99Bitcoins - How to Buy Bitcoin in 2020 Mine Bitcoin ...

Epic Cash AMA Recap with CryptoDiffer Community

CryptoDiffer team Hello, everyone! We are glad to meet here: Max Freeman (@maxfreeman4), Project Lead at Epic Cash Yoga Dude (@Yogadude), PR&Marketing at Epic Cash Xenolink (@Xenolink), Advisor at Epic Cash
Max Freeman Project Lead at Epic Cash Thanks Max, we are excited to be here!
Yoga Dude PR&Marketing at Epic Cash Hello Everyone! Thank you for having us here!
Xenolink Advisor at Epic Cash Thank you to the CryptoDiffer team and CryptoDiffer community for hosting us!
CryptoDiffer team Let`s start from the first introduction question: Q1: Can you introduce yourself to the community? What is your background and how did you join Epic Cash?
Yoga Dude PR&Marketing at Epic Cash
Hello! My background is Marketing and Business Development, I’ve been in crypto since 2011 started with Bitcoin, then Monero in 2014, Ethereum in 2015 and at some point Doge for fun and profit. I joined Epic Cash team in September 2019 handling PR and Marketing.
I saw in Epic Cash what was missing in my previous cryptos — things that were missing in Bitcoin and Monero especially.
Xenolink Advisor at Epic Cash
Hello Cryptodiffer Community, I am not an original co-founder nor am I a developer for the Epic Cash project. I am however a community member that is involved in helping scale this project to higher levels. One of the many beauties of Epic Cash is that every single member in the community has the opportunity to be part of EPIC’s team, it can be from development all the way to content producing. Epic Cash is a community driven project. The true Core Team of Epic Cash is our community. I believe a community that is the Core Team is truly powerful. EPIC Cash has one of the freshest and strongest communities I have seen in quite a while. Which is one of the reasons why I became involved in this project. Epic displayed some of the most self community produced content I have seen in a project. I’m actually a doctor of medicine but in terms of my experience in crypto, I have been involved in the industry since 2012 beginning with mining Litecoin. Since then I have been doing deep dive analysis on different projects, investing, and building a network in crypto that I will utilize to help connect and scale Epic in every way I can. To give some credit to those people in my network that have been a part of helping give Epic exposure, I would like to give a special thanks to u/Tetsugan and u/Saurabhblr. Tetsugan has been doing a lot of work for the Japanese community to penetrate the Japanese market, and Japan has already developed a growing interest in Epic. Daku Sarabh the owner and creator of Crypto Daku Robinhooders, I would like to thank him and his community for giving us one of our first large AMA’s, which he has supported our project early and given us a free AMA. Many more to thank but can’t be disclosed. Also thank you to all the Epic Community leaders, developers, and Content producers!
Max Freeman Project Lead at Epic Cash
I’m Max Freeman, which stands for “Maximum Freedom for Mankind”. I started working on the ideas that would become Epic in 2018. I fell in love with Bitcoin in 2017 but realized that it needs privacy at the base layer, fungibility, better scalability in order to go to the next level.
CryptoDiffer team
Really interesting backgrounds I must admit, pleasure to see the team that clearly has one vision of the project by being completely decentralized:)
Q2: Can you briefly describe what is Epic Cash in 3–5 sentences? What technology stands behind Epic Cash and why it’s better than the existing one?
Max Freeman Project Lead at Epic Cash
I’d like to highlight the differences between Epic and the two highest-valued privacy coin projects, Monero and Zcash. XMR has always-on privacy like Epic does, but at a cost: Its blockchain is over 20x more data intensive than Epic, which limits its possibilities for scalability. Epic’s blockchain is small and light enough to run a full node on cell phones, something that is in our product road map. ZEC by comparison can’t run on low end devices because of its zero knowledge based approach, and only 1% of transactions are fully private. Epic is simply newer, more advanced technology than prior networks thanks to Mimblewimble
We will also add more algorithms to widen the range of hardware that can participate in mining. For example, cell phones and tablets based around ARM chips. Millions of people can mine Epic that can’t mine Bitcoin, and that will help grow the network rapidly.
There are some great short videos on our YouTube channel https://www.youtube.com/channel/UCQBFfksJlM97rgrplLRwNUg/videos
that explain why we believe we have created something truly special here.
Our core architecture derives from Grin, so we are fortunate to benefit on an ongoing basis from their considerable development efforts. We are focused on making our currency truly usable and widely available, beyond a store of value and becoming a true medium of exchange.
Yoga Dude PR&Marketing at Epic Cash
Well we all have our views, but in a nutshell, we offer things that were missing in the previous cryptos. We have sound fiscal emission schedule matching Bitcoin, but we are vastly more private and faster. Our blockchain is lighter than Bitcoin or Monero and our tech is more scalable. Also, we are unique in that we are mineable with CPUs and GPUs as well as ASICs, giving the broadest population the ability to mine Epic Cash. Plus, you can’t forget FUNGIBILITY 🙂 we are big on that — since you can’t have true privacy without fungibility.
Also, please understand, we have HUGE respect to all the cryptos that came before us, we learned a lot from them, and thanks to their mistakes we evolved.
Xenolink Advisor at Epic Cash
To add on, what also makes Epic Cash unique is the ability to decentralize the mining using a tri-algo model of Random X (CPU), Progpow (GPU), and Cuckoo (ASIC) for an ability to do hybrid mining. I believe this is an issue we can see today in Bitcoin having centralized mining and the average user has a costly barrier of entry.
To follow up on this one in my opinion one of the things we adopted that we have seen success for , in example Bitcoin and Monero, is a strong community driven coin. I believe having a community driven coin will provide a more organic atmosphere especially when starting with No ICO, or Premine with a fair distribution model for everyone.
CryptoDiffer team
Q3: What are the major milestones Epic Cash has achieved so far? Maybe you can share with us some exciting plans for future weeks/months?
Yoga Dude PR&Marketing at Epic Cash
Since we went live in September of 2019, we attracted a very large community of users, miners, investors and contributors from across the world. Epic Cash is a very international project with white papers translated into over 30 languages. We are very much a community driven project; this is very evident from our content and the amount of translations in our white papers and in our social media content.
We are constantly working on improving our usability, security and privacy, as well as getting our message and philosophy out into the world to achieve mass adoption. We have a lot of exciting plans for our project, the plan is to make Epic Cash into something that is More than Money.
You can tell I am the Marketing guy since my message is less about the actual tech and more about the usability and use cases for Epic Cash, I think our Team and Community have a great mix of technical, practical, social and fiscal experiences. Since we opened our YouTube channels content for community submissions, we have seen our content translated into Spanish, French, German, Polish, Chinese, Japanese, Arabic, Russian, and other languages
Max Freeman Project Lead at Epic Cash
Our future development roadmap will be published soon and includes 4 tracks:
Usability
Mining
Core Protocol
Ecosystem Development
Core Protocol
Epic Server 2.9.0 — this release improves the difficulty adjustment and is aimed at making block emission closer to the target 60 seconds, particularly reducing the incidence of extremely short and long blocks — Status: In Development (Testing) Anticipated Release: June 2020
Epic Server 3.0.0 — this completes the rebase to Grin 3.0.0 and serves as the prerequisite to some important functional building blocks for the future of the ecosystem. Specifically, sending via Tor (which eliminates the need to open ports), proof of payment (useful for certain dex applications e.g. Bisq), and our native mobile app. Status: In Development (Testing) Anticipated Release: Fall 2020
Non-Interactive Transactions — this will enhance usability by enabling “fire and forget” send-to-address functionality that users are accustomed to from most cryptocurrencies. Status: Drawing Board Anticipated Release: n/a
Scaling Options — when blocks start becoming full, how will we increase capacity? Two obvious options are increasing the block size, as well as a Lightning Network-style Layer 2 structure. Status: Drawing Board Anticipated Release: n/a
Confidential Assets — Similar to Raven, Tari, and Beam, the ability to create independently tradable assets that ride on the Epic Blockchain. Status: Drawing Board Anticipated Release: n/a
Usability
GUI Wallet 2.0 — Restore from seed words and various usability enhancements — Status: Needs Assessment Anticipated Release: Fall 2020
Mobile App — Native mobile experience for iOS and Android. Status: In Development (Testing) Anticipated Release: Winter 2020
Telegram Integration — Anonymous payments over the Telegram network, bot functionality for groups. Status: Drawing Board Anticipated Release: n/a
Mining
RandomX on ARM — Our 4th PoW algorithm, this will enable tablets, cell phones, and low power devices such as Raspberry Pi to participate in mining. Status: Needs Assessment Anticipated Release: n/a
The economics of mining Epic are extremely compelling for countries that have free or extremely cheap electricity, since anyone with an ordinary PC can mine. Individual people around the world can simply run the miner and earn meaningful money (imagine Venezuela for example), something that has not been possible since the very early days of Bitcoin.
Ecosystem Development
Atomic Swaps — Connecting Epic to other blockchains in a trustless way, starting with ETH so that Epic can trade on DeFi infrastructure such as Uniswap, Kyber, etc. Status: Drawing Board Anticipated Release: n/a
Xenolink Advisor at Epic Cash
From the Community aspect, we have been further developing our community international reach. We have been seeing an increase in interest from South America, China, Russia, Japan, Italy, and the Philippines. We are working on targeting more countries. We truly aim to be a decentralized project that is open to everyone worldwide.
CryptoDiffer team
Great, thank you for your answers, we now can move to community questions part!
Cryptodiffer Community
You have 3 mining algorithms, the question is: how do they not compete with each other? Is there any benefit of mining on the GPU and CPU if someone is mining on the ASIC?
Max Freeman Project Lead at Epic Cash
The block selection is deterministic, so that every 100 blocks, 60% are for RandomX (CPU), 38% for ProgPow (GPU), and 2% for Cuckoo (ASIC) — the policy is flexible so that we can have as many algorithms with any percentages we want. The goal is to make the most decentralized and resilient network possible, and with that in mind we are excited to work on enabling tablets and cell phones to mine, since that opens it up to millions of people that otherwise can’t take part.
Cryptodiffer Community
To Run a project smoothly, Funding is very important, From where does the Funding/revenue come from?
Xenolink Advisor at Epic Cash
Yes, early on this was realized and in order to scale a project funds are indeed needed. Epic Cash did not start with any funding and no ICO and was organically genesis mined with no pre-mine. Epic cash is also a nonprofit community driven project similar to Monero. There is no profit-driven entity in the picture. To overcome the revenue issue Epic Cash setup a development fund tax that decreases 1% every year until 2028 when Epic Cash reaches singularity with Bitcoin emissions. Currently it is at 7.77%. This will help support the scaling of the project.
Cryptodiffer Community
Hi! In your experience working also with MONERO can you please clarify which are those identified problems that EPIC CASH aims to develop and resolve? What’s the main advantage that EPIC CASH has over MONERO? Thank you!
Yoga Dude PR&Marketing at Epic Cash
First, I must admit that I am still a huge fan and HODLer of Monero. That said:
✅ our blockchain is MUCH lighter than Monero’s
✅ our transaction processing speed is much faster
✅ our address-less blockchain is more private
✅ Epic Cash can be mined with CPU (RandomX) GPU (ProgPow) and Cuckoo, whereas Monero migrated to RandomX and currently only mineable with CPU
Cryptodiffer Community
  1. the feature ‘Cut Through’ deletes old data, how is it decided which data will be deletes, and what are the consequences of it for the platform and therefore the users?
