Tag Archives: bitcoin

This Arduino-powered instrument turns Bitcoin into sounds


::vtol:: has done it again! This time he has turned cryptocurrencies into tunes with a giant Arduino-powered string instrument.


Although cryptocurrencies may not be printed on paper or metalicized into coins, it doesn’t mean that Bitcoin and Litecoin can’t still be brought to life. Just ask Dmitry Morozov, also known as ::vtol::, who has transformed those digital bits into something quite tangible… music.

12020230_921470527906345_1026044411_o_670

The artist’s latest piece, dubbed Silk, is an installation comprised of two six-foot metal towers strung with wire, which tracks the real-time changes in market activities related to cryptocurrencies. Motorized fingers pull one of five strings, with each one representing a different currency, as the rates fluctuate: dollar, Yuan, Euro, Canadian dollar and Ruble. The resulting sound is then picked up by a pair of Dimarzio guitar pickups, and emitted through a set of speakers.

The music is all in the data, however. As the Bitcoin and Litecoin cryptocurrencies change in value against the more traditional currencies, the imagined monetary values generate new melodies and rhythms.

Behind all the magic lies an automatic tuning mechanism comprised of 10 stepper motors and 10 servo motors that is tasked with precisely plucking the wires, all driven by an Arduino board and some MaxMSP and Pure Data programming.

1_670

“This piece explores how new technologies and progress in such areas of knowledge as cryptography, mathematics, computer science influence the financial system, inevitably changing the social structure of the society. These changes can be characterised by growing decentralization, transparency, unfalsifiability, immateriality of values,” the artist adds. “The ‘Silk road’ of the future, the global network of Internet is creating its own unit of exchange independent from political and geographical limitations. Bitcoin has no material analogue, and may be only conditionally compared to existing currencies, in fact being a protocol of values transfer. Technologies of future stimulate creation of virtual entities, which still have no less real meaning – and Bitcoin is one of the first examples.”

Okay, so although it’s not the most harmonic and soothing tunes you’ve ever heard, it’s pretty mesmerizing if you ask us. See for yourself below!

Tracking Bitcoin conversion rates with Arduino and ESP8266


Maker creates a Bitcoin price ticker using the combination of an Arduino Pro Micro and an ESP8266 Wi-Fi module.


What do you do when you have an ESP8266 Wi-Fi module just lying around? Well, if you’re Bitcoin enthusiast Kendrick Tabi, you make an Arduino-based Bitcoin price tracker.

Bitcoin-Price-Ticker-using-ESP8266-WiFi-Module

For this project, the Maker decided to employ the combination of the incredibly popular Wi-Fi chip along with a 5V Arduino Pro Micro (ATmega32U4). The ESP8266 interfaces with the Arduino via serial connection, and operates at 3.3V. Meanwhile, two 3.6V Zener diodes handle the logic level conversion.

Bitcoin-Price-Ticker-using-ESP8266-WiFi-Module-Parts

“Since I am using an Arduino Pro Micro which only has a 5V output, I made a little tweaky experiment to achieve a 3.3V to 3.7V output. Using a two 3.6v Zener diodes connected in series, I managed to get a voltage drop of 1.05V and an output voltage of 3.74V from the 4.79V output of the board. This seems enough to make the ESP8266 work and to prevent overpowering the module,” Tabi explains.

Bitcoin-Price-Ticker-using-ESP8266-WiFi-Module-Breadboard

The code running on the Arduino is tasked with checking the CoinDesk API every 60 seconds, retrieving the incoming JSON data and then displaying the current Bitcon price in the serial monitor. While this may be a bit of an elaborate project for simply monitoring conversion rates, it’s pretty cool nonetheless and opens the door to a wide range of potential apps.

Intrigued? Head over to the Maker’s project page here.

16 tech trends Andreessen Horowitz is most excited about


This list lets you inside the mind of Marc Andreessen and Ben Horowitz. 


