Note:
This page has been designed solely to examine ideas and potentials of the project and the idea has not yet been officially implemented and it has not been invested. The registration process for the company in Germany, under the name of ZINO, has been legally , and has been authorized to operate in Germany in Hamburg, and it is receiving a license from BaFin (Federal Financial Supervisory Authority) (German: Bundesanstalt für Finanzdienstleistungsaufsicht) to launch ICO and invest. Until BaFin has not issued the license, the company does not have the right to run ICO.
Preface:
We are all familiar with the world of digital currencies, and we know that the largest issue of digital currencies is mining. For years, my team and I have been investigating to set up a large mining farm in Germany and Sweden. But after a while with various reviews of softwares on the Internet I realized that there was a mining idea for home computers that sometimes had a weakness in the programming system. Some were successful and some were not. But programming caused damage to the user’s system. In the beginning, we did not take this plan very seriously, but with the reviews we found that many of these softwares have become very popular in a short time, and occasionally Alexa Rank of some of them has been above the most famous sites in the world.
With a lot of reviews, we found out that many people in low-income countries use these softwares. After reviewing a lot of these softwares, we found their weaknesses. Weakness in programming and weakness of the network are among them; that is, mining is not done for the user individually, and in general, the software receives all the computational power from the power of the users’ computers, connects to a computational pool, and managers make an estimated payment to pay more. Actually, the software does not have an engineering structure and is more like a port. The next weakness of these softwares is the singularity of the computational algorithm; that is, users can only use an algorithm that is mostly Bitcoin. The second weakness is the non-use of the GPU. 99% of the softwares use the user's CPU. We solved this problem and included in the software engine the ability to select or use. The next weakness is non-clarity of payment and mining, which is due to the weakness of programming and the scarcity of software resources that cannot use a large database (for such a project, the Oracle database must be used).
The next weakness is the lack of hardware and software knowledge together. I can surely say that 99% of the existing softwares have interfacing mode; that is, software management controls hardware and software together. By various investigations, we have been able to sum up all the weaknesses and present an idea. However, software will be described in more detail as soon as the software is registered and the license is received.
The summary of the software details is presented in the following:
The following description has been written generally and describes the general description of the project and the stages of the softwares development. It has been tried to avoid generalities. Detailed stages of the softwares development have not been mentioned in this document.
General Classification of the Project:
Project Hardware Section:
The equipment to be designed and implemented in this section is one of the two vital components of the system. An appropriate place with all the necessary facilities for installing and launching this equipment should be considered.
The equipment to be designed and implemented in this section is one of the two vital components of the system. An appropriate place with all the necessary facilities for installing and launching this equipment should be considered.
In the following, we just mention the required server equipment and their relation to various softwares and use of cloud computing space.
Project Software Section:
This project requires a number of softwares to manage the system and a number of softwares to provide services to clients. A series of software is on the server side, and clients do not have access to them and they are for system owners. All processes in the computational pool and clients, etc., are controlled and monitored by these types of softwares.
A series of softwares is on the client side, by installing them the clients can do mining or even be aware of their account status. In the following, we will address them.
Project Hardware Section:
Due to the large number of visits to the server and the need for much processing by the server and, of course, large volumes of input and output data, at the beginning of the work, a powerful server is absolutely necessary and unavoidable. Such server with powerful hardware equipment is available on the global market and can be used to get started, and it does not require launching a second server room as long as it handles users. Of course, in the design principles of computational pools, a server room should include two separate servers. The second server is back up so that in the event of a crash or overfull or confrontation with a DDos attack, the traffic can be redirected to the second server to resolve the problem of the first server. If such measures are not anticipated and implemented, in the case users disconnect from the main servers, the users would become distrusted or frustrated with the system and you would be subject to a trend of criticism on the Internet.
Also, in parallel with the server and its equipment, we need a data center with high data storage capacity to store and maintain the specifications of each user account and the specifications of each user’s virtual wallet, and of course, the performed specifications and computations.
The servers require a hardware security system, such as valid firewalls and hardware IDs, to prevent hackers from penetrating and attacking as much as possible.
The server room needs to have high Internet bandwidth. Consequently, regarding the location of the server room, it is necessary to negotiate with Internet providers to purchase at least one fiber optic line and use the highest possible capacity of each optic fiber line.
Project Software Section:
In this system, we should produce, design, and program nearly 22 separate softwares. A number of these softwares will work individually and some will work together. They are listed separately and explained in the following.
Softwares at the server side for managing the computational pool and all existing processes:
The main computational pool software is used to compute encrypted blocks, develop and allocate computational blocks for users, and receive and sum up computations from users. Developing this software requires a complex computational process. It should be noted that the core architecture of the entire process will be generated and developed from this software. The computational pool will use SHA256 algorithm, and another pool and software should be developed to use the other peer algorithm. The SHA256 algorithm includes a lot of virtual currencies, the most famous of which are Unobtanium UNO - Bitcoin Dark BTCD - Factom FCT - Bitcoin Cash BCH - Bitcoin BTC.
A pool that is architected and established by this algorithm can mine all digital currencies based on the SHA256 algorithm. This feature can be added to the developed software. An obvious example of this is the famous pools like the BTC.com and antpool.com pools, in whose workers-specific user panel, Bitcoin and Bitcoin Cash options and available for the SHA256 algorithm.
Even in such well-known pools with a computational volume over 6000 PH/s, in order that users and especially computations do not enter into collision processes, there are always separate computational pools for different codes, and even codes with an algorithm have been spread in multiple servers all over the world.
To create various algorithms such as the Ethash algorithm, all architectural and design steps of a computational pool should first be performed, in terms of either the software at the server side or the hardware. This feature can only be created on client side software in order to choose one of the cryptographic currencies by choosing type of cryptography like SHA256 and Ethash and opening the drop-down menu; however, its infrastructure should be fully provided at server side in order that by choosing the desired algorithm and currency, the software can communicate with the core and the user begins to mine. Indeed, this requires larger profiles and more wallets in the data center. This method has several problems, including greater volume of the software at the client side and its complexity and computational complexity. The best solution is to develop separate softwares for different algorithms, because if it did not have any problem, 100% of the large validated computational pools would have such features in their mining softwares.
The software monitoring the generated blocks and outputs and inputs of the blocks to the main computational server and allocating the computations of each user to that user:
This software is complementary to the above software and is at the server side and is a component of the server core. Its task is to monitor the output and inputs of generated blocks and validate them. The second task is to monitor accurate allocation of blocks resolved to each user so that the generated Bitcoin value is added to the user account accurately and the server is prevented from thieving itself as far as possible. Developing this software requires accurate computations. This software is usually an independent project in such projects.
Software for developing and destroying various wallets for users and for the server itself:
This includes 2 softwares, one running automatically and one manually. Its automatic one is at the server side and is considered to be a component of the main core so that by opening each user account a wallet for each currency is created for the user and the software automatically transger generates the outputs of the user at any certain timing from the original wallet to the user’s wallet. Its manual side is to create a wallet for a particular currency by the user.
Traffic guidance and management software from clouds to major servers:
Due to the high traffic volume of visitors, server responsiveness to users will be delayed. To solve this problem, two methods will be applied: first, the client-side software that attempts to minimize communication with the server by creating cash and collecting computational packages, for example, every 2 minutes; second, creating terminal software at the cloud side. The task of this software is to direct high traffics from many parts of the world to the server, and vice versa, so that the software will be stored in cloud services and will only receive blocked computational packages from the server and send them to the user, and on the contrary, the user will receive the data and send to the server, of course, it will, for example, be 2,000 to 1; that means, it will send 2,000 client connections in 1 package to the mother server, and in one package of data, will receive data of 2000 users from the server and send them to users.
The software itself consists of several parts, a part of which will be in the cloud, another part in the core of the server software, and the other part in the client software.
Very complex processes and exchange of security keys should be included in these softwares to prevent security problems.
Core softwares and auxiliary softwares for the core and wallet softwares, database and data center management, and computing and monitoring processes, and all user-related processes and pool security softwares will be included in the content management system (CMS) software.
Note: All main and lateral softwares at the server side should be integrated into the main content management system (CMS) software.
Management Software and Computation of Subsetting:
This software should match the core and inspection software and the entire system, so that it can detect and divide users and transfer their percentages correctly.
Application of Managing and Monitoring Computational Pool for Android:
All main CMS tasks will be included in this application.
Application of Managing and Monitoring Computational Pool for Windows Phone:
All main CMS tasks will be included in this application.