  2. On your website I see links to download Epic wallet and mining software for Linux,Windows and MacOs, I am a user of android, is there a version for me, or does it have a release date?
Max Freeman Project Lead at Epic Cash
  1. This is one of the most exciting features of Mimblewimble, which is its extraordinary ability to compress blockchain data. In Bitcoin, the entire history of a coin must be replayed every time it is spent, and comprehensive details are permanently stored in the blockchain. Epic discards spent transaction inputs and consolidates outputs, storing neither addresses or amounts, only a tiny kernel to allow sender and receiver to prove their transaction.
  2. The Vitex mobile app is great for today, and we have a native mobile app for iOS and Android in the works as well.
Cryptodiffer Community
$EPIC Have total Supply of 21,000,000 EPIC , is there any burning plan? Or Buyback program to maintain $EPIC price in the future?
Who is Epic Biggest competitors?
And what’s makes epic better than competitors?
Xenolink Advisor at Epic Cash
We respect the older generation coins like Bitcoin. But we have learned that the supply economics of Bitcoin is very sound. Until today we can witness how the Bitcoin is being adopted institutionally and by retail. We match the 21 million BTC supply economics because it is an inelastic fixed model which makes the long-term economics very sound. To have an elastic model of burning tokens or printing tokens will not have a solid economic future. Take for example the USD which is an inflating supply. In terms of competitors we look at everyone in crypto with respect and also learn from everyone. If we had to compare to other Mimblewimble tech coins, Grin is an inelastic forever inflating supply which in the long term is not sound economics. Beam however is an inelastic model but is formed as a corporation. The fair distribution is not there because of the permanent revenue model setup for them. Epic Cash a non-profit development tax fund model for scaling purposes that will disappear by 2028’s singularity.
Cryptodiffer Community
What your plans in place for global expansion, are you focusing on only market at this time? Or focus on building and developing or getting customers and users, or partnerships?
Yoga Dude PR&Marketing at Epic Cash
Since we are a community project, we have many developers, in addition to the core team.
Our plans for Global expansion are simple — we have advocates in different regions addressing their audiences in their native languages. We are growing organically, by explaining our ideology and usability. The idea is to grow beyond needing a fiat bridge for crypto use, but to rather replace fiat with our borderless, private and fungible crypto so people can use it to get goods and services without using banks.
We are not limiting ourselves to one particular demographic — Epic Cash is a valid solution for the gamers, investors, techie and non techie people, and the unbanked.
Cryptodiffer Community
EPIC confidential coin! Did you have any problems with the regulators? And there will be no problems with listing on centralized exchanges?
Xenolink Advisor at Epic Cash
In terms of structure, we are carefully set up to minimize these concerns. Without a company or investors in the picture, and having raised no funds, there is little scope to attack in terms of securities laws. Bitcoin and Ethereum are widely acknowledged as acceptable, and we follow in their well-established footprints in that respect. Centralized exchanges already trade other privacy coins, so we don’t see this as much of an issue either. In general, decentralized p2p exchange options are more interesting than today’s centralized platforms. They are more censorship resistant, secure, and privacy-protecting. As the technology gets better, they should continue to gain market share and that’s why we’re proud to be partnered with Vitex, whose exchange and mobile app work very well.
Cryptodiffer Community
What are the main utility and real-life usage of the #EPIC As an investor, why should we invest in the #EPIC project as a long-term investment?
Max Freeman Project Lead at Epic Cash
Because our blockchain is so light (only 1.16gb currently, and grows very slowly) it is naturally well suited to become a decentralized mobile money standard because people can run a full node on their phone, guaranteeing the security of their funds. Scalability in Bitcoin requires complicated and compromised workarounds such as Lightning Network and light clients, and these problems are solved in Epic.
With our forthcoming Mobile Mining app, hundreds of millions of cell phones and tablets will be able to easily join the network. People can quickly and cheaply send money to one another, fulfilling the long-envisioned promise of P2P electronic cash.
As an investor, it’s important to ask a few key questions. Bitcoin Standard tokenomics of disinflation and a fixed supply are well proven over a decade now. We follow this model exactly, with a permanently synchronized supply from 2028, and 4 emission halvings from now until then, with our first one in about two weeks. Beyond that, we can apply some simple logical tests. What is more valuable, money that can only be used in some cases (censorable Bitcoin based on a lack of fungibility) or money that can be used universally? (fungible Epic based on always-on privacy by default). Epic is also poised to be a more decentralized and therefore resilient network because of wider participation in mining. Epic is designed to be Bitcoin++ Privacy, Fungibility, Scalability
Cryptodiffer Community
Q1. What are advantages for choosing three mining algorithms RandomX+, ProgPow and CuckAToo31+ ?
Q2. Beam and Grin use MimbleWimble protocol, so what are difference for Epic? All of you will be friends for partners or competitors?
Max Freeman Project Lead at Epic Cash
RandomX and ProgPow are designed to use the entirety of a CPU / GPU’s unique processing capabilities in a way that other types of hardware don’t work as well. You can run RandomX on a GPU but it doesn’t work nearly as well as a much cheaper CPU, for example. Cuckoo is a “memory hard” algorithm that widens the range of companies that can produce the hardware.
Grin and Beam are great projects and we’ve learned a lot from them. We inherited our first codebase from Grin’s excellent Rust design, which is a better language for community participation than C++ that Beam currently uses.
Functionally, Mimblewimble is similar across the 3 coins, with standard Confidential Transactions, CoinJoin, Dandelion++, Schnorr Signatures and other advanced features. Grin is primarily ASIC-targeted, Beam is GPU-targeted, and Epic is multi-hardware.
The biggest differences though are in tokenomics and project structure. Grin has permanent inflation of 60 coins per block with no halvings, which means steady erosion of value over time due to new supply pressure. It also lacks a steady funding model, making future development in jeopardy, particularly as the per coin price falls. Beam has a for-profit model with heavy early inflation and a high developer tax. Epic builds on the strengths of these earlier mimblewimble projects and addresses the parts that could be improved.
Cryptodiffer Community Some privacy coin has scalability issues! How Epic cash will solve scalability issues? Why you choose randomX consensus algorithem?
Xenolink Advisor at Epic Cash
Fungibility means that you can’t distinguish one unit of currency from another, in example Gold. Fungibility has recently become a hot issue as people have been noticing Bitcoins being locked up by exchanges which may of had a nefarious history which are called Tainted Coins. In example coins that have been involved in a hack, darknet market transactions, or even processing coin through a mixer. Today we can already see freshly mined Bitcoins being sold at a premium price to avoid the fungibility problem Bitcoin carries today. Bitcoin can be tracked by chainalysis and is not a fungible cryptocurrency. One of the features that Epic has is privacy with added fungibility, because of Mimblewimble technology, Epic has no addresses recorded and therefore nothing can be tracked by chainalysis. Below I provide a link of an example of what the lack of fungibility is resulting in today with Bitcoin. One of the reasons why we chose the Random X algo. is because of the easy barrier of entry and also to further decentralize the mining. Random X algo can be mined on old computers or laptops. We also have 2 other algos Progpow (GPU), and Cuckoo (ASIC) to create a wider decentralization of mining methods for Epic.
Cryptodiffer Community
I’m a newbie in crypto and blockchain so how will Epic Cash team target and educate people who don’t know about blockchain and crypto?
What is the uniqueness of Epic Cash that cannot be found in other project that´s been released so far ?
Yoga Dude Pr&Marketing at Epic Cash
Actually, while we have our white paper translated into over 30 languages, we are more focused on explaining our uses and advantages rather than cold specs. Our tech is solid, but we not get hung up on pure tech talk which most casual users do not need to or care to understand. As long as our fundamentals and tech are secure and user friendly our primary goal is to educate about use cases and market potential.
The uniqueness of Epic Cash is its amalgamation of “whats good” in other cryptos. We use Mimblewimble for privacy and anonymity. Our blockchain is much lighter than our competitors. We are the only Mimblewimble crypto to use a unique cocktail of mining algorithms allowing to be mined by casual miners with gaming rigs and laptops, while remaining friendly to GPU and CPU farmers.
The “uniqueness” is learning from the mistakes of those who came before us, we evolved and learned, which is why our privacy is better, we are faster, we are fungible, we offer diverse mining and so on. We are the best blend — thats powerful and unique
Cryptodiffer Community
Can you share EPIC’s vision for decentralized finance (DEFI)? What features do EPIC have to support DEFI?
Yoga Dude PR&Marketing at Epic Cash
We view Epic as ideally suited to be the decentralized digital reserve asset of the new Private Internet of Money that’s emerging. At a technology level, atomic swaps can be created to build liquidity bridges so that wrapped Epic tokens (like WBTC, WETH) can trade on other networks as ERC20, BEP2, NEP5, VIP180, Algorand and so on. There is more Bitcoin value locked on Ethereum than in Lightning Network, so we will similarly integrate Epic so that it can trade on networks such as Uniswap, Kyber, and so on.
Longer term, if there is market demand for it, thanks to Scriptless Script functionality our blockchain has, we can build “Confidential Assets” (which Raven, Tari, and Beam are all also working on) that enable people to create tokenized assets in a private way.
Cryptodiffer Community
If you could choose one celebrity to promote Epic-cash, who that would be?
Max Freeman Project Lead at Epic Cash
I am a firm believer that the strength of the project lies in allowing community members to become their own celebrities, if their content is good enough the community will propel them to celebrity status. Organic celebrities with small but loyal following are vastly more beneficial than big name professional shills with inflated but non caring audiences.
I remember the early days of Apple when an enthusiastic dude named Guy Kawasaki became Apple Evangelist, he was literally going around stores that sold Apple and visited user groups and Evangelized his belief in Apple. This guy became a Legend and helped Apple become what it is today.
Epic Cash will have its OWN Celebrities
Cryptodiffer Community
How does $EPIC solve scalability of transactions? Current blockchains face issues with scalability a lot, how does $EPIC creates a solution to it?
Xenolink Advisor at Epic Cash
Epic Cash is utilizing Mimblewimble technology. Besides the privacy & fungibility aspect of the tech. There is the scalability features of it. It is implemented into Epic by transaction cut-through. Which means it allows nodes to remove all intermediate transactions, thus significantly reducing the blockchain size without affecting its validation. Mimblewimble also does not use addresses like a BTC address, and amount of transactions are also not recorded. One problem Monero and Bitcoin are facing now is scalability. It is evident today that data is getting more expensive and that will be a problem in the long run for those coins. Epic is 90% lighter and more scalable compared to Monero and Bitcoin.
Cryptodiffer Community
what are the ways that Epic Cash generates profits/revenue to maintain your project and what is its revenue model ? How can it make benefit win-win to both invester and your project ?
Max Freeman Project Lead at Epic Cash
There is a block subsidy of 7.77% that declines 1.11% per year until 0, where it stays after that. As a nonprofit community effort, this extremely modest amount goes much further than in other projects, which often take 20, 30, even 50+ % of the coin supply. We believe that this ongoing funding model best aligns the long term incentives for all participants and balances the compromises between the ends of the centralized/decentralized spectrum of choices that any project must make.
Cryptodiffer Community
Q1 : What are your major goals to archive in the next 3–4 years?
Q2 : What are your plans to expand and gain more adoption?
