Was Sie über Windows 10 Secure Boot Keys wissen müssen

In einem, was absolut als glitzerndes Beispiel dafür angesehen werden könnte, warum es keine goldenen Schlüssel geben sollte, die eine Hintertür zu sicheren Diensten anbieten, hat Microsoft versehentlich den Hauptschlüssel an sein Secure Boot-System weitergegeben.

Das Leck aktiviert potenziell alle Geräte mit installierter Microsoft Secure Boot-Technologie, wodurch der Status des gesperrten Betriebssystems aufgehoben wird, so dass Benutzer ihre eigenen Betriebssysteme und Anwendungen anstelle derjenigen installieren und secure boot schlüssel löschen können, die vom Redmonder Technologiekonzern als solche bezeichnet werden.

Das Leck sollte die Sicherheit Ihres Geräts nicht beeinträchtigen – theoretisch. Aber es wird die Leitungen für alternative Betriebssysteme und andere Anwendungen öffnen, die bisher auf einem Secure Boot-System nicht funktioniert hätten.

Wie wird Microsoft darauf reagieren?

Ein einfaches Update, um jeden Secure Boot Basisschlüssel zu ändern? Oder ist es einfach zu spät, Schaden angerichtet?

Was Sie über Windows 10 Secure Boot Keys wissen müssen

Lassen Sie uns einen guten Blick darauf werfen, was das Secure Boot Leak für Sie und Ihre Geräte bedeutet.

Was ist ein sicherer Boot?

„Secure Boot hilft sicherzustellen, dass Ihr PC nur mit Firmware bootet, die vom Hersteller vertraut wird“.

Microsoft Secure Boot wurde mit Windows 8 ausgeliefert und soll böswillige Betreiber, die Anwendungen oder nicht autorisierte Betriebssysteme installieren, daran hindern, während des Systemstartvorgangs Anwendungen oder nicht autorisierte Betriebssysteme zu laden oder Änderungen vorzunehmen. Als es ankam, gab es Bedenken, dass seine Einführung die Möglichkeit, Microsoft-Systeme mit zwei oder mehreren Booten zu starten, stark einschränken würde. Letztendlich war dies weitgehend unbegründet – oder es wurden Workarounds gefunden.

Da Secure Boot auf die UEFI-Spezifikation (Unified Extensible Firmware Interface) angewiesen ist, um grundlegende Verschlüsselungsfunktionen, Netzwerk-Authentifizierung und Treibersignierung bereitzustellen, bietet es modernen Systemen eine weitere Schutzschicht vor Rootkits und Low-Level-Malware.

Windows 10 UEFI

Microsoft wollte den „Schutz“ von UEFI in Windows 10 erhöhen.

Um dies durchzusetzen, informierte Microsoft die Hersteller vor der Veröffentlichung von Windows 10, dass die Entscheidung, die Option zum Deaktivieren von Secure Boot zu entfernen, in ihren Händen lag und das Betriebssystem effektiv an dasjenige anschloss, mit dem ein Computer kommt. Es sei darauf hingewiesen, dass Microsoft diese Initiative nicht direkt (zumindest nicht ganz öffentlich) vorangetrieben hat, aber wie Peter Bright von Ars Technica erklärt, haben Änderungen an den bestehenden UEFI-Regeln vor dem Veröffentlichungsdatum von Windows 10 dies ermöglicht:
Wird Linux auf zukünftiger Windows 10 Hardware nicht mehr funktionieren?
Wird Linux auf zukünftiger Windows 10 Hardware nicht mehr funktionieren? Secure Boot kann verhindern, dass einige Linux-Distros booten. Auf kommenden Windows 10-Geräten können Hersteller die Option zum Deaktivieren von Secure Boot entfernen. Dies wird sich auf Linux Mint und einige andere beliebte Distributionen auswirken.
„Sollte dieser Stand bestehen, können wir uns vorstellen, dass OEMs Maschinen bauen, die keine einfache Möglichkeit bieten, selbst erstellte Betriebssysteme zu booten, oder sogar jedes Betriebssystem, das keine entsprechenden digitalen Signaturen hat.“

