it, Eggs, Inc was probably my favorite Android game I had ever played. But like most incremental games, there comes a moment when I suddenly stop and think, what am I doing?
Because there is something fascinating about Incrementals. Their addictiveness is in a way the whole point. An incremental is less of a game and more an act of electronic addictiveness. What's the point?
Eggs, Inc is a very well made and fun incremental but even the best in its genre is still pointless.
4
Castle Clicker
Supposedly a mix of incremental and city building but didn't really find out since the clickings were way to much. I know this is supposed to be the genre but I like the incremental part more than the tapping part. This seemed to be a good way to hurt your fingers.
2
Endless Era
This RPG clicker game is like other such games but with horrible GUI and animations. Tap tap tap. It's my fault for downloading such games. Why would I ever think this would be fun???
1
Idle Quote
An incremental game with a unique twist. This time we get to make up quotes! The first negative about the game and this irritates me a lot is most of the quotes are fake. A quick search on Google and this proves it. Quotes are generally attributed to Buddha or Ghandi or shit like that and it's usually fake like most quotes on the internet. This kills the major possible advantage of the game because I thought coming up with arbitrary words would at least give me some quotes to learn. Aside from the this, the game isn't fun either because it slows down very quickly meaning you combine words very slowly at a certain stage of the game and then it becomes a boring grind.
2
Monster Miser
An incremental game with almost no graphics. We just see character portraits of monsters which we buy and then upgrade until we buy the next monster. Eventually we prestige which gives us multipliers. The only game choice is choosing between two monsters with each new monster with unique benefits. Annoyingly there is a max limit which I wish didn't exist because I wanted to prestige so much that I would be over powerful in upgrading like that "Idle Oil Tycoon". Still, pointless but reasonably fun.
3
Pocket Politics
An incremental take on politics sounds fun but it's so generic that it could have been about anything. A Capitalist idle game or a cooking idle game, it wouldn't matter. IAP was also the usual shitty kind.
1
Time Clickers
A shooter incremental sounds like a cool twist but it's not a FPS like I imagined it would be. I'm just stuck in a room and I was shooting blocks. Upgrades didn't give me any enjoyment since I was shooting fucking blocks.
1
Tap Tap Fish - Abyssrium
I thought this was going to be relaxing incremental but the ridiculous and generic IAPs and all the social integeration spoil it. Too much time is spent in them asking you to buy or share or tweet or post or give them a blowjob. And there is nothing relaxing about that.
2
Cartoon 999
Incremental game about comic book writers, but not the marvel DC kind, it seemed to be the webcomic one and I think it's a Korean developer so all the characters and injokes made no sense to me. The whole thing was just targeted to a very specific audience.
2
Dungeon Manager
Incremental games need to be simple but this is beyond simple, it's just upgrade a fighter to level 5, go to next dungeon character, do the same, and just continue without any of the delicious balancing of upgrades like other idle games.
2
Final Fortress
Incremental games are already pointless but when it's super heavy on IAP than its also annoying, but when it always has bugs that doesn't register my offline earnings, then it just needs a uninstall in its face.
The zombie skin was also crappy.
1
Mana Maker
Here is how I know this clicker isn't very good. It doesn't make me hate all clickers and my life and mobile gaming in general for being so addictive and pointless.
So fail, sorry.
2
Infinity Dungeon
The usual incremental RPG that I should probably never play again. Starts simple enough and then gets more or a chore as you play.
1
Another incremental game which I had promised myself not to play anymore because they are so pointless and repetitive and endless. Well, this wasn't infinite and had a goal at 999 level so I thought it was good but while the humor was cute, the game did become very repetitive. Every 10 levels the slimes changed but after every 100 levels the whole thing restarted and while the monsters got stronger, I seemed to get even stronger. So the game became easier as I progressed and there was no more challenge. By level 800, I gave up.
2
Tap Dungeon RPG
Okay, I'm running out of ways to complain about those incremental RPG games that all have similar problems. It starts off reasonably fast and fun but soon it seems like I am in a data entry job. Doing the same thing over and over again with little changes.
1
Dungeon 999 F: Secret of Slime Dungeon
Another incremental game which I had promised myself not to play anymore because they are so pointless and repetitive and endless. Well, this wasn't infinite and had a goal at 999 level so I thought it was good but while the humor was cute, the game did become very repetitive. Every 10 levels the slimes changed but after every 100 levels the whole thing restarted and while the monsters got stronger, I seemed to get even stronger. So the game became easier as I progressed and there was no more challenge. By level 800, I gave up.
2
Tap Dungeon RPG
Okay, I'm running out of ways to complain about those incremental RPG games that all have similar problems. It starts off reasonably fast and fun but soon it seems like I am in a data entry job. Doing the same thing over and over again with little changes.
1
Tower of Hero
You start on the first floor of the tower and keep fighting your way up by summoning your heroes (by clicking) and recruiting other fighters, get upgrades, level up, and then, ugh, here is the typical incremental RPG part, restart, get items, and do it ALL over again.
There is something fun about restarting and getting slowly stronger each time but it also feels so pointless after a while. Such a pointless genre now that I have played a billion of such titles, heh.
3
Pageboy
Yet another incremental RPG which I have no idea why I downloaded because I'm sick of the genre. I played a pageboy to a knight who does the fighting while I collect the lot. I collect the loot, buy stuff for the knight, and eventually I restart to do the same thing again and get better items but this game I didn't even RESTART! Because fuck it! Fuck it!
2
Idle Warriors
The story is cute. Human population is regressing while monster population is on the rise. So the humans start enslaving monsters to mine for them! The brave warriors beat the crap out of monsters, kidnap the bosses, and enslave them. The animation of monsters slaving away while speech balloons above them talk about their wife and children is funny.
But the game itself is another RPG incremental which I should start staying away from. These games are like a chore for me nowadays because I'm doing the same crap again and again. The blame is probably on me because it seems like a reasonably solid game. But hey, fuck it, I PERSONALLY didn't enjoy it.
2
Tap! Tap! Faraway!
Any game that is remotely like Tap Titan scares me. They are addictive at first and very fast moving but after every restart gets more and more annoying. It soon turns into a time eating activity with the player having to redo the initial levels to get relics to get better items to progress further to restart to get relics to and so on until the player realizes how much time he is putting in the game for a repetitive activity.
