📜 ⬆️ ⬇️

What Bitfury Does: A Digest About Our Developments

This is a selection of materials about our blockchain solutions - Exonum, Crystal, Lightning Peach and Bitfury Clarke. Articles under the cut tell how to track stolen cryptocurrency on the blockchain, how to cool mining chips in a data center and how to make coffee for bitcoins.


Image: Ardonik CC BY-SA


How we develop software



How we translated Exonum from Iron to actix-web

When creating our platform for developing private Exonum blockchains, we used the Iron web framework. However, over time, its authors have stopped releasing updates and that is outdated. Actix-web was chosen to replace Iron. In this article, we share our experience of migrating Exonum to a new framework using generalized programming techniques: we give the code “before” and “after” updating the entire backend.



A look at Tokio: how the asynchronous event handler works

Another article about the development of our framework Exonum. We talk about how we implemented the Tokio asynchronous event handler instead of the Mio library. We present the code and schemes for implementing event loops for working with Exonum-blockchain nodes, and also talk about Tokio functional components - futures and streams.



Exonum first buyding: why we chose Java

E xonum is written in Rust, since this language is focused on the safety of working with memory (which is important when creating blockchains). However, Rust is a rather difficult PL to explore. To simplify the work with the Exonum platform for users, we wrote a Java library. In the article we tell why we chose Java, and provide guidance on creating Exonum services in a “new” language.



How to deanonimize users bitcoin-blockchain and why it is needed

Blockchain is an anonymous network in which the identities of the owners of addresses are unknown. This is used by cybercriminals to withdraw illegally obtained funds (for example, using ransomware viruses like WannaCry). However, it is still possible to establish the owner of a particular wallet in the Bitcoin network. To do this, we have developed a special clustering method that combines addresses belonging to the same owner.

Information search in various sources, manual registration on the exchanges and other methods allow you to determine the owners for the resulting clusters. In this article, we described the principles of our approach, compared it with similar methods and shared the test results.


Monitor for Lightning Network from the team of Lightning Peach

Last September, our Lightning Peach developers introduced the Lightning Network Node Monitoring System - LN Monitor . It keeps track of the number of connected nodes in the network, the average lifetime of installed bidirectional channels, the size of commissions, and more. In the article we analyze the capabilities of the tool on real LN data - with graphs and explanations.


How to investigate financial crimes



Crystal Blockchain Analytics: Investigate Zaif Attack

These are the results of the hacking study of the Japanese cryptocurrency exchange Zaif, which occurred in September 2018. Our experts analyzed the methods of cybercriminals using Bitfury Crystal , a tool for tracking cryptocurrency in public blockchains. The principles of its operation are based on the clustering algorithm (which we mentioned in the previous subsection) and a special tracking algorithm.

We describe how the Bitfury team monitored the movement of stolen Bitcoins to output points - the Binance, Livecoin and BTCBox.com exchanges. We give a step by step algorithm of actions.



How to track an attacker using a bitcoin blockchain

The Forbes article on cryptogy giant plans (including Bitfury) on the development of tools to protect blockchains and cryptographs, which were discussed at the main industry event - BlockShow. The author of the article did not bypass our Crystal solution.



Bitfury Crystal: how to track suspicious cryptotransactions

Detailed guide on the components and operation of our Crystal Transaction Analytics Platform. We are talking about the main modules and tools: risk assessment, visual presentation, tracking and clustering.

We also prepared a short video in which we analyzed the capabilities of our system on the example of a case with the ransomware virus WannaCry. We show how to compile a list of addresses through which a stolen cryptocurrency passed, and to build a visual scheme reflecting the connections of all virtual wallets.


/ Bitfury Crystal



As we stole bitcoins from Electrum wallets investigated

At the end of December, Electrum e-wallet developers published a tweet warning users of phishing attacks. But the attackers still managed to kidnap 245 BTC. We tell how hackers worked and at what addresses the stolen currency “settled”.


Our iron



Under the hood of Bitfury Clarke - how our new mining chip works

Overview of the components of the new ASIC chip Bitfury Clarke: from controllers and buses to the interface and generator. Even in the article there are characteristics of the device: performance, power consumption, the number of gigagesh that the chip decides in a second. For example, in our new mining server Bitfury Tardis, they “count” up to 80 teraheshs per second. We also give examples of industries where the new chip will be used.



Bitfury Clarke: what's special about it

What indicators affect the efficiency of the chip: size, power consumption, process technology, design, something else? You will find the answer to this question in our promo video about the fresh Bitfury Clarke chip.



“Magic Baths” or Bitfury Cooling System

Material about our new immersion cooling system based on "dry water". We tell how it is arranged on the example of the installation in our data center in Tbilisi. Read more about the properties of "dry water" in Habrablog of our partners - 3M company - which produces this special liquid for cooling equipment in the data center.


Where the blockchain has found application



How blockchain will help speed up the purchase of a house

Blockchain is used not only by banks and fintech startups. Technology has found application in real estate. The article discusses two cases: a blockchain for the sale of houses and apartments in Franklin County, Ohio, and a distributed registry based on our Exonum framework for registering land rights in Georgia.



Blockchain will deliver Russian Post from “philatelic piracy”

The fight against the underground market of postage stamps in Russia has been going on for many years, but they have not yet come up with a reliable solution to the problem. Bitfury has published a study describing how a blockchain can fix this problem.

The idea is to accompany the actual purchase and sale of postage marks with transactions with tokens in a distributed network. Time stamps will be affixed with the purchase of stamps by the distributor and at their cancellation. Thus, fake stamps will not be able to get on the envelopes. Read more about the concept in our material.


Image: Ralf Steinberger CC BY



How Exonum helps state online auction

Since 2015, the first public auction OpenMarket has been operating in Ukraine. The management of the organization is faced with the problem of authenticating user rates. The Bitfury team came to the rescue. In three months, we introduced the blockchain into the auction system, which reduced to zero the risks of data substitution. In this short video, CEO OpenMarket will tell you what has changed in the company after the transition to the blockchain, and what additional benefits the technology has brought.



Lightning Peach and Paytomat: use the Lightning Network in restaurants and cafes

Paytomat, which develops a blockchain-based payment processing system, now works with our Lightning Peach solution, an electronic wallet based on the Lightning Network technology, which accelerates payment for purchases with cryptocurrency. We prepared two videos in which we showed how using Paytomat to pay a bill in a restaurant and buy a cup of hot drink at a coffee shop .



Create a private cryptocurrency service based on Exonum

We tell how to use Exonum to create your own cryptocurrency service with a high level of privacy. The development is carried out using Rust and custom implementation of the “ proof with zero disclosure ” - the Bulletproofs protocol ( PDF ).


miscellanea



Bitfury coffee machines have learned to take Bitcoins: how it works

We tell how we taught the coffee machines in our offices to accept payments in cryptocurrency using Raspberry Pi. It works as follows, first the user selects the type of coffee and presses the button to make it. Then the controller of the coffee machine sends information about the ordered drink to the single board computer, which generates a QR code. This user code scans in a special application. After a second payment passes, and the machine starts to prepare coffee.

How does the "installation", you can see in the video on YouTube :




How to protect the Internet of things - how Lightning Network will help

By 2020, the number of IoT gadgets will exceed 30 billion. The Internet of things is developing very fast, but one of its main problems remains unresolved - weak security. We describe how Lightning Network will help overcome this difficulty through decentralization and micropayments.



Our other digests:

Source: https://habr.com/ru/post/437134/