  • Obwohl es zweifellos zahlreiche Desktops und Laptops mit freigeschalteten UEFI-Einstellungen gibt, könnte dies ein weiterer Stolperstein für diejenigen sein, die eine Alternative zu ihrem Windows-Betriebssystem ausprobieren möchten.
  • Noch eine weitere Straßensperre für Linux-Befürworter, die umher arbeiten…. Seufzer.
    Und jetzt ist der sichere Kofferraum dauerhaft entsperrt?
  • Auf Dauer bin ich mir nicht so sicher. Aber für die Zwischenzeit kann Secure Boot freigeschaltet werden. Hier ist, was passiert ist.
  • Ich weiß, dass ich mich auf einen superduper Skelettschlüssel bezogen habe, der jedes einzelne Schloss im gesamten Microsoft UEFI Secure Boot-Universum freischaltet…. aber es kommt tatsächlich darauf an, welche Richtlinien Sie auf Ihrem System unterzeichnet haben.
  • Secure Boot arbeitet mit bestimmten Richtlinien zusammen, die vom Windows Bootmanager gelesen und vollständig befolgt werden. Die Richtlinien empfehlen dem Bootmanager, Secure Boot aktiviert zu lassen. Microsoft hat jedoch eine Richtlinie entwickelt, die es Entwicklern ermöglicht, Betriebssystem-Builds zu testen, ohne jede Version digital signieren zu müssen. Dies übersteuert effektiv den sicheren Start und deaktiviert frühzeitige Systemprüfungen während des Startvorgangs. Die Sicherheitsforscher MY123 und Slipstream dokumentierten ihre Ergebnisse (auf einer wirklich reizvollen Website):
    Wie man die meisten Windows Boot-Probleme löst
    Wie löst man die meisten Windows Boot-Probleme? Wird Ihr Windows-Computer nicht hochgefahren? Es kann sich um einen Hardware-, Software- oder Firmware-Fehler handeln. Hier ist, wie man diese Probleme diagnostiziert und behebt.

Was bedeuten die Symbole auf meinem Bildschirm?

Die Symbole oben auf dem Display

Ganz oben auf dem Bildschirm Ihres Telefons sehen Sie möglicherweise alle möglichen Symbole, die Sie nicht erkennen. Diese wurden nicht angebracht, um dich zu verwirren. Sie versuchen tatsächlich, Ihnen zu helfen, indem sie Ihnen einige Informationen über den Status Ihres Telefons geben. Aber wenn man das Symbol nicht erkennt, ist es keine große Hilfe, oder? Deshalb haben wir diesen Artikel erstellt – er ist eine Zusammenfassung der häufigsten Benachrichtigungen und android symbole oben, die Sie auf Ihrem Display sehen können.

Pluszeichen im Kreis

Viele Leute haben nach diesem hier gefragt. Das Datenrettungssymbol besteht zu 75% aus einem Kreis mit einem zusätzlichen Zeichen in der Mitte, und es befindet sich auf Android-Geräten mit Nougat und höher. Es hilft Ihnen, Ihre Datenmenge zu sparen und wird ein- und ausgeschaltet, indem Sie in Ihre Einstellungen zur Datennutzung wechseln.

Zwei horizontale Pfeile, die in entgegengesetzte Richtungen zeigen.

Sie sehen dieses Symbol, wenn Ihr Mobilfunknetz Voice over LTE (VoLTE) Dienste gestartet hat oder testet. Die neue Technologie nutzt Ihr 4G-Signal für Sprachanrufe – bisher wurden nur Internetdaten von 4G verarbeitet – und bietet Ihnen eine bessere Abdeckung, insbesondere in Innenräumen, und eine bessere Gesprächsqualität.

Was bedeuten die Symbole auf meinem Bildschirm?

Wi-Fi

Das kleine Radarsymbol bedeutet, dass Sie mit Wi-Fi verbunden sind. Dies ist normalerweise in Ihrem Haus, bei der Arbeit oder in Cafés zu finden. Es ist sehr schnell und eignet sich für alle Arten von Internetaktivitäten, funktioniert aber nur, wenn Sie sich in Reichweite einer Wi-Fi-Verbindung befinden.

