I've taken the liberty of rounding up all the questions and answers provided from Hydro's most recent AMA hosted with BitcoinMarkets incase you missed it. Enjoy! Hydro Q&A’s Q (knonsu):
How does Snowflake relate to other identity protocols out there like Civic and uPort ? A.1 (Anurag):
We see snowflake as existing a layer below these types of projects. Even without blockchain, identity is a broad term. Different people around the world have different forms of identity (state ID, country ID, social media IDs, etc). Civic, uPort, and other blockchain projects help to build specific types of an on-chain identity for a user; however those IDs are meaningful in different ways to different observers. For instance, imagine that a government or business builds a system that accepts Civic as a form of identity while another government/business only recognizes uPort identities. On top of this, certain systems only care about information tied to a user’s social media profile. A user can maintain one standard Snowflake as a base layer and set each of these different forms of identity as a resolver. Snowflake eliminates the need for global unanimous adoption of a singular identity standard and rather allows systems to build business logic off of identity standards they themselves recognize. Follow up Q (knonsu):
thats cool. so its totally depends on the person/ institute utilizing it . One problem I found is how easy its to create fake identities (in their basic system). A.2 (Anurag):
Yup! So people can conduct off-chain verifications to prove that you own a snowflake, and then tie an on-chain verification to your Snowflake. This links real-world KYC to your on-chain ID, so sure you could mint another snowflake, but that same party won't validate it again for you. Anyone who trusts that party would be able to accept their validations, and people who don't trust that party can rely on a different validator they do trust.
— Q (kat):
How big is the team working specifically on Hydro products? Can we get a numbers breakdown of engineers, biz dev, etc? Do you have plans to scale this team as the Hydro project develops? A.1 (Andy):
Our Hydro team is 8 people.
Devlopers (Myself and Noah)
Product (Anurag and Shane)
Founders (Mike and Matt)
The nice thing about Hydrogen though is we have a team of 30 people who we can leverage for different things. For example, Noah and I do not build mobile apps, but we have a front end team that is well versed in mobile app development. So while they are not directly on the Hydro team they do have a direct impact on Hydro.
Hydrogen as a company is working to grow pretty rapidly. As we grow we will be filling out more positions in both blockchain and non-blockchain rolls. A.2 (Anurag):
To add to Andy's answer - pretty much everyone working for Hydrogen helps out with Hydro in some way, whether via design, front-end development, API support, business discussion, etc.
Here's our full team: https://www.hydrogenplatform.com/about
— Q (rocket man):
So in the age of ICOs, what motivated your team to not pursue that funding model and instead have a token distribution for developers? A (Andy):
This was something that we spent a very long time considering and discussing. We spent a lot of resources (time, money & energy) trying to find the best solution for us going forward. When it was all said and done, we decided on an airdrop because of two main things, getting the token into the hands of people who will actually use it and regulatory concerns.
We feel as though our distribution was the fairest approach that allowed for people with actual interest in the Hydro community to get involved. Overall, we have been very pleased with the level of community engagement from people who are interested in the utility of the Hydro token and we feel that a lot of this can be credited to our distribution strategy.
— Q (matheussiq8):
How hydro tokens will be used is still vague in the Snowflake whitepaper draft. Would the amount required to hold depend on the volume of API calls or some other parameter? For example, if I decide to implement raindrop and later snowflake in my small webshop would I need to hold the same amount of tokens as Binance (if they ever implement it of course…)? A (Noah):
as always, the permissionlessness of public blockchains is a double-edged sword. smart contracts partially solve the problem by letting us enforce certain things on-chain (minimum token balances, signature validity, etc.), but there are limits. so, re. your specific question: in raindrop we do not vary the staking requirement across users, because that would necessarily involve value judgements we are not comfortable making as a centralized entity. however, there are two types of staking required for raindrop:
- “institutional staking” requires entities who wish to sign up raindrop users *on their behalf* (i.e. passing new users’ addresses to the smart contract as parameters rather than new users transacting directly from their accounts) to stake a significant amount of hydro. these are the players we want to ensure are acting in the best interests of the community. in this model, hydro is simply one of many institutional stakers (where we sign up users on our kickass mobile app, which will be out soon).
- “user staking” requires individuals who wish to sign up for raindrop on their own, i.e. transact directly with the smart contract, are able to do so by staking a much smaller amount of hydro.
What this all means for you, as a potential customer of our API, is that you don’t actually have to worry about the staking requirement or signing up users at all, and can simply use our API in conjunction with the Hydro app.
Looking ahead to Snowflake, we have big plans to integrate increasing sophisticated uses of the token into the product. to some extent these are still up in the air, but rest assured that we are very focused on building a strong tokenomics structure. At a high level, the core token mechanism for snowflake will involve depositing tokens into the snowflake smart contract. These deposits will allow native staking/payment/incentive functionality denominated in hydro, without the hassle and worry of using ether with every call.
