Bitcoin Dominance Decreases! What this Means For BTC Price and Altcoins – Coinpedia Fintech News

When Bitcoins dominance decreases, it means that altcoins are performing relatively well and that the total cryptocurrency market capitalization is increasing. This usually leads to an increase in BTC price as well, since more money is flowing into the cryptocurrency market as a whole.

As of now, Bitcoin is trading near the $22K price range, having recently passed its all-time high of $68.8K. Its currently trading at around $22K.

Due to the invasion of new coins in the market that are environmental and electricity friendly, BTC dominance has dropped to new lows, because the number of cryptocurrencies has gone high and therefore Bitcoin is facing a stiff competition

bitcoin org bitcoin org Event OrganiserTechnologyPayment solution Followers : 0 View profile is under fire for the amount of energy its Proof-of-Work consensus mechanism requires. ethereum ethereum Blockchain NetworkTechnology Followers : 0 View profile , which was using that same method, is in the process of shifting to a more environmentally friendly Proof-of-stake system that will take place in 2 days to come

According to a tweet by Justin bons, he is a firm believer that Bitcoin is not going to be the one coin to rule them all and that we are in a market where many digital assets will find their own place and use cases. He values the ideas of censorship resistance and decentralization more highly regarded.

Ethereum, the Bitcoin competitor is preparing to make a big shift from its current proof-of-work consensus algorithm to a new proof-of-stake system. The move is designed to make Ethereum more environmentally friendly, but it could have significant implications for the cryptocurrency market as a whole.

If successful, Ethereums switch to proof-of-stake could spur other major cryptocurrencies to do the same, further eroding Bitcoins dominance of the market.

This would be a positive development for the cryptocurrency market as a whole, as it would increase competition and lead to more innovation. It could also lead to lower prices for Bitcoin, as demand for the coin declines.

Was this writing helpful?

Originally posted here:
Bitcoin Dominance Decreases! What this Means For BTC Price and Altcoins - Coinpedia Fintech News

Mooners and Shakers: Ravencoin soars and Bitcoin pumps, but Ethereum flattens out ahead of Merge – Stockhead

Okay, Ravencoin. Whats this one all about then? Its pumping, so lets peck into it. Meanwhile Bitcoins been on a bit of a surge, too, while Ethereum is currently lazing on a deck chair hoping for a decent Merge tan.

Deep into that crypto winter darkness peering, long I stood there, wondering, fearing, doubting, dreaming dreams no shadowy super coder ever dared to dream before. Quoth the Ravencoin, Nevermore.

Edgar Allen Poe didnt quite write that.

That said we can 99.93% say for sure that the legendary 19th century American fountain pen and opioid user wouldve been a crypto fan. Probably. Apparently, he had a keen interest in cryptography and, in fact, had something of an influence on the modern science.

Would love to get into that a bit morebut weve got magic internet money to natter about.

Now, what the squawk is Ravencoin (RVN) then and why is it flapping and ca-cawwing its way up the daily cryptocurrency top 100 chart? Would it surprise you to learn that, in a roundabout sort of way, its Merge related? Nope? Didnt think so.

Ravencoin is not, however, a Proof-of-Stake coin, and its not new. Launched in 2018, the protocol is an Ethereum mining alternative that uses a Proof-of-Work consensus algorithm blockchain that mimics Bitcoins 21 million-coin supply.Its got its own, sophisticated tokenised ecosystem that uses RVN for various DeFi and NFT applications.

According to CoinGecko data, Ravencoin has surged about 30% over the past day and more than 95% over the week.

Why? Well, all things Ethereum (well, aside from ETH itself today) seem to be taking turns at grabbing the spotlight in the lead up to the leading smart contract blockchains Merge to Proof-of-Stake.

Despite the ESG, carbon-reducing positivity that the Merge move is partly building its momentum on, there are still a fair amount of mining, PoW fans out there, making their case and seeking mining alternatives as the main Ethereum chain swaps lanes. Thats partly it, but perhaps the main reason is this

The RVN pump in price has basically coincided with the news major global crypto exchange FTX announced the listing of Ravencoin perpetual futures on September 12.

Onto other crypto-related pumpery and dumpery

With the overall crypto market cap at US$1.1 trillion and down about 0.3% since yesterday, heres the current state of play among top 10 tokens according to CoinGecko.

As youd expect, the chart tells the story here. Basically Bitcoin, Ethereum rival Solana and XRP are the only things in the green over the past 24 hours.

Lets check in on Solana (SOL) for a sec It seems determined to dodge the Merge shadow. Is there a reason for the exuberance? Other than some ongoing positivity based around the Helium projects potential migration, nothing major that were seeing

Although theres this, too Solana is Ethereums greatest rival for NFT-based activity and that appears to be spiking on Solana market place Magic Eden again, according to crypto-data gurus Nansen

As for Bitcoin, its kicked with some confidence into what most think is going to be a vortex of volatility this week. BTC is now trading back above US$22k at the time of writing, after closing its latest weekly candle at US$21,800. Thats the OG cryptos highest weekly close for about a month.

In the very short term, the US dollar tapering off and seemingly hitting some chart-based resistance seems to be helping Bitcoin, other cryptos and stonks so far this week.

Dont forget, though (well, you can if you want), that the fresh US Consumer Price Index inflation-related data for the month of August is set to be released. And, for those who are a tad over-exposed to risk assets, lately these figures have been a recipe for nervy toilet sessions and/or Hey EVERYONE, this rounds on me!

Sweeping a market-cap range of about US$8.4 billion to about US$446 million in the rest of the top 100, lets find some of the biggest 24-hour gainers and losers at press time. (Stats accurate at time of publishing, based on CoinGecko.com data.)

DAILY PUMPERS

Ravencoin (RVN), (market cap: US$783 million) +32%

Hedera (HBAR), (mc: US$1.6 billion) +10%

The Graph (GRT), (mc: US$932 million) +9%

Helium (HNT), (mc: US$682 million) +6%

NEAR Protocol (NEAR), (mc: US$3.9 billion) +5%

DAILY SLUMPERS

Terra(LUNA), (market cap: US$661 million) -28%

Terra Luna Classic (LUNC), (mc: US$2.13 billion) -21%

Celsius Network (CEL), (mc: US$608 million) -9%

Rocket Pool (RPL), (mc: US$588 million) -7%

Amp (AMP), (mc: US$472 million) -6%

Well, probably shoulda known this would happen. As soon as we open our traps about a Terra LUNA revival, its coins go and dump harder than that Brent Naden spear tackle a couple of months back. If you follow such things, that is.

This, however, doesnt change the fact that both LUNA (or LUNA2 as its also now known) and LUNC have made stupendous gains just recently.

That said, as per yesterdays column, weve been very much cautioning with buyer beware when it comes to CeFi tokens struggling for revival, especially considering Terra LUNAs catastrophic and crypto-contagion-inducing collapse in May.

Touch them with an extendable barge pole? Not financially advising on that, or anything for that matter, as theres, unsurprisingly, no qualification for that hanging in my pool room.

A selection of randomness and pertinence that stuck with us on our morning moves through the Crypto Twitterverse

Get the latest Stockhead news delivered free to your inbox.

"*" indicates required fields

It's free. Unsubscribe whenever you want.

You might be interested in

Go here to read the rest:
Mooners and Shakers: Ravencoin soars and Bitcoin pumps, but Ethereum flattens out ahead of Merge - Stockhead

Bitcoin’s Accumulated Momentum Is Going To Be Hard To Stop – Bitcoin Magazine

The below is a direct excerpt of Marty's Bent Issue #1259: "Bitcoin is action. The accumulated momentum is going to be hard to stop." Sign up for the newsletter here.

This morning I listened to a recent Macro Voices podcast with Brent Johnson from Santiago Capital. It was a very good conversation about the state of the global economy, particularly focused on the dollar's relative strength against other currencies and how things may play out as the dollar continues to strengthen as prophesied by the "Dollar Milkshake" theory. Here's a link to the episode for those interested.

Toward the end of their discussion Erik (the host) and Brent make it clear without saying anything explicitly that it is insane that global markets are essentially beholden to the whims of a very select few people, central bankers, out of the billions who are alive on this planet. The fact that the world hinges on the cryptic language of people who are completely disconnected from reality and do not suffer the consequences of their actions is a bit baffling. With that being said, what I'd like to focus on is the fact the Erik and Brent ended their conversation with a brief detour to discuss the next world reserve currency. Both gentlemen acknowledged that it would likely be a cryptocurrency - likely produced by one of the governments or a coalition of governments - and will certainly not be bitcoin.

To your Uncle Marty, this is an incredibly hilarious line of thinking from a couple of individuals who seem to "get it" in regards to the fact that the fiat system is doomed for failure and it's failure is being driven by incompetent central planners. To think that the solution to bad central planning from an incompetent group will be better central planning from the same group via a fresh slate a CBDC or something like it would provide. Even funnier is the fact that they emphatically proclaim that bitcoin most certainly will not become the dominant money in the world while deriding "bitcoin maximalists". This is our edge, freaks.

While "the smartest people in the room" scan the horizon waiting to place their bets on something that hasn't materialized yet and is sure to end in failure if it ever does because it will suffer from the same centralized attributes that doomed the dollar, bitcoiners are out there actually building the future they want to live in. The macro mensches of the world can continue to sit on the sideline and pontificate about what they think will come to market. Bitcoiners will continue to act and bring their distributed, censorship resistant, sound money to market. And the headstart bitcoin has amassed is approaching insurmountable. It is a step-function improvement on the incumbent monetary system in every way.

It's provably scarce and extremely hard to change.

You can send it over the internet.

You can divide more granularly.

It is extremely hard to prevent someone from receiving or sending bitcoin if used correctly.

And, what might be the most underappreciated aspect, it is beginning to become an integral part of the energy sector. And as we're finding out now energy is pretty damn important. Arguably the most important asset on the planet. Bitcoin becoming an essential for energy producers makes it significantly harder to kill from a logistical and political perspective.

We are so early.

More here:
Bitcoin's Accumulated Momentum Is Going To Be Hard To Stop - Bitcoin Magazine

Are Bitcoin transactions anonymous or traceable and can they be withheld? – CNBCTV18

Mini

Bitcoin and many other cryptocurrencies are built on blockchain technology, which provides complete decentralisation. These digital assets can function without any oversight or control from a central governing body. As such, cryptocurrencies are widely believed to be anonymous, untraceable, and tamper-proof digital assets. But to what extent is this true? Lets find out:

Bitcoin is a cryptocurrency that has gained a lot of popularity in recent years. It has seen an astronomical rise, with more and more people adopting it as a means of payment and investment.

Bitcoin and many other cryptocurrencies are built on blockchain technology, which provides complete decentralisation. These digital assets can function without any oversight or control from a central governing body. As such, cryptocurrencies are widely believed to be anonymous, untraceable, and tamper-proof digital assets. But to what extent is this true? Lets find out.

Are Bitcoin transactions traceable?

Since Bitcoin uses blockchain technology, there is complete transparency, and all the transactions are recorded on a distributed ledger. These ledgers are open to the public, and anyone can access them. This makes Bitcoin transactions traceable.

With the help of tools known as Bitcoin explorers, users can trace any activity on the blockchain. One can also trace the amount sent and the addresses involved in a transaction. However, you can only trace these transactions to the users public key; they do not provide real-world identification or personal information.

Therefore, while blockchain explorers can help trace transactions and obtain wallet addresses, finding the identity linked to the address is not easythis grants the user pseudo-anonymity.

Are Bitcoin transactions anonymous?

The transactions on the blockchain can only be identified by a string of alpha-numerical known as a public key. This key makes bitcoin transactions pseudo-anonymous. This means that, while others can look at your transactions and your holdings, they cannot ascertain the real-world identity behind the public key.

However, this changes when you need to exchange your cryptocurrency for cash or other tokens or to get a crypto debit card. You need to register with a centralised cryptocurrency exchange, decentralised application, or crypto bank for any such services. These platforms will most likely need you to complete a KYC process to take you on as a customer. By doing so, you create a link between real-world data and the public key of a wallet, which can be used to uncover details of the identity behind a wallets public key.

Can Bitcoin be withheld?

One of the most significant benefits of blockchain technology is that transaction records and personal crypto holdings cannot be tampered with or modified. This is a feature known as censorship resistance or immutability.