One of, if not the, most prominent VC groups in Silicon Valley has revealed the hottest tech trends changing the world right now. For those wondering, that firm is Andreessen Horowitz and we’re referring to no other than its “16 Things” list. The breakdown, which highlights the most investable spaces at the moment, unsurprisingly includes Internet of Things, digital health, crowdfunding, and security — a couple of areas in which we know a little something about.

schonfeld_andreessen-horowitz-2

“We don’t invest in themes; we invest in special founders with breakthrough ideas,” Andreessen Horowitz writes. “Which means we don’t make investments based on a pre-existing thesis about a category. That said, here are a few of the things we’ve been observing or thinking about.”

While the list — which includes several themes that were evident throughout the CES 2015 show floor — will likely change over time, it does provide a nice glimpse into the firm’s thinking at the start of this year. Just in case you don’t feel like clicking through and navigating a16z in its entirety, here’s a brief overview of those breakthrough areas.

Virtual Reality

“VR will be the ultimate input-output device. Some people call VR “the last medium” because any subsequent medium can be invented inside of VR, using software alone. Looking back, the movie and TV screens we use today will be seen as an intermediate step between the invention of electricity and the invention of VR. Kids will think it’s funny that their ancestors used to stare at glowing rectangles hoping to suspend disbelief.”

Sensorification of the Enterprise

“For enterprise, the value of the sensors is in being a shortcut for the user interface, potentially even replacing typing so we can concentrate on the easy, fun, creative things.”

Machine Learning and Big Data

“The key here is in more automated apps where big data drives what the application does, and with no user intervention.”

Full Stack Startups

“The old approach startups took was to sell or license their new technology to incumbents. The new, ‘full stack’ approach is to build a complete, end-to-end product or service that bypasses incumbents and other competitors.”

Containers

“The next step in containerization is treating the datacenter, with all its containers, like one giant computer or server. Many applications today are really just distributed systems: Applications aren’t necessarily confined to just one container.”

Digital Health

“Tomorrow? To understand your personal diagnostic data, you might soon depend more upon an iPhone app developed in a garage than on your local MD.”

Online Marketplaces

“We’re continuing to see tremendous innovation in marketplaces. The first generation of net companies saw a few big horizontal marketplace winners like eBay and Craigslist. But entrepreneurs are continuing to create the next generation of online marketplaces.”

Security

“There are two things now driving the security industry: (1) The bad guys are already inside. (2) New platforms — cloud and mobile — have arrived… Both are forcing a different set of technologies, and the creation of new kinds of companies.”

Bitcoin (and Blockchain)

“The clock has just begun on Bitcoin’s acceptance more broadly. Crash or no crash, we should expect a significant increase in the level of institutional adoption this year. Specifically, a large number of companies will put together groups focused on what Bitcoin means to them.”

Cloud-Client Computing

“Endpoints aren’t just phones; they could be wearables and other small devices and screens connected to the internet. Beyond the devices themselves, it all adds up to a massive amount of compute power. The next decade of computing will be about doing something with it.”

Crowdfunding

“Crowdfunding is going somewhere it never has — into the mainstream. That, in turn, will change all sorts of other things.”

Internet of Things

“Something often overlooked when we talk about all the shiny new connected gadgets emerging out of the Internet of Things is what happens to all the old things. I’m fascinated by the power of adding multiple sensors to old things and then connecting them to the Internet…. With the IoT we’re headed to a world where things aren’t liable to break catastrophically — or at least, we’ll have a hell of a heads up.”

Online Video

“What we do know is that online video is far from done… so it will be interesting to see what even a little competition will do here.”

Insurance

“Insurance is all about distributing risk. With dramatic advances in software and data, shouldn’t the way we buy and experience our insurance products change dramatically? Software will rewrite the entire way we buy and experience our insurance products — medical, home, auto, and life.”

DevOps

“The rise of the hyperscale cloud datacenter has now made this job much harder as developers have had to hack together tools and complex scripts for pushing code to thousands of pancake servers. This complex cloud infrastructure — coupled with the growth of the DevOps movement today — has opened up many opportunities, starting with helping developers and companies to manage the entire process … to much more.”