Yoga Dude Pr&Marketing at Epic Cash
Max already talked about our technical plans and goals in his roadmap. Allow me to talk more about the non technical 😁
We are aiming for broader reach in the non technical more mainstream community — this is a big challenge but we believe it is doable. By offering simpler ways to mine Epic Cash (with smart phones for example), and by doing more education we will achieve the holy grail of crypto — moving past the fiat bridges and getting Epic Cash to be accepted as means of payment for goods and services. We will accomplish this by working with regional advocacy groups, community interaction, off-line promotional activities and diverse social media targeting.
Cryptodiffer Community
It seems to me that EpicCash will have its first Halving, right? Why a halving so soon?
Is a mobile version feasible?
Max Freeman Project Lead at Epic Cash
Our supply emission catches up to that of Bitcoin’s first 19 years after 8 years in Epic, so that requires more frequent halvings. Today’s block emission is 16, next up are 8, 4, 2, and then finally 0.15625. After that, the supply of Epic and that of BTC stay synchronized until maxing out at 21m coins in 2140.
Today we have a mobile wallet through the Vitex app, a native mobile wallet coming, and are working on mobile mining.
Cryptodiffer Community
What markets will you add after that?
Yoga Dude PR&Marketing at Epic Cash
Well, we are aiming to have ALL markets
Epic Cash in its final iteration will be usable by everyone everywhere regardless of their technical expertise. We are not limiting ourselves to the technocrats, one of our main goals is to help the billions of unbanked. We want everyone to be able to mine, buy, and most of all USE Epic Cash — gamers, farmers, soccer moms, students, retirees, everyone really — even bankers (well once we defeat the banking industry)
We will continue building on the multilingual diversity of our global community adding support and advocacy groups in more countries in more languages.
Epic Cash is More than Money and its for Everyone.
Cryptodiffer Community
Almost, all cryptocurrencies are decentralized & no-one knows who owns that cryptocurrencies ! then also, why Privacy is needed? hats the advantages of Private coins?
Max Freeman Project Lead at Epic Cash
With a public transparent blockchain such as Bitcoin, you are permanently posting a detailed history of your money movements open for anyone to see (not just legitimate authorities, either!) — It would be considered crazy to post your credit card or bank statements to Twitter, but that’s what is happening every time you send a transaction that is not private. This excellent video from community contributor Spencer Lambert https://www.youtube.com/watch?v=0blbfmvCq\_4 explains better than I can.
Privacy is not just for criminals, it’s for everyone. Do you want your landlord to increase the rent when he sees that you get a raise? Your insurance company to raise your healthcare costs because they see you buying too much ice cream? If you’re a business, do you want your employees to see how much money their coworkers make? Do you want your competitors to trace your supplier and customer relationships? Of course not. By privacy being default for everyone, cryptocurrency can be used in a much wider range of situations without unacceptable compromises.
Cryptodiffer Community
What are the main utility and real-life usage of the #EPIC As an investor, why should we invest in the #EPIC project as a long-term investment?
Xenolink Advisor at Epic Cash
Epic Cash can be used as a Private and Fungible store of value, medium of exchange, and unit of account. As Epic Cash grows and becomes adopted it can be compared to how Bitcoin and Monero is used and adopted as well. As Epic is adopted by the masses, it can be accepted as a medium of exchange for store owners and as fungible payments without the worry of having money that is tainted. Epic Cash as a store of value may be a good long term aspect of investment to consider. Epic Cash carries an inelastic fixed supply economic model of 21 million coins. There will be 5 halvings which this month of June will be our first halving of epic. From a block reward of 16 Epic reduced to 8. If we look at BTC’s price action and history of their halvings it has been proven and show that there has been an increase in value due to the scarcity and from halvings a reduction of # of BTC’s mined per block. An inelastic supply model like Bitcoin provides proof of the circulating supply compared to the total supply by the history of it’s Price action which is evident in long term charts since the birth of Bitcoin. EPIC Plans to have 5 halvings before the year 2028 to match the emissions of Bitcoin which we call the singularity event. Below is a chart displaying our halvings model approaching singularity. Once bitcoin and cryptocurrency becomes adopted mainstream, the fungibility problem will be more noticed by the general public. Privacy coins and the features of fungibility/scalability will most likely be sought over. Right now a majority of people believe that all cryptocurrency is fungible. However, that is not true. We can already see Chainalysis confirming that they can trace and track and even for other well-known privacy coins today such as Z-Cash.
Cryptodiffer Community
  1. You aim to reach support from a global community, what are your plans to get spanish speakers involved into Epic Cash? And emerging markets like the african
  2. How am I secure I won’t be affected by receiving tainted money?
Max Freeman Project Lead at Epic Cash
Native speakers from our community are working to raise awareness in key markets such as mining in Argentina and Venezuela for Spanish (Roberto Navarro called Epic “the holy grail of cryptocurrency” and Ethiopia and certain North African countries that have the lowest electricity costs in the world. Remittances between USA and Latin American countries are expensive and slow, so Epic is also perfect for people to send money back home as well.
Cryptodiffer Community
Do EPICs in 2020 focus more on research and coding, or on sales and implementation?
Yoga Dude PR&Marketing at Epic Cash
We will definitely continue to work on research and coding, with emphasis on improved accessibility (especially via smartphones) usability, security and privacy.
In terms of financial infrastructure will continuing to add exchanges both KYC and non KYC.
Big part of our plans is in ongoing Marketing and PR outreach. The idea is to make Epic Cash a viral sensation of sorts. If we can get Epic Cash adopters to spread the word and tell their family, coworkers and friends about Epic Cash — there will be no stopping us and to help that happen we have a growing army of content creators, and supporters.
Everyone with skin in the game gets the benefit of advancing the cause.
Folks also, this isn’t an answer to the question but an example of a real-world Epic Cash content —
https://www.youtube.com/watch?v=XtAVEqKGgqY
a challenge from one of our content creators to beat his 21 pull ups and get 100 epics! This has not been claimed yet — people need to step up 🙂 and to help that I will match another 100 Epic Cash to the first person to beat this
Cryptodiffer Community
I was watching some videos explaining how to send and receive transactions in EpicCash, which consists of ports and sending links, my question is why this is so, which, for now, looks complex?
Let’s talk about the economic model, can EpicCash comply with the concept of value reserve?
Max Freeman Project Lead at Epic Cash
In V3, which is coming later this summer, Epic can be sent over Tor, which eliminates this issue of port opening, even though using tools like ngrok.io, it’s not necessarily as painful as directly configuring the router ports. Early Lightning Network had this issue as well and it’s something we have a plan to address via research into non-interactive transactions. “Fire and Forget” payments to an address, as people are used to in Bitcoin, is coming to Epic and we’re excited to develop functionality that other advanced mimblewimble coins don’t yet have. We are committed to constant improvement in usability and utility, to make our money system the ease of use leader.
We are involved in the project (anyone can join the Freeman Family) because we believe that simply by choosing to use a form of money that better aligns with our ideals, that we can make a positive change in the world. Some of my thoughts about how I got involved are here: https://medium.com/epic-cash/the-freeman-family-e3b9c3b3f166
Max Freeman Project Lead at Epic Cash
Huge thanks to our friends Maks and Vladyslav, we welcome everyone to come say hi at one of our friendly communities. It is extremely early in this journey, our market cap is only 0.5m right now, whereas the 3 other mimblewimble coins are at $20m, $30m and $100m respectively. Epic is a historic opportunity to follow in the footsteps of legends such as Bitcoin and Monero, and we hope to become the first Top 5 privacy coin project.
Xenolink Advisor at Epic Cash
Would like to Thank the Cryptodiffer Team and the Cryptodiffer community for hosting us and also engaging with us to learn more about Epic. If anyone else has more questions and wants to know more about EPIC , can find us at our telegram channel at https://t.me/EpicCash .
Yoga Dude Pr&Marketing at Epic Cash
Thank you, CryptoDiffer Team, and this wonderful Community!!!
Cryptodiffer TEAM
Thank you everyone for taking your time and asking great questions
Thank you for your time, it was an insightful session
Spread the love
submitted by EpicCashFrodo to epiccash [link] [comments]

Blindspot Whitepaper: Specialized Threat Assessment and Protection (STAP) for the Blockchain

BlindSpot™
Stop attacks before ”zero day” and stop the Advanced Persistent Threat (APT)
We live in a dangerous world — our information technology systems face that danger every single day. Hackers are constantly attempting to infiltrate systems, steal information, damage government and corporate reputations, and take control of systems and processes.
Hackers share and use a variety of tools and techniques to gain access to, and
maintain access to, IT systems, including groups and techniques so dangerous
they have their own category - the Advanced Persistent Threat (APT). At the
center of the APT are sophisticated techniques using malware to exploit vulnerabilities in systems. Traditional cyber security technologies use file signatures to locate these tools and hacker malware, but hackers are now actively camouflaging their tools by changing, customizing, and “morphing” them into new files that do not match any known signatures (‘Polymorphic Malware’). This introduces a massive gap in malicious file detection which leaves the enterprise open to exploitation — and it’s just not possible for traditional signature-based systems to keep up. In fact, signature-based anti-virus and anti-malware systems are only around 25% effective today. BlindSpot™ sees through it all, even as the files morph and change in a futile attempt to remain camouflaged.
Digital File Fingerprints
Any File Type, Any Language, Partial Matches, Exact Matches
BlindSpot™, the adaptive security solution from BlindSpot™, can see through the
Polymorphic camouflage used by the worlds most advanced hackers by utilizing
digital file fingerprints and our proprietary adaptive BlindSpot™ ‘brain’ that constantly analyzes the fingerprints of known malicious files and tools to locate partial matches within the files on your systems - servers, laptops, desktops, USB drives, and even mobile devices. BlindSpot™ can cut right through the Polymorphic files, revealing the true hacking tools underneath, even if they are only fragments or pieces of a more complete set of hacking tools and technologies.
Most cyber attacks happen weeks or even months after their initial penetration and access to a network or system, and even the simplest attacks tend to have a fuse that is typically several days. It takes them time to map out a system, probe for the information they want, and obtain or forge credentials with the type of access they need. But from the moment their tools first land on your network and systems, BlindSpot™ sees them. If fact, BlindSpot™ can see them sitting on a newly inserted USB drive even if the files are not copied to your systems. This means BlindSpot™ can identify and alert you to malicious files and potential illicit activities before the attack happens - before zero day!
How does BlindSpot™ work? BlindSpot™ sits on the endpoint and continuously monitors file activity. Digital fingerprints, which can be used to find partial matches of any file type in any language, are reported back where they are kept forever in a temporal repository.
BlindSpot™ looks through all of the digital fingerprints — both those from files on your systems and those in a constantly updated database of known malicious files and hacking tools, to locate and alert you to any indication of hacking, malicious files, or illicit activity. BlindSpot™ is a disruptive technology that can see polymorphic malware and stop attacks before zero day.
Digital File Fingerprints are created from a file or a piece of digital data/information by using advanced mathematics to look at all of the small pieces of data that make up the file to create a very small, unique piece of mathematical data — a digital file fingerprint. Files may be of any file type and in any language - digital fingerprints can find partial and exact matches regardless of what is in the file itself.
Just like with humans, once a fingerprint has been taken, you no longer need the
person to identify them. The fingerprint is enough. Even a partial fingerprint is
enough, and sometimes a smudge will do. Digital fingerprints work on the same
principle. Once BlindSpot™ has taken a digital fingerprint of a file, the file is no longer needed to identify it or to compare it with other files. And because digital fingerprints are tiny, they are easy to store. Even a multi-gigabyte file has a digital fingerprint that is no larger than 10k bytes.
Once you have two sets of digital fingerprints, you can compare them. Because BlindSpot™ starts with full fingerprints of known malicious files, it can identify matching files even when the digital fingerprint is only partially there. And with BlindSpot™’s advanced processing capabilities, file fragments, recovered data from a hard drive, partially downloaded documents, damaged files (both intentional and accidental) and other incomplete file structures can be properly fingerprinted in a way that still allows matches to be found.
Other technologies and software use static signatures, which do not work if any part of a file, regardless of how small, is different from another, or if the file is damaged in any way. BlindSpot™ and digital fingerprints enable partial matching, and can see through the camouflage that has become the industry standard for hackers across the globe. Static signature based solutions simply cannot do this.
Imagine your favorite detective drama on TV. The prosecutor says “This partial
fingerprint was found at the crime scene and the video camera across the
street recorded a perfect image of the person’s face.” The jury deliberates and
compares the picture and fingerprints of the defendant that were taken the day
before. They conclude, because the fingerprint was not all there and was not 100% identical, and because one picture showed a mustache that looked identical but was one millimeter longer than the other picture, that the two people were not identical - and set the criminal free. Well, that show wouldn’t be on TV long because crime would run rampant. Now imagine they had BlindSpot™. Criminals would be caught, the town would be a much safer place, and the show would be on for years to come.
Now imagine your network and systems without BlindSpot™, where traditional
exact match signature software is on your front line of defense. All kinds of
malicious files could walk right through and sit down on your hard drives, just
waiting for hackers to activate them. But you don’t have to imagine what your
systems would be like with BlindSpot™ — instead, simply contact us, get BlindSpot™ in place, and we’ll work with you to show you what’s really on your systems and help you keep those systems safe.
Ensuring System Compliance
Take the guesswork out of compliance assessment
All Government systems go through Certification and Accreditation. BlindSpot™ can help you with malicious code protection, for both security considerations and required compliance. Guidelines found in NIST 800-53 Revisions 3+ Security Requirements for System Integrity, SI-3 Malicious Code Protection, state that malicious code protection mechanisms must be employed at information system entry and exit points, including workstations, notebook computers, and mobile devices, to detect and eradicate malicious code.
BlindSpot™, with its continuous monitoring of the files on your endpoints and its
continuous updating of its known malicious file repository, will provide the
required real-time and full monthly re-scans of your files, will alert your
administrative staff when malicious code is found, will provide reports on
potential malicious files, illicit activity, and follow-up with very short false positive reports. BlindSpot™’s false positive rate is less than 0.01%. BlindSpot™ helps organizations meet the security requirements set forth and ensure compliance.
Intellectual Property Protection
Track sensitive information as it changes and moves around the enterprise
BlindSpot™ uses digital file fingerprints to identify partial and exact matches between files, regardless of file type or language. This ability can be used to track movements of and changes to files on a network of computers.
Government entities and corporations need to addresses the issue of monitoring
documents and files that contain sensitive information intellectual property, and it
is no longer sufficient to simply store them on a secure server and require specific credentials to access the information. People, both unintentionally and sometimes with malicious intent, copy and paste parts of documents, move files to USB drives, and otherwise edit and transfer files in order to get them on to a laptop, share them with a co-worker, or exfiltrate confidential information to outside networks and systems. BlindSpot™ carefully watches all of the files on your network, including what’s going with USB drives. If someone copies part of a file that has sensitive data to another file, BlindSpot™ sees it. Furthermore, BlindSpot™ can alert you when it sees questionable activity with certain documents/files or with specific computers/individuals.
Your sensitive files now have a watchdog that catches both unintentional and
malicious exposure to non-secure systems. Use BlindSpot™ to set up a custom
database of the locations where your sensitive files are stored, and BlindSpot™ will create a set of digital file fingerprints that can be used to track those files across your network and systems. This ensures that an organization can know where its proprietary and sensitive information is 365/7/24, in real-time.
Supervisory Control and Data Acquisition (SCADA) Systems
Supervisory Control and Data Acquisition (SCADA) is a system for remote monitoring and control that operates with coded signals over communication channels (using typically one communication channel per remote station).
SCADA networks contain computers and applications that perform key functions in providing essential services and commodities (e.g. electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. They are part of the nation’s critical infrastructure, provide great efficiency, are widely used, and require protection from a variety of cyber threats.
One of the most significant threats is benign files residing on the computers on
the network that morph into tools that hackers can use to gain access to the
network and the equipment it monitors and/or controls. These files might be part
of the operating system (binary files), might be a normal file that includes
scripting, or can even be a general data file moved onto the computer through a
network or a USB drive. By morphing, these files circumvent detection and
countermeasures. This is just one example of how a hacker can compromise and
exploit the system and the worst part is that you will never know until it is too late!
The recent Department of Justice announcement charging Iranian hackers
believed to be tied to the 2013 hacking of a New York dam illustrates this threat
clearly.
Enter BlindSpot™’s BlindSpot™ Adaptive Security — BlindSpot™ monitors all files of all types (any format or language) without the requirement of a translator or human operator. BlindSpot™ can see right through the hacker’s camouflage of
morphing files to quickly identify problems and threats before hackers have the
opportunity to active and use their tools. For U.S. and foreign based systems,
BlindSpot™ is a must have cyber security solution.
The BlindSpot™ team has extensive experience with SCADA systems and critical infrastructure. Our BlindSpot™ solution is critical to the overall security framework of such systems as it was designed to find the morphing, malicious files and associated illicit file activity that can lead to compromise of the integrity, confidentiality and/or availability of the system. Threats loom on both the inside and outside, and the dynamic nature of these systems require continuous, temporal monitoring to stop cyber attacks before they happen.
Stop Ransomware
Identify and remove Ransomware before it encrypts your files
Ransomware attacks are on the rise and affect Fortune 500 companies, Federal
organizations, and consumers. This vicious type of attack affects your user’s ability to get their work done and prevents users from accessing files on a device or network by making the device or network unusable, by encrypting the files your users need to access, and/or by stopping certain applications from running (e.g. the web browser). A ransom is then demanded (an electronic payment of currency or bitcoins) with the promise that your data will be unencrypted and accessible again following the payment.
If the ransom payment is made, there is no guarantee that the data will be
unencrypted or returned to a state of integrity and/or availability. Furthermore,
there is also no guarantee that the people behind the ransom will not re-infect
your systems again with a variant of what was initially used. Payment encourages future attacks because they know you cannot detect it and will pay again next time. Surprisingly, there are only a handful of known ransomware files in use today (e.g. Crowti, Fakebsod). Safeguards exist that use static signatures to find exact matches for these known files, but the moment these files morph or are changed in any way they become undetectable by these solutions. BlindSpot™ digs deeper with digital file fingerprints and can find the new files, enabling you to analyze, quarantine, or delete them before they activate. This pro-active approach can be the difference between a system being protected and a system being made completely unavailable with encrypted data being held hostage for a ransom. The image below is an actual Fakebsod notification message.
BlindSpot™ uses digital file fingerprints to detect the ransomware by looking at
both partial and exact matches and can report the problem before it happens.
Ransomeware of the past attacked your personal computer and today’s variant
attacks the servers — BlindSpot™ can detect both.
Case Study: March 2016 - Two more healthcare networks are hit by ransomware targeting servers. Advice from law enforcement — pay the ransom! (They did). File backups are insufficient. Paying ransoms is costly and only encourages repeat attacks.
BlindSpot™ is the most comprehensive solution available to detect and root out
ransomware. Take charge of the situation and put BlindSpot™ to work continuously monitoring your systems.
Get BlindSpot™ Now
Commercial or Government, with multiple contract vehicles available
How Can I Get BlindSpot™?
CYBR develops and sells its adaptive enterprise cyber security software product, BlindSpot™, and provides professional services and support for BlindSpot™ implementations.
Product
BlindSpot™ Adaptive Security is a continuous monitoring enterprise solution that tracks file-based activity on the endpoint using digital file fingerprints, can identify problems and cyber threats before zero day, and can see through morphing, camouflaged (polymorphic) files to make accurate determinations of malicious files and illicit activity.
Deployment Options
BlindSpot™ can deployed as a secure cloud application for maximum flexibility, a standalone Enterprise implementation for maximum security, or the two combined in an Enterprise implementation augmented through a secure cloud gateway.
Professional Services and Training
BlindSpot™’s team of cyber security experts have the expertise to support
you by creating a holistic, enterprise security framework that consists of people,
policy, procedures and technology that will ensure a security posture that implements the best risk management strategies, tactics and operations available.
Email us at [[email protected]](mailto:[email protected]) for more information.
BlindSpot Solution Brief
June 29, 2018
POC: Shawn R. Key CEO, President
[[email protected]](mailto:[email protected])
Executive Summary and Estimated Pricing
CYBR’s BlindSpot is an enterprise cyber security solution that pro-actively identifies unknown and known malicious files and circumventive activity on endpoint devices. It is designed to interact with the CYBR Ecosystem and associated Web Portal. Distributed clients serve as the connection to the various BlindSpot server tiers.
BlindSpot identifies Illicit File Activity (IFA) and associated hacker activity via perceptive, industry standard algorithms. BlindSpot identifies exact AND similar files regardless of file type and/or language. This applies to ALL file types (e.g. documents, images, audio and video, carrier, etc.). Currently implemented safeguards and counter measures (such as anti-virus (AV), content filters and malware analysis tools) cannot address polymorphic/adaptive files and emerging threats. This introduces a massive gap in illicit file detection and leaves the enterprise open to exploitation. BlindSpot fills that void.
Additionally, corporations and government entities have a need to address known files and associated activity with regards to content and data management. The uncertainty of Intellectual Property (IP) location and propagation poses significant risk to the organization. The ability to identify the life cycle of a file (origin, source, destination, attributes and proliferation) ensures an organization knows where its proprietary, sensitive and privacy information is 365/24/7, in near real-time.
BlindSpot, is significantly different from solutions in the emerging Specialized Threat Assessment and Protection (STAP) marketplace, as it scales to meet the needs of enterprise organizations and the commercial marketplace. BlindSpot’s proprietary database consists of millions of unique, digital identifiers (hash values) that identify exact AND similar, modified files. This ensures that files existing in their original state or those which have been intentionally modified, do not circumvent detection. Our algorithms ensure near zero false positive return rates. The combinatory effect and the rare expertise of our executives and development thwarts potential competition as BlindSpot is an enterprise solution; not a tool.
The enterprise solution is provide as a license per IP address with associated appliance and/or server hardware requirements.
CYBR BlindSpot Technical Deep Dive
CYBR’s BlindSpot product is currently available as a Software as a Service) (SaaS) deployment blockchain solution and will be available as a full enterprise-install by Q2 2019. In both implementations, end-point agent software monitors the hard drive(s) of a computer or server, analyses any files that change, and reports [multiple] file hashes back to the main system. This enables the main system to effectively monitor which files could be malicious or represent intellectual property on the computers and servers within the customer’s network. By using fuzzy hashing algorithms, the system can detect polymorphic malware and intellectual property that has been partially hidden or obfuscated.