Ausrufezeichen auf dem Wi-Fi-Symbol

Dieses Symbol zeigt an, dass Ihr Telefon die neue Funktion Smart Network Switching verwendet, um Ihnen die bestmögliche Internetverbindung zu bieten. Wenn Sie sich mit einem WLAN-Netzwerk verbinden, das nicht funktioniert, schaltet Smart Network Switching Ihr Handy automatisch wieder in das Mobilfunknetz ein, so dass Sie eine stabile Internetverbindung erhalten.

Kapital G

G ist die langsamste und älteste Internetverbindungsgeschwindigkeit. Es steht für GPRS (General Packet Radio Service) und ist aufgrund der langsamen Datenrate nur für das Senden einiger weniger Nachrichten über WhatsApp geeignet.

Kapital E

E ist etwas schneller als G, aber immer noch zu langsam, um Websites anzusehen oder Musik effektiv zu streamen. Es steht für EDGE (Enhanced Data Rates for GSM Evolution).

3G

Mit 3G wird das Internet praktischer. Webbrowser laden relativ schnell und Musik-Streaming ist möglich, obwohl es nicht wirklich schnell genug für Video-Streaming oder Download ist.

Kapital H

H ist eine schnellere Form von 3G. Geschwindigkeiten machen das Musik-Streaming zuverlässiger, aber Sie werden viel Geduld benötigen, wenn Sie einen Film herunterladen möchten. Das Streamen von Inhalten, die länger als ein paar Minuten dauern, kann ebenfalls viel Zeit in Anspruch nehmen. H steht für HSDPA, was für High-Speed Downlink Packet Access steht.

Kapital H+

H+ ist der nächste Schritt nach H, aber immer noch nicht so schnell wie ein 4G-Anschluss. Downloads sind praktischer und Video-Streaming ist viel zuverlässiger. Der Empfang für H+ ist derzeit weiter verbreitet als bei 4G. H+ ist die Abkürzung für HSDPA+.

4G/LTE

  • 4G, oder Long Term Evolution, ist bei weitem die schnellste Verbindung und ist fast so schnell wie die Wi-Fi-Verbindung zu Hause oder im Büro. Es ist für alle Internetaktivitäten wie Video-Streaming und Filmdownloads, Videoanrufe und so weiter geeignet. Aber denken Sie daran, dass das Herunterladen von Dingen über 4G schnell geht, aber Ihre Daten schneller verbraucht.
    Pfeile neben oder unter Internet-Symbolen
  • Bei vielen Handys sehen Sie nun zwei Pfeile neben oder unter dem Internetsymbol auf Ihrem Handy (wie in den Bildern oben). Diese blinken, wenn Ihr Handy seine Internetverbindung nutzt und sind ein praktischer Indikator dafür, dass die Verbindung ordnungsgemäß funktioniert (beide Pfeile sollten in diesem Fall blinken). Die Pfeile lassen Sie auch wissen, ob eine Anwendung das Internet im Hintergrund nutzt, da sie blinkt, wenn Sie nicht versuchen, online zu gehen.

R neben den Signalschienen

Das große R“, das neben den Signalschienen an Telefonen erscheint, ist das Datenroaming-Symbol. Wenn Sie es sehen, bedeutet dies, dass Ihr Telefon mit einem Netzwerk verbunden ist, das nicht das normale ist. Ohne Roaming können Sie das mobile Internet auch außerhalb des Landes nicht nutzen. Es kann in den Netzwerkeinstellungen Ihres Telefons ein- und ausgeschaltet werden. Bitte beachten Sie, dass die Nutzung des Internets, wenn Sie dieses Symbol sehen, hohe Rechnungen verursachen kann (in der EU sollten Sie jedoch in Ordnung sein – wenn Sie in der EU reisen, fallen keine Roamingkosten an).
Dreieck neben den Signalbalken

Auf älteren Android-Handys sehen Sie möglicherweise ein Dreieck neben Ihren Signalbalken. Dies zeigt, dass Ihr Handy roamt, wie das obige Symbol „R“.

Telefon mit Wi-Fi-Symbol, das herauskommt.

Dieses Symbol zeigt an, dass Ihr Telefon für Wi-Fi-Anrufe eingerichtet ist.

An interview with Prince Michael of Liechtenstein: „Now comes a disappointment phase

Prince Michael of Liechtenstein is, among other things, the founder and chairman of the Vaduz-based geopolitical consulting and information service Geopolitical Intelligence Services AG. In the context of his work, he also deals with crypto currencies and blockchain technology.

BTC-ECHO met him exclusively for an interview about the Bitcoin secret

About the future of Bitcoin secret, Liechtenstein as a business location and the sense of an international regulation of crypto currencies and the Bitcoin secret.

When it comes to financial technologies such as Bitcoin and other crypto currencies, the Principality of Liechtenstein made a comparatively early effort to achieve sensible regulation. BTC-ECHO met Prince Michael of Liechtenstein at the Blockchain Leadership Summit in Basel for an interview to discuss regulation, the future of Bitcoin and ICOs.

Prince Michael of Liechtenstein, you just mentioned it in your opening speech: Theoretically everyone can publish his or her own crypto currency, there are numerous other coins besides Bitcoin. Are there too many?

That’s typical of a new technology. There are many ideas and many players. I think that will consolidate over time. I believe and hope that there will be a lot of special solutions. So I think that you can design certain crypto currencies for certain regions and themes.

Are you thinking about specific cryptosoft?

Yes, exactly. We might have some global and comprehensive [cryptosoft currencies] [in the future], but we might have a specific cryptosoft review. For example, if a certain region has liquidity problems: Here crypto currencies could create an advantage to help the local economy. Other use cases are also conceivable – especially in the supply chain sector.

At the moment, the Bitcoin share price is struggling with losses. Do you think Bitcoin has a chance as a global currency?

To be honest: I don’t know. I think Bitcoin is a bit too limited to be a global payment system at the moment. It’s also not fast enough yet. But I don’t know whether it’s Bitcoin that’s evolving and becoming established.

Frick-Bank-CCO Hubert Büchel: „We don’t share the scepticism of other market participants“

Some time ago, the news that the Liechtenstein Financial Market Authority had approved the first crypto-asset-based fund regulated in Europe caused quite a stir. The Liechtenstein bank Frick is sympathetic to blockchain technology and serves as custodian for the Postera and other crypto-asset-based funds. An interview with Hubert Büchel, CCO of Bank Frick.

A few days ago, BTC-ECHO wrote about regulated crypto funds. Various interviews show that the Old Economy is also showing more and more interest in crypto currencies. In this respect, Liechtenstein seems to become an increasingly important location in Europe, as the statements of Prince Michael von und zu Liechtenstein show. Thanks to the Savedroid debacle, the Liechtenstein bank Frick has also become better known in crypto circles. To say the least, Yassim Hankir’s PR stunt was not fully thought through, but Bankhaus Frick’s response was sovereign, calm and appropriate:

„All funds invested in the ICO of savedroid AG are safe and could not have been deducted under any circumstances due to fiduciary diligence. Bank Frick does not understand the PR stunt of savedroid CEO Yassin Hankir and prefers to work with professional market participants“.

Both this form of reaction and the fiduciary custody of the funds acquired by the ICO show that the Liechtenstein bank knows the crypto market.

Depository for Bitcoin revolution crypto assets

Hello, Mr. Büchel. Can you explain to us exactly what a cryptographic asset depository is? Similar to traditional banking, it is basically a matter of keeping assets in safe custody. However, while humanity has learned over thousands of years to assess analogous values and risks, purely digital Bitcoin revolution crypto assets present us with new challenges. At worst, Bitcoin revolution can be irretrievably lost. Conventional approaches focus primarily on protecting against natural risks, accidents or unauthorized access. Bank Frick has unique expertise worldwide, not only in making known risks manageable, but also in countering political risks. Our customers have it easy: The traded assets are booked via the custody account or accounts like a normal stock exchange transaction.