— Q (Hodlall):
When is raindrop Android app is releasing A (Andy):
It is currently under development. We have a bunch of android phones with different OS on the way. It is hard to give a set date as we don't know what unforeseen issues could come up during the process though. All I can say is it is literally all that our mobile development team is working on
— Q (Jeff_We_Cannafi):
To piggyback on matheussiq8’s question, how do these identity tokens compare to existing forms of identity authentication, and do you anticipate the tokens themselves will be traded on exchanges? A (Andy):
In my opinion, the main difference between what we are working towards and others like civic and uport is the scope of what we are aiming to do. We understand the value of having KYC on the blockchain and "One click signup", but really I think blockchain identity can be so much more than that. We are aiming to create a completely extendable and modular protocol which will allow for people to link anything they desire to their blockchain identity. Other protocols can tend to lean towards centralization (more a fault of current KYC procedures than the projects themselves) and we feel like this doesn't have to be the case. At least for now, something like KYC needs to have central authorities to verify user information, but why can't I also link my crypto kitties to my blockchain id or my linkedin profile to my blockchain id?
Overall, what we are trying to build will easily allow for other blockchain developers to create robust identity solutions for whatever application they feel fit with Snowflake being at the core of that. We feel that this is crucial to eventually creating a completely open and decentralized identity system. Anyone can join and anyone can add what THEY consider to be an identity, but I only have to accept what I consider to be an identity.
As far as trading, Snowflake Identity tokens will never be tradable. We feel that you identity should always be linked to you. This would be a dangerous road to a very easy black market for people's identities
— Q (Jrock):
What do you find the hardest part of pitching icos to regular companies?
Also what do you think needs to happen for widespread crypto adoption? A (Shane):
If you mean pitching Hydro to regular companies (we're not an ICO :stuck_out_tongue:), I would say the hardest part is getting the larger companies to move faster than a snail's pace. There are too many chefs in the kitchen and sometimes there is a lack of top-down strategy on blockchain, and it leaves large enterprises paralyzed sometimes. We try to resolve this by pitching how easy Hydro is to use, and how it connects to our broader Hydrogen ecosystem which can add value in a lot of places.
In my opinion, widespread crypto adoption is going to be dependent on how parallelization plays out. If crypto's only option is to create a new parallel economy, widespread adoption is going to be slow and arduous and will take decades. However, if blockchain is able to be infused or layered on some of the current systems we have in place, the adoption will be much faster and broader. Ultimately this comes down to the usage of private vs public chains - the more private and centralized chains that get implemented, the farther the mainstream adoption will get pushed out.
— Q (Luke):
One aspect of Hydro that is beginning to really intrigue me are the potential use cases and dapps that can be built by external developers ontop of the Hydro protocol layers for each phase.
- Having held various dev meetups and networking at various conferences, how are you finding the process of attracting developers to start building dapps and products in your ecosystem?
- I understand the HCDP is getting updated with various new rules and bounties for dapps to be built, have you approached any developers yet with this new offer, and if so, how has the reception been?
- How else do you intend to attract developers towards building on the Hydro protocols?
- Through our events, we're mainly focused on helping expand the blockchain-focused developer community. We help give exposure to projects we find to be doing neat, innovative work in the space and keep ongoing dialogue with these communities.
- In particular, to provide impetus to developers in the Hydro ecosystem, we've established the HCDP. The new process will involve putting out specific task requests. In the next week or so we'll have published specifications for dApps that can be built on top of Snowflake. We ourselves will not be building these dApps (they have nothing to do with Hydrogen's space as a company). This helps the ecosystem expand outside of Hydrogen-specific use-cases.
- ^^Through the above process to get them started. Eventually, we want the Hydro development process to be community-driven, so people are building on Hydro because it benefits their own programs and applications.
— Q (elmer_FUD):
Hey Hydro Team! Here's a few question I've got for you after checking out the Raindrop and Snowflake whitepapers:
How has your experience working in the Ethereum ecosystem been so far?
While you are currently focused on the financial sector, would you consider actively marketing to other sectors such as healthcare and education in the future?
It seems like both Raindrop and Snowflake would be useful in any environment that processes or stores sensitive data.
Do you have plans to release official Raindrop SDK packages in other languages in the future?
A bit more of a specific question: Raindrop is looks like a great product to use in a PCI-DSS environment - do you have thoughts on whether or not it the product is ready for primetime and do you think the industry standards and government regulation is prepared to handle these kinds of systems? A (Andy):
Thanks for the questions! I'm gonna answer each in a separate response in this thread
Overall it has been pretty solid. There is still a ton of room for growth in terms of documentation and stuff like that, but it is miles ahead of basically every other blockchain platform I have worked with. By far the biggest pain has been handling gas costs when considering the user experience. When trying to build actual products that people will want to use we feel that making it user friendly is something that many blockchain projects have not focused on nearly enough.
Yeah certainly. We focus on fintech as that is where the rest of our companies APIs focus and that is where we have the most connections, but much of what we are building is much further reaching than that. Just as far as authentication goes, it really can apply to any major field and we intend to market it as such.
We currently have Python and JS SDKs and have had a few java ones submitted through our community dev program. We have been revamping that program, but I anticipate we will be putting up more bounties for most major languages. I have considered making a few more myself, but we feel that they could be better suited as community projects.
I completely agree. Raindrop and blockchain authentication when handling anything around payments is a great application. I think the biggest thing is actually convincing regulatory bodies that the protocols we have build are secure (since many can still be scared of blockchain). I definitely see this as a direct use case though
— Q.1 (khonsu):
What kind of banking relations do you have as a company, do they (banks) understand what you are trying to do ? Any VCs approached you for funding ? explain your business model. A.1 (Shane):
Hydrogen has existed since 2009 in the form of Hedgeable. Hedgeable is a consumer-facing online investing app, and the tech behind it eventually spawned the Hydrogen tech platform. The story of how the transition happened goes essentially like this: (1) Hedgeable was disrupting banks & investing firms, (2) banks & investing firms started contacting us and seeing if we would help them digitize & automate their own businesses, (3) we started packaging up our tech and selling it to the banks. There was so much demand for this from financial institutions that we spun out a new company (Hydrogen).