2
Auto RPG
Now that is a title the game developers didn't spend too much time on. RPG battles are automatic but I can help out by clicking like a mad man. I started with one hero but would get additional members in my party as the story progressed. Party members receive skills as as they level up and while all the skill usage is automatic, it did give me a sense of progression which is extremely important in a RPG and which I think is usually lacking in incremental games. It usually starts feeling useless but in this game at least there are new maps, new members, and an actual end sight!
There is an infinity stage once the last boss is defeated but I am glad the infinity stage happens AFTER the end and it's not the game itself.
4
Merchant
Hire a hero and send on to battle. The battles is done automatically and takes time, starts with something short like 10 seconds with each battle taking longer. The loot is raw materials which can be used to craft equipment which also takes real life time with better items taking longer. The crafted items can either be sold or equipped to the hero to make him be able to fight stronger monsters.
I was worried I would hate the longer crafting and fighting times because I hate games which I have to watch for a task to finish but even though the durations for longer, I had more to do. However, I don't know what would have happened in the end game because I gave up on it. New maps were exactly like the first map just with different heroes but the progression was similar in each level which felt that I was doing the exact same thing all over again but with longer task times.
2
Idle Oil Tycoon
This is the best idle game I played. It's graphics aren't just minor, they are none existent. It's just numbers, so basic that my sister thought I was on a stock market app.
It's such a simple concept. Invest, get oil, upgrade then like other idlers restart to get a bonus and do the full thing all over again. When I finished the game, I played the unlimited mode which I played until the unlimited mode couldn't handle the numbers anymore.
5
Soda Dungeon
This kind-of Idle Dungeon was great. I started with weak ass fighters who would fight on my behalf while I collected the loot. I then got to use the lot to upgrade the sofa bar to recruit more adventurers. Not sure why it was a sofa bar. Maybe they wanted to make it a family game and not have alcohol? Sounds weird but the sofa element in a RPG game sounds weirder.
The game only hit a brick for me when, like most other incremental games, there is no real closure. Once I thought I bet the big bad guy, it just goes on, harder but similar enough with no end in sight. Eventually, we have to stop playing right, but it always feels a bit like a let down when I don't feel like I have finished the game.
4
10 Billion Wives Kept Man Life
The two games from this company, 10 Billion Wives and Kept Man Life, have similar strengths and weaknesses.
I liked the silly premises from both. In 10BM, I had to get married as much as I could, using the loves I collect to marry more expensive wives! In KML, I'm a boyfriend who doesn't work and I have to please my career gf so she would take care of me.
Both start reasonably fast and I was willing to grind through difficult parts but the end game is like a brick wall. Passing through it to get all the achievements is pretty much impossible unless one puts in way too many hours. And it's a shame because I really wanted to get all the achievements to see all the tiny little extra stuff.
3
Adventure Capitalist
One of the better incremental games, but now that I am out of the short lived incremental fan phase, I realized how dumb the genre is. Tap, tap, tap, upgrade, do this a million times, reset, and do it all over again like a moron. The game does deserve credits for me acting like a moron and playing it for so long but I also cheated and got free cash and then if occupying became even more pointless.
3
The Monolith
A combination of an incremental and a civilization building game seemed like an excellent idea and in some ways, it was, specially how we get to upgrade through the ages from cavemen to futuristic. But no offline feature means that the resets aren't enticing.
2
USSR Simulator
An incremental game that has a great theme (USSR!) but absolutely horrible to enjoy, even though I did stick to it. After a certain upgrades, the game just turned into me popping in the game, clicking an upgrade and then forgetting about the game for a few days.
2
RPG Clicker
They should call these games tappers not clickers. We are not clicking anything on a touchscreen device. Anyway, tap tap tap level up buy weapons tap tap and uninstall.
1
Logging Quest Logging Quest 2
[Review is for the original and its sequel]
There is not much of a difference between the game. I actually played them both at the same time because the actual game is offline. You choose your hero, send them to a dungeon, and then come back to the game after a while to see how well they did. I thought an offline RPG like this might be interesting but then, if you don't really play a game, how much fun can it be?
1
Another pointless incremental. I was in an incremental phase and got so many incremental games that I know realize were absolutely pointless.
Hit a tree, buy upgrades, get a new hero, and continue hitting a tree. Not much offline it seems which is what I like about incrementals.
1
Galaxy Clicker
A space incremental that should have been a lot of fun. You get to upgrade your spaceship and buy new ones and explorer new planets. But first of all, the interface is so ugly that it makes playing the game less enjoyable. And a lot of things I didn't really get no matter how much I would play like the full exploring planets. The spaceships were nice, so it could have been fun.
2
Megatramp
A pretty pointless incremental kind of game. You are a tramp and then you can collect money to buy upgrades to make more money, with no strategy needed, nor any effort needs to be made to hurt your brain cells.
1
Inflation RPG
It supposed to be some kind of incremental RPG, I think, which has you resetting and getting more powerful and then fighting monsters to get insane levels. It is very unique but I couldn't get into it.
2
Widget RPG
Are you fucking with me? This is button bashing rpg in the most extreme manner. You get a widget, so you don't even have to open the game and distract yourself from the button bushing. Just click the button and the game plays behind the scenes and gets you experience, loot, and kills.
It's a ridiculous idea that is fun for a few minutes to see what they come up with but there is only so much button bashing you can do.
2
Capitalist Tycoon
I downloaded this game because I was in an incremental/idle game phase and really enjoyed AdVenture Capitalist. But this game is nothing like that. On the surface, it seems similar, buy small investments, make money, buy bigger investments, and so on.
But with this game, there is no offline mode, and you keep having to wake up managers, AND the goal is to see how much you make in one year. Bah. I prefer the incremental approach which makes you build and build and build, not try to rush it in just a year.
2
Clicking Bad
An incremental clicking game that is themed after Breaking Bad. It is a fun idea it's a very simple game with little to do aside from the obvious of upgrading and upgrading. The only twist might be to balance out making lots of money selling drugs and not attracting the law but even that is only a small challenge at the start. Eventually, you will get enough upgrades to bring the law risk so down that it makes no impact on the game play.
