Mr. Feng: Used botvs, it is a quantitative platform. I think with the development of the currency circle, there will be more and more such tools in the future. Although the function is still relatively simple, it is a leap forward compared to emotional investment. There are mature quantitative software in foreign exchange stocks and other markets, and the currency circle will have them in the future, and they will inevitably be used in future investments. My research on quanutorrent bitcoin miningtitative strategies is not deep, and I feel that some simple trend strategies and arbitrage strategies should be frequently used by ordinary users.
Dandelion (dandelion) is another privacy transaction broadcasting technology. The main idea is that the transaction broadcast is carried out in two stages: first, the stem stage, and then the fluff stage. In the stem phase, each node relays the transaction to a peer node. After a random number of hops along the stem, the transaction enters the fluff phase, and its behavior is similar to ordinary transaction diffusion. Even if an attacker can identify the location of the fluff phase, it is difficult to identify the source of the stem. 
Lopp: Okay. I became interested in Bitcoin around 2012. Of course that was not the first time I heard about Bitcoin, which is the same as most of us. We heard about Bitcoin, then ignored it, and then it continued to enter our audiovisual range, and finally we were attracted by it.
The appearance of HiddenTear is of great significance. It is only 12KB. Although the size is small, the sparrow is small and complete. The design of this software is very good in spreading modules and destroying modules. Although the author UtkuSen has repeatedly emphasized that this software is to let people know more about the working principle of ransomware, its open source as ransomware has caused many controversies. At present, this project has been hidden on Github, but the source code can still be obtained after sending the application to the author. After reading the source code of the HiddenTear ransomware, the author also suddenly realized that the original programming ideas and methods are really unique, and destructive thinking and constructive thinking are indeed completely different styles. It can be said that the emergence of HiddenTear objectively has also greatly developed the ransomware.
However, if you put the same energy, time and money on human-computer interaction, such as the Bitcoin community that focuses on machine mining, the effect may be quite different. As long as you install the client, set up the mining machine, and access the mining pool, once the block is generated, Bitcoin will be credited to the account instantly. This is a benefit transfer chain with a very short feedback cycle and a high success rate. Only under the stimulus of this continuous positive feedback of the Bitcoin network, we have seen the Bitcoin community composed of vested interests gathered due to the scattered wealth. Although this community is a bit different from what people imagined-its main interaction is between people and computers, not between other community members, but it doesn't matter. In this area where individual differences are too large and common memories are weak In the ages, the depth of communication between strangers has already degraded to be no different from human-computer interaction (except for quarrels), just like various OTC legal currency trading areas, people use automatic replies and transfers to each other. Interaction makes the author often wonder if I am dealing with machines.
MetaMask software developer Frankie Pangilinan said that the transaction alarm function is good for subscription services. Ledger co-founder Nicolas Bacca said his team is exploring the implemenutorrent bitcoin miningtation of alarm clocks in hardware wallets to increase transaction scheduling capabilities.