So to get back to your original question: we have some long-standing relationships in the banking & finance world, and to this day we have inbound leads from that space coming in every week. The key thing to keep in mind is that these institutions move extremely slowly, but they do understand the core value prop of our platform. Many of these firms are still in the midst of basic digitization efforts (i.e. moving from really slow offline processes to simple digital infrastructure), and that is the primary thing we are helping them with in early stages. But they are also keen on blockchain tech and they will naturally turn to us for that once they reach that point. We do have a few relationships with big financial companies in which Hydro/blockchain are already part of the discussion.
We have revenue and don't need to rely on VCs. It is our general philosophy that building a business sustainably with actual clients and revenue is a good approach, but we would consider working with the right VC if that came to be and we wanted to scale more quickly. Right now, that is not an immediate concern for us.
Our business model is in charging developers and enterprises to access the Hydrogen technology platform, which currently consists of products like Atom, Ion, and Hydro. Developers pay a per-user fee to hit our core APIs, while large enterprises negotiate custom (usually multi-year) contracts with us that typically include recurring revenue. Hydro, specifically, is being offered for free right now, as we attempt to gain adoption. But it is important to note that Hydro is just one piece of our ecosystem. Q.2 (Joleen):
When you say fee - is this fee HYDRO? And when do you envisage HYDRO to no longer be offered FOC? A
**.2 (Shane):** Sorry if it wasn't clear, I meant free to use our Hydro tech/APIs. The usage of HYDRO tokens within that is a separate issue - they still need to have HYDRO and we do not give it away for free to clients
— Q (guacam0le):
Adoption of an identity management solution (etc) would potentially involve a lot of identities. Further, scalability is a hot topic w/ blockchain. Is this a potential bottleneck? What is or might be done to address such?
Tackling a competitor like Google or Authy's 2FA is no small feat. Also, not everyone is yet to embrace blockchain-based solutions. Have you found it difficult to interface with enterprises & get them excited about the idea of an overhaul? A (Anurag):
nowflake is designed to be relatively low-load on the blockchain. A user needs to conduct a single transaction to “mint” their Snowflake. Once this is complete, they would need to complete one-time transactions to set each of their different forms of identities as resolvers as needed. A Snowflake is designed to be built out via resolvers over the duration of a user’s lifetime, so there’s never a need for heavy, frequent transactional capability. Similarly, smart contracts simply need to be set as resolvers by users; they do not themselves transact. Network scalability improvements will increase the range of use-cases for smart contracts that can be tied to Snowflake, but they aren’t a necessary prerequisite to some important early use-cases such as KYC platforms, and a few basic user-interaction platforms.
As far as competition, we feel that current adoption of 2FA is, in general far short of where it should be, and any 2FA is generally better than none. Many businesses use text-message based 2FA, etc. In the short-run we are aiming toward pilot implementations with small businesses. To further this, we have put out many integration resources, guides, and documentation and accordingly believe implementation of Raindrop is a more straightforward workflow. As far as large enterprises go, Hydrogen has clients, so it is helpful for our project to have those connections. Large institutions are generally relatively slow-moving, but have expressed interest in using Raindrop, in particular for securing employee accounts. As the product grows, we may eventually move in this direction with Client Raindrop, but resources will always be available for any site that wants to adopt it. Additionally, we are looking into making a wordpress plug-in to make implementation much more accessible for many developers.
-- Q (Smithymethods):
I know Hydro is a fintech company, hydro plan to curb phishing and hacking to the bearest minimum we know that hacking is very rampant these days on MEW and with other wallet. Is Hydro planning to create a wallet that support hydro and other tokens using their raindrop Technology?
As this will put an end to the problem of phishing and also promote hydro A (Noah):
like everyone in the crypto space, we’re very worried about phishing, both personally and on behalf of all hydro token holders. we first want to reemphasize that preventing scams and fraud has to be a community-driven effort: teams and users need to be vigilant and promote best practices (never trusting links in public chats, shunning fake accounts, etc.). we are excited about raindrop’s potential to help combat phishing, though. we actually talked with someone about mycrypto about integrating raindrop into their desktop app. we’ve forked their code and are researching how feasible an implementation would be, stay tuned for updates!
— Q (Hodlall):
What security measures in place for hydro , I see lot of tokens being hacked nowadays , and money is stolen.. how does hydro make sure their team tokens are completely secured or as much as possible A (Andy):
We all have been in crypto for a while and are pretty well versed in securing our stuff. Our tokens that are currently locked are in cold storage. Others are held in hardware wallets
— Q (Joleen):
We know that the Hydrogen platform is going to be used by CI Investments, a large insurance firm and a world top 20 bank, have these companies already begun purchasing Hydro OTC? A (Andy):
This is something that we feel is best to be hands off with. It is really up to the discretion of our partners
— Q (khonsu’s mumaffi):
Ill be honest i have not yet fully read the whitepaper but id like to know other than investor growth do you truly believe there is interest in a model where users have to pay each time for access? How big do u expect this fee to be...for large companies dont you believe this is an unscalable practice? This may be a question more about most technologies built on token based economics too. A (Andy):
So we have 2 different authentication protocols. One happens less often and is in the same vein as OAuth. This is called Server-Side Raindrop. This requires tokens to be sent. This protocol would only happen once per day for a business when accessing something like an API. I don't feel that these values are extremely high for increased security.