2
Zombie Tapper
A super basic incremental clicker game with a zombie team. Click click click to eat brains, use brains (?) to buy zombies to do the brain eating for you and then buy upgrades for your zombies, and buy new zombies and it all feels very pointless.
1
Bitcoin Billionaire
I started to enjoy incremental games, but it needs to have a good offline mode, because I don’t want to just play a game where I keep tapping. But that doesn’t mean I didn’t play. I played it, and I played a lot of it, because I could reset the game (like most incremental games) and it gives you a small benefit where you could finish the full game a bit faster (it gives you bonus income). So, I kept finishing and resetting, and each time the start to finish would shorten, so I thought I would reach a stage where I could finish each start-to-finish in an instant! It didn’t happen. I got bored first.
3
Tap Titan
An addictive tapping game. Just tap on the creatures, level up, get new skills, hire heroes, and then reset and to it all over again to progress further. It’s an incremental game where it depends on resets to progress, but no real offline bonus, so you have to be playing online. Which got boring, so I installed an app that does the tapping for me, which is actually a stupid way to play the game, but this isn’t an attempt to prove to anyone my intelligence. Anyway, thankfully something went wrong and my progress got deleted, WHICH WAS A GOOD THING, because the game was extremely addictive.
4
God Squad
I’ve realized most incremental games are stupid. Tap on monsters to kill, collect gold, buy Roman Gods, level them up, fight other monsters, and then get bored.
1
submitted by madali0 to incremental_games [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to privacycoins [link] [comments]

[SHARE] Fulfilled Request Megathread 4 FREE DOWNLOAD

Download any of these for free at https://oppfiles.com/585933
DM me if you have any requests for anything not on the list.
Please subscribe the sub to find all the eBook releases. Enjoy!
[BOOK] 'The macabresque : human violation and hate in genocide, mass atrocity and enemy-making' Edward Weisband, Oxford University Press 2018(self) 1 [BOOK] Scotland After the Ice Age Environment, Archaeology and History 8000 BC - AD 1000(self) 1 [Book] Ethics of Captivity edited by Lori Gruen(self) 1 [Book] Aspects of American History By Simon Henderson(self) 1 [Book] The Soviet Colossus History and Aftermath By Michael G. Kort(self) 1 [BOOK] Challenges to Political Decision-making Dealing with Information Overload, Ignorance and Contested Knowledge(self) 5 [Article] The EU Competition Law Fining System: A Reassessment, Damien Geradin(self) 1 [Book] Russia and the USSR, 1855–1991 Autocracy and Dictatorship ByStephen J. Lee(self) 1 [Book] Søren Kierkegaard: Epistemology and psychology : Kierkegaard and the recoil from freedom - Daniel W. Conway, K. E. Gover(self) 4 [ARTICLE] 'A History of Reason in the Age of Insanity: The Deconstruction of Foucault in Hegel’s Phenomenology' The Owl of Minerva, Volume 25, Issue 1, Fall 1993, Andrew Cutrofello Pages 15-21(self) 1 [BOOK] Mere Civility by Teresa M. Bejan(self) 2 [book] The Philosophy Shop by Peter Worley(self) 1 [BOOK] Sentenciando Trafico - Marcelo Semer(self) 1 [Article] GENETIC INSTABILITY ASSOCIATED WITH BREAK-INDUCED REPLICATION(self) 1 [Article] Properties of elastic bodies in contact - J. Dundurs 1975(self) 2 [Article] Transition alumina phases induced by heat treatment of boehmite: An X-ray diffraction and infrared spectroscopy study(self) 1 [Book] Russian Companion by James Cooper(self) 1 [Book] Model Stock Purchase Agreement with Commentary, by American Bar Association(self) 1 [Book] A History of Modern France By Jeremy D. Popkin(self) 1 [Book] Mathematical Notation: A Guide for Engineers and Scientists(self) 1 [Book] The Epistemological Significance of the Interrogative by James Somerville(self) 1 [Book] Looking for Managing Human Resources 11e. by Cascio, Wayne F.(self) 4 [Article] XVIII. The arrangement of atoms in crystals(self) 4 [Article] I am looking for "The Myth of Cartesian Privacy"(self) 5 [Book] Litigating morality : American legal thought and its English roots(self) 4 [Article] Child-on-child sexual abuse: An investigation of behavioral and emotional sequelae(self) 1 [Book] La proyección del neoliberalismo: Las transformaciones del cine mexicano (1988–2012)(self) 1 [Book] Handbook of Research on Online Discussion-Based Teaching Methods - Lesley Wilton and Clare Brett(self) 2 [Article] Turning up the Lights on Gaslighting by Kate Abramson in Philosophical Perspectives, 2014.(self) 8 [Book] Punishment and Social Structure by Rusche and Kirchheimer(self) 3 [Article] A Strong Leader for A Time of Crisis: Xi Jinping’s Strongman Politics as A Collective Response to Regime Weakness(self) 1 [Book] Nünning, Ansgar and Carola Surkamp - Englische Literatur unterrichten I: Grundlagen und Methoden(self) 2 [Article] Multicultural attitudes and cultural intelligence of preschool teachers, by Çağrı Peköz, Ayşe Işık Gürşimşek , 2020(self) 4 [Book] Statistics for Business and Economics, 4th Edition, 2017, David Anderson, Dennis Sweeney, Thomas Williams, Jim Freeman, Eddie Shoesmith(self) 4 [Article] Evaluation of Occupant Loading in Low- to Moderate-Speed Frontal and Rear-End Motor Vehicle Collisions(self) 1 [Book] Theories of Multiculturalism by George Crowder(self) 6 [BOOK] A Dictionary of Critical Theory (2nd Ed.) by Ian Buchanan(self) 0 "The People’s Charter and the Enigmatic Mr. Maltman Barry", by Paul Martinez (1980) [Article](self) 4 [Book] Rössner, Philipp (ed) 2015 On Commerce and Usury (1524) by Martin Luther. Anthem Press.