What security precautions do you take as a bank for Bitcoin loophole crypto assets?

Security means the integrity of private keys at all costs and limiting access as much as possible. We ensure the integrity by means of geo-redundancy. The restriction of access takes place at the expense of availability, but reduces the risks to a minimum. Technically, we make remote access impossible through permanent physical isolation and multiple encryption. Bitcoin loophole transactions only take place in a high trust environment and require several persons. We also have a very good Bitcoin loophole monitoring system and can react quickly to changes.

A huge potential

What do you think of the scepticism of other banks? We do not share the skepticism of other market participants. What we can say is that the great interest shown by investors and the steadily growing number of applications of the core technology behind it testify to the enormous potential of a market that is just emerging – especially for regulated products and services on the blockchain, which we as a bank are already offering. Of course, we understand that such leaps in technology are sometimes viewed „cautiously“.

What projects is Bank Frick planning in the crypto-asset area?

At the moment, Bank Frick is paying a lot of attention to the tokenisation of classic assets. A token represents the value of the underlying assets. Here the difficulty is still in trading. Since these are security tokens, tradability is only possible via corresponding providers who are authorized to do so. We are therefore very curious to see how the market of Exchanges and Brokers will change in the future. […] Our focus here is on the development of AlF funds and with the Postera Fund we have co-developed the world’s first crypto fund, which is designed in accordance with European law. Our Payment Service Provider team is also interested in the optimization of payment solutions based on the Blockchai

Nakamoto Family Foundation: We are all Satoshi Nakamoto

Since 29 June 2018, the website nakamotofamilyfoundation.org has published a first excerpt from the book „Duality“. The author of the book is said to be the legendary Bitcoin inventor Satoshi Nakamoto. On closer inspection, however, one comes to a different conclusion.

Who is Satoshi Nakamoto? The search for the identity behind the name „Satoshi Nakamoto“ is still a mystery. The latest news appeared on the website nakamotofamilyfoundation.org. Here the alleged Satoshi published an excerpt from his planned book. A glance at the excerpt raises strong doubts that it is the „real“ Satoshi.

On the page announcing the excerpt from the upcoming book, Satoshi says that his book will appear in two parts. In an easy-to-solve cryptogram (be careful: spoiler!) he reveals the title of the book: Honne and Tatemae. This title describes a phenomenon that we recently described in our series on digital identity: The difference between the inner attitude (Honne) and the masquerade (tatemae) that we cultivate in society – the social roles.

Furthermore, he admits at the same time: „I want to point out that there are many who have participated in this project, many of whom I have not mentioned. Individuals who, for various reasons, have decided not to go public. Out of respect for them, I didn’t name them.“

„Satoshi“ and the news spy Cypherpunks

In the extract he describes the news spy basic idea behind Bitcoin and that it originates from the Cypherpunk movement, which he joined at the age of 14. Satoshi Nakamoto is also the Japanese equivalent of the name „John Smith“ – Lieschen Müller or Otto Müller. He explains further about the news spy:

„At some point it became obvious to part of the community that Satoshi Nakamoto could not be real. And although I pulled out all the stops to ignore it, some people were clever enough to see through it all. Maybe Satoshi Nakamoto was actually just a pseudonym. Maybe I wasn’t from Japan at all, but of English descent. Some came to this conclusion after analyzing my way of writing. To be honest, that was something I learned early on – good English. (I must admit, however, that I know that my writing style has changed in the meantime. I don’t use double spaces anymore and I also know that I don’t take myself so seriously anymore, maybe because I’ve grown older. If you try to appear older than you are in the 1920s, to be accepted in a community that equates age with experience, and to drive your own project forward – you wouldn’t believe what you’re doing.“

Aren’t we all a little Satoshi regarding the Bitcoin secret?