Our second protocol, Client-Side Raindrop, functions much more like google auth. This logic actually does not require any tokens or even a transaction by the end user. It is 100% free for them to use and they will never have to pay for a transaction. Here the responsibility is on the implementing party to stake tokens. This allows them to onboard users and authenticate them.
We felt it was crucial to have an authentication that did not have a cost per user login as it is not scalable
— Q (khonsu’s mumaffi):
Also do u plan to tokenise atom and ion too and if not covered earlier how big of an impact do the market conditions have on your business A (Anurag):
Tough to say we're going to "tokenize" them since that word can carry a lot of different meanings in different contexts, but we do plan on integrating the entire Hydrogen platform with Hydro. This will most likely take the form of enhancements to systems leveraging Hydro. You can find a more detailed breakdown on our Hydro roadmap: https://medium.com/hydrogen-api/project-hydro-features-in-depth-look-39faa29f0d61
Market conditions don't really have an impact - we're still building the same tech on a day-to-day basis
— Q (ghost):
As a company in the space, do you see the fact that tokens have to be acquired on exchanges as an issue? How would a company that wants to develop with you acquire tokens? A (Anurag):
Depends on what they're developing. dApps developing using Hydro smart contracts to create native functionality to their applications would need to acquire those tokens on their own; however, companies using the Hydrogen API will not. Here's a detailed article outlining when a developer would need the token for the Client Raindrop smart contract: https://medium.com/hydrogen-api/how-to-use-client-raindrop-without-using-the-hydrogen-api-bb04934ae293
— Q (jarederaj):
Can you describe your stakeholders and give me a better sense of the exigency of your products? Who are you focused on serving with your platform and why are they motivated to use your platform? A (Shane):
The Hydrogen platform serves developers and enterprises who want to build applications. We are specifically targeting the financial services sector, including banks, investing firms, insurance providers, and financial advisors. This includes large enterprises, individual developers, and startups.
Our products are Atom (core digital infrastructure & engine for finserv), Ion (AutoML & business intelligence capabilities), and Hydro (blockchain & decentralization layer). Each has a different use case but these products combine to form an ecosystem of tools for developers to build sophisticated applications with.
The main pain point we are addressing is the resources required to build, launch, and run a digital financial application. These resources include both time and money.
Large enterprises have resources, but they waste years and millions of dollars trying to launch digital platforms (we've seen this first-hand), often unsuccessfully. The motivation here is obvious. Startups and smaller developers, on the other hand, do not have access to huge resource pools, so they are forced to look for solutions that make the process more efficient.
In the same way that Wordpress makes launching a blog easy and also allows for extended functionality, Hydrogen makes launching fintech application easy.
— Q (shujjishah):
When the app will be released??? A (Anurag):
We're going through our mobile development very iteratively. Since we work very closely with the product, there are things we can't recognize until we've got people beta testing the app. As we started Beta testing and conducting user-research, we realized that one aspect of the UI for the app was not intuitive to about half of our testers. We decided to make a few API changes to enable the mobile app to display a "linked" vs "unlinked" status in order to improve the user experience. Our front-end team is finalizing these changes, so our Beta testers will receive a new build in their testflight apps within the next few days. This new build will require another round of Beta testing to ensure that none of the code changes causes any problems on devices; if this change goes smoothly, and our mainnet testing goes smoothly, we will be able to release the app this month.
Since there isn't much precedent on releasing a product into the app store that connects users with the ethereum mainnet, our primary concern is making sure the product works fully as intended and provides an intuitive user experience. Misc Q&A’s Q (elmer_FUD):
What's your favorite thing to drink? A.1 (Andy):
Overall, I really love Baja Blast Mountain Dew. If I am drinking, I'm a big fan of fruity beers like Blue Moon and Shocktop. Also had a really good raspberry sour recently A.2 (Nahom):
Primary=water but i do enjoy Jamaican ginger ale/beer. We keep honest tea in the office too, i love it because it brings me back from the dead:skull_and_crossbones:, @Hydro Andy drinks most of it behind my back though :triumph: A.3 (Noah):
hard: tequila or picklebacks
soft: any sour beer
other: mango juice
i also crush like 2 nalgene’s worth of water every day at work A.4 (Shane):
For hard alcohol: whiskey/bourbon A.5 (Anurag):
ooh, went to the finback brewery last weekend; was wonderful
— Q (Joleen):
Do you HODL any other tokens personally? A.1 (Andy):
I do. I think it is probably best to not say which, but if you follow me enough in #altcoins I am sure you will see me talk about a few A.2 (Noah):
im a bit of an eth maximalist actually :grimacing: i do dabble though
— Q (Joleen):
Who got who in the World Cup sweepstakes? A.1 (Andy):
I'm going for Germany, but I know next to nothing about soccer A.2 (Shane):
I'm rooting for Portugal, but I don't think they're going to win the cup
— Q (Joleen):
Who's got the best banter in the office? And who has the worst? A.1 (Andy):
One of our backend devs, Paavan, typically has some great banter
and even better hot takes A.2 (Noah):
dont @ me for worst banter A.3 (Shane):
Sabih (BA @ Hydrogen) banter is by far the best
Hello! My name is Inna Halahuz, I am a sales manager at Platinum, the largest listing service provider for the STO and ICO projects. We know all about the best and most useful STO and ICO marketing services.
