Ezios is also embracing a Rollup-centric roadmap; NEAR is also designing data availability sharding. This article mainly discusses the modular trend of Ethereum.
The "Blockchain Trilemma" limits the possibility of achieving extreme development of all attributes simultaneously, so simply expanding based on a single-layer blockchain cannot solve Ethereum's dilemma.
- Modular mixed scaling: layer1 (data sharding) + layer2 (rollups)
The architecture design is mainly divided into four layers: execution layer, settlement layer, consensus layer, and data availability layer. In many cases, the industry also refers to the execution layer and settlement layer collectively as the execution layer, and the consensus layer and data availability layer collectively as the consensus layer.
Execution Layer: Responsible for processing on-chain transactions, executing on-chain orders, and verifying the execution of transfers and smart contracts, mainly focusing on Rollups. After the modular blockchain has developed to a certain stage, users typically interact with the blockchain based on the execution layer, including signing transactions, deploying smart contracts, and transferring assets. The execution layer addresses the scalability of the blockchain.
Settlement Layer: The settlement layer is used to verify the execution results of the execution layer such as Rollups and resolve disputes, and to settle state commitments.
Consensus Layer: The consensus layer reaches consensus on the validity of state transitions by downloading and executing block contents through a full node network, thus providing ordering and finality, and validating block production through a PoS mechanism.
Data Availability Layer: Ensures that transaction data can be used (ensuring storage and verifiability). It is necessary to publish and store the data required to verify the validity of state transitions in this layer. In the event of malicious block proposers withholding transaction data, the data in the data availability layer can be used for verification.
The core mechanisms introduced by Danksharding are mainly: PBS and DAS.
PBS (Proposer Builder Separation) refers to the separation of block proposers (Proposer) and block builders (Builder) when constructing blocks. The Proposer proposes the block, the Builder bids for transaction ordering rights and calculates the block header, and the Proposer packages the transactions based on the Builder's calculations and writes the block header into the block to complete block production. Before the introduction of PBS, block proposers (Miners before Merge, Validators after Merge) could maximize their mining profits by viewing which transactions were in the mempool and adopting certain strategies to capture MEV opportunities. After the introduction of the PBS mechanism, this role separation mechanism combined with the bidding mechanism for Builder ordering rights can partially solve the MEV problem, with the final MEV profits being shared among all validators in the network. Additionally, PBS helps address the synchronization issues between sharding and the beacon chain, as well as the censorship resistance of the Ethereum network.
DAS (Data Availability Sampling) is an effective method to address blockchain state explosion. It allows validating nodes to check block availability; by using DAS checks, light clients can verify whether a block has been published by only downloading some randomly selected blocks. Since DAS can perform parallel verification of block data, even if the number of data shards increases significantly in the future, it will not increase the burden on individual validating nodes, but rather stimulate more validating nodes to join, thus ensuring sufficient decentralization of validating nodes.
Ultimately, Danksharding can achieve centralized block production for Ethereum through PBS, decentralized validation through DAS, and possess a certain degree of censorship resistance, thereby ensuring that Ethereum becomes a scalable consensus layer and data availability layer capable of accommodating more Rollups from the execution layer. (PS: Centralized block production and decentralized validation are also concepts proposed by Vitalik in Endgame regarding the future development of Ethereum.)
First, let's consider a question: if you want to buy a book online, what is the transaction process?
Step 1: After you place an order, you transfer the money to Alipay.
Step 2: After Alipay receives the payment, it notifies the seller that they can ship the goods.
Step 3: After receiving the notification, the seller ships the goods to you.
Step 4: After you receive the goods and are satisfied, you confirm receipt.
Step 5: Alipay receives your notification and pays the seller.
Although you are transacting with the seller, the entire transaction revolves around Alipay. Therefore, if there is a problem with the Alipay system, such as a meteorite falling from the sky and destroying Alipay's servers, or if Alipay goes bankrupt due to a global economic crisis, Alipay might simply state that this transaction does not exist, and the transaction would end in failure, leading to confusion between the buyer and seller, with both parties unable to prove their case.
To understand how a decentralized blockchain operates, let's simplify the entire decentralized distributed structure to an extreme case for exploration. Suppose there is a decentralized small city with five lively friends, and when they lend money to each other, they do it like this:
Suppose B borrows 1 dollar from A, what do the people in the city do? A shouts in the crowd: "I am A, I lent B 1 dollar!" B also shouts in the crowd: "I am B, A lent me 1 dollar!"
At this point, the other people in the city, C, D, and E, hear this news and take out their little notebooks to silently note: "On a certain date, A lent B 1 dollar."
After extreme simplification of the decentralized model, we find that in this city of only five people, a decentralized system has already been established that does not require a bank or Alipay. This model does not require trust relationships or an organization with credibility. When everyone in the distributed structure keeps accounts, tampering with the ledger becomes impossible. For example, if B suddenly denies the debt: "I don't owe A 1 dollar!" at this point, the people, C, D, or E, would stand up and say: "No, my notebook clearly records that on a certain date, you borrowed 1 dollar from A, and there is no record of you repaying it."
We notice that in this model, the so-called 1 dollar is not important, and no one cares; "1 dollar" has become a variable that can be replaced by any concept, as long as everyone agrees that it is something of value.
For example, A shouts in this city: "I created a Balala energy!" The other people in the city hear it, and everyone notes down "someone has a Balala energy" in their little notebooks, and they don't even need to know what Balala energy is; A indeed has a Balala energy. What can A do next? A can shout again: "I gave B a Balala energy!"