(self)NSFW 4 [Article] Electronic documents give reproducible research a new meaning(self) 1 [ARTICLE] A Three Square Geometry Problem by Charles Trigg(self) 1 [BOOK] Structure And Mechanism In Protein Science: A Guide To Enzyme Catalysis And Protein Folding (Structural Biology) Reprint Edition(self) 1 [BOOK] Genetic Analysis: Genes, Genomes, and Networks in Eukaryotes 2nd Edition by Philip Meneely(self) 2 [Article] Ultimate Strength Design of Reinforced Concrete Chimmneys. Rumman, W.S., and Sun, R. Y.,1977(self) 1 [book] Signs of civilisation : the characters that changed Europe(self) 1 [Book] Social Class : How Does It Work? by Annette Lareau; Dalton Conley(self) 1 [book] Garner's Dictionary of Legal Usage Third Edition(self) 1 [book] The Integration of MILLION into the English System of Number Words(self) 1 [Book] Connected Speech: The Interaction of Syntax and Phonology - Ellen Kaisse(self) 2 [BOOK] Statistics Using R: An Integrative Approach(self) 4 [Article] Rethinking International Institutionalisation through Treaty Organs by Gloria Fernández Arribas(self) 1 [Book] Parasitic Gaps - Peter W. Culicover and Paul M. Postal(self) 4 [Book] The Global Economy A Concise History Edited By Franco Amatori, Andrea Colli(self) 7 [Article] "Sorting out the ethics of propaganda", Stanley Cunningham(self) 1 [Book] Diet, Life-Style, and Mortality in China: A Study of the Characteristics of 65 Chinese Counties(self) 2 [Article] “Some Degenerate Entrepreneur Fleeing From a Medicine Show”: Judge Holden in The Age of P.T. Barnum(self) 4 [Article] Christoph Witzel and Matteo Toscani, "How to make a #theDress," J. Opt. Soc. Am. A 37, A202-A211 (2020)(self) 4 [Article] [Heinonline] The Emergence and Fallacy of 'China's Debt-Trap Diplomacy' Narrative(self) 5 [Article] [Heinonline] US-Philippines Defense Cooperation during the Duterte Administration: Adjustments and Limitations(self) 8 [Supplement] Polariton Z Topological Insulator, A. V. Nalitov, D. D. Solnyshkov, and G. Malpuech(self) 4 [BOOK] HILL, Christopher. Intellectual Origins of the English Revolution - Revisited.(self) 11 [Article] Post-National Citizenship in Europe: The EU as a Welfare Rights Generator, by Marlene Wind.(self)NSFW 4 [Chapter] The Russian and Chinese Revolutions Compared S. A. Smith from The Oxford Handbook of Modern Russian History(self) 2 [Book] Beyond the Annual Budget: Global Experience with Medium Term Expenditure Frameworks(self) 1 [Book] How Art Can Be Thought: A Handbook for Change - Allan deSouza(self) 1 [Article] Surgical treatment of neuromuscular scoliosis: current techniques(self) 5 [Chapter] Desire, Mimetic Theory, and Original Sin(self) 1 [Book] Dayen, David 2020 Monopolized Life: in the Age of Corporate Power. The New Press.(self) 1 [book] Penetrating Language A Critical Discourse Analysis of Pornography(self) 1 [book] Presentation in Language: Rethinking Speech and Writing(self) 4 [Article] Can someone find the full article for me?(self) 1 [BOOK] Genera Palmarum: the evolution and classification of palms by John Dransfield and Natalie W. Uhl(self) 1 [book] Orthography, Variation, and the Creation of Meaning in Written Japanese(self) 4 [Chapter] The Relative Cycle in Hungarian Declaratives, Julia Bacskai-Atkari(self) 1 [Article] Involvement of MicroRNA Mir15a in Control of Human Ovarian Granulosa Cell Proliferation, Apoptosis, Steroidogenesis, and Response to FSH(self) 1 [Chapter], in Violence in War and Peace: An Anthology by Nancy Scheper-Hughes & Philippe Bourgois (Editors)(self) 1 [Chatper], in Violence in War and Peace: An Anthology by Nancy Scheper-Hughes & Philippe Bourgois (Editors)(self) 1 [book] Oxford Dictionary of Proverbs (6 ed.)(self) 1 [Book] The Origins of the First World War ByJames Joll, Gordon Martel(self) 4 [Chapter] The Feminist Standpoint Theory Reader: Intellectual and Political Controversies(self) 4 [BOOK] Early Events in Monocot Evolution by Paul Wilkin and Simon J. Mayo(self) 5 [Book] BRIGGS, Robin. "Communities of Belief: Cultural and Social Tensions in Early Modern France"(self) 2 [Article] Transgenerational Epigenetics: A Window into Paternal Health Influences on Offspring(self) 3 [Thesis] Earthquake risk assessment of building structures(self) 1 [Article] Factors associated with women achieving and maintaining abstinence from alcohol: a rapid evidence assessment(self) 1 [Thesis/Article] Earthquake risk assessment of building structures(self) 1 [BOOK] Censorship and Propaganda in World War I, 2019(self) 3 [article] A new device producing ambulatory intermittent pneumatic compression suitable for the treatment of lower limb oedema: A preliminary report(self) 1 [Article] Kinetic Modeling and Optimization of the Release Mechanism of Curcumin from Folate Conjugated Hybrid BSA Nanocarrier(self) 1 [Article] Lawrence Transfer Factor: Transference of Specific Immune Memory by Dialyzable Leukocyte Extract from a CD8+ T Cell Line(self) 1 [Book] he Origins of the First World War William Mulligan(self) 1 2 [Article] Biteye: A System for Tracking Bitcoin Transactions(self) 1 [BOOK] A Photographic Atlas of Developmental Biology. 2005. Shirley J. Wright. Morton.(self) 4 [Other] Philippine Daily Inquirer July 16, 2020(self) 1 [BOOK] Letters on Familiar Matters, Volume 1 by Francesco Petrarch(self) 2 [Article] Optical fiber micro-devices made with femtosecond laser by Kaiming Zhou, Fangcheng Shen, Guolu Yin, and Lin Zhang(self) 3 [BOOK] Need a book from Oxford Scholarship online: The Oxford Francis Bacon Vol. 6(self) 1 [BOOK] I need OBSERVATIONAL ASTRONOMY by D. Scott Birney(self) 4 [Article] Homeostatic Plasticity Shapes the Retinal Response to Photoreceptor Degeneration by Shen, Wang, Soto and Kerchensteiner.