By the way, we developed the best blockchain platform:
We also created the UBAI, the unique educational project with the best and most useful online courses. We not only share our knowledge but also help the best graduates to find a job! After finishing our courses you will know all about crypto securities, ICO and STO advertizing and best blockchain platforms.
What a Blockchain Wallet is? What is its purpose?
Find the answer after reading this article.
The public key is the digital code you give to someone that wants to transfer ownership of a unit of cryptocurrency to you; and a private key is what you need to be able to unlock your own wallet to transfer a unit of a cryptocurrency to someone else. The encoding of information within a wallet is done by the private and public keys. That is the main component of the encryption that maintains the security of the wallet. Both keys function in simultaneous encryption systems called symmetric and asymmetric encryption. The former, alternatively known as private key encryption, makes use of the same key for encryption and decryption. The latter, asymmetric encryption, utilizes two keys, the public and private key, wherein a message-sender encrypts the message with the public key, and the recipient decodes it with their private key. The public key uses asymmetric algorithms that convert messages into an unreadable format. A person who possesses a public key can encrypt the message for a specific receiver.
Methods of wallet access vary depending on the type of wallet being used. Various types of currency wallets on an exchange will normally be accessed via the exchange’s entrance portal, normally involving a combination of a username/password and optionally, 2FA (Two factor authentication, which we explain in more detail later). Whereas hardware wallets need to be connected to an internet enabled device, and then have a pin code entered manually by the user in possession of the hardware wallet in order for access to be gained. Phone wallets are accessed through the device on which the wallet application has been downloaded. Ordinarily, a passcode and/or security pattern must be entered before entry is granted, in addition to 2FA for withdrawals.
Satoshi Nakamoto built the Satoshi client which evolved into Bitcoin in 2009. This software allowed users to create wallets and send money to other addresses. However, it proved to be a nightmarish user experience, with many transactions being sent to incorrect addresses and private keys being lost. The MtGox (Magic the Gathering Online exchange, named after the original intended use of the exchange) incident, which will be covered in greater detail later, serves as a reminder of the dangers present in the cryptosphere regarding security, and the need to constantly upgrade your defenses against all potential hacks. The resulting loss of 850k BTC is a still unresolved problem, weighing heavily on the victims and the markets at large. This caused a huge push for a constantly evolving and improving focus on security. Exchanges that developed later, and are thus considered more legitimate and secure, such as Gemini and Coinbase, put a much greater emphasis on vigilance as a direct result of the MtGox hacking incident. We also saw the evolution of wallet security into the physical realm with the creation of hardware wallets, most notable among them the Ledger and Trezor wallets.
Types of Wallets & Storage Methods
The simplest way to sift through the dozens of cryptocurrency storage methods available today, is to divide them up into digital and non-digital, software and hardware wallets. There are also less commonly used methods of storage of private keys, like paper wallets and brain wallets. We will examine them all at least briefly, because in the course of your interaction with cryptocurrencies and Blockchain technology, it is essential to master all the different types of hardware and software wallets. Another distinction must be made between hot wallets and cold wallets. A hot wallet is one that is connected to the internet, and a cold wallet is one that is not. Fun fact: The level below cold storage, deep cold storage has just recently been implemented by the Regal RA DMCC, a subsidiary of an internationally renowned gold trading company licensed in the Middle East. After having been granted a crypto trading license, Regal RA launched their “deep cold” storage solution for traders and investors, which offers the ability to store crypto assets in vaults deep below the Almas Tower in Dubai. This storage method is so secure that at no point is the vault connected to a network or the internet; meaning the owners of the assets can be sure that the private keys are known only to the rightful owners.
Lets take a quick look at specific features and functionality of varieties of crypto wallets. Software wallets: wallet applications installed on a laptop, desktop, phone or tablet. Web Wallets: A hot wallet by definition. Web Wallets are accessible through the web browser on your phone or computer. The most important feature to recognize about any kind of web wallet, is that the private keys are held and managed by a trusted third party. MyEtherWallet is the most commonly used non-exchange web wallet, but it can only be used to store Ethereum and ERC-20 tokens.
Though the avenue of access to MEW is through the web, it is not strictly speaking a web wallet, though this label will suffice for the time being. The MEW site gives you the ability to create a new wallet so you can store your ETH yourself. All the data is created and stored on your CPU rather than their servers. This makes MEW a hybrid kind of web wallet and desktop wallet. Exchange Wallets: A form of Web Wallet contained within an exchange. An exchange will hold a wallet for each individual variety of cryptocurrency you hold on that exchange. Desktop Wallets: A software program downloaded onto your computer or tablet hard drive that usually holds only one kind of cryptocurrency. The Nano Wallet (Formerly Raiwallet) and Neon wallet for storage of NEO and NEP-5 tokens are notable examples of desktop wallets Phone Wallets: These are apps downloaded onto a mobile phone that function in the same manner as a desktop wallet, but actually can hold many different kinds of cryptocurrency. The Eidoo Wallet for storing Ethereum and its associated tokens and Blockchain Wallet which currently is configured to hold BTC, ETH and Bitcoin Cash, are some of the most widely used examples.