Since blockchain technology is based on a decentralised system, no entity has control over someones funds or data.

Therefore, on-chain tokens cannot be frozen, withheld, or modified in any way. Perhaps the only way to block a user from accessing their on-chain funds would be to shut off internet services in the vicinity.

However, all this protection goes out the window when you transfer your funds to a crypto exchange, lending platform or DApp. A central authority is then involved and can freeze funds if necessary. It is a common occurrence where a centralised trading platform will freeze a users wallet.

This often happens if the user is involved in some criminal activity. Government authorities can contact the developers to freeze a particular address. The developers blacklist the address, preventing the user from sending or receiving cryptocurrency.

In some cases, the feature to blacklist an address can be misused by scammers. Usually, on decentralised exchanges, scammers can use this feature so that the tokens that are bought cant be sold. This will inflate the price of the said token and lure investors toward the project. Once the prices are high enough, the scammers dump their tokens in the open market and disappear with a fortune.

Conclusion

In conclusion, Bitcoin can provide some degree of anonymity. However, with new KYC guidelines, maintaining this anonymity and making untraceable transactions is becoming more difficult. Cases of frozen wallets have also become common these days. However, the odds of someone tracing your account, uncovering your real-world identity, or freezing your account are extremely rare. It takes specialised tools and knowledge to pull off these tasks and usually entails law enforcement agencies tracking down some criminals.

Read the original:
Are Bitcoin transactions anonymous or traceable and can they be withheld? - CNBCTV18

The Greatest Trick Ever Played, And How Bitcoin Shatters The Illusion – Bitcoin Magazine

This is an opinion editorial by Andrew Axelrod, a Bitcoin educator and writerwhose LinkedIn posts have orange pilled thousands.

"The devil's finest trick is to persuade you that he does not exist." Charles Baudelaire

The second greatest trick was convincing the world he is good. Ken Ammi

Throughout history, people have always been blinded by the cathedral of their times. Ideas of chivalry, caste systems and royal bloodlines were all incredibly powerful constructs that towered above any possible scrutiny, let alone rebuke.

Today is no different.

Just as fish cannot perceive the water they swim in, it is also difficult for people to recognize the cathedrals for what they truly are. Grandiose narratives, fanciful myths, and seductive lies make for invisible chains.

They are the walls of Platos Cave. They are the scrolling green code of the Matrix.

And no prisoner can break free from shackles that remain hidden.

Such illusions are shattered by bitcoin like waves breaking against solid rock. This is because bitcoin unveils the three most powerful and enduring illusions of our time those of the competent central planner, the common good, and fiat money.

Let us now step through the looking glass and dissect these magic tricks one by one, starting with the competence of central planners.

Ah yes, central planners. They aspire to positions of power in the guise of charismatic figureheads, lofty intellectuals, the spiritually enlightened or impressive polymaths whos vast knowledge spans the fields of economics, finance, healthcare, engineering, infrastructure, energy policy and oooohhhh so many more.

Even better, they are packaged and sold as benevolent leaders that strive for a better tomorrow, acting only out of altruism and for love of the common good. Truth and justice are their names.

Intellect, wisdom and hearts of gold? Sign me up!

Of the three, this is perhaps the easiest illusion to dispel.

At its best, politics is often described as the act of jumping in front of a moving parade while claiming credit. And at its worst, central planners get drunk on the myth of their own competence which inevitably turns the parade into a chain gang shuffle.

This is because central planning at its heart must rely on coercion. Voluntary actions occur organically, bottom up, and on the individual level. By definition, they do not need to be centrally orchestrated.

Next, putting aside the laughable notion that an individual mortal could possess any meaningful level of mastery across so many complex domaines and ignoring the fact that these are flesh and blood humans, naturally prone to self-interest and subject to all the usual dark appetites, it is equally insane to think that an abstraction such as the common good could ever be agreed on let alone achieved.

But that, of course, is the entire point.

The common good has always been in the eye of the beholder and is therefore highly susceptible to every possible perversion. It is ideally malleable custom tailored camouflage for the central planner.

In the name of the common good, central planners then take upon themselves the right to decide on the conflicts of nations, on conscription in war, on the hollowing out of industry, on the allocation of rations, on the burden of tax (either directly at gunpoint or discretely through inflation) and, most importantly, on who gets to be first in line at the money printers trough.

Bitcoin of course flips this on its head. More on that later.

But how does such a ludicrous belief in central planning perpetuate itself the deranged idea that a miniscule group of people, or oftentimes even a sole individual, should with the flick of a pen decide the wellbeing and economic fate of millions?

It all comes back to the delusion of the common good.

It is precisely this belief in the common good taken to its extreme, a belief in paradise on earth, that justifies the greatest abuses.

This is the corrosive narrative which central planners always draw on for legitimacy and which they use to feed their lust for control. Because ideas of eutopia justify any means to accomplish their end, central planners can use them to maximum effect. Not only do they make dubious claims of a eutopia, but also insist on possessing knowledge of the righteous path that leads to it.

Why go through the trouble of building such a cathedral?

Contrary to the common cynics belief, the vast majority of people want to be perceived as doing good and arent prone to extremism a benefit of normal distributions.

Therefore, evil has to cloak itself in the mantle of virtue or else be rejected.

After all, the road to perdition is famously paved with good intentions.

And what could be more well intentioned than the pursuit of heaven on earth.

This is what lifted the Communists into power, perhaps the most outspoken central planners of them all. It is also what gives the jihadis credibility in the eyes of the faithful and what fueled the rise of Nazi Germany.

The common good is the perfect narrative for central planners to seize the reins of power and gives their followers the iron conviction to follow through on even the most heinous of acts.

And who would dare speak out against them? Who would be so cruel as to deny paradise.

Because when it comes to bringing about heaven on earth no price is too steep, no sacrifice sufficient and no body count too high.

What do another million dead matter if paradise awaits just around the corner. It is never enough, the bloodlust cannot be slaked.

The nameless mass graves of 80 million killed at the hands of Mao, the 40 million under Stalin, the 20 million under Hitler, the 3.5 million under the Kims and the 3 million under Pol Pot they all attest to this slaughtered in the name of this most depraved of fantasies.

The sad irony is that although paradise is an illusion, hell on earth is very real.

One need look no further than North Korea, where people are publicly executed for the crime of making unauthorized phone calls.

In fact, eutopia and dystopia aren't opposites they're synonyms.

And the surest way to arrive at this terrible destination is to concentrate ultimate power in the hands of a few, in the hands of central planners.

The carrot of eutopia combined with the stick of an emergency whether it be a classless and plentiful society threatened by the greedy bourgeoisie, or the promise of a thousand year Aryan rule to crush the corrupting globalists or the establishment of a glorious caliphate as a stronghold against the aggressing infidels these narratives are all designed to rally a core group of true believers and convince the wider public to enshrine in central planners extraordinary powers.

But how then do the actual mechanics of coercion work at scale and how is the average person ensnared beyond just turning a blind eye?

How does the narrative actually transmit into reality?

Through fiat money.

In the words of Henry Kissinger: Who controls money, controls the world.

This is the greatest trick ever played.

If the competent central planner and the common good can be called illusions, fiat money makes these look like cheap parlor tricks by comparison.

Most civilized societies have concluded that central planning of the economy is generally a bad idea. A committee of central planners overriding the free market by setting the prices of commodities, goods and services has always lead to great misery and starvation.

But when it comes to money, suddenly the rules seem to magically change.

At the center of every modern economy sits a central bank whos explicit mandate is to control the supply of money through its balance sheet and set its price through interest rate fixing.

How can this contradiction be rationalized?

Jordan Peterson famously remarked that only half the lesson of World War II had been learnt.

By this he meant that wed grappled with the snakepit of national socialism but not the communist den of vipers a tragic consequence of the Allies expedient alignment with the Soviets against the Third Reich.

One key consequence of this was that central planners were allowed to nest in the corridors of power and permitted to desecrate once hallowed institutions.

For example, it is now perfectly acceptable for academics to self-identify as Marxists, which nearly 20% of professors in the social sciences do.

But even still, the notion that at least half the lesson was learnt is hopelessly optimistic.

The lessons of the past have been reduced to a wild goose chase for the modern day equivalent of an angry-sounding German man in leather boots and a silly-looking mustache. Its a stultifying distraction from the underlying culprit of fiat money which allowed such madmen to rule in the first place. While society is preoccupied with a frenzied scavenger hunt for goose-stepping fascists, literal central banks have been put in charge of the money. As we will see, this is a clear pattern.

The money printer allows central planners to override free market choices.

What instrument of control could possibly be more perfect.

Endless wars can now be financed with just the push of a button, destructive policies can be pursued no matter the cost and when challenged, central planners can bribe their opposition into compliance with promises of a universal basic income, of free education and health care, and of subsidized housing for the needy.

And all of this they can deliver, if only given the power of the printer.

Fiat money lets central planners hide the true cost of their destructive decisions by papering over them. And when society inevitably collides with the walls of reality, this provides central planners with the perfect emergency to centralize even more.

In their greatest time of need, people blinded by panic will turn to the arsonists and beg them to extinguish the fire.

As the black hole of money printing distorts price signals, misallocates assets, and debases societys savings, people will actually blame late stage capitalism for the deterioration.

Not recognizing the caustic effects of fiat money and centralized power, people will instead cry out for more of the same poison that ails them. When decades of loose monetary policy and insatiable money printing drove America into the Great Depression of the 1930s, the remedy was more centralization.

What followed was the outlawing of gold with Executive Order 6102, the last bulwark against fiat, and thereafter an unprecedented nationalization of private industry that fed the war machine.

In fact, FDR was able to centralize so much power that he became de facto president for life and died while serving his fourth term in office the only president to ever do so. After his death, a 22nd amendment was hastily added to the constitution, setting a two-term limit on the presidency.

The massive military industrial complex that was erected during this time and has since grown by orders of magnitude, gorging itself on money printing, is something Americans are still contending with unable to extricate themselves from multiplying conflicts.

When Weimar Germany collapsed under the hyperinflationary fires of the papiermark, the answer was again to centralize. Only this time, the Fhrer used fiat to turn Germany into a giant weapons manufacturer and burnt Europe to the ground.

And when Lenins Soviet Union was ravaged by three successive hyperinflations due to Communist profligacy, Stalin seized the mantle of power, then turned around and brutally butchered the Russian people. In fact, Soviet Russia burnt through a total of seven versions of the fiat ruble and endured seven painful resets.

The central planners fiat trick became so routine that Soviet workers would famously joke: We pretend to work and they pretend to pay. But of course, every fiat money must find a point of exhaustion, when the money printers ink runs dry. It is for this reason, that the seemingly opposite Eastern communist and Western capitalist systems were at least similar in this way:

Both ultimately believed in top-down control through fiat money.

Only the communists, spurred on by a more rabid fanaticism, made the fatal mistake of centralizing every nut and bolt of their economy, involving the government in decisions ranging from the harvesting of crops to the manufacturing of shoes and the production of cars. This ended in incomprehensible human suffering.

Central planners in the West took a more tactful approach by first allowing their economies to self organize and fatten up before milking them dry via centralized money.

And so, fiat is the greatest trick ever played. It is also the ultimate heist, allowing central planners to siphon off a populations entire productivity and exhaust its every resource through the counterfeiting of money. Fiat money is watermelon socialism capitalist green on the outside and communist red at its core.

As justification, central planners must contort themselves into impressive mental pretzels and invert the truth. Some of these brazen lies famously include:

Thats right.

War is peace. Slavery is freedom. Ignorance is strength.

But what if money could not be printed at will? If money bore an actual cost, then central planners maleficence would become almost instantly and laughably obvious. The peoples pocket could no longer be picked with inflation and the central planners incompetence would incur an immediate and tangible cost. Want to wage wars? Youll need to pay for them. Want to fund wasteful government programs? Youll need to justify them. Want to bankrupt your citizens and leave them destitute? Youll need to face them.

Central planners could no longer destroy the world on credit and would be required to close out their tab. The cost of unproductive and wrongheaded action would come to bear immediately and allow society to course correct. This is what bitcoin does by separating money and state. It takes the central planners favorite tool of coercion and snaps it in half like a brittle twig. Once money can no longer be printed, what good are moral posturing and illusions of grandeur.

Bitcoin strips the lie of the common good down to the hollow and empty shell that it really is and exposes any shred of unearned competence the central planners have left.

Their trick revealed, central planners will finally be forced to take a bow they just shouldnt expect any applause.

This is a guest post by Andrew Axelrod. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

Read more:
The Greatest Trick Ever Played, And How Bitcoin Shatters The Illusion - Bitcoin Magazine

Biggest Movers: SOL, Near Protocol up by Over 10% to Start the Week Market Updates Bitcoin News – Bitcoin News

Solana moved closer to the $40.00 mark on Monday, as it rose for a sixth straight session to start the week. Bullish momentum in the worlds ninth largest cryptocurrency intensified, following a breakout of a resistance point of $36.35. Near protocol was also in the green, as prices rose by over 10% on Monday.

Solana (SOL) climbed to a three-week high to start the week, as the token moved towards the $40.00 level

Following a low of $34.48 on Sunday, SOL/USD was able to reach a peak of $38.15 so far in todays session.

Todays rally comes as the toke rose past a key resistance level of $36.30 for the time since August 19.

As seen from the chart, Mondays rally came as the 10-day (red) moving average crossed its 25-day (blue) counterpart for the first time in over a month.

In addition to this, the 14-day relative strength index (RSI) is currently tracking at 61.31, which is its strongest reading since August 13.

This is marginally below a ceiling of 64.05, which will likely be the main hurdle preventing prices from rising above $40.00.

Near protocol (NEAR) was another notable mover to start the week, with prices nearing a one-month high.

NEAR/USD was able to climb to a peak of $5.25 on Monday, less than 24 hours after trading at a low of $4.72.

Mondays surge comes as near protocol rose for a sixth consecutive session, with todays top the highest point it has reached since August 16.

This recent rise in bullish momentum comes following an upwards crossover of the 10-day (red), and 25-day (blue) moving averages last week.

As a result of the increase in price, the RSI has moved to its strongest level since August 13, and is currently tracking at a reading of 64.25.

Should bulls continue to maintain the current sentiment, NEAR could continue to move closer to a target price of $5.50.

Register your email here to get weekly price analysis updates sent to your inbox:

Do you expect near protocol to hit $5.50 in September? Let us know your thoughts in the comments.

Eliman brings an eclectic point of view to market analysis, he was previously a brokerage director and retail trading educator. Currently, he acts as a commentator across various asset classes, including Crypto, Stocks and FX.

Image Credits: Shutterstock, Pixabay, Wiki Commons, sdx15 / Shutterstock.com

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Visit link:
Biggest Movers: SOL, Near Protocol up by Over 10% to Start the Week Market Updates Bitcoin News - Bitcoin News

Bitcoin to $40,000? Analyst Explains Why This Might Happen – U.Today

Alex Dovbnya

The $40,000 level is a "big upside target" for Bitcoin, according to this analyst

In a recent tweet, Yahoo Finance analyst Jared Blikre says that $40,000 could be a big upside target for Bitcoin, the worlds largest cryptocurrency.

Blikre explains that the flagship coin has formed a big base at the $20,000 level.

On Sept. 6, the price of Bitcoin plunged to $18,669, the lowest level since June.

However, bulls managed to step in to save the day. Over the past five days, the price of the leading cryptocurrency has surged by roughly 18%.

Ads

Blikre has noted that there is tons of price memory from the $30,000 level and the $60,000 level.

If the Bitcoin price does reclaim some of the bullish targets, it remains to be seen how many traders-turned-HODLers will be tempted to take profits.

On Aug. 15, the price of the largest cryptocurrency surged to $25,212, but bulls failed to maintain the momentum.

The largest cryptocurrency is currently trading at $21,622, according to data provided by CoinMarketCap.

The largest cryptocurrency is currently valued at $414 billion.

Read the original here:
Bitcoin to $40,000? Analyst Explains Why This Might Happen - U.Today

Big Brother Has Hacked the Constitution – Tenth Amendment Center

Big Brother has hacked the Constitution.

It has been over nine years since Edward Snowden released the first documents exposing the extent of NSA spying to the world. Since then, the surveillance state has only gotten bigger.

I finally got around to reading Snowdens memoir, Permanent Record. I bought the book not long after it was released, but life took over and the book sat on the shelf all but forgotten until we recently moved. As I was unpacking, I thought, I really need to read this.

I was right.

The book was a poignant reminder of just how insidious and omnipotent the national surveillance state has become. And how a complete breakdown of the constitutional system supports it.

SPYING ON EVERYBODY

The Snowden revelations had a profound impact on the trajectory of my own work. In the ensuing years, surveillance became one of my primary policy areas. I was heavily involved in the Tenth Amendment Centers efforts to turn off the water to the NSA facility in Bluffdale, Utah. I spearheaded the TACs OffNow project to address warrantless surveillance more broadly. I contributed to the drafting of a local ordinance creating oversight and transparency for surveillance programs that passed in numerous cities. And I got involved in fighting a surveillance program in Lexington, Ky. That resulted in a multi-year lawsuit.

As you can imagine, in the course of this work, Ive read a great deal about surveillance. I dug deep into Snowdens documents and the reporting as he released them. Ive poured over hundreds of documents describing the ever-growing surveillance state. I even took an online course on surveillance law. So, I have a keen understanding of just how deep and powerful the national spy complex runs. But Snowdens simple description of one NSA program stunned me. It is the program that allows U.S. intelligence agencies to access information about you, me, and pretty much everybody.

The program that enables this access was called XKEYSCORE which is perhaps best understood as a search engine that lets an analyst search through all the records of your life. Imagine a kind of Google that instead of showing pages from the public internet returns results from your private email, your private chats, your private files, everything.

In documents released by Snowden, the NSA calls XKEYSCORE its widest-ranging tool used to search nearly everything a user does on the internet. In his memoir, Snowden called it the closest thing to science fiction Ive ever seen in science fact; an interface that allows you to type in pretty much anyones address, telephone number, or IP address, and then basically go through the recent history of their online activity.

In some cases, you could even play back recordings of their online sessions, so that the screen youd be looking at was their screen, whatever was on their desktop. You could read their emails, their browser history, their social media postings, everything.

Snowden goes on to describe how analysts with access to XKEYSCORE shared pictures of nudes they found on target computers.

I knew this was a thing. But Snowden put it in such stark, simple terms that I was floored by the scope of federal surveillance all over again.

Snowdens revelations shined a light on the NSAs unconstitutional overreach. It produced some outrage, but its almost certain that these surveillance programs continue today. And in all likelihood, surveillance has expanded with the advancement of technology over the ensuing years.

HACKING THE CONSTITUTION

As Snowden put it, the government has hacked the Constitution.

He describes a wholesale breakdown of the constitutional system that shredded the Fourth Amendment.

Had constitutional oversight mechanisms been functioning properly, this extremist interpretation of the Fourth Amendment effectively holding that the very act of using modern technologies is tantamount to a surrender of your privacy rights would have been rejected by Congress and the courts.

Reading Snowdens outline of the constitutional breakdown that supports the surveillance state, its glaringly clear that we cant count on the federal government to limit the power of the federal government. Every branch of the federal government shares culpability.

As Snowden points out, Congress willingly abandoned its supervisory role over the intelligence community. Meanwhile, the failure of the judicial branch was just as egregious. The FISA Court created to oversee foreign surveillance approved 99 percent of the surveillance requests brought before it, a rate more suggestive of a ministerial rubber stamp than a deliberative judicial process. But Snowden described the executive branch as the primary cause of the constitutional breach.

The presidents office, through the Justice Department, had committed the original sin of secretly issuing directives that authorized mass surveillance in the wake of 9/11. Executive overreach has only continued in the decades since, with administrations of both parties seeking to act unilaterally and establish policy directives that circumvent law policy directives that cannot be challenged, since their classification keeps them from being publicly known.

In effect, all three branches of the federal government failed deliberately and with coordination creating what Snowden called a culture of impunity.

It was time to face the fact that the IC (intelligence community) believed themselves above the law, and given how broken the process was, they were right. The IC had come to understand the rules rules of our system better than the people who had created it, and they used the knowledge to their advantage.

Theyd hacked the Constitution.

As I read Snowdens words some nine years later, I had to ask myself, What has changed.

The answer is nothing.

The Constitution remains hacked. The federal government still wont limit its own power. That means its up to us to rein in this surveillance menace. State HERE.

Tags: edward snowden, fourth-amendment, NSA, Privacy, Surveillance

Go here to read the rest:
Big Brother Has Hacked the Constitution - Tenth Amendment Center

A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded – Forbes

After years of proposing Bring Your Own Device strategies, the U.S. Army has embarked on Phase III ... [+] of its BYOD Pilot.

The U.S. Army is testing a mobile device application that would let its Soldiers and DoD civilians access the Army Cloud using their personal cellphones or laptops. But theres some confusion about the app and the extent to which it will be used.

For context, its worth explaining that the Army and other services have enabled service members and DoD civilians to work remotely via Government Furnished Equipment (GFE) for over 15 years. The once ubiquitous BlackBerry phones that Soldiers, Airmen, Sailors and Marines carried for years exemplified remote work.

Uncle Sam paid for and supplied these devices and users were/are expected to conduct only official business on them, with the resulting phone in each hand a common sight among service people and government officials physically segregating their professional and personal communications. But a lot has changed in the last decade.

The Army and other branches followed and began to embrace the commercial technology evolution that has brought us digital cloud storage and software-as-a-service (SaaS). For the Army, and the rest of the world, that embrace became a bear hug when COVID-19 hit in 2020.

At the height of the Pandemic the Pentagon turned to a commercial solution for the vastly expanded telework work it believed was necessary to continue to function, enabling Microsoft MSFT Office 365 mobile capability for the military/civilian workforce. The capability was well received but in the span of less than a year DoD recognized it wasnt particularly secure. In June, 2021 Office 365 mobile capability was turned off.

To work remotely and access the cloud, users reverted to their GFE. As they did so, the folks running the DoD cloud enterprise were already asking the question - Do they have to use government funded devices?

Bring Your Own Device

With Microsoft Office 365 connectivity disabled, the DoD CIO and the respective service CIOs established separate pilot programs to assess the potential for military personnel and civilians to work remotely using their own cellphones and laptops. The Pentagon refers to this strategy and to the separate service pilots as Bring Your Own Device or BYOD.

The Army, Navy and Air Force each have their own BYOD Pilots though the Armys Pilot - now in Phase III - is likely the most mature. The goal of BYOD the Army says is to extend the convenience of teleworking on just one device to Soldiers and Army civilians. Essentially, its another app on your phone. A service member can walk out of the Pentagon or off-base, go to the store and still be connected to official business via his or her personal device.

BYOD may also save the service considerable money Army CIO, Dr. Raj Iyer says.

Army CIO Dr. Raj Iyer says its BYOD Pilot is demonstrating the convenience and potential cost ... [+] savings of having Army personnel use their own devices for official business.

We know that there are savings to be had. If you look at the total cost of ownership of government furnished cellphones and how much we pay for data services from the telecom providers, theres an opportunity to reduce those costs by switching to BYOD.

How much potential savings from dropping GFEs/data could be realized is one of a number of issues relating to BYOD over which there has been some confusion. Chief among these has been what kind of work it will enable users to do.

Lieutenant General John B. Morrison, the Armys Deputy Chief of Staff for Command, Control, Communications, Cyber Operations and Networks (G-6), emphasizes that BYOD is largely for administrative work. Technically, it is cleared to carry up to Impact Level 5 (IL 5) information including unclassified and controlled unclassified information the Army says. It is not for use for classified work, communications or data sharing.

Moreover, the Army BYOD Pilot is limited to the strategic administrative level, typically for in-garrison users within the U.S. However, the G-6 is working through use cases outside the continental U.S. LTG Morrison says so personnel in Europe, Africa or South Korea may theoretically be using their own devices through BYOD one day.

Deputy Chief of Staff, G-6 Lt. Gen. John B. Morrison, Jr. emphasizes that the Army's BYOD Pilot is ... [+] evolving and will go forward based on its productivity, security and a cost-driven business case.

While General Morrison says there has been no discussion of using the Bring Your Own Device approach in tactical scenarios at this time, he does not rule out the possibility. That would surely raise additional security concerns and Morrison adds, Were very mindful of the capability some of our adversaries have to use cellphones to do direction-finding and identification.

But for now, BYOD is a tool that replaces the GFEs mostly carried by those at the Army leadership level Morrison says. That includes a fair number of people. Phase III of the pilot will extend to 20,000 users.

Dr. Iyer says it can fully scale to over 20,000 users including National Guardsmen and Reservists whom the Army has also included in the Pilot. If, as LTG Morrison says, the Army will use Phase III to look at other use cases BYOD may have to expand beyond the above number.

The user population brings the BYOD proposition back to cost. If the Army can eliminate the need to provide 20,000 devices, it could probably save come coin. But this proposition has some wrinkles.

For one, both Gen. Morrison and Dr. Iyer stress that the Pilot (and ultimately a program) are strictly voluntary. However if the user base is smaller than anticipated, the cost of acquiring the commercial license for the BYOD app and maintaining its link to the Army cloud may outweigh the savings from handing out fewer phones.

The participation of Guardsmen (both Army and Air Force) and Reservists introduces another nuance to the cost equation. In addition to LTG Morrison and Dr. Iyer, I spoke with Kenneth C. McNeill, CIO at the National Guard Bureau who affirmed that Phase II BYOD testing with Guard Soldiers and Airmen went quite well.

He points out that only a relative handful of Guardsmen (and Reservists) actually have GFEs. To communicate and conduct official business, they have to go to an Armory or other post. When they respond to hurricanes, floods or [provide] whatever support theyre asked to, McNeill said, this will give them the capability to stay connected, pre and post mobilizing.

But since Guardsmen and Reservists who volunteer to use their own phones currently have no GFEs, their participation effectively represents no saving. The convenience may be welcome but Morrison acknowledges, We will do due diligence on whether it fiscally makes sense to move this forward.

Some in the cybersecurity community have already been asking whether moving forward with BYOD makes sense. While Army BYOD is not a classified system, penetrating it would still yield potential insights for U.S. adversaries like China which has derived real benefit over the last three decades from open-source intel, let-alone controlled information.

The Army is cognizant of this and with security foremost in mind, it has given BYOD a Halo.

A Security Halo

The key to BYOD is the ability to securely connect users personal devices to the Armys enterprise cloud environment. Known as cArmy, the services cloud currently offers shared services in the Amazon AMZN Web Services (AWS) and Microsoft Azure clouds at IL 2, 4 and 5.

To enable BYOD the Army turned to Hypori, a Virginia-based SaaS firm which has developed Halo cloud-access software. Halo renders applications and data that reside inside the cArmy cloud on a users device as pixels.

These virtual images allow users to interact and work within cArmy, without any actual transfer of data. Raj Iyer describes Halo-enabled phones as dumb display units which show representations of email, scheduling, spreadsheets or other applications hosted by cArmy. None of it resides on the users device.

This approach largely shifts security from the device to the cloud itself. It allows the service to focus its efforts on defending a single point - cArmy - rather than a collection of phones or laptops. The Army controls access to the cloud (right down to physical access to its servers) and constantly monitors the environment.

Hypori's Halo cloud software connects mobile devices to applications in the cloud via a pixel ... [+] presentation. No data is actually transferred to or from the edge device.

If an anomaly pops up inside cArmy, the Armys Enterprise Cloud Management Agency tells me that it is confident it can rapidly detect and identify an intrusion and defend the BYOD environment. Halo-enabled BYOD has been repeatedly red-teamed Iyer says, passing these evaluations with flying colors and outperforming the solutions the Navy and Air Force have chosen.

Despite their high level of confidence in Halo, both Iyer and General Morrison acknowledge that one can never-say-never in cybersecurity matters. The same centralization in the cloud allows U.S. adversaries to focus their own resources on a single target - cArmy.

While no data rests on the device, the vulnerabilities that always exist at the intersection between hardware, software and the internet remain as does the threat of what the Army cannot control. That stretches from the industrial architecture underpinning the cloud and cloud vendors (Amazon, Microsoft) to the risk of insider exploits.

One of the most notable cloud breaches was publicly acknowledged last May when news broke that in 2019 a former AWS employee exploited her knowledge of cloud server vulnerabilities at Capital One COF and more than 30 other companies to steal the personal information of over 100 million people, including names, dates-of-birth, and social security numbers. The possibility of such an insider breach of BYOD or other cloud systems rings as real to the Army as the name, Bradley Manning.

Even though the Army BYOD is currently intended for non-classified work, LTG Morrison stresses that, Weve baked cybersecurity in early and often and well do it again if we go live and do continual assessments to ensure that we adequately secure the capability were providing.

What was interesting to us about Halo was that we could implement it on devices that were unmanaged, Dr. Iyer says.

Other BYOD solutions come with a Mobile Device Management (MDM) approach which requires the environment (cloud) owner to take control of the device, typically to ensure security and compliance issues. For users, MDM raises privacy concerns which might prove a significant obstacle to adoption. But there is no MDM with Halo. The Army does not control the users device and cannot see beyond its own cloud boundary.

Before BYOD, one of the things we consistently heard from our users was that they didnt want their cellphones to be monitored or wiped if there was any potential [data] spillage, Iyer acknowledges.

The Army G-6 is confident enough in the privacy and security of Halo that I was told that there would be no obstacle to users having it on their phones - right next to Tinder, Reddit, or even TikTok.

Convenience or Burden?

As noted, adoption will be key to BYOD. General Morrison notes that the cost savings it may help the Army realize are up there in terms of importance with the productivity gains and security expected with BYOD. Its success in delivering on this trio of elements will determine a path beyond the current Pilot.

We will do due diligence on whether it fiscally makes sense to move this forward, Morrison affirms.

Users may ultimately have to weigh the convenience of using their own devices for official business with the cost. Some observers have already questioned whether BYOD simply shifts the burden of ownership of appropriate devices with sufficient data plans, identity security, and personal accountability from the government to the individual.

Having the right phone may or may not be a hurdle. In fact, my discussions with the G-6, General Morrison, Dr. Iyer and Hypori illustrated some cloudiness on the issue.

According to the G-6 there will be a list of approved devices which would not include phones no longer supported by their original equipment manufacturers like older Android and Apple versions. An iPhone 6, for example, wouldnt be acceptable. (Nor presumably, would a Huawei phone.) A signed user agreement for BYOD would also require that device owners maintain the latest security updates to remain eligible to work via the app.

However, Raj Iyer differed with the strict notion of approved devices, telling me that a user could bring just about anything to BYOD. Because it is an unmanaged solution, there are no specific requirements for what cellphone you bring. God forbid if you have a BlackBerry somewhere, that might work too.

I was later told Dr. Iyer was joking about the BlackBerry but the impression is that almost anything goes. To be sure I checked with Hypori CEO, Jared Shepard.

Shepard re-emphasized that Hypori Halo is a zero-trust platform which assumes that all edge devices are compromised. By design, it does not allow interaction of data from the protected environment with the device.

But he added, As a Security best practice we recommend that only devices that are still supported [updated and patched] by the manufacturers be allowed. This allows a tremendous amount of flexibility for devices new and old [many 4-6yrs old or more]. Currently iPhone 6 and 7 are still supported by Apple.

We will learn how this capability reacts to different kinds of phones that are out there, Morrison concludes.

As with other aspects of BYOD, the Army will have to have consistent messaging on its user requirements. These include identity. According to Iyer, BYOD employs multi-factor authentication (MFA, passwords augmented by scanning a fingerprint or entering a code received by phone for example).

However, the user identification system employed may also limit devices that can be used with BYOD. For example, Cisco Systems Duo MFA device requirements include a Secure Startup mode and a Cisco-approved operating system (Android 7 or higher) among other things.

Dr. Iyer points out that the Armys enterprise IT management system not only identifies but tracks BYOD phone locations. If a phone operating in Washington DC pops up three hours later in China, somethings obviously wrong. Devices will generally have to indicate active use inside the U.S. While the Army wont have access to personal data, dropping a GFE device wont allow users to go un-tracked.

Iyer says he has seen tremendous excitement about BYOD on social media, suggesting a population eager to embrace the scheme. But given its rollout largely to a group of more senior Army and civilian users, there may be less enthusiasm for yoking ones personal device (and consumer data plan) to BYOD than for a broader cross-section of the Army.

Indeed, one senior Army National Guard officer with a background in cybersecurity told me that while he thinks BYOD may be a useful convenience in the future, hed likely stick with his GFE. Since BYOD is strictly voluntary, potentially eligible users could elect to stay with their government furnished phones prompting a question as to whether personnel who decline to participate might worry about the career implications of taking a pass on BYOD.

This is not going to be viewed favorably or unfavorably, Dr. Iyer assures. I believe that the majority of our users will want it.

Kenneth McNeill thinks people will eventually get comfortable with the idea and says theres already a sizeable group of Guardsmen and Reservists volunteering. General Morrison characterizes early adopters as BYOD champions, people who are helping craft the tactics, techniques and procedures for its use. As Phase III progresses the Army will evaluate its expanded mix of users, continually reassessing the Pilot and iterating the app. How BYOD will ultimately take shape isnt known yet Morrison acknowledges.

Were being very pragmatic, he stresses. That includes putting BYOD through several legal reviews. Army personnel and DoD civilians will have the last word, ultimately making it clear to the service whether theyre comfortable enough with the privacy, security, cost and convenience of personal devices as a gateway to the Army cloud to bring their own.

Go here to read the rest:
A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded - Forbes

Programming languages: One in four Go developers are already using this ‘most requested’ feature – ZDNet

Getty Images/Nitat Termmee

About a quarter of developers using Google's open source Go programming language have started using "generics" a highly demanded feature that was missing until this year and while developers worry about supply chain security, they're ill equipped to respond to vulnerabilities.

Go gained generics in Go version 1.18 released in March, when it was described as 'Go's most often requested feature' so it's not surprising it has since been quickly adopted. According to the June 2022 Go developer survey, over a quarter of the 5,752 respondents have started using generics in their Go code. Go is the 16th most popular programming language, according to developer analyst, Redmonk's January 2022 rankings.

Todd Kulesza, a UX designer on Go, noted in a blogpost that addition of generics was welcome, but noted that about a third of developers are running into some limitations of its initial implementation.

Generics, or support for type parameters, brings more type safety to Go and improves productivity and performance. Some 86% of respondents were aware generics shipped in Go 1.18 and 26% had used it, with 14% already using generics in production or released code. However, 54% said they didn't need to use generics today, while 12% had used generics but not in production code.

Other obstacles to using generics was that linters didn't support them while 26% reported using a pre-1.8 release or being on a Linux distribution that didn't provide Go 1.18 packages.

But 10% reported that using generics had resulted in less code duplication.

Kulesza says worries over vulnerabilities in Go dependencies are a "top security concern". Only 12% of developers were using tools like fuzz testing on Go code. A sizable 65% of developers were using static analysis tools but only 35% of them use it to find vulnerabilities.

The survey found that 84% use security tooling during CI/CD time, but this was often too late in the development cycle as developers want to be notified about a vulnerability in a dependency before building up on it.

The Go team this week also launched new vulnerability management tools and a vulnerability database for Go based on data from Go package maintainers. Go 1.18 was also the first version to feature fuzzing in its standard toolchain. The Go fuzz tests are supported by Google's open source fuzzing tool OSS-Fuzz.

These are all activities the NSA recently recommended for developers to do to improve software supply chain security and secure coding practices, which came into focus after the 2020 SolarWinds breach.

The Go survey highlights some problems developers face.

Fifty-seven percent of developers reported having difficulties evaluating the security of third-party libraries. Kulesza notes GitHub's dependabot or the Go team's govulncheck can assist here. In fact, Dependabot was by far the most common way respondents learned of a vulnerability in a dependency.

However, only 12% reported conducted an investigation to see whether and how their software was impacted by a vulnerability. It found 70% of those who did investigate a vulnerability's impact found the process of impact analysis the most challenging. They also reported it was often unplanned and unrewarded work.

The most popular code editor for Go developers was Microsoft's cross-platform Visual Studio Code (VS Code), which is used by 45% of respondents, followed by GoLand/IntelliJ (34%), Vim/Neovim (14%), and Emacs (3%).

Some 59% of respondents developed on a Linux machine, followed by 52% on macOS, and 23% on Windows, with 13% using the Windows Subsystem for Linux. By far the most common platform to target was Linux at 93%, followed by Windows at 16%, macOS at 13%, and IoT devices at 5%.

Continue reading here:
Programming languages: One in four Go developers are already using this 'most requested' feature - ZDNet