(self) 1 [Artikel] Homeostatic Plasticity Shapes the Retinal Response to Photoreceptor Degeneration by Shen, Wang, Soto and Kerchensteiner(self) 3 [Article][Request] Anyone have access to this article?(self) 7 [Article] The idea that everything from spoons to stones is conscious is gaining academic credibility (Quartz)(self) 2 [Article](self) 1 [BOOK] Need a german book from JSTOR, "Politisches Skandalmanagement: Strategien der Selbstverteidigung in politischen Affären der Bundesrepublik Deutschland "(self) 1 [BOOK] The Oxford Handbook of Ethics of AI(self) 1 [ARTICLE] Are natural scientists more masculine than humanists? The association patterns between 2D:4D ratio and field of study by Kainz, Sarah; Weitzer, Jakob; Zingale, Stefania; Köllner, Johanna; Albrecht, Cornelia; Gaidora, Angelika; Rudorfer, Marie-Theres; Nürnberger, Anna; Kirchengast, Sylvia(self) 1 [Book] The Crisis of Criticism - Maurice Berger (editor)(self) 2 [Book] Handbook of Nonprescription Drugs: An Interactive Approach to Self-Care, 19th Edition(self) 1 [Book] 'Le discours pornographique' Marie-Anne Paveau, La Musardine, 2014(self) 8 [Article] Allocation and Operation of A Hydropneumatic Energy Storage with Building Microgrid(self) 1 [ARTICLE] L'information internationale en Amérique du Sud: les agences et les réseaux, circa 1874-1919, 2013(self) 1 [Book] The Beaultiful Fall: Fashion, Genius and Glorious Excess in 1970s Paris, Alicia Drake(self) 4 [BOOK] 'Sociology and the Sacred: An Introduction to Philip Rieff's Theory of Culture' Antonius A.W. Zondervan, University of Toronto Press, 2005(self) 1 [Article] Flavell, J. (1987). Speculations about the nature and development of metacognition. In F. Weinert & R. Kluwe (Ed.), Metacognition, motivation, and understanding (p. 21-29). Hillsdale, NJ: Lawrence Erlbaum.(self) 1 [Book] Health Policy Management: A Case Approach 1st Edition(self) 3 [BOOK] Visions and Ideas of Europe during the First World War, 2019(self) 4 [Article] Opioids After Surgery in the United States Versus the Rest of the World The International Patterns of Opioid Prescribing (iPOP) Multicenter Study by Kaafarani, Haytham M. A. MD, MPH*; Han, Kelsey BSc*; El Moheb, Mohamad MD et al(self) 1 [ARTICLE] "Who Is This?" Narration of the Divine Identity of Jesus in Matthew 21:10—17, Andrew E. Nelson(self) 2 [Book] Origins of value: The financial innovations that created modern capital markets(self) 1 [Article] Automation of in-hospital pharmacy dispensing: a systematic review by Sarah Batson, Ana Herranz, Nicolas Rohrbach, Michela Canobbio, Stephen A Mitchell, Pascal Bonnabry(self) 1 [Book] Manual of Pediatric Balance Disorders - Robert C. O'Reilly(self) 1 [Article] Primary adrenal failure and central nervous system lesions: a rare case report of primary adrenal lymphoma by Cristina P. Correia, José G. Freitas, António Martins, Jorge Oliveira(self) 1 [Book] Portable Literature: Reading, Reacting, Writing(self) 5 [BOOK] Lawfare: Law as a Weapon of War - Orde F. Kittrie(self) 3 [Article] Dismantling Restrictive Gender Norms: Can Better Designed Paternal Leave Policies Help? by Negar Omidakhsh, Aleta Sprague, & Jody Heymann(self) 1 [BOOK] Modernization from the Other Shore: American Intellectuals and the Romance of Russian Development by David Engerman(self) 1 [Article] Torsional Response of Reinforced Fibrous Concrete Beams(self) 1 [Book] Language change by Joan Bybee(self) 1 [Book] [Taylor and Francis] The Routledge Handbook of North American Languages(self) 3 [Thesis] "Gas-Surface Desorption and Scattering Processes: Development and Application of the Random Corrugation Model"(self) 1 [Book] Reinventing the Museum: The Evolving Conversation on the Paradigm Shift (2nd Edition)(self) 1 [BOOK] When Police Kill - Franklin Zimring(self) 1 [article] DNA Vaccine Delivery and Improved Immunogenicity Kevin R. Porter and Kanakatte Raviprakash(self) 7 [BOOK] 'The Triumph of the Therapeutic: Uses of Faith after Freud', Philip Rieff, 1973(self) 1 [book] Verbs, Clauses and Constructions: Functional and Typological Approaches(self) 6 [Book] Special Duty: A History of the Japanese Intelligence Community by Richard J. Samuels(self) 7 [BOOK] The Right to Know: Transparency of an Open World by Ann Florini(self) 4 [BOOK] At Home in Two Countries: The Past and Future of Dual Citizenship by Peter J Spiro(self) 1 [BOOK] 'Mesolithic Europe' Geoff Bailey & Penny Spikins, 2008/2010(self) 7 [BOOK] 'Nietzsche and the Clinic: Psychoanalysis, Philosophy, Metaphysics' Jared Russell, 2017(self) 1 [book] Lexical Properties of Selected Non-native Morphemes of English(self) 4 [BOOK] 'Wild Things: Recent advances in Palaeolithic and Mesolithic research' Frederick W. F. Foulds, 2014(self) 2 [Article] Thoracoabdominal Aneurysm Surgery(self) 1 [BOOK] Research handbook on climate governance(self) 2 [Book] High-Performance Compilers for Parallel Computing by Michael Wolfe(self) 3 [Article] Cosmic Cinema: On the Philosophical Films of Terrence Malick(self) 3 [Book] Critical thinking about research.