Hardware wallets — LedgeTrezoAlternatives
Hardware wallets are basically physical pathways and keys to the unique location of your crypto assets on the Blockchain. These are thought to be more secure than any variety of web wallet because the private key is stored within your own hard wallet, an actual physical device. This forcibly removes the risk your online wallet, or your exchange counter party, might be hacked in the same manner as MtGox. In hardware wallet transactions, the wallet’s API creates the transaction when a user requests a payment. An API is a set of functions that facilitates the creation of applications that interact and access features or data of an operating system. The hardware then signs the transaction, and produces a public key, which is given to the network. This means the signing keys never leave the hardware wallet. The user must both enter a personal identification number and physically press buttons on the hardware wallet in order to gain access to their Blockchain wallet address through this method, and do the same to initiate transfers.
Possibly the safest form of cryptocurrency storage in terms of avoiding hacking, Paper Wallets are an offline form of crypto storage that is free to set up, and probably the most secure way for users, from beginners to experts, to hold on to their crypto assets. To say it simply, paper wallets are an offline cold storage method of storing cryptocurrency. This includes actually printing out your public and private keys on a piece of paper, which you then store and save in a secure place. The keys are printed in the form of QR codes which you can scan in the future for all your transactions. The reason why it is so safe is that it gives complete control to you, the user. You do not need to worry about the security or condition of a piece of hardware, nor do you have to worry about hackers on the net, or any other piece of malware. You just need to take care of one piece of paper!
Real World Historical Examples of Different Wallet Types
Web Wallet: Blockchain.info Brief mechanism & Security Blockchain.info is both a cryptocurrency wallet, supporting Bitcoin, Ethereum and Bitcoin cash, and also a block explorer service. The wallet service provided by blockchain.info has both a Web Wallet, and mobile phone application wallet, both of which involve signing up with an email address, and both have downloadable private keys. Two Factor Authentication is enabled for transfers from the web and mobile wallets, as well as email confirmation (as with most withdrawals from exchanges). Phone Wallet: Eidoo The Eidoo wallet is a multi-currency mobile phone app wallet for storage of Ethereum and ERC-20 tokens. The security level is the standard phone wallet level of email registration, confirmation, password login, and 2 factor authentication used in all transfers out. You may find small volumes of different varieties of cryptocurrencies randomly turning up in your Eidoo wallet address. Certain projects have deals with individual wallets to allow for “airdrops” to take place of a particular token into the wallet, without the consent of the wallet holder. There is no need to be alarmed, and the security of the wallet is not in any way compromised by these airdrops.
The NEON wallet sets the standard for web wallets in terms of security and user-friendly functionality. This wallet is only designed for storing NEO, Gas, and NEP-5 tokens (Ontology, Deep Brain Chain, RPX etc.). As with all single-currency wallets, be forewarned, if you send the wrong cryptocurrency type to a wallet for which it is not designed, you will probably lose your tokens or coins. MyEtherWallet My Ether Wallet, often referred to as MEW, is the most widely used and highly regarded wallet for Ethereum and its related ERC-20 tokens. You can access your MEW account with a hardware wallet, or a different program. Or you can also get access by typing or copying in your private key. However, you should understand this method is the least safe way possible,and therefore is the most likely to result in a hack. Hardware: TrezoLedger Brief History Mechanism and Security A hardware wallet is a physical key to your on-chain wallet location, with the private keys contained within a secure sector of the device. Your private key never leaves your hardware wallet. This is one of the safest possible methods of access to your crypto assets. Many people feel like the hardware wallet strikes the right balance between security, peace of mind, and convenience. Paper Wallet Paper wallets can be generated at various websites, such as https://bitcoinpaperwallet.com/
. They enable wallet holders to store their private keys totally offline, in as secure a manner as is possible.
Real World Example — Poor Practices
MtGox Hack history effects and security considerations MtGox was the largest cryptocurrency exchange in the world before it was hacked in 2014. They were handling over 70% of BTC transactions before they were forced to liquidate their business. The biggest theft of cryptocurrency in history began when the private keys for the hot wallets were stolen in 2011 from a wallet.dat file, possibly by hacking, possibly by a rogue employee. Over the course of the next 3 years the hot wallets were emptied of approximately 650000 BTC. The hacker only needed wallet.dat file to access and make transfers from the hot wallet, as wallet encryption was only in operation from the time of the Bitcoin 0.4.0 release on Sept 23rd 2011. Even as the wallets were being emptied, the employees at Mt Gox were apparently oblivious to what was taking place. It seems that Mt Gox workers were interpreting these withdrawals as large transfers being made to more secure wallets. The former CEO of the exchange, Mark Karpeles, is currently on trial for embezzlement and faces up to 5 years in prison if found guilty. The Mt Gox hack precipitated the acceleration of security improvements on other exchanges, for wallets, and the architecture of bitcoin itself. As a rule of thumb, no small-to-medium scale crypto holders should use exchange wallets as a long-term storage solution. Investors and experienced traders may do this to take advantage of market fluctuations, but exchange wallets are perhaps the most prone to hacking, and storing assets on exchanges for an extended time is one of the riskiest ways to hold your assets.