Applications
End-point (client) agent: native to each major OS as a fat client. Currently we have end-point agents for Microsoft Windows-based systems using MS .NET c# 2.0/4.5 and C++, although the c# portion will be replaced with all c++ code to increase scalability, efficiency, and security, in Q1 2016. End-point agents for Mac OS (written in Objective-C) and popular Linux platforms (written in c++) will ship in Q1/Q2 2016. Development work on the CentOS linux agent will begin in December 2015.
The Control Application enables system administrators to configure each end-point agent, the system itself, and to actively monitor and access reports on files that have been identified by the system as problematic or of interest. At this time the Control Application is able to provide configuration and monitoring services but is not yet ready for customer on-site deployment and is therefore only available in a SaaS model.
The middle-tier of the system, the Portal sever, currently runs in MS .NET and is written in c#. This tier will be upgraded to a full c++ implementation to increase scalability, efficiency, and security, in Q1 2016, and will run as a standard web server extension on a Linux platform (CentOS/Apache).
The data-tier of the system currently is running in MS SQL Server 2008/2012 and uses transact-SQL tables, but does not use any stored procedures or transactions. Although this tier is sufficient for scalability through mid to late 2016, a no-SQL version of the data tier will be developed in 2016.
The Crush server (hashing services) currently runs on MS Server 2008/2012, is written in c#/c++ and is a) being ported to run as a (c++) daemon on a standard Linux (CentOS) server, and b) being re-engineered to function as a massively parallel application (c/c++) running on NVIDIA Tesla GPU accelerated systems. The Crush server communicates with the data-tier directly and the C2 server indirectly. Multiple Crush servers can run simultaneously and are horizontally scalable and fault-tolerant.
The C2 (Command and Control) server, written in c# and being moved to c++, communicates with the data-tier directly and the Crush server and Control Application indirectly to provide scheduling, system health and integrity, and prioritization services, as well redirecting jobs to maintain fault tolerance of the back-end server components. Multiple C2 servers can run simultaneously and are horizontally scalable.
Hardware and Network:
The basic architecture of the system has two different stacks of software. First, a typical 3-tier approach isolates data storage from end-point and Control Application access with a middle-man protocol altering Portal server. In the SaaS model, the end-point and Control Application software reside on-site with the customer, and the remaining stack components reside at the SaaS hosting datacenter. The second stack consists of multiple horizontally-scalable server components that run entirely in the backend as daemons and interact primarily through the data area to provide the services that are being marketed and sold to the customers. The two stacks are kept somewhat separate from each other in order to buffer one against the other in times of extreme load and for enhanced security.
Following is a description of each software module in the system and how it relates to the others:
The system has one component for data collection (the end-point agent software, which resides on the desktop computers and servers within a deployed customer site), one component for system administration (the Control Application, which resides on a desktop computer that the customer has access to or that an analyst can access through the SaaS system), and a collection of software processes/daemons and a data storage area that comprise the back-end.
The end-point agent collects data from the end-point computer, passes it to the Portal server, which in turn stores it in the data area.
The C2 server monitors the in-flow of data from the end-points, and tasks the Crush server(s) to analyze the data and compare it to databases of known good, known bad, and watch list files, in an efficient manner.
The C2 server also provides notification to the customer of any problematic or watch-list files following the completion of the Crush server tasks.
The Crush server monitors the data area, and performs batch or real-time processing of data as instructed to by the C2 server.
Technology
CYBR’s BlindSpot software is a commercially available product that combines a small footprint end-point agent with a centralized monitoring and management system to track files and file changes on the end-point using partial-match digital fingerprints rather than rigid full-match-only file signatures. As files and data buffers are created, edited/altered, and moved either through the network or via removable media devices including USB drives, the product uses its unique and proprietary technologies in combination with industry standard technologies to identify and locate both known malware and unknown [polymorphic] malware on end-points that are continuously monitored by the product. Staff is notified, depending on the urgency or type of digital fingerprint identified, through integrations with 3rd party SIEM solutions, email/SMS transmissions, and reports that are available using the central management system. A false positive rate of partial digital fingerprint matching of ~1 in 10-12 means staff will not be bombarded with unnecessary alerts, maintaining staff efficiency.
Overview: Traditional anti-malware products use static file signatures to locate known malware but have no means of detecting unknown malware, CYBR’s product uses digital file fingerprints that can identify both partial file matches as well as full file signature matches and in doing so can locate and identify both known and unknown malware within the deployed enterprise. A combination of industry standard and publicly available algorithms and CYBR’s own proprietary algorithms, trade secrets, methods, optimizations, and intellectual property for which a patent is currently pending (which is owned solely by CYBR) are combined to form a comprehensive anti-malware platform and continuous end-point monitoring product that is completely unique in the marketplace. Through the use of our proprietary algorithms and optimizations, the product has the ability to scale to the enterprise level and can track desktops/servers as well as mobile/phone/tablet/Internet of Things (IoTs) devices.
Project Implementation: The implementation of this product would include both the commercially available BlindSpot product as well as prototypes of integration packages to connect with the on-site Security Information and Event Management (SIEM) and other systems and prototypes of end-point agents running on operating systems that are not yet available in the currently available version of the product. Both the integration and end-point agent prototypes would be based on existing modular code/functionality and would extend functionality past the currently available modules to ensure the full needs and requirements of the project are met. A full version of BlindSpot would be deployed on servers at/on the enterprise site, and prototypes of both SIEM integrations and new end-point agents would be deployed to augment the full production system. Information flow between all areas of the full system and prototypes would be tested and verified with increasing scale to ensure the level of performance required is available prior to the completion of the project.
End-point Agents: Each end-point is installed with native low-profile proprietary agent software that minimizes both its file system footprint and CPU use. The current product has a native end-point available for Microsoft Windows OSs (both desktops/tablets and servers) in production, and has native end-point agents in development/prototype stage for iOS, Android, MacOS, and RHEL/CentOS, with additional popular Linux derivatives to follow. The main job of the end-point agent is to communicate with the OS and monitor the file system for any changes in files that occur. When changes are detected, a digital file fingerprint of the file is taken and reported to the centralized data store, or cached until a later time if the centralized data store is unreachable (e,g, no cell coverage, laptop not connected to internet). The agent normally runs in “stealth-mode” and uses minimal CPU, RAM, and file system footprint so as not to disrupt the end-user’s workflow or impact system performance. Taking a digital fingerprint of a file and reporting it is very fast and thus the main job of the end-point agent is not system resource intensive. The “heavy lifting” is done on the back-end and does not burden the users or the end-point devices. Configuration of each end-point agent is conducted through the centralized management system, and changes in configuration are transmitted to the end-point agent within a few seconds (provided there is network connectivity).
Central Data Store: A collection of databases on the back end store file watch lists, known good and known bad digital file fingerprints (whitelists and blacklists containing digital file fingerprints of known malware), priority lists and configurations, end-point configurations, last-seen lists, and the full temporal accounting of all digital file fingerprints reported by end-point agents. As new threats are identified they are added to the central data store. As files on end-points change or are edited, their new digital fingerprints are added to the central data store as well. As new threats are identified though polymorphic partial matching, they are added to the known bad list as well.
Identification of Known and Unknown Malware: By comparing the databases of digital file fingerprints of known malware and digital file fingerprints of files on end-points, the product’s Crush server(s) use sophisticated algorithms to compare the partial digital file fingerprints, regardless of content of the files themselves. The product looks at the raw data (bytes) in the files when creating the digital file fingerprints and as such all file types/formats/languages are handled. This means that all file types and data in any and all languages can be compared with similar files. Binary DLLs, MS Word documents and spreadsheets (MS Excel, csv, …), JPEG images, Javascript, HTML, Executable files (.exe) — all of these files are handled by the product and known/unknown malware within them can be located using the digital file fingerprints in the centralized data store and Crush server’s analysis.
Scale, System Throughput, and Priority: A single Crush server can serve a small enterprise (100s or 1,000s of end-points), and a horizontally scalable array of Crush servers can be used to provide identification of malware for large enterprises. Similarly, databases in the central data store can be split and maintained/mirrored on several servers or run in a monolithic configuration. This makes the system highly scalable and able to be adapted to enterprises of varying sizes/scales while maintaining a good price/performance ratio. Priority lists can be designated for Crush servers such that high-priority end-points and/or high-priority malware fingerprints can be compared and identified in real-time, and similarly, low-priority lists (e.g. malware fingerprints that have not been seen in months or years) can be run in the evenings or when the system is running below normal load to ensure both immediate analysis of high-priority threats and comprehensive analysis of low-priority threats.
Integration: Several modular integration points within the product enable the straight-forward integration with 3rd party SIEM software and other reporting/management tools and systems. Distinct “notification channels” within the product are used based on the type of threat detected, the priority level of the specific threat detected, the confidence of the match (low percentage match of digital fingerprint vs high), and the location of the match (specific end-point list). Each notification channel has integration points that can be linked in with 3rd party systems so that staff are notified using software and procedures they are already familiar with and trained on (i.e., through a SIEM solution that is already begin monitored by dedicated, trained staff). Prototypes of each specific integration would need to be developed as a part of this project to match/communicate with the exact SIEM (or other) system that is in use at the deployment site in the mannemethod desired. Such a prototype would be developed for the purpose of evaluating the technical interconnectivity between systems to meet the requirements of the deployment, and following the prototype testing period, would be load-tested and stress-tested to ensure it’s performance meets the demands of a highly scalable environment, leading to a mature integration over a period of 3-6 months following the initial prototype period of 1-3 months.
Technology Section Summary: With end-points being continuously monitored by the product, both known and unknown malware threats delivered by the network and removable media will be detected and reported through SIEM system integration and direct email/SMS messages with minimal impact to the end-point (on all major OSs, including desktop and mobile). Centralized management and temporal monitoring of digital fingerprints enables the system to proactively locate and identify malware threats before zero day as well as enabling the staff to conduct their own investigations of systems either in the present or the past for forensic investigations. This makes CYBR’s BlindSpot a complete product that reaches all of the end-point devices to ensure safety and security from all types of malware threats.
Defense Utility
The blockchain’s cyber security posture will be greatly enhanced by BlindSpot. CYBR’s executive team works with various military and federal organizations and has a deep understanding of the cyber security challenges that face the enterprise today including advanced persistent threat (APT), polymorphic and pleomorphic malware, zero day attacks and the need to locate white and black files in real time. These threats have now permeated to the blockchain and must be secured.
Company and Customers
The proposed team includes CYBR, Inc. executive management and staff. The company is a works closely with its sister company, 21st Century Technologies, Inc. (21CT), which is a HUBZone certified, Small Business entity. 21CT serves as a value added reseller (VAR) for CYBR, Inc. and is currently a teammate on the DOMino classified DHS contract as a subcontractor to Raytheon.
Existing, paying customers include Stratford University, Test Pros and Devitas. The company also has integrator and VAR partner relationships with Anomali (formerly Threatstream), Lockheed Martin (Cyber and Space) and various commercial entities, which the company believes will become paying customers in 2019.
Transition and Commercialization
Our technology is a commercially available product and commercial sales have been made. The company is actively working to scale this solution to hundreds of thousands of users, which the company has deemed do-able and is in the process of horizontally scaling.
Data Rights Assertions
CYBR, Inc. currently holds a provisional patent and incorporates other trade secrets into the solution. No unreasonable restrictions (including ITAR) are placed upon the use of this intellectual property with regards to global sales.
submitted by CYBRToken to u/CYBRToken [link] [comments]

Who is the team behind Bayan Token?