(self) 6 [Supplement] Transposable elements in mammals promote regulatory variation and diversification of genes with specialized functions, Louie N.van de Lagemaat Josette-RenéeLandry Dixie L.MagerPatrikMedstrand(self) 1 [BOOK] Crisis Elections, New Contenders and Government Formation. Breaking the Mould in Southern Europe - Anna Bosco & Susannah Verney(self) 4 [Article] Legal and Ethical Imperatives for Using Certified Sign Language Interpreters in Health Care Settings(self) 5 [Article] Bottles and Bricks: Rethinking the Prohibition against Violent Political Protest by Jennifer Kling & Megan Mitchell(self) 6 [Book] Corruption in International Investment Arbitration - Aloysius Llamzon(self) 5 [Article] Sports prediction and betting models in the machine learning age: The case of Tennis, Wilkes 2019.(self) 1 [chapter] Handwriting Recognition Systems and Applications(self) 3 [Article] Designing robust policies under deep uncertainty for mitigating epidemics, Siddhartha Paul, Jayendran Venkateswaran(self) 4 [ARTICLE] IJSSSP: TLS Certificates of the Tor Network and Their Distinctive Features(self) 1 [Book] Methods in Yeast Genetics and Genomics, 2015 Edition: A CSHL Course Manual(self) 3 [Article] Optically improved mitochondrial function redeems aged human visual decline(self) 4 [ARTICLE] Getting Involved with Time: Notes on the Analysis of a Schizoid Man (PROQUEST)(self) 7 [Book] URGENT If you have access to Project MUSE please help me with finding the pdf of "Where is Ana Mendieta"(self) 4 [Book] Rites, rights and rhythms: a genealogy of musical meaning in Colombia's black pacific by Michael Birenbaum Quintero(self) 1 [BOOK] Corrupt Research: The Case for Reconceptualizing Empirical Management and Social Science by Raymond Hubbard(self) 4 [Thesis] Protecting education from attack: Humanitarian agencies and the implementation of a new global norm in the case of Palestine (Proquest)(self)NSFW 3 [Chapter] from A History of the Soviet Union From the Beginning to Its Legacy By Peter Kenez chapter 11,12,13(self) 2 [Article] The effects of NBPTS‐certified teachers on student achievement + Douglas N. Harris Tim R. Sass(self) 5 [Book] Nietzsche and Contemporary Ethics - Simon Robertson(self) 1 [Book] Smolensk Under the Nazis: Everyday Life in Occupied Russia(self) 1 [Article] [Ingenta] A Study on the Complementary Economy of China and the Philippines Under the New Normal Situation (2010-2016) by Zhu Bin and Jing Lei(self) 4 [Article] Weavers, Merchants and Company: The Handloom Industry in Southeastern India 1750-1790 by S. Arasaratnam(self) 1 [BOOK] Legacies of the Left Turn in Latin America: The Promise of Inclusive Citizenship - Manuel Balán & Françoise Montambeault(self) 6 [Article] Autonomous industrial mobile manipulation (AIMM): past, present and future. Author: Mads Hvilshøj, Simon Bøgh, Oluf Skov Nielsen, Ole Madsen.(self) 1 Removed: Pending moderation REQUEST [eBook] The Assessment Book – Physiotutors Guide to Orthopedic Physical Assessment(self) 1 [Article] [Brill] The Tragedy of Small Power Politics: The Philippines in the South China Sea by Charmaine Misalucha-Willoughby and Robert Joseph Medillo(self) 1 [BOOK] Echo and Reverb: Fabricating Space in Popular Music Recording, 1900-1960(self) 5 [Article] EFFECTS OF HIGH CONCENTRATIONS OF PLANT OILS AND FATTY ACIDS FOR MYCELIAL GROWTH AND PINHEAD FORMATION OF HERICIUM ERINACEUM(self) 1 [Article] [HeinOnline] "Disposable Deontology: The Death Penalty" by Tung Yin(self) 2 [Article] Efficient conversion of pretreated brewer’s spent grain and wheat bran by submerged cultivation of Hericium erinaceus(self) 1 [Chapter] The Imperial Institute: The state and the development of the natural resources of the Colonial Empire, 1887–1923(self) 1 [Book] Pieter Steyn - Zapuphizo: Voice of the Nagas(self) 3 [Article] Critical Constructivism and Postphenomenology: Ethics, Politics, and the Empirical(self) 5 [BOOK] Political Populism: A Handbook - Reinhard C. Heinisch, Christina Holtz-Bacha, Oscar Mazzoleni (Ed.)(self) 1 [BOOK] Effective Strategies for Protecting Human Rights(self) 4 [BOOK] The Unprovability of Consistency - George Boolos(self) 1 [BOOK] 'The Unity of Hegel's Phenomenology of Spirit: A Systematic Interpretation' Jon Stewart, Northwestern University Press (2000)(self) 1 [Book] Campus Wars by Kenneth J Heineman(self) 3 [Article] Circuit Theory for Waveguiding, Robert E. Collin(self) 1 [Other] [UpToDate] Attention deficit hyperactivity disorder in adults: Epidemiology, pathogenesis, clinical features, course, assessment, and diagnosis(self) 2 [BOOK] Quark-Gluon Plasma: From Big Bang to Little Bang(self) 10 [Book] The Representation of (in)definiteness - It's on archive.org but I can't seem to be able to download it(self) 1 [Book] Aginid bayok sa atong tawarik(self) 1 [Book] Political Economy In Macro Economics By Allan Drazen and Political Control of the Economy By Edward R. Tufte(self) 4 [Book] The Routledge Companion to Animal-Human History(self) 4 [Article] Inventing Brands: Opportunities at the Nexus of Semiotics and Intellectual Property by Conley, J. G.(self) 6 [Chapter] MULTICULTURALISM, OR, THE CULTURAL LOGIC OF MULTINATIONAL CAPITALISM by Slavoj Zizek(self) 5 [Article] Value articulation : A framework for the strategic manage- ment of intellectual property by Conley, James G., Peter M.Bican, and Holger Ernst(self) 3 [Book](JSTOR)Why We Believe: Evolution and the Human Way of Being by Agustin Fuentes(self) 1 [Book](self) 1 [Book] Ottoman Explorations of the Nile: Evliya Çelebi’s Map of the Nile and The Nile Journeys in the Book of Travels (Seyahatname) - Dankoff, Tezcan & Sheridan(self) 1 [Article] The Jewels of Adad by FNH Al-Rawi, JA Black(self) 1 [article] A measurement of collective learning effects in Italian high-tech milieux(self) 1 [Article] Parasympathetic activity is reduced during slow-wave sleep, but not resting wakefulness, in patients with chronic fatigue syndrome - Fatt et al., 2020(self) 1 [Book] Linked Data for Libraries, Archives, and Museums, by Seth van Hooland and Ruben Verborgh(self) 4 [Book] The Oxford Handbook of Well-Being and Public Policy - Edited by Matthew D. Adler and Marc Fleurbaey(self) 4 [Book] The Ostrich Communal Nesting System(self) 1 [Article] Protracted Effects of Ketamine Require Immediate Kappa Opioid Receptor Activation and Long‐Lasting Desensitization - Jacobson et al., 2020(self) 1 [Book] The Routledge Handbook to the Political Economy and Governance of the Americas by Olaf Kaltmeier et al.