Failure

“The goal is not to fail fast. The goal is to succeed over the long run. They are not the same thing.”

Bringing Bitcoin-based micropayments to the Internet of Things

Cryptotronix recently announced a partnership with TilePay, a decentralized payment system based on the Bitcoin blockchain, to bring cryptocurrency payments to Internet of Things (IoT) devices. The collaboration is hoping to make secure payments for real-time access to IoT sensors using micropayments a reality.

cryptobackpack_proto

Cryptotronix is building open-source authentication hardware and firmware to allow Pinocc.io devices to securely participate in TilePay. The solution is built around Atmel’s ATECC108 crypto engine which allows each TilePay-enabled sensor to have a unique ECDSA private key. (The same chip can be found on the CryptoCape, a dedicated security daughterboard for the BeagleBone created by SparkFun Electronics and Cryptotronix.) This lets users purchasing sensor data to verify the authenticity and origination of the data.

“Let’s consider an example. A company, organization, or a private citizen spends their own money to setup a temperature sensor network. The administrators can offer the temperature service for free (maybe they’re generous), they can charge a subscription fee to the service, or maybe they provide a free service that is subsidized with ads. With TilePay, there is a better option. TilePay will allow real-time access to the sensor and the users only pay for what they use using Bitcoin-based micropayments,” the team writes.

While the CryptoBackPack is currently only a prototype, Cryptotronix shares that it will be releasing the hardware design files and firmware soon.

Digital anonymity: The ultimate luxury item

Data is quickly becoming the currency of the digital society, of which we are all now citizens. Let’s call that “Digitopia.”

Digitopia123 copy

In Digitopia, companies and governments just can’t get enough data. There is real data obsession, which is directly leading to an unprecedented loss of privacy. And, that has been going on for a long time — certainly since 9/11. Now a backlash is underway with increasing signs of a groundswell of people wanting their privacy back. This privacy movement is about digital anonymity. It is real, and particularly acute in Europe. However, the extremely powerful forces of governments and corporations will fight the desire for personal privacy revanchism at every turn. What seems likely is that those with financial means (i.e. 1%-ers) will be at the forefront of demanding and retrieving privacy and anonymity; subsequently, anonymity could easily become the new luxury item. Ironically, digital invisibility could be the highest form of status.

Anon

Let’s explore what is creating the growing demand for a return to some anonymity. The main driver is the collective realization of just how vulnerable we all are to data breaches and snooping — thanks to Edward Snowden’s NSA revelations, Russian Cyber-Vor hacker gangs stealing passwords, Unit 61318 of the People’s Liberation Army creating all kinds of infrastructure, commercial and military mischief, the Syrian Electronic Army conducting cyber attacks, Anonymous, Heatbleed, Shellshock, Target and Home Depot credit card number breaches among countless other instances of real digital danger.

What all this means is that everyone is a potential victim, and that is the big collective “ah-ha” moment for digital security. (Maybe it’s more of an “oh-no!” moment?) As illustrated by the chart below, the magnitude, types and sheer number of recent attacks should make anyone feel a sense of unease about their own digital exposure. Why is this dangerous to everyone? Well, because data now literally translates into money. And I literally mean literally. Here’s why…

Breach 1

Bitcoin Exposes the Dirty Little Secret About Money 

Bitcoin is a great starting point because it’s the poster child of the data = money equation. Bitcoin currency is nothing more than authenticated data, and completely disposes any pretense of money being physical. It is this ephemeral-by-design nature of Bitcoin that, in fact, exposes the dirty little secret about all money, which is that without gold, silver or other tangible backing, dollars, the Euro, Renmimbi, Yen, Won, Franc, Pound, Kroner, Ruble and everything else is nothing but data. Money is a manmade concept — really just an idea.

How this works can best be described by putting it into cryptographic engineering terms. Governments are the “issuing certification authority” of money. Each country or monetary union (e.g. EU) with a currency of their own is literally an “issuer.” All roads lead back to the issuer’s central bank via a type of authentication process to prove that the transaction is based upon the faith and credit of the issuer.