Question 1: Why should I help you keep accounts?
Why should you shout to the sky, and others should help you keep accounts? Isn't their time worth something? Isn't their little notebook worth something? Therefore, to get everyone to help me keep accounts, I add a new rule: I decide to reward the first person who hears my shout and records it in their notebook. The reward mechanism is also simple: the first person who hears my shout and records it can receive a reward of one Balala energy.
This Balala energy is not given for free; it is a reward for your labor, just like earning money by working. You help me keep accounts, and the entire system will reward you. What you need to do is as follows: first, you need to be the first to hear my shout and record it in your notebook; after recording, you must immediately inform everyone in the city—"I have recorded this statement; if you record it now, it won't matter, and others will give up this money-making business." At the same time, you need to do one more thing: give your record a unique number, and then shout out the record and the number together, so the next person recording will continue with this record and unique number.
- The blockchain system creates a block approximately every 10 minutes, which contains all transactions that occurred across the network during that time. Each block also contains the ID (identifier) of the previous block, allowing each block to find its predecessor, thus forming a complete transaction chain from its inception to the present.
Two, Hash Algorithm
The hash algorithm is a one-way cryptographic mechanism that ensures transaction information is not tampered with in the blockchain. The hash algorithm takes a plaintext input and converts it into a shorter, fixed-length hash data in an irreversible manner.
It has two characteristics:
-
The encryption process is irreversible, meaning we cannot deduce the original plaintext from the output hash data;
-
The input plaintext corresponds one-to-one with the output hash data; any change in the input information will inevitably lead to a change in the final output hash data.
In the blockchain, SHA-256 (Secure Hash Algorithm) is typically used for block encryption, with an input length of 256 bits and an output of a 32-byte random hash data. The blockchain encrypts transaction information in a transaction block using the hash algorithm and compresses the information into a hash string composed of a series of numbers and letters. The hash value of the blockchain can uniquely and accurately identify a block, and any node in the blockchain can obtain the hash value of this block through simple hash calculations. If the calculated hash value remains unchanged, it means that the information in the block has not been tampered with.
In discussions about blockchain, we often hear terms like public key and private key. This refers to the asymmetric encryption method, which is an improvement over the previous symmetric encryption method (using usernames and passwords).
We can briefly introduce it using an email encryption model: the public key is for everyone to use; you can publish it via email or allow others to download it from a website. The public key is actually used for encryption/verifying signatures. The private key is personal and must be kept very carefully, preferably with a password; the private key is used for decryption/signing, and it is owned by the individual. In the Bitcoin system, the private key is essentially an array of 32 bytes, and the generation of the public key and address relies on the private key. With the private key, one can generate the public key and address, allowing the spending of Bitcoin corresponding to that address. The way to spend Bitcoin with the private key is to sign the unspent transaction corresponding to that private key.
Information sender: Signs the information with the private key and encrypts it using the recipient's public key.
Information recipient: Uses the sender's public key to verify the sender's identity and decrypts the encrypted information with their private key.
Four, Timestamp
The timestamp in the blockchain exists from the moment a block is generated; it corresponds to the authentication of each transaction record, proving the authenticity of the transaction record.
The timestamp is directly written into the blockchain, and the blocks that have already been generated in the blockchain cannot be tampered with; once tampered with, the generated hash value will change, rendering it invalid data. Each timestamp will include the previous timestamp in its random hash value, and this process repeats continuously, forming a complete chain.
The blockchain uses the Merkle tree data structure to store the values of all leaf nodes and generates a unified hash value based on this. The leaf nodes of the Merkle tree store the hash values of data information, while non-leaf nodes store the hash values obtained from hashing the combinations of all leaf nodes beneath them.
Similarly, any change in the data of a block will cause the Merkle tree structure to change. In the process of verifying and comparing transaction information, the Merkle tree structure can significantly reduce the computational load, as we only need to verify the unified hash value generated by the Merkle tree structure.
One of the characteristics of Bitcoin is its immutability; all records are unalterable and publicly verifiable. Once a Bitcoin address published by a hacker receives Bitcoin, a record is added to the ledger, and everyone's ledger will be updated synchronously. Everyone can check this record, and subsequent transfer and withdrawal records for this address are also verifiable. As long as the hacker performs operations like withdrawing Bitcoin that require interaction with reality, they will inevitably leave traces.
In the blockchain, all nodes can trace back to the source, which is the first block in the blockchain, known as the "Genesis Block."
After the "Genesis Block" was born, Bitcoin users continuously "solve problems," that is, they calculate to find values that meet specific SHA-256 hash requirements. This process is known as "mining" in Bitcoin.
When any user calculates a qualifying value first, they broadcast it across the network, and other nodes in the network will verify this information. If verified, other nodes will abandon their calculations and add the newly created block to the previous block.
The capacity of a Bitcoin block is 1M, 1M = 1,024KB (kilobytes) = 1,048,576 bytes, so the total number of transactions contained in a block is: 1,048,576 ÷ 250 ≈ 4,194.3 (transactions). The confirmation time for a block in Bitcoin is 10 minutes, which is 600 seconds, so the number of transactions a block can process per second is: 4,194.3 ÷ 600 ≈ 7 (transactions). A block can only process 7 transactions per second; if the transaction data is larger, it may not even reach 7 transactions. This leads to a result where transactions on Bitcoin become congested and slow. After a transaction occurs, there are many transactions ahead waiting for confirmation; how long do we have to wait? Eventually, the congestion will reach a point where it exceeds the capacity limit, and then it will collapