Launch 11/08/2017 4PM CETLOGO:
https://4.bp.blogspot.com/-yc_J59e5dMk/WYNk9qb9aPI/AAAAAAAABiQ/CGzeegdsHNQExK6Ywe7ZRKEaU_zGJWmJwCLcBGAs/s320/bith500x500.pngBITHUMAN (
BTH) is a cryptocurrency
"Open Source". BitHuman is not a fork Bitcoin and uses the unique algorithm CryptoNight.
Based on CryptoNote technology |
https://cryptonote.org/Donations:BitHuman address: bthQiBKT8Z49q5yxHJF5P4Tb2SSwrQi1JU4EMnx6nFTdQZQuCcMwnvB6KsRFHeRu8aaZDJvbKcC4BWg
W5VQ9s3cH7DkWBfpiDc
Bitcoin address: 1cRmmwWpNoQRD7FgkzrjUogYhsTyZqmC2
SourceCode:
https://drive.google.com/open?id=0B0mW9X-qMiXBQ3dqdDNOS3BGZGMBuild in Linux:
Download SourceCode (extract)
Open Command Line in the Folder (bithuman)
Run: make -j1
The resulting executables can be found in bithuman/build/release/src.
Linux Gui Wallet:
https://drive.google.com/open?id=0B0mW9X-qMiXBOVllVk5ORFRfcWcLinux Command Line(daemon + simplewallet) (builded with boost 1.58 and Ubuntu 16 - 64bit):
https://drive.google.com/open?id=0B0mW9X-qMiXBMElLNXZNdGt6U3MWindows:Build On Windows:
Dependencies: MSVC 2013 or later, CMake 2.8.6 or later, and Boost 1.55. You may download them from:
http://www.microsoft.com/http://www.cmake.org/http://www.boost.org/To build, change to a directory where this file is located, and run this commands:
mkdir build
cd build
cmake -G "Visual Studio 12 Win64" ..
iOS:Solo Mining:Open: BitHumand
Open: Simplewallet
Create: new wallet (in simplewallet)
Run: start_mining (in simplewallet)
Mining Pools:http://pool2.mine-pool.ro/Exchange:
SpecificationsAlgorithm: CryptoNight
Block time: 120 seconds (2 minutes)
Difficulty retargets each block
Block reward decreases each block according to the formula: BaseReward = (MSupply - A)/218, where MSupply = (264 - 1) atomic units and 'A' is amount of already generated coins
One coin is divisible down to 8 decimal places (divisible up to 108)
Total coins: 184467440737.00000000 (= 184.46 billion BTH) -
90% in 5 YearsPremined: 1% to improve the currency
Features True anonymity & data protection
Untraceable payments use ring signature
Unlinkable transactions with random data by the sender
Blockchain analysis resistant
Only CPU-mining & ASIC-resistant
POW mechanism is a voting system for users
What is CryptoNote?CryptoNote is an application layer protocol that powers several decentralized privacy oriented digital currencies. Conceptually, it is an evolution of ideas behind bitcoin: both are similar in some ways yet different in many others.
The main difference between the two technologies is that bitcoin (and most digital currencies) is less opaque than CryptoNote-based currencies due to the latter's blockchain being almost anonymous, contrary to non-Cryptonote blockchains.CryptoNote currencies use a distributed public ledger that records all balances and transactions of its in-built currency like bitcoin. Unlike bitcoin, CryptoNote's transactions cannot be followed through the blockchain in a way that reveals who sent or received coins. The approximate amount of a transaction can be known, but the origin, destination, or actual amount cannot be learned. The only information available is that the actual amount was lower than the displayed amount. The only people with access to the whole set of data about a transaction are the sender or receiver of the transaction and the person who possesses one or both secret keys.
Another significant difference is hash-based proof-of-work algorithm. Bitcoin uses SHA256, which is CPU-bound function. That means that participants (miners) are only limited by their calculation speeds, and it is relatively cheap to create an application-specific integrated circuit (ASIC) device, which will surpass an ordinary computer in hashes per unit of money.[5] CryptoNote uses memory bound function CryptoNight, which cannot be easily pipelined.
CryptoNote code was not forked from bitcoin's, so it also has other different inner algorithms, like recalculating new difficulty level or new block size.
Untraceable paymentsCryptoNote provides users with a completely anonymous payment scheme. CryptoNote implements the ring signature technology which allows you to sign a message on behalf of a group. The signature only proves the message was created by someone from the group, but all the possible signers are indistinguishable from each other.
Unlinkable transactionsEven if outgoing transactions are untraceable, everyone may still be able to see the payments you have received and thus determine your income. However, by using a variation of the Diffie-Hellman exchange protocol, a receiver has multiple unique one-time addresses derived from his single public key. After funds are sent to these addresses they can only be redeemed by the receiver; and it would be impossible to cross-link these payments.
Double-spending proofNobody is able to spend the same money twice — even if all his signatures are anonymous. Every signature contains a key image — a kind of fingerprint of the secret key. It is based on a one-way cryptographic function; this implies that given only the key image it is impossible to restore the corresponding secret key. These key images are used to prevent double-spending.
Blockchain analysisresistanceNon-repeating one-time addresses and mixed keys in ring signatures make the whole blockchain resistant to analysis. Each future transaction will only increase the entropy and create additional obstacles for an analyst.
Egalitarian proof of workThe proof of work mechanism acts as a voting system. Thus, it is crucial that during the voting process all the participants have equal voting privileges. CryptoNote brings this equality with its egalitarian proof of work, utilizing built-in CPU instructions, which are very hard and too expensive to implement in special purpose devices, but perfectly suitable for ordinary PCs.
Adaptive parametersA decentralized payment system must not depend on a single person's decisions, even if this person is a developer. CryptoNote has no hard-coded constants; magic numbers in the code are designed to be re-calculated based on the previous state of the network. Thus, they always change adaptively and independently, allowing the network to develop on its own.
Ring signatures are explained below. Reproduced from CryptoNote:A normal signature looks like this. There's only one participant, which allows one-to-one mapping.
https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FdcbDq05.png&t=578&c=HLRqRc1qfKqaywA ring signature obscures identities because it only proves that a signer belongs to a group.
https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FavTQPnT.png&t=579&c=5ncjEKTCKCYMzAThis allows a high level of anonymity in cryptocurrency transactions. You can think of it as decentralized and trustless mixing.
https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FioewLSY.png&t=579&c=3tpzhuKkxAQhWw
Donations: bthQiBKT8Z49q5yxHJF5P4Tb2SSwrQi1JU4EMnx6nFTdQZQuCcMwnvB6KsRFHeRu8aaZDJvbKcC4BWg
W5VQ9s3cH7DkWBfpiDc