Banks are the links on that authentication/certification chain back that leads back to the issuer. Each link on the chain (or each bank) is subject to strict rules (i.e. laws) and audits established by the issuer about exactly how to deal with the issuer, with other banks in the system, with the currencies created by other issues (i.e. other countries), with customers, and how to account for transactions. Audits, laws, and rules are therefore an authentication process. Consumers’ bank accounts and credit cards are the end-client systems. Those end-client systems are linked back through the chain of banks via the authentication process (rules, etc.) to the issuer of the money. That linkage is what creates the monetary system.

Bitcoin was built precisely and purposefully upon cryptographic authentication and certification. It is cryptography and nothing more. There is no central issuing authority and it remains peer-to-peer on purpose. Bitcoin bypasses banks precisely so that no overseer can control the value (i.e. create inflation and deflation at their political whim). This also preserves anonymity.

The bottom line is that the modern banking system has been based upon “fiat money” since the Nixon Administration abandoned the gold standard. The Latin word “fiat” means “arbitrary agreement” and that is what money is: an arbitrary agreement that numbers in a ledger have some type of value and can act as a medium of exchange. Note that physical money (paper and coins) is only an extremely small fraction of the world’s money supply. The bulk of the world’s money is comprised of nothing more than accounting entries in the ledgers of the world’s banking system.

See?  Money = Data. Everything else is window dressing to make it appear more than that (e.g. marble columned bank buildings, Fort Knox, Treasury agents with sunglasses and guns, engraved bonds, armored cars, multi-colored paper currency, coins, etc.).

So, if money equals data, then thieves will not rob banks as often; however, those who can will raid data bases instead, despite what Willie Sutton said. Data bases are where the money is now.

1573355_the-illuminati_jpeg890495712403ec5fef85b53b0a65a1ab

By now, the problem should be obvious to anyone who is paying attention — data of any kind is vulnerable to attack by a wide variety of antagonists from hacker groups and cyber-criminals to electronic armies, techno-vandals and other unscrupulous organizations and people. The reason is simple. Yes, you guessed it: It is because data = money. To make it worse, because of the web of interconnections between people, companies, things, institutions and everything else, everyone and everything digital is exposed.

Big Data. Little Freedom.

The 800-pound gorillas of Digitopia are without a doubt governments. Governments mandate that all kinds of data be presented to them at their whim. Tax returns, national health insurance applications, VA and student loan applications, and other things loaded with very sensitive personal data are routinely demanded and handed over. Individuals and corporations cannot refuse to provide data to the government if they want the monopolized “services” governments provide (or to stay out of jail). And, that is just the open side of the governmental data collection machine.

The surreptitious, snooping side is even larger and involves clandestine scanning of personal conversations, emails, and many other things. However, there is another, non-governmental component to data gathering (I will not use the term “private sector” because it is way too ironic). Companies are now becoming very sophisticated at mining data and tracking people, and getting more so every day. This is the notion of “big data,” and it is getting bigger and bigger all the time.

The Economist recently articulated how advertisers are tracking people to a degree once reserved for fiction. (Think George Orwell’s 1984.) Thousands of firms are now invisibly gathering intelligence. Consumers are being profiled with skills far exceeding that of FBI profilers. When consumers view a website, advertisers compete via a hidden bidding process to show them targeted ads based on the individual’s profile. These ads are extremely well focused due to intensive analytics and extensive data collection. These auctions take milliseconds and the ads are displayed when the website loads. We have all seen these ads targeted at us by now. This brave new advertising world is a sort of a cross between Mad Men and Minority Report with an Orwellian script.

The Personalization Conundrum

There is a certain seductiveness associated with consumer targeting. It is the notion of personalization. People tend to like having a certain level of personalized targeting. It makes sense to have things that you like presented to you without any effort on your part. It is sort of an electronic personal shopping experience. Most people don’t seem to mind the risk of having their preferences and habits collected and used by those they don’t even know. Consumers are complicit and habituated to revealing a great deal about themselves.  Millennials have grown up in a world where the notion of privacy is more of a quaint anachronism from days gone by. But, that is all likely to change as more people get hurt.