Sheikh Dr. Zaharuddin Abd Rahman — Chairman, Shariah Board
Sheikh Dr. Zaharuddin Abd Rahman who is a Managing Director of Elzar Group of companies (Elzar Shariah Solutions Sdn Bhd, Elzar Resources Sdn Bhd, Elzar Trading Sdn Bhd and K-Fiqh Sdn Bhd).
Dr. Zaharuddin served as an Assistant Professor at the Kulliyyah of Economics, International Islamic University Malaysia (IIUM) for more than 10 years. He obtained his degree from University of Malaya, MA in Shariah from Al-Yarmouk University, Jordan and PHD in Islamic Studies and Finance from University of Wales. He is also a certified Islamic Finance trainer and lecturer by The Markfield Institute of Higher Education, United Kingdom.
He has served RHB Islamic Bank Ltd, Malaysia as a Senior Shari’ah Manager & Product Development and later, joining Asian Finance Bank Ltd as Head of the Shari’ah Compliance. He has a vast experience in Shariah where he has served various institutions as Shariah Consultant and Advisor for Central Bank of Malaysia (BNM), OSK Investment Bank, Deutche Bank, Al-Rajhi Bank Malaysia, Standard Chartered Saadiq Bank, ACR ReTakaful Bahrain, BIMB Securities Sdn Bhd, BNP Paribas Bank and others.
To-date, he has written over 20 books and hundreds of articles on Islamic Jurisprudence and Islamic Banking and other Shari’ah matters in journal, including local and international magazines and conferences. He frequently appears in the local television and radio lecturing on various Shari’ah issues especially with regards to the Islamic commercial transaction. His Facebook page ‘Dr. Zaharuddin Abd Rahman’ has about 1.3 million followers.
LinkedIn: https://www.linkedin.com/in/dr-zaharuddin-abd-rahman-05a0195/
Mr Vince Focarelli — Ambassador
There was a time, whenever Vince Focarelli’s name was mentioned, it struck fear and hatred in the people’s heart, especially amongst the residents of Adelaide. That is not the case anymore. The former leader of the notorious gang ‘Comanchero’, he is now a transformed and completely different person after embracing Islam. Watch the interview with Vince about his journey to Islam. (https://www.youtube.com/watch?v=N2jcCxBwm9s)
Vince — now Imran Abdul Salam — is an active social activist, where he frequently gives motivational and inspirational talk about his journey to Islam. He is also actively involved in several humanitarian works such as organising a food convoy for the Yemeni refugees. He used to own and run a Halal Italian restaurant, La Fig Cucina in Adelaide, of which he wishes to expand its presence around the world.
Vince has been appointed as the Ambassador to Bayan Token as he shares the same aspirations and noble intentions of spreading good to the wider mass. An avid preacher of kindness and goodness himself, he is very excited and looking forward to do greater good through the Shariah compliant Bayan Token.
Facebook: https://www.facebook.com/Vince-Focarelli-1892643934346711/
Dato’ Zainal Abidin M Husain — Chairman
Dato’ Zainal Abidin was a name to be reckoned with in the banking and financial industry. He served as a Manager for eight years at Arab-Malaysian Merchant Bank Berhad before becoming the Head of Finance at Halim Securities Sdn Bhd.
He then made his leap of faith by founding Ikhtiar Destinasi Sdn Bhd. He has held many significant positions since then which include the Managing Director for Ikhtiar Factoring Sdn Bhd and Director for both Transpro Sdn Bhd and Ikhtiar Commerce Sdn Bhd.
At 56, he is still active and going strong, overseeing Ikhtiar Destinasi Sdn Bhd as its Executive Chairman. He graduated from University of Minnesota in Accounting and Idaho State University in Masters in Education (Business).
LinkedIn: https://www.linkedin.com/in/dato-zainalabidin-husain-267927aa/
Nazimuddin Nazaruddin — Chief Executive Officer
Nazimuddin graduated from Universiti Teknologi Mara (UiTM), completing his Association of Chartered Certified Accountant (ACCA) professional course. He is a member of ACCA and Malaysia Institute of Accountants (MIA), and is currently a Chartered Accountant by background. He kickstarts his career in a medium sized Audit Firm, Afrizan Tarmili Khairul Azhar (AFTAAS), and continue his auditing career to one of the Big Four firm, Deloitte Malaysia based in Petaling Jaya, leading and managing various client’s portfolio, from small to big entities.
Then he moved to Schlumberger KL Financial Hub as a Management Accountant, dealing with Financial Reporting and operational matters, taking care of Middle East area operations via working closely with Operation Controllers, specifically in Artificial Lift and Completions segment for Kuwait, UAE, and North Sudan. Currently he is practicing in his own firm Nazim & Co, an accounting firm under MIA, specializing in small medium entities portfolio’s.
He has vast experience and well verse in International and local financial reporting standards, international standards of auditing, financial reporting compliance, statutory and taxation matters, performance management and internal audit compliance.
LinkedIn: https://www.linkedin.com/in/nazimuddin-nazaruddin-acca-ca-m-3391b1aa/
Ameerul Zafeeq Hizamuddin — Chief Financial Officer
Ameerul Zafeeq is a chartered accountant graduated in 2010 from Kaplan Financial College, London. He started his career at Binder Dijker Otte (BDO) as an audit associate. He then moved to Accenture as Accountant before joining Royal Bank of Canada (RBC) as Fund Accountant to have a first-hand experience in investment field.
Ameerul was hired by Petronas Carigali as a Senior Executive in 2016. He was promoted to Assistant Manager and moved to Petronas Berhad. He specialises in business planning, forecasting, budgeting and reporting.
LinkedIn: https://www.linkedin.com/in/ameerul-zafeeq-hizamuddin-883224a3/
Adam Effendy Mustapha — Chief Operating Officer
Adam Effendy graduated from London School of Economics and Political Science in Bsc. Economics. Immediately after graduation, he was offered an executive position in UEM Group Berhad, serving both the Corporate Finance Department and the Managing Director’s office. He then moved to UEM Sunrise Berhad, gaining more experiences in the corporate world after serving total of three years in the Managing Director’s office and the Corporate Planning department.
Adam then decided to resign and started his own publishing house that has published ten books to-date; two of them were national bestsellers. After two and half years being an entrepreneur, Adam craves for new challenges and wants to learn something novel and exciting. He quickly jumped at the offer to join the team as he gets to enjoy the best of two worlds; Islamic finance and financial technology.
LinkedIn: https://www.linkedin.com/in/adam-e-mustapha-661011b1/
Muhamad Akif Akmal Abdul Aziz — Chief Technology Officer
A First-Class Honour graduate in B.Eng Electrical & Electronic from University of Adelaide, Muhamad Akif Akmal was an Electrical Engineer at Tarpon Energy Services Asia Pacific Sdn Bhd since 2014 before joining the team. He specialises in designing electrical system and instrument.
Akif is a crypto and blockchain enthusiast who has traded using various platforms such as Poloniex, Shapeshift, Remitano and LocalBitcoins. He also has experiences in building GPU mining rig and designing mining farm. He was also a back-end technology consultant for several ICOs.
LinkedIn: https://www.linkedin.com/in/muhamad-akif-akmal-abdul-aziz-19b22a73/
Zikri Zainudin — Chief Technical Analyst
A Financial Engineering graduate with 7 years of investment banking experience, Zikri Zainudin is a self-taught computer programmer. He applied complex algorithms and artificial intelligence to enhance the Z2 System into an integrated, advanced methodological application, designed for efficient stock picking, complex alerts and automated execution to support professional trading. It took more than 10 years to derive the methodology, which is now known as the Z2 Protocol.
Mr Steven Georgiadis — Legal Consultant
Steven Georgiadis is a highly acclaimed and seasoned Trial Attorney with 18 years of accomplished experience. With a combination of a scholastic and reformist approach, he has netted triumphant proficiency in investment banking, private banking, Mergers & Acquisition, private equity transactions, corporate finance and corporate governance. Commonly sought internationally by prestigious cliental, he has become a highly respected advisor and esteemed leader.
Steven, a graduate from Bond University, Gold Coast, Australian with Bachelor of Laws (LLB), has been solicited for his astute abilities in a vast array of legal disciplines including dispute resolution and in litigation for both hard and soft commodity sectors.
LinkedIn: https://www.linkedin.com/in/steven-georgiadis-06692768/
Mr Pierre Chuah — Marketing Expert
Pierre Chuah is a Digital Marketing Cloud Specialist with 20 years of experience. With a holistic digital experiences, he is able to understand and implement various digital marketing technologies for businesses.
Pierre started his career in KPMG Asia Pacific as an IT consultant in the implementation of SAP Finance solutions, for various companies in Malaysia and Singapore. Subsequently he led a team of 23 individuals in providing digital marketing consultancy to various multi-national companies such as Japanese Tobacco Industry (JTI), Carlsberg, Nissan, Cadbury, Kimberly Clarke, Mattel Toys, Adidas, Panasonic and many others in implementing digital marketing technologies.
Pierre joins Oranje-ISC as a Digital Director in the year 2014 having developed and implemented a 360-digital experience for Langkawi Island. Under his direction, Oranje-ISC was made finalist in ‘Marketing Excellence Awards 2017’. He is professionally certified by SAP, Google, Oracle and Adobe. He graduated from Warwick University, United Kingdom BSc Management Science and City University, London with MSc Information System and Technology.
LinkedIn: https://www.linkedin.com/in/pierre-chuah-18222861/
Dr. Said Adekunle Mikail — Shariah Expert
Dr. Said Adekunle Mikail is a researcher at International Shariah Research Academy for Islamic Finance (ISRA) and lecturer at International Centre for Education in Islamic Finance (INCEIF). His academic qualifications are distinguished; he graduated from Islamic University of Madinah with LLB (Shariah) and earned his Master’s Degree in Comparative Law from the International Islamic University of Malaysia (IIUM). He then obtained his PhD in Islamic Finance from the same university.
Dr. Said’s experience in Islamic Finance is extensive. He was the Shariah advisor for BNP Paribas (Islamic Banking Window, Malaysia) in 2015. He was appointed as the Shariah Consultant to I Consult Africa (PTY) Ltd. Ethical and Responsible Advisory, South Africa in 2016 and still serving them until now. He is also a Shariah Consultant under ISRA Consultancy Sdn Bhd, which has served a number of high-profile clients including the Central Bank of Malaysia.
Dr. Said holds a number of memberships in various esteemed bodies and organisations such as Al-Birr Investment and Credit Cooperative Society Limited (Chairman), Muslim Scholarship Fund of Nigeria (MSFN-Nigeria) (Partner), International Council of Islamic Finance Educators, Malaysia (Associate Member), Malaysia Institute of Management (Affiliate Member) and Malaysian Financial Planning Council.
Being conferred the 21st Yayasan Tun Razak Youth Leadership Award in 2016 and Shariah Scholarship Award by ISRA in 2011, Dr Said has produced many academic publications and reports, which are internationally recognised.
Dr Hameeth Shah Abdul Wahid — Biotech Project Expert
Dr Hameeth Shah Abdul Wahid completed his MBBS from the International Islamic University of Malaysia (IIUM) in 2004. He started his career as a young doctor in Hospital Besar Alor Setar. Since the early days, he has special interest in Internal Medicine that lead him to take up postgrad studies in the subject matter. Eventually he completed his postgrad studies and obtained membership of Members of Royal College of Physician (MRCP), United Kingdom in 2014.