(self) 1 [Article] Dispute Resolution Provisions of the Energy Charter by Philippe Pinsolle(self) 1 [Book] Regional Development and Planning for the 21st Century New Priorities, New Philosophies(self) 4 [BOOK] Need a book from Oxford Scholarship online on International law subject.(self) 1 [Book] Prehispanic Settlement Patterns in the Upper Mantaro and Tarma Drainages, Junín, Peru: Volume 2, The Wanka Region(self) 4 [Book] Varieties of Virtue Ethics - David Carr, James Arthur, Kristján Kristjánsson(self) 4 [Article] Combustion Characteristics of a Swirled Burner Fueled With Waste Cooking Oil(self) 1 [BOOK] 'Beyond pleasure : Freud, Lacan, Barthes' by Margaret Iversen(self) 5 [Article] Empirical Studies of Adolescent Sexual Behavior: A Critical Review(self) 3 [Article]The sexual attitudes, behavior, and relationships of women with histrionic personality disorder(self) 2 Midsommar: Thing Theory [Article](self) 6 [Article] Microdosing psychedelics as cognitive and emotional enhancers.(self) 1 [Book] (Taylor&Francis) Human Evolution An Introduction to Man's Adaptations by Bernard Campbell(self) 1 [Article] Changing settlement patterns in the upper Mantaro Valley, Peru(self) 1 [BOOK] Fighting for Abortion Rights in Latin America Social Movements, State Allies and Institutions - Cora Fernández Anderson(self) 1 [Chapter] from the book The Crimean War: 1853–1856 Winfried Baumgart chapter 1 , 3 ,18(self) 1 [Book] Models of Integrity: Art and Law in Post-Sixties America -Joan Kee(self) 3 [Article] Forensic medical evaluation of children who present with suspected sexual abuse: How do we know what we know? by Grace Wong(self) 4 [book] Grammatical Voice — Fernando Zúñiga and Seppo Kittilä(self) 2 [Article]Naturally occurring 5′ preS1 deletions markedly enhance replication and infectivity of HBV genotype B and genotype C (supplementary materials)(self) 1 [Book] Commercial Real Estate Analysis and Investments (International) 3rd Edition(self) 2 [Book] Best Practices Guide to Residential Construction: Materials, Finishes, and Details by Steven Bliss(self) 2 [Book] Green Logistics: Improving the Environmental Sustainability of Logistics(self) 1 [Article] Black Codes and Slave Codes by Nakia D. Parker(self) 1 [Book] Marsh's Becoming a Teacher(self) 4 [Book] Germans Against Nazism: Nonconformity, Opposition and Resistance in the Third Reich: Essays in Honour of Peter Hoffmann by Francis R. Nicosia and Lawrence D. Stokes(self) 4 [Chapter] The Standard Story and Its Rivals(self) 1 [BOOK]Agrarian and Other Histories Essays for Binay Bhushan Chaudhuri - Edited by Shubhra Chakrabarti and Utsa Patnaik(self) 1 [Book] Regional modernities : the cultural politics of development in India. Ed. K. Sivaramakrishnan; Arun Agrawal(self) 1 [Chapter] Damping in Structures(self) 1 [Book] Gerontología y geriatría: valoración e intervención. Editorial Médica Panamericana. José Carlos Millán-Calentí(self) 1 [Book] Lotman's Cultural Semiotics and the Political - Makarychev & Yatsyk (2017)(self) 2 [Book] (Brill) The Handbook of Austroasiatic Languages (2 vols)(self) 1 [Book] Indian Films in Soviet Cinemas: The Culture of Movie-going After Stalin by Sudha Rajagopalan(self) 4 [BOOK] Decolonizing Theory: Thinking across Traditions by Aditya Nigam (1st edition, Bloomsbury India)(self) 3 [Request] [Article] Cell-by-Cell Deconstruction of Stem Cell Niches(self) 1 [Book] Social research methods- fifth edition, Bryman, Alan (2016)(self) 4 [Book]Chinese and Indian Warfare – From the Classical Age to 1870(self) 1 [Book] PC-Forensik Christoph Willer(self) 1 [Book] Designing for Empathy: Perspectives on the Museum Experience(self) 4 [book] American Communism and Black Americans by Philip Foner(self) 4 [Book] Marcus Franke : War and Nationalism in South Asia The Indian State and the Nagas(self) 8 [BOOK] Natural Resources, Extraction and Indigenous Rights in Latin America. Exploring the Boundaries of Environmental and State-Corporate Crime in Bolivia, Peru, and Mexico(self) 1 [Book] International Human Rights Law (3rd edn) Edited by Daniel Moeckli - Oxford University Press(self) 4 [Book] Participatory Heritage, Edited by Henriette Roued-Cunliffe , Andrea Copeland(self) 4 [BOOK] Political Representation in Southern Europe and Latin America Before and After the Great Recession and the Commodity Crisis - André Freire, Mélany Barragán, Xavier Coller, Marco Lisi, Emmanouil Tsatsanis(self) 4 [BOOK] Latin America and Policy Diffusion From Import to Export - Osmany Porto de Oliveira, Cecilia Osorio Gonnet, Sergio Montero, Cristiane Kerches da Silva Leite(self) 0 [Book] Sexual behaviour in Britain: The National Survey of Sexual Attitudes and Lifestyles (1994)(self) 1 [book] Studien zur Hirnpathologie und Psychologie - Pick, Arnold(self) 4 [Other] Special Issue, Blockchain innovation and public policy, Journal of Entrepreneurship and Public Policy: Volume 9 Issue 2(self) 4 [BOOK] baby jails: the fight to end the incarceration of refugee children in america/ jstor account??