Note: Other softwares should be developed to assist in the main CMS to all the different processes and we just mention them here: ticketing support system, accounting system for basic calculations, security software and so on.
Application of Managing and Monitoring Computational Pool for IOS:
In total, at the server side, 9 main softwares and 8 subsidiary softwares will play, which will eventually increase or decrease over time. This is over time and the time should display the role of softwares. Stages of general use in the beta stage will be the main determinant up to 80% that will be shown after complete production and start-up in a 6-month or 1-year period.
Client Side Software:
This section will contain 6 main softwares and users will download them by referring to the main pool website or similar websites and will begin to use them after completing the training stages. Internet browser software like Chrome or any software that can connect to computational pools and perform mining operations, after being downloaded and installed in the software system will force the user to go through the training process, with different pointers and explanations. After passing the training course, the user can create a user account by Gmail through the software or website. By creating this account, user information is created and stored in the server's data center. In order that a user can sync multiple computers to an account, the syncing step should be done either by rebooting the same account or entering a social network account. All of these steps are performed fast for the user in several steps, but at the server side for each user with an account, a profile is created in order that the subsequent steps are performed based on that profile. In the next step, the user can start by specifying the desired password and currency dependent on it, but Bitcoin will be active for the user from the beginning by default. Behind the software, the server-side core generates a temporary wallet for Bitcoin (for each profile) and, of course, by choosing for example cash Bitcoin, the temporary wallet of this currency is also created for the user, and in the user’s profile the generated quantity in the last 24 hour and the transfer of currency and so on are shown. The software will be very similar to the Crypto Tab software; and all the steps of displaying the dashboard, sending followers page link for subsets, and the amount of using CPU and GPU power in the software will be included if possible, but the Crypto Tab does not have these features. The above software will be available in both 32bit and 64bit versions for Windows.
Similar to the above software for the Macintosh operating system and devices manufactured by Apple Company
Similar to the above software for the Linux operating system in both 32bit and 64bit versions (Debian and Fedora Linux)
Monitoring and mining application for Android devices version 4.2.2 and upper
Monitoring and mining application for IOS devices
Monitoring and mining application for Windows Phone devices
Further Details:
Client-side software should be able to operate well and contain many features. Here are some of these features, for example, the software should be able to detect the temperature of the CPU and GPU processors from the data of motherboard BIOS and the devices itself, so that the processing will automatically shut off if the temperature of these processors exceeds a standard limit for any reason. This feature prevents damaging the client’s device. One of the most prominent features in these softwares is to give priority to other processes, so that when the user uses the mining software if another activity is required, the software automatically assigns priority to user tasks, but this requires system programming and or having a complementary software inside the main software that controls the crash control as a handler.
With the above explanation, it is concluded that this is a megaproject, which has a high degree of complexity and elegance, and requires the precise computations and software engineering. In the field of computer science and its subcategories, there is a need for programmers, database specialists, Network Science and Communications specialists, Cryptography specialists, Network Security and Information specialists, operating system specialists, Web Developers, Designers and Project Manager, and a complete system of a professional team that can operate the project with the help of each other and with coherent management. And we have prepared such a team.
With the above explanation, it is concluded that this is a megaproject, which has a high degree of complexity and elegance, and requires the precise computations and software engineering. In the field of computer science and its subcategories, there is a need for programmers, database specialists, Network Science and Communications specialists, Cryptography specialists, Network Security and Information specialists, operating system specialists, Web Developers, Designers and Project Manager, and a complete system of a professional team that can operate the project with the help of each other and with coherent management. And we have prepared such a team.
In general, the project has a lot of profits for the company as well as for all people in the community, especially those with low incomes and in developing countries.
We hope people will support our project so that we can implement this megaproject, especially the German speaking people around the world and other people interested in Block Chain technology and digital currencies.
We are currently waiting for BaFin license to obtain ICO licenses in Germany. After that, we are ready to raise funds privately for the initial implementation.
The pricing policies and the type of bonuses and set-up costs with full details of the White Paper will be publicly announced after registration.
We are ready to hear your comments and guidance to help us make the project better.
We would like to use even your slight comments. Even a comment is valuable to us. We created this page solely to hear your comments and experiences so that we can make the project as effective as possible.