In a case strikingly similar to the MtGox of 2011–2014, the operators of the BitGrail exchange “discovered” that approximately 17 million XRB ($195 million worth in early 2018) were missing. The operators of the exchange were inexplicably still accepting deposits, long after they knew about the hack. Then they proceeded to block withdrawals from non-EU users. And then they even requested a hard fork of the code to restore the funds. This would have meant the entire XRB Blockchain would have had to accept all transactions from their first “invalid” transaction that were invalid, and rollback the ledger. The BitGrailexchange attempted to open operations in May 2018 but was immediately forced to close by order of the Italian courts. BitGrail did not institute mandatory KYC (Know your customer) procedures for their clients until after the theft had been reported, and allegedly months after the hack was visible. They also did not have 2 factor authentication mandatory for withdrawals. All big, and very costly mistakes.
Case Study: Good Practice Binance, the Attempted Hack
During the 2017 bull run, China-based exchange Binance quickly rose to the status of biggest altcoin exchange in the world, boasting daily volumes that surged to over $4 billion per day in late December. Unfortunately, this success attracted the attention of some crafty hackers. These hackers purchased domain names that were confusingly similar to “binance.com”. And then they created sufficiently convincing replica websites so they could phish traders for their login information. After obtaining this vital info, the scammers created API keys to place large buy orders for VIAcoin, an obscure, low volume digital currency. Those large buy orders spiked VIA’s price. Within minutes they traded the artificially high-priced VIA for BTC. Then they immediately made withdrawal requests from the hacked BTC wallets to wallets outside of the exchange. Almost a perfect fait accompli! But, Binance’s “automating risk management system” kicked in, as it should, and all withdrawals were temporarily suspended, resulting in a foiled hacking attempt.
Software Wallets Web/Desktop/Phone/Exchange Advantages and Limitations
As we said before, it is inadvisable to store crypto assets in exchange wallets, and, to a lesser extent, Web Wallets. The specific reason we say that is because you need to deliver your private keys into the hands of another party, and rely on that website or exchange to keep your private key, and thus your assets, safe. The advantages of the less-secure exchange or web wallets, are the speed at which you can transfer assets into another currency, or into another exchange for sale or for arbitrage purposes. Despite the convenience factor, all software wallets will at some point have been connected to the internet or a network. So, you can never be 100% sure that your system has not been infected with malware, or some kind of keylogging software, that will allow a third party to record your passwords or private keys. How well the type of storage method limits your contact with such hazards is a good way to rate the security of said variety of wallet. Of all the software wallets, desktop and mobile wallets are the most secure because you download and store your own private key, preferably on a different system. By taking the responsibility of private key storage you can be sure that only one person has possession of it, and that is you! Thereby greatly increasing the security of your crypto assets. By having their assets in a desktop wallet, traders can guard their private key and enjoy the associated heightened security levels, as well keep their assets just one swift transfer away from an exchange.
Hardware Wallets Advantages and Limitations
We briefly touched on the features and operation of the two most popular hardware wallets currently on the market, the Ledger and Trezor wallets. Now it will be helpful to take a closer look into the pros and cons of the hardware wallet storage method. With hardware wallets, the private keys are stored within a protected area of the microcontroller, and they are prevented from being exported out of the device in plain text. They are fortified with state-of-the-art cryptography that makes them immune to computer viruses and malware. And much of the time, the software is open source, which allows user validation of the entire performance of the device. The advantages of a hardware wallet over the perhaps more secure paper wallet method of crypto storage is the interactive user experience, and also the fact that the private key must at some stage be downloaded in order to use the paper wallet. The main disadvantage of a hardware wallet is the time-consuming extra steps needed to transfer funds out of this mode of storage to an exchange, which could conceivably result in some traders missing out on profits. But with security being the main concern of the vast majority of holders, investors and traders too, this slight drawback is largely inconsequential in most situations.
Paper Wallets Advantages and Limitations
Paper wallets are thought by some to be the safest way to store your crypto assets, or more specifically, the best method of guarding the pathways to your assets on the Blockchain. By printing out your private key information, the route to your assets on the Blockchain is stored 100% offline (apart from the act of printing the private key out, the entire process is totally offline). This means that you will not run the risk of being infected with malware or become the victim of keylogging scams. The main drawback of using paper wallets is that you are in effect putting all your eggs in one basket, and if the physical document is destroyed, you will lose access to your crypto assets forever.
Key things to keep in mind about your Wallet Security: Recovery Phrases/Private Key Storage/2FA/Email Security
Recovery phrases are used to recover the on-chain location for your wallet with your assets for hardware wallets like ledgers and Trezors that have been lost. When you purchase a new ledger for example, you just have to set it up again by entering the recovery phrase into the display and the lost wallets will appear with your assets intact. Private key storage is of paramount importance to maintain the safety of your on-chain assets! This should be done in paper wallet form, or stored offline on a different computer, or USB device, from the one you would typically use to connect to the 2 Factor Authentication (2FA) sometimes known as “two step authentication”. This feature offers an extra security layer when withdrawing funds from cryptocurrency wallets. A specialized app, most commonly Google Authenticator, is synced up to the exchange to provide a constantly changing code. This code must be entered within a short time window to initiate transfers, or to log into an exchange, if it has also been enabled for that purpose.