(self) 1 [Journal] Special Issue: Blockchain innovation and public policy, Journal of Entrepreneurship and Public Policy, Volume 9, Issue 2(self) 1 [Book] Blackstone's EU Treaties and Legislation 2019-2020 (20th ed)(self) 3 [article] Deep Graph Kernels(self) 5 [Book] Routledge Handbook of the South Asian Diaspora - By Joya Chatterji, David Washbrook(self) 4 [Book] Growth and distribution(self) 1 [BOOK] The Radical Left in Europe in the Age of Austerity - Babak Amini(self) 4 [Book] Political Myth by Christopher Flood (Routledge) (2002)(self) 2 [Article] Robotic Assisted Radical Cystectomy vs Open Radical Cystectomy: Systematic Review and Meta-Analysis + Niranjan J Sathianathen et al(self) 1 [Book] Folk Art Potters of Japan Beyond an Anthropology of Aesthetics (Routledge) by Brian Moeran(self) 1 [book] Revolution: How the Bicycle Reinvented Modern Britain(self) 5 [BOOK] Radical Left Movements in Europe - Magnus Wennerhag, Christian Fröhlich, Grzegorz Piotrowski(self) 4 [BOOK] Party System Change, the European Crisis and the State of Democracy - Marco Lisi(self) 5 [BOOK] Routledge Handbook of Contemporary European Social Movements. Protest in Turbulent Times - Cristina Flesher Fominaya, Ramon A. Feenstra(self) 4 [Book] Attorney-Client Privilege in International Arbitration(self) 1 [Article] An Alternative Ontology of Food Beyond Metaphysics by Lisa Heldke. Published in Radical Philosophy Review, Vol 15, Issue 1, 2012(self) 1 [Book] Bello, Walden 2005 Dilemmas of Domination: The Unmaking of the American Empire. Zed Books, 2005.(self) 1 [Article] Owning the PastOwning the Past Reply to Stokes(self) 1 [Article] Owning the PastOwning the Past Reply to Stokes(self) 1 [Book] McQuire, Scott. Crossing the Digital Threshold. Brisbane: Australian Key Centre for Cultural and Media Policy, Faculty of Humanities, Griffith University, 1997.(self) 3 [Book] Request: Migration and the Refugee Dissensus in Europe: Borders, Security and Austerity by Nicos Trimikliniotis.(self) 9 [Article] Masculinity in videogames: the gendered gameplay of Silent Hill(self) 1 [BOOK] 'Truth games : lies, money, and psychoanalysis' by John Forrester, Harvard University Press, 2000(self) 1 [Book] Osterloh, Jörg, und Clemens Vollnhals. NS-Prozesse Und Deutsche Öffentlichkeit: Besatzungszeit, Frühe Bundesrepublik Und DDR.(self) 2
submitted by jaylenholt to ebookleaksdownload [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethtrader [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to CryptoCurrencies [link] [comments]

Parts Of Computer - Computer Part Names for Children ... ABC Phonics Song with Sounds for Children – Alphabet Song ... SAINT PATRICK'S DAY VOCABULARY FOR CHILDREN ESL - YouTube ROOT WORDS - Vocabulary for KIDS - Learn ENGLISH - COVID ... Adjectives - Describing Words For Kids  English Grammar ...

A value related to a public key which could only have reasonably been created by someone who has the private key that created that public key. Used in Bitcoin to authorize spending satoshis previously sent to a public key. Signature hash Sighash. A flag to Bitcoin signatures that indicates what parts of the transaction the signature signs. (The ... When the bitcoin client switches to another, longer chain, all valid transactions of the blocks inside the shorter chain are re-added to the pool of queued transactions and will be included in another block. The reward for the blocks on the shorter chain will not be present in the longest chain, so they will be practically lost, which is why a network-enforced 100-block maturation time for ... Photo about Conceptual image of King of cryptocurrency - bitcoin. Successful boy holding money. Kid has a cryptocurrency, bitcoin at laptop. Image of money, children, cryptocurrency - 106728837 Bitcoin Is A Digital Form Of Currency 1523 Words 7 Pages. Origins of Bitcoin The term Bitcoin first came to light around 2008. Bitcoin is a digital form of currency (aka cryptocurrency) that can be traded on the internet around the world and it quickly stroked the interest of IT savvy enthusiast for its cleverness and libertarian who saw it as means of non-governmental controlled currency ... Como Ganhar Bitcoins Ganha Bitcoin Ganhar Bitcoin Jogando Ganhar Bitcoin Gratis – Ganhe Bitcoin de graça Como ganhar bitcoin gratis e altcoin gratis de uma forma facil e sem muito trabalho.bitcoin free, bitcoin gratis, dogecoin gratis, litecoin gratis.. Tres dos melhores jogos para ganhar bitcoin: SHARKOIN.com SHARKOIN is a brilliantly simple and very addictive online game!

[index] [5517] [36198] [1172] [38494] [31133] [46687] [16194] [38367] [26376] [15151]

Parts Of Computer - Computer Part Names for Children ...

★ NOTICE: A ver.2 of this video has been uploaded with the word 'fart' taken out. If you want to watch [NEW] Kids vocabulary - Action Verbs 2, click on the l... Subscribe for more Kids Songs! https://goo.gl/qPMW2J Watch MORE ELF Kids Videos https://goo.gl/UxUhFy Learn the 100 Sight Words Collection for Children wi... Learn some vocabulary related to St Patick's Day, this video is suitable for children and ESL students. It could be used in the flipped classroom. Words are ... This animated phonics song helps children learn the sounds of the letters in the English alphabet. Colorful characters teach kids two words for each alphabet... Kamea Aloha Jr. is the The "Crypto Coin Kid" explains in simple terms what BITCOIN and CRYPTOCURRENCIES are and how to use it! He teaches what digital money,...

#