Volunteering information is one thing, but much of the content around our digital selves is being collected automatically and used for things we don’t have any idea about. People are increasingly buying products that track their activities, location, physical condition, purchases and other things. Cars are already storing data about our driving habits and downloading that to other parties without the need for consent. So, the question is becoming at point does the risk of sharing too much information outweigh the convenience? It is likely that point has already been reached, if you ask me at least.

The Need for a Digital Switzerland

With the unholy trinity of governmental data gathering, corporate targeting, and cyber-criminality, the need for personal data security should be more than obvious. Yet, the ability to become secure is not something that individuals will be able to make happen on their own. Data collection systems are not accessible, and they are not modifiable by people without PhDs in computer science.

With privacy being compromised every time one views a webpage, uses a credit card, pays taxes, applies for a loan, goes to the doctor, drives on a toll way, buys insurance, gets into a car, or does a collection of other things, it becomes nearly impossible to preserve privacy. The central point here is that privacy is becoming scarce, and scarcity creates value. So, we could be on the verge of privacy and anonymity becoming a valuable commodity that people will pay for. A privacy industry will arise. Think of a digital Pinkerton’s.

It is likely that those who can afford digital anonymity will be the first to take measures to regain it. To paraphrase a concept from a famous American financial radio show host, privacy could replace the BMW as the modern status symbol. The top income earners who want to protect themselves and their companies will be looking for a type of digital Switzerland.

swiss army

Until now a modicum of privacy had been attainable from careful titling and sequestering of assets (i.e. numbered bank accounts, trusts, shell corporations, etc.). That is not enough anymore. The U.S. Patriot Act, European Cy­bercrime Convention, and EU rules on data retention are the first stirrings concerning a return to the right to anonymity. These acts will apply pressure to the very governmental agencies that are driving privacy away. Dripping irony…

Legal, investigational, and engineering assets will need to be brought to bear to provide privacy services. It will take a team of experts to find where the bits are buried and secure them. Privacy needs do not stop at people either. Engineers will have to get busy to secure things as well.

The Internet of Things

Everything said until this point about the loss of personal privacy also applies to the mini-machines that are proliferating in the environment and communicating with each other about all kinds of things. The notion of the Internet of Things (IoT) is fundamentally about autonomous data collection and communication and it is expected that tens of billions of dispersed objects will be involved in only a few years form now. These numerous and ubiquitous so-called things will typically sense data about their surroundings, and that includes sensing people and what those people are doing. Therefore, these things have to add security to keep personal information out of the hands of interlopers and to keep the data from being tampered with. This is called data integrity in cryptographic parlance.

What Can be Done?

To ensure that things are what they say they are, it is necessary to use authentication. Authentication, in a cryptographic sense, requires that a secret or private key be securely stored somewhere for use by a system. If that secret key is not secret then there is no such thing as security. That is a simple point but of paramount importance.

2014-Crypto-Security-at-our-Core-Atmel-Has-You-Covered

The most secure way to store a cryptographic key is in secure hardware that is designed to be untamperable and impervious to a range of attacks to get at it. Atmel has created a line of products called CryptoAuthentication precisely for this purpose.  Atmel CryptoAuthentication products — such as ATSHA204AATECC108A and ATAES132 — implement hardware-based key storage, which is much stronger then software based storage because of the defense mechanisms that only hardware can provide against attacks. Secure storage in hardware beats storage in software every time.

It is most likely that as we citizens of Digitopia continue to realize how dependent we are on data and how dependent those pieces of data are on real security, there will be a powerful move towards the strongest type of security that can be achieved. (Yes, I mean hardware.)

In the future, the most important question may even become, “Does your system have hardware key storage?” We should all be asking that already and avoiding those systems that do not. Cryptography is, as Edward Snowden has said, the “defense against the dark arts for the digital realm.”  We should all start to take cover.