You must always consider the level of fees, or the amount of Gas, that will be needed to carry out the transaction. In times of high network activity Gas prices can be quite high. In fact, in December 2017 network fees became so high that some Bitcoin transactions became absolutely unfeasible. But that was basically due to the anomalous network congestion caused by frantic trading of Bitcoin as it was skyrocketing in value. When copying wallet addresses, double check and triple check that they are correct. If you make a mistake and enter an incorrect address, it is most likely your funds will be irretrievably lost; you will never see those particular assets again. Also check that you haven’t input the address of another one of your wallets that is designed to hold a different variety of cryptocurrency. You would similarly run the very great risk of losing your funds forever. Or, at the very least, if you have sent the wrong crypto to a large exchange wallet, for example on Coinbase, maybe you could eventually get those funds back, but it would still entail a long and unenjoyable wait.
How to Monitor Funds
There are two ways to monitor you funds and your wallets. The first is by searching for individual wallet addresses on websites specifically designed to let you view all the transactions on a particular Blockchain. The other is to store a copy of your wallet contents on an application that tracks the prices of all cryptocurrencies. Blockchain.info is the block explorer for Bitcoin, and it allows you to track all wallet movements so you can view your holdings and all the historical transactions within the wallet. The Ethereum blockchain’s block explorer is called Ether scanner, and it functions in the same way. There is a rival to Ether scanner produced by the Jibrel Network, called JSearch which will be released soon. JSearch will aim to offer a more streamlined and faster search method for Ethereum blockchain transactions. There are many different kinds of block explorer for each individual crypto currency, including nanoexplorer.io for Nano (formerly Rai Blocks) and Neotracker for NEO. If you simply want to view the value of your portfolio, the Delta and Blockfolio apps allow you to easily do that. But they are not actually linked to your specific wallet address, they just show price movements and total value of the coins you want to monitor.
That’s not all! You can learn how to transfer and monitor the funds in and out of your wallet by clicking on the link.
To be continued! UBAI.co
Contact me via Facebook, Instagram and LinkedIn to learn more about the best online education: LinkedIn Facebook Instagram
Binance started as a crypto exchange hosting a relatively large selection of coins. Offering access to crypto is one of our key features. We don’t list every coin under the sun. We have a selection process that is often viewed as overly strict, especially by project communities that haven’t been listed yet. Out of hundreds of thousands of tokens created on the blockchains, we have only ... We will request historical Bitcoin price data from the Binance API and then outline four options to save that data to a CSV file. We want data that goes as far back as possible. Fortunately, there is a function within the library that allows us to determine the first available price point. # valid intervals - 1m, 3m, 5m, 15m, 30m, 1h, 2h, 4h, 6h, 8h, 12h, 1d, 3d, 1w, 1M # get timestamp of ... The exchange, a U.S. affiliate of Binance, currently lists bitcoin, ether, XRP, Qtum, Atom, Dash and 20 other cryptocurrencies. If adopted, the proposal might help exchanges become more comfortable with listing new assets, Coley said, with the understanding that the developers behind those projects would be required to “maintain quality development,” and would not immediately be classified ... CoinDesk provides a simple and free API to make its Bitcoin Price Index (BPI) data programmatically available to others. Find out how to use it here. L'API Binance est conçue pour fournir un moyen simple et efficace d'intégrer votre application de trading à notre plateforme. Documentation API officielle de Binance . Contactez-nous. Assistance 24h/24 et 7j/7. Vous avez un problème ? Contactez-nous, c'est tout. Notre équipe d'assistance technique est disponible 24/7. Blog Binance. Actualités et mises à jour du leader mondial des ... Binance.US is available to download as an app in your Apple or Android phone, allowing users to deposit, trade, and send over 30 digital assets including Bitcoin to and from your digital wallets, bank account, and/or crypto storage options of your choice.
In this video I talk about the basics of using Python requests by showing you how to call the Coinbase Bitcoin Price Index API. You can see the API docs here... Binance Deutsch - Binance anmelden - Binance Anleitung In diesem Video zeige ich dir in Form meiner Binance Erfahrungen, wie du dich bei Binance anmelden kannst. Exchange Bitcoin to Ethereum on the best cryptocurrency exchange platform Changelly.com. Buy Ethereum with the best exchange rates with a credit card or any crypto wallet. Integrate our API A full... Heute möchte ich euch ein Unternehmen vorstellen von welchem ich mehr als überzeugt bin. In diesem Video wird es aber vorrangig um meine Ergebnisse gehen. Kurz und Knapp jedoch mit einem ... Thanks for watching! For donations: Bitcoin - 1CpGMM8Ag8gNYL3FffusVqEBUvHyYenTP8 In this video I demonstrate how websocket data can be streamed into a browser using electron module. Useful Links: Download and Install NodeJS: https://nodej... The links used for analysing binance. Binance can be bought from the binance exchange by depositing btc. https://coinmarketcap.com/ https://www.linkedin.com/... In deze video leg ik stap voor stap uit hoe je jouw exchange (BINANCE) kan koppelen aan je Cryptohopper en kan beginnen met trade!! LINKS ⛓️ Start hier met een binance account: Coinigy Bitcoin 366 views. 2:05. What is an API? - Duration: 3:25. MuleSoft Videos 3,073,026 views. 3:25. How to link your Binance API Key with the CWE trading platform - Duration: 3:13. Crypto ... Their API and the documentation for their API is the best out there. They are currently running a promotion where if you use the code "CCT" when you register you get 0% trading fees until the end ...