Literarily, you’re dealing with a (most likely conscious) game with the categories Bitcoin secret author and protagonist. Already the title indicates such a Bitcoin secret. Also the hint that many people participated in the project suggests that it is not the „real“ Satoshi who wrote these lines. Rather, it raises the question of whether this genuine Satoshi exists at all. In connection with the hint that behind Satoshi Nakamoto lies the Japanese equivalent of Otto Müller, one can conclude from this perspective: We are all Satoshi Nakamoto. At least according to the Nakamoto Family Foundation – whoever is behind it.

Basic data protection regulation: What does this mean for Bitcoin, Ethereum & Co.?

The time has come: The Basic Data Protection Regulation (DSGVO) comes into force. The problems caused by the new data protection law with public blockchains are highly problematic and unclear to many. The right to be forgotten clashes with the right not to be able to forget. The principle of central responsibility stumbles over decentralisation. How can this be reconciled with the blockchain and crypto currencies?

After a grace period of two years, the DSGVO finally enters into force. With its seemingly endless scope of application and the hefty penalties of up to 20 million euros or 4 percent of the worldwide annual turnover, it has already caused a sensation in the entire business world. So far, it has attracted less attention in the area of blockchains.

Does the Bitcoin loophole even apply to blockchains?

When initial questions were asked about the compatibility of Bitcoin and the DSGVO, some objected that the block chain was anonymous. As everyone now knows, the blockchains at Ethereum and Bitcoin loophole are not anonymous, but pseudonymous. The DSGVO may therefore be applicable.

In addition, the scope of application of the DSGVO is extremely broad.

First of all, in territorial terms it is de facto applicable worldwide due to the digital network and the attractive European economic area, namely according to Art. 3 DSGVO in simplified terms whenever data of EU citizens are processed or data processing takes place within the EU.

In addition, data processing is an inherent part of the functioning of a blockchain, which places it more in the focus of the DSGVO.

Personal data in the news spy

Of course, the processing of any data is not sufficient. It must be personal data – the news spy clarifies this directly in its first articles (Art. 1 para. 1 and Art. 2 para. 1 DSGVO). According to the definition of scam in Art. 4 para. 1 DSGVO, personal data are „any information relating to an identified or identifiable natural person […]“.

The blockchain stores all transactions ever carried out. With this transaction data, it contains information about the credit balances and payment flows assigned to the individual Bitcoin addresses. With the appropriate additional knowledge, this makes it possible to establish a link to the persons behind the data (more and more easily). The stored hashes serve to identify the user. Thus they are person-related for those persons who have or can obtain the necessary knowledge to assign this information (by relative means) to a specific person – for example, if a trading exchange, a marketplace or an online shop is involved.

The DSVGO is thus applicable to public blockchains.

Persons responsible in a public block chain
Against whom can the associated obligations be enforced at all? Who is responsible for any infringements of the DSGVO? According to Art. 4 No. 7 DSGVO, the person responsible is the person who alone or jointly with others decides on the purposes and means of processing personal data. It is therefore about the actual power to determine the blockchain.

The example of Satoshi Nakamoto makes it clear that it cannot be the person who programmed and started the blockchain: After the start he gave the control completely out of his hand.

The miners cannot be seen as responsible either. Their influence is limited only to the calculation of new blocks. They have neither influence on the content nor any real decision-making power. They only provide the computing power.

But this is different with full nodes: Whoever carries out a transaction and thereby distributes information or enters the blockchain into his copy, processes data, participates in the network and pursues his own economic purposes – and is responsible according to the DSGVO.

K.O. through rights of data subjects
In addition to a number of other rights and obligations, the DSGVO regulates the right to be forgotten as the strongest right (Art. 17 DSGVO). Thus the obligation to delete applies to the respective responsible node.

It is in the nature of the blockchain that data in it are not changed or deleted, but should remain permanently stored. This is what establishes the decentralised public faith or public trust in the first place. In addition, the complete deletion of data in public blockchains is theoretically possible, but extremely difficult in practice. Deleting individual data would change the hash of the block and all blocks that follow it.

After all, the basic idea of the blockchain has become so popular precisely because of the fact that the hash of the block and of all blocks that follow it can be deleted in its hash.