Currently Dr Hameeth Shah is working as a Senior Lecturer at University Kuala Lumpur-Royal College of Medicine Perak (UNIKL-RCMP) and practicing as a Specialist in Internal Medicine at Pusat Pakar Perubatan Ar-Ridzuan in Ipoh, Perak. He also has special interest in cardiology and currently doing his fellowship in Interventional Cardiology.
LinkedIn: https://www.linkedin.com/in/hameeth-shah-67167445/
Siti Sarah Nadiah Suliman — Legal & Human Capital Director
Siti Sarah Nadiah is a qualified lawyer, whose vast experience in legal practice ranges from human rights, civil litigation, commercial and banking law.
Siti Sarah Nadiah graduated from UiTM with Honours Degree of Law and currently pursuing her Master’s degree in Islamic Finance Practice. She is also a Senior Associate Member of Chartered Institute of Islamic Finance Professionals (CIIF).
LinkedIn: https://www.linkedin.com/in/siti-sarah-nadiah-suliman-a16007159/
Noorashikin Zainal — Account & Finance Director
Noorashikin Zainal has a total of more than 17 years of experience in accounting. She has handled accounts of companies of various businesses and industries, which include healthcare, electrical and electronics, real estate and event management.
A graduate from UNITEN in accounting, Noorashikin’s last position was Account Manager at K-Fiqh Sdn Bhd.
LinkedIn: https://www.linkedin.com/in/noorashikin-zainal-b83686133/
Zainab Abdul Razak — Mart Operation Director
Zainab joined Zalora, Asia’s leading online fashion platform as Operation Executive in 2012 before moving to Lazada, Malaysia’s largest e-commerce store as Senior Operation Associate in 2014, focusing on the warehouse operation. Zainab is now entrusted with managing the whole operation of Elzar Mart, a retail halal supermarket that offers everyday items at a very competitive price.
LinkedIn: https://www.linkedin.com/in/dea-zainab-a193756b/
Dr. Siti Hajar Pahmi — Biotechnology Consultant
Dr Hajar completed her Bachelor’s degree in Biotechnology with First Class Honours in 2010 from the University of Queensland, Australia. The university, together with the Australian Government then funded her Ph.D in Medicinal Chemistry under the International Postgraduate Research Scholarship (IPRS) and the University of Queensland Centennial Scholarship, where she gained her doctorship in 2015. Whilst formal education is important to her, Dr Hajar also led and was heavily involved in multiple projects and events both in Australia and Malaysia.
Throughout her student years, Dr Hajar’s leadership and management skills shone when she held several important positions in the Malaysian Students’ Council of Australia (MASCA) from 2007 to 2014. She maintains a balanced life by being active in sports, and have competed competitively and socially in netball, futsal, basketball, ultimate frisbee, and touch rugby. She is a strong advocate for healthy living as she believes in “healthy heart, healthy life”.
LinkedIn: https://www.linkedin.com/in/hajar-pahmi-19ba3860/
Mohamad Shafiq Ezhan Khairulazli — Creative & Marketing Director
Mohamad Shafiq Ezhan has more than 10 years of experience in creative art and design. He is the founding partner and Creative Director of Talenta Holdings Sdn Bhd, whose clients include Petronas, Telekom Malaysia Berhad and Little Trees (a company based in the United States).
A graduate from UniKL MFI in mechatronics, Shafiq Ezhan’s experience also includes marketing and image and branding strategy.
Siddiq Mohd Amin — Shariah Secretary
Siddiq Mohd Amin graduated from University of al-Azhar, Cairo with a Bachelor in Shariah in 2016. An excellent student with Best Student Award in his third year, he immediately started his career with Elzar Shariah Solutions and Advisory upon his graduation as a Shariah Associate.
LinkedIn: https://www.linkedin.com/in/siddiq-mohd-amin-516b76162/
Professor Dato’ Dr Norbik Bashah Idris — Advisor
Dato Dr Norbik Bashah Idris is currently a Professor at Kulliyah of ICT in IIUM. He started his academic career in 1983 with UTM and has been attributed as one of the early pioneers of Cybersecurity in Malaysia.
Throughout his career, he has been a member of SIGSAC –(Special Interest Group on Security, Audit and Control) of the ACM (Association of Computing Machinery), IEEE Computer Society, New York Academy of Science, USA and IFIP Working Group-11.3 on Database Security (USA). As a cybersecurity professional, Prof Norbik carries CISSP & CISM certifications from ISC2 & ISACA.
In 1995 he led a team which won a strategic research grant from MOSTI to start the first major research work on Cryptography in Malaysia which produced a suite of indigenious cryptographic utilities. In 1998 Prof Norbik founded the first Real-time Software Engineering Centre of Excellence in Malaysia, where he collaborated with the University of Thales from Paris. The cybersecurity R&D team he led later became incorporated as a company which won a significant project from the Malaysian Government to help monitor security of government’s network throughout the country. The company later became the first public-listed company on Cybersecurity in Malaysia. Following his success in Malaysia, Prof Norbik repeated the success into other ASEAN countries and later into the Gulf countries (UAE & Saudi Arabia).
Throughout his career Prof Norbik has been a Keynote Speaker, Visiting Professor, Corporate Figure, Consultant & Advisor on Cybersecurity to various Organizations & Governments, both in Malaysia & international. He was nominee for 2007 Ernst & Young Best IT Entrepreneur, twice Distinguished ISC2 Award winner for Asia-Pacific, IDG Distinguished Chief Security Officer for Asia Pacific, winner of at least 7 Gold medals in various exhibitions and competitions on Cybersecurity products & services, and holder of a few patents.
Prof Norbik’s latest interest is in synergizing cybersecurity & DLT (Blockchain/Tangle) into Islamic Fintech products & services in the hope of contributing to the Maqasid Shariah.
LinkedIn: https://my.linkedin.com/in/norbik-idris-92102036
Mr Hj Khairil Anuar Mohd Noor — Advisor
Khairil Anuar has been an international banker for over 27 years, where the past 18 years has been in Islamic Finance. Over the course of his career as a banker, he has had a significant exposure and experience across a multitude of area including wholesale banking, syndications, trade finance, debt and capital market, asset management, retail banking, cash management, banking operation, system implementation and product management to name a few.
Khairil had helmed HSBC Malaysia’s and Bank Simpanan Nasional’s Islamic Banking Division. He then moved to Dubai serving Emirates Islamic Bank as its Head of Marketing. His last posting was the Head of Structuring, Product Management and Business Intelligence for Wholesale Banking Group at Al Hilal Bank, Abu Dhabi, where he served for almost 10 years.
From 2006 until recently, Khairil has been instrumental in developing the Islamic Finance capabilities of Al Rajhi Bank Malaysia, Mashreq Bank, Dubai and Al Hilal Bank, Abu Dhabi and Kazakhstan within wholesale, retail and operation setting. He graduated with MBA from Saint Louis University in Missouri, USA in 1987, where he also spent 2 years working for a premier stock broking firm there.
LinkedIn: https://www.linkedin.com/in/khairil-anuar-mohd-noor-77040313/
Mr Zuheer Mohammed Majid — Advisor
Zuheer Mohammed Majid is an experienced banker whose career spans over almost 30 years. Now a Senior Vice President in Citibank Malaysia Berhad, his journey in banking began when he joined United Malayan Banking Berhad (now RHB Bank Berhad) in 1986. He then became Assistant Vice President at ABN AMRO Bank Berhad before serving Hong Leong Bank Berhad as Manager for Trade Finance and Correspondent Banking.
Zuheer’s expertise across many areas in the industry had landed him the Senior Vice President post in Citigroup Transaction Services Malaysia Sdn Bhd, where in year 2000, he joined them to oversee the trade services/finance operations and advisory services. He graduated from Irvine University, California with an MBA.
LinkedIn: https://www.linkedin.com/in/zuheer-mohammed-majid-7a32301b/
Mr Hj Zainuddin Md Yusof — Advisor
A market trader with a background in statistics, Hj Zainuddin started trading the global markets in the 1980’s. Aside from having more than 30 years exposure to the global markets, specializing in the US equity market; he has spent thousands of hours testing and enhancing technical trading tools to develop a state-of-the-art proprietary trading system — the Z2 System — which combines technical and fundamental analysis to identify optimum trading opportunities using cutting-edge technology.
Mr Hj Zulhisham Ayob — Advisor
Haji Zulhisham is a top-notch seasoned player in the media and marketing communications industries. He has over three decades of working experience in Broadcasting and Marketing Communications prior to founding Oranje-ISC. Among others, he had served as the Chief Operating Officer in Radio Airtime Services, Executive Vice President Marketing for IT Vista and Executive Director of Pakarmedia Sdn Berhad.
Apart from media industry, Haji Zulhisham is an entrepreneur who founded the Home of TAHFIZ Darul Siddir — A specialist Islamic religious institutions serving and nourishing Islamic spiritual needs promoting mainstream learning of Islam based on the Quran and Sunnah, preparing for the future generations. Home of TAHFIZ Darul Siddir is committed to the dissemination of Islamic knowledge through the traditional time honoured methods for the Glory of Allah (Glorious and Almighty He is) and in honour of our Prophet Muhammad (peace and blessing upon him).
Another outfit founded by Haji Zulhisham is Twentytwo Multi-Labels Concept Store skewed towards offering Muslimah fashions. With more than 100 brands housed under one roof physically and digitally, Twentytwo provides trading, branding and marketing solutions to its business partners and variety of affordable designer brands suitable not only for Moslems, but those who desires to look fashionable and elegant yet dignified.
Mr Khairu Rejal — Advisor
Khairu Rejal has more than 10 years of experience in the venture capital and start-up incubation space, initially at the Nanyang Technopreneurship Center (NTC) and later at Majuven, a Singapore-based venture capital firm focused on early growth and high-tech companies in Bio-Technology, Healthcare, Clean-Sustainable Solutions and Dynamic Digital Convergences. In 2017, Khairu along with other like-minded angel investors came together to launch Rekanext Capital Partners.
Currently, in Rekanext, Khairu as a Managing Partner is always looking out for start-ups across Indonesia, Malaysia as well as Philippines and Vietnam with a focus on enterprise software and deep tech verticals. He also sits on several committees of other non-profit organisations and has led initiatives in the social impact sector.
LinkedIn: https://www.linkedin.com/in/khairurejal/
Mr Hj Che Salmi Che Ibrahim — Advisor
Che Salmi Che Ibrahim has been in the retail industry for the past 26 years. Starting with Sabasun Sdn Bhd, before it changed to its current household name; Sabasun Hyperruncit Sdn Bhd. A local entrepreneur with a global vision, at the moment he proudly owns three Sabasun hypermarkets and a warehouse, aiming to become more efficient in distributing its items.
Sabasun Hyperruncit Sdn Bhd will launch the Terengganu Halal Business Centre in January 2019, which will house the first ever Sabasun Mall, Parkson, a hotel, office units, F&B outlets with a bowling alley. Under Che Salmi’s leadership and dedication, Sabasun has won the Malaysian Ministry of Domestic Trade, Co-Operatives and Consumerism’s ‘Consumer’s Choice Award’ in 2009.
Che Salmi, a graduate in Psycholinguistics, is known not only for his skilful entrepreneurship, but also active in humanitarian and charity works. His Sabasun hypermarkets are famous among locals as it is able to cater the needs of the low-income earners. He is also known for organising fund-raising for people who are less fortunate in other countries like Palestine and Syria.