Bitcoin Cash criticized: How decentralized are BCH Full Nodes really?

The Twitter account BitPico accuses the popular representatives of the Bitcoin Cash network, Roger Ver and Jihan Wu, of hosting full nodes via a centralized cloud server. What does this mean for the security of Bitcoin Cash?

Bitcoin revolution has many vocal opponents on Twitter

The crypto currency there is often called „BCash“, much to the chagrin of front man Roger Ver. The old-established Bitcoin revolution community makes it clear time and again that Bitcoin Cash is not „the real Bitcoin“. Now new accusations are circulating against Bitcoin Cash: Bitcoin Revolution Review 2018 » Full Scam Check

Full Nodes about Cloud Server: BitPico is a Twitter account of a group of Bitcoin developers, miners and whales. As they recently twittered, a stress test showed that many of the full nodes start with the same IP address:

Perhaps somebody from the #bcash $bch #BitcoinCash team can explain this? #cryptocurrency #blockchain #decentralized #magic #trick #fail @rogerkver @JihanWu If you are running a bitPico Cash stress test node please update your code ASAP. Thanks! pic.twitter. pic.twitter.com/0GfJy8xDZM

Server farms, a single point of Bitcoin revolution

For the layman, it is not possible to see directly what the problem is. After all, it is healthy for the network to have many full nodes as tested here: onlinebetrug.de. A Full Node is a computer that has the entire blockchain stored. These entities play an important role in the network because they check the validity of the blocks produced by the miners according to the consensus rules. So the more full nodes there are around the Bitcoin revolution world, the more secure the network will be.

However, looking at the screenshot you can see that many Full Nodes have an IP address of 47.88.xxx.xxx. This is an indicator that they are in the same place. Probably this is a rented server farm where someone runs Full Nodes.

Only eleven minutes after BitPico’s tweet, 800 full nodes were banned. Krypto-OG, DanDarkPill, expresses itself ironically with a Star Wars reference on the subject:

While it’s good that there are many full nodes on the network, it’s problematic if they’re all in the same place. If they are hosted on the same service, the total number of nodes is deceptive when it comes to the degree of decentralization. An environmental disaster or a service provider could quickly ensure that a large number of full nodes are no longer part of the network. A spatial concentration of nodes also gives rise to fears that the block chain will then be under the control of a single party. All in all, a concentrated number of nodes in a single server farm therefore conflicts with the desired decentralization of a crypto currency.

US government wants to fight crime with crypto currencies

There are only two weeks left from 2016 and bitcoin seems to be busy „catching up“. For a long time analysts have predicted that bitcoin would reach 800 US dollars by the end of the year. Looking at the last few days, this could become reality. Currently bitcoin is trading at 791 dollars and is therefore only 9(!) dollars away from this hurdle.

But not everyone celebrates this cryptosoft review

The US government is still hanging around with the idea that bitcoin is the most popular cryptosoft review for criminals and terrorists. And they are most likely to use the digital currency for their atrocities.

However, some representatives believe that terrorists could create a cryptosoft review that is so anonymous and powerful that there is no way to find out the identity of the co-conspirators. (Editor’s note: Monero, Zcash, ShadowCoin…?)

Joshua Baron, theoretical cryptographer and mathematician for Rand Corp., shares his knowledge with a US government think tank. His mission? Find out if the enemies of the nation want to create such a currency. Currently, there is no evidence that anonymous money is being developed in this form.

Crypto trader scam crime is relatively low in the United States

„We are trying to find ways for the government to prevent crypto trader scam with onlinebetrug and new virtual currencies for terrorists, non-state actors and separatists,“ he said.

Juan Zarate, senior consultant at a Washington think tank center for strategic and international studies, worked on the problems of transparency in digital crypto trader scam currencies. He has actively fought money-based crime in the crypto sector. In 2003, he led a team of Treasury experts to freeze personal accounts of American enemies to „provoke trouble“. He explained that the model they have introduced prevents major crimes and that the government does not have to worry too much.