Madam Roseta Mohd Jaafar — Advisor
Roseta Mohd Jaafar started off her career in Corporate Communications with Mekar Idaman Sdn Bhd as a Senior Executive in 1997. Little did she know that she would flourish in that area and climb the corporate ladder at a rather fast pace. After Mekar Idaman, she moved to Intria Berhad as Assistant Manager before becoming Head of Corporate Communications at Opus International Consultants Limited just one year after that.
Roseta then advanced her career with UEM Group Berhad, as a Manager in the Corporate Communications department. After almost 2 years there, she then took a leap of faith to become the Vice President, Head of Group Corporate Communications and Public Affairs for EON Group Berhad in 2007. Her most lustrous career to-date was her 7-year and a half stint with Al-Rajhi Bank (Malaysia), as their Vice President, Head of Corporate Communications.
Now the Corporate Affairs Director at GCH Retail (M) Sdn Bhd, which owns over 120 Giant hypermarkets, 400 Guardian pharmacies and more than 16 Cold Storage supermarkets, Rosetta has in total more than 20 years’ worth of experience in Corporate Communications. She graduated from University of Leeds with BA (Honours) in TESOL and earned her Masters of Science degree in Corporate Communications from Universiti Putra Malaysia.
LinkedIn: https://www.linkedin.com/in/roseta-mohd-jaafar-5a75763/
submitted by BayanToken to u/BayanToken [link] [comments]

US Taxes, and Mining - How it affects and complicates your tax return.

This won't be a guide so much, as more as me just sharing the tax realities of the US government when it comes to cryptocurrency, and my feelings on the matter. I will be linking to a number of references and articles however. I encourage you to read further.
Ultimately what you do is between you, your conscience, and your government.
My personal perspective:
My understanding of the matter is that mining creates an absolute nightmare from an accounting perspective relative to tax reporting. So much so that the administrative "cost" of tracking what is needed, completely removes the incentives for me. This is expressly and even more of an issue for new altcoins, as online services set up to try to help with this problem have a delay in supporting less popular, or new coins, wallets, and exchanges.
I started getting into crypto in late December as it's a slow period at the office, and friends and family were starting to ask me about crypto. I was aware of crypto, but not the full intricate details. It took me a few hours to get mining, and a week to learn in depth knowledge of optimization. For me this was a hardware tweaking nerds dream, so I immediately understood the appeal. I got involved in this community, and wanted to share my knowledge. With only a few exceptions, the info that I was finding out there was quite fragmented, or poor quality. I created 2 Tutorials here in that time:
Tutorial: Mining and Wallets - A comprehensive guide for new miners
Tutorial: How to improve your Hash Rates with xmr-stak
Happy New Year! It's tax season
With the new year comes tax season. This is something that was on my mind, but I hadn't yet looked into as I was just becoming satisfied with the technical aspects of cryptocurrency and mining. Prompted by a post on /personalfinance and relevant to the surge in popularity with Bitcoin and others being in the news, I ran across this fantastic post:
Crypto-Currency: A Guide to Common Tax Situations
I'm going to barrow and expand on what this means specifically to mining here, but please read the above post, as well as it's reference links and discussions.
The United States IRS, and Cryptocurrency:
The US IRS considers cryptocurrency to be a property, and is taxed as such. This makes selling, exchanging, mining, and even using it in some cases to be taxable events. Buying and holding it forever may not even avoid you a taxable event, should the currency fork (BTC to BCH).
In 2014 the IRS published IRS Notice 2014-21 on crypto currency to provide guidance on the usage of virtual currency. It is done in Q&A format.
Specific to mining it states:
Q-8: Does a taxpayer who “mines” virtual currency (for example, uses computer resources to validate Bitcoin transactions and maintain the public Bitcoin transaction ledger) realize gross income upon receipt of the virtual currency resulting from those activities?
A-8: Yes, when a taxpayer successfully “mines” virtual currency, the fair market value of the virtual currency as of the date of receipt is includible in gross income. See Publication 525, Taxable and Nontaxable Income, for more information on taxable income.
Q-9: Is an individual who “mines” virtual currency as a trade or business subject to self-employment tax on the income derived from those activities?
A-9: If a taxpayer’s “mining” of virtual currency constitutes a trade or business, and the “mining” activity is not undertaken by the taxpayer as an employee, the net earnings from self-employment (generally, gross income derived from carrying on a trade or business less allowable deductions) resulting from those activities constitute selfemployment income and are subject to the self-employment tax. See Chapter 10 of Publication 334, Tax Guide for Small Business, for more information on selfemployment tax and Publication 535, Business Expenses, for more information on determining whether expenses are from a business activity carried on to make a profit.
What this means is that depending on the amount of effort you put into mining, it is either considered a hobby or a self-employment (business) activity. The IRS provides the following list of questions to help decide the correct classification:
As a rule of thumb, randomly mining crypto on an old computer is probably a hobby; mining full time on a custom rig is probably a business.
What does this mean for me and my mining??
Most of you are likely to fall under mining as a hobby, so you'll have to report your earnings Schedule A on line 21 of your tax return. If you have a multi GPU rig mining full or mostly full time, you're going to be classified as a business, you will report on Schedule C (and have more options for deducting costs), but I will strongly recommend those individuals consult a CPA.
Mining in a pool isn't well defined, but I generally consider the pool payout and coin sent to your wallet to be the point where your income is realized. Since this is to be reported as income (often referred to as "other income").
You then need to find what the value your virtual currency was relative to USD at the time that it was mined. This will mean you will have hundred, potentially thousands of transactions. From Dec 20 to the end of the year, I had over 100 payments from my mining pools. And will have to track the conversion prices for each time you were paid by your pool. This works very similar to shares of a stock acquired through ESPP or dividend reinvestment, except you are now the one that has to do all the accounting, as there is no brokerage firm to do that work.
Reporting the income is actually the easy part, once you've at least obtained the value for your currency at the point of being mined. Add up the total and add it to line 21 of your Schedule A and you're done, at least for now until you sell, trade, or spend.
Selling the coin to an exchange for FIAT is a taxable event for the calendar year in which it is sold. For each of the above shares you tracked as stated above, you will take the difference in value to when it was sold, and that difference is your profit, or loss, and you are taxed on that value as capital gains tax. You will also be listing each "share" sold on your return, I again group these as each transaction paid out. For example if your pool paid you 10ETN on 12/24/2017, you would have a line on your return reporting the USD value for 10ETN on 12/24/2017, and then the USD value of 10ETN for the date it was sold. You can consider it like owning 10 shares of stock in ETN, and each transaction or grouping of shares would be reported. If you received a faction, such as 0.4ETN as the entirety of the transaction, that would still have it's own line when reporting capital gains.
Swapping your ENT for BTC is also a taxable event, even if you don't cash out. This is subject to the same rules as cashing out.
Buying goods and services is also considered a taxable event, and the same as cashing out.
You can give ETN to someone, and it is not considered taxable, but may be subject to gift tax depending on the value of the amount gifted.
Conclusions
I am not a CPA, and thus not an expert, please do your own research. I wanted to bring this topic up as it is important, and for me it creates so much of a administrative barrier that I have stopped all mining completly. Reporting capital gains (especially for ESPP) can be a lot of work even with all the accounting done by your brokerage and employer. It may be possible in the future that software can automate a lot of this, high frequency trading has a lot of similar issues but since brokerages are still involved there's a lot of tracking already. I've looked at solutions like CoinTracking.info, however importing from ETN wallets is not currently supported, and so current options are just as manual as keeping a spreadsheet at the moment. Buying and selling through an exchange can be more easily automated for the generation of tax forms, should your exchange be supported (and Cryptopia is). And in general buying is done in larger blocks of ETN, so it is less lines to deal with, and values in USD at the time of inquiring to track. Mining on an pool with a high pay out may help a bit, but could also distort the IRS definitions since some of those coins would have been "mined" day's earlier and just held for payout. This is very much grey area.
Cryptocurrency Facts has a great article on this topic that provides a wonderful and simple break down of things.
If you're considering not reporting, or just not reporting your earnings and only doing capital gains, be warned. The IRS is increasingly looking at cryptocurrencies, and if you get audited, you will be in a world of hurt. Only reporting your capital gains can be problematic if you did not report your earnings. You will also have a hard time showing your profits if you do not track the value of the coin at the time you acquired it. Exchange information may be requested by the government, and you could get audited based on that. Random audits can and do happen and it may not even be for many years, but the can and will look at your past returns, and you will pay penalty fee's for under reporting.
submitted by BOFslime to ETNmining [link] [comments]

Free Bitcoin Mining - CPU GPU Mining Software How to build a Mining Rig - Part 2 - Setting it up! Nvidia Multi-algorithm Profit Switching Setup! Mine more coins!!! Updated 2018 How to mine Bitcoin with GPU Video Card ... How Much Can You Make Mining Bitcoin With 6X 1080 Ti ...

The innovation of GPU mining, that is mining bitcoin on a GPU device, made producing bitcoin blocks and earning block rewards on average roughly six times more efficient according to analysis done ... Events; Giveaways; AMD3D; 中文版 ; Performance Analysis: Two Radeon RX 590 in Crossfire @ AMD3D March 4, 2020 Winston Articles, PC & Computers, Video Cards 0. Our sister site AMD3D have published a performance analysis two Radeon RX 590 in Crossfire mode. Head over there to check out the full article, and see whether it’s really worth having a Crossfire multi-GPU setup. Read the more ... CGMiner 4.1.11 – This is a multi-threaded multi-bullet FPGA and ASIC miner for bitcoins, as well as the most popular miner for GPU / FPGA / ASIC. CGMiner – This is an open source GPU miner written in C and available on several platforms such as Windows, Linux and OS X. One of the things that make it extremely popular is the fact that it is ... Is multi-GPU setups really worth it? Now, this is probably one of the most asked question by the majority of users out there. Well, to be honest, it all depends on how you look at it. If you’re on a tight budget and want to increase your graphics performance, then buying a second graphics card for a multi-GPU setup isn’t your best option. I ... Updating your device's firmware, generating your own secure random seed or using multi-signature can make it harder to steal your bitcoins. Very secure environment This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment. Variable ...

[index] [10943] [37756] [11725] [32420] [6698] [1780] [31443] [38975] [42820] [50670]

Free Bitcoin Mining - CPU GPU Mining Software

SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Nviddia GTX 1080 Ti - https://amzn.to/2Hiw5xp 6X GPU Mining Rig Case - https://bitcoinmerch.com/produc... Greetings Guys! In Part 2 of my Mining Rig Tutorial I want to show you how I set up my Mining Rig and what you have to consider. Enjoy! Graphics Card: GTX 10... If you want to exchange your bitcoins for other crypto: (Ethereum, XRB, Litecoin) this is a handy exchange: https://www.kucoin.com/#/?r=256xv I have a video ... Need a guide for a Multi-GPU Mining Rig setup? Here it is, I'm using - ASRock H81 Pro BTC motherboard - Intel Pentium G3220 processor - ZOTAC GTX 1060 AMP - ... Nicehash Multi CPU / GPU Cryptocoin Miner & Benchmark Software - Duration: 14 ... How to start Bitcoin mining for beginners (SUPER EASY) - ULTIMATE GUIDE - Duration: 13:51. We Do Tech 712,130 ...

#