„We have now made it very difficult for members of the Islamic state to receive money or send money around the world,“ he said. „Even Iran has difficulties.

First, Treasury officials will observe and let pass the development of bitcoin and other crypto currencies. However, they keep a critical eye on the development in order to be present in time if something unusual happens.

„Such anonymous money does not yet exist? Let us please remember the security theatre for Zcash. There I ask, among other things, the following question: ‚The federal government does not want the surveillance of WhatsApp and Co. nation states to be seen as potential attackers of this currency? At the time I wrote this article, it was just a logical conclusion. That after a little more than half a month we see more or less evidence of such activities, frankly surprises me.

It’s not as if I didn’t expect it. Rather, I wonder how quickly such information comes to the public and how here it is more or less ’said by the flower‘ that anonymous digital currencies can be seen as a terrorist weapon.“

Starta ICO Analysis: A Bridge between the USA and Eastern Europe

„Venture capital“ has become an everyday term in recent years and we are currently experiencing a boom phase in start-ups. The startup euphoria and the need for venture capitalists are also increasing in Eastern Europe. Starta wants to invest in Eastern European start-ups and aim for exits to major investors in the USA.

What is Starta’s goal?

The idea behind Starta’s „Accelerator 16/17“ project is to invest primarily in the early stages of start-up companies in Eastern Europe. Many start-ups still have problems obtaining sufficient venture capital in important phases if they do not have an appropriate network of VCs. Therefore, Starta invests smaller sums and supports the founders with its own programs to build up their company.

If the company grows strongly, then an exit to other VC’s should take place, since these usually have start-ups in later phases in view. Starta would like to build a bridge between Eastern Europe and the USA, because there is a much larger stock of venture capital in the latter region.

The Eastern European region could be a useful region for this project, since the VC culture, as it exists in the US, for example, is less pronounced here. Ultimately, the Early Stage Accelarator ensures that the start-ups are built up through financial injections and mentoring and that an exit in the USA is subsequently promoted.

How does the Starta ICO work?

Starta would like to raise capital for the project through the ICO and issue its own tokens in cooperation with Cross Coin. The Singapore-based partner Cross Coin will then acquire a 33 percent stake in Starta Accelerator 16/17 LLC. Those who participate in the ICO will receive the Cross Coin Tokens. The pro rata winnings will then be distributed to the token owners via the partner Cross Coin.

The Starta Accelerator 16/17 holds 21 „post product“ startups, i.e. young companies whose idea has already left the conception phase. Exact details on the individual start-ups are explained relatively openly by Starta in the corresponding whitepaper of the project (see below).

Up to 1.5 million US dollars will flow directly into the 16/17 fund, and any additional amounts will be invested in Starta’s future accelerator programs.

The Starta Blockchain
The relation to the Starta blockchain is rather small – this project does not focus on the technical sophistication of the blockchain technology, but rather on a new type of funding, which is carried out with this ICO. The tokens are used exclusively to carry out the buy-back programme digitally as simply and as cheaply as possible. This doesn’t have to be a bad thing, but this ICO is a comparatively less technical project.

The team
The team seems to be very experienced at first sight: The members promise years of experience in leading positions and in the VC sector. If you get up close and personal with Roy Weissman, you will indeed find a verifiable record track – with small flaws:

Roy Weissman

Weissman is Vice President Business Development at Octopus, an American media agency. The company’s website greets with the face of Weissman. According to Weissman, the company has already worked with partners such as Amazon.

At Starta, Weissman has been acting as Sales and Business Development Advisor since August 2016.

He mentors the „Protokol App“ project, a tech startup. This had received a funding of approx. 130,000 US dollars from Starta. Although this did not take place until January 2017, the project website, which is currently not accessible, appears less professional.

Weismann is also Vice President of Sales at SendPulse, a startup for professional email marketing that makes use of artificial intelligence (AI). In fact, Sendpulse’s services are already relatively well known. Although Weissman’s work at SendPulse is predominantly sales, it is likely to be at least a proof of his affinity with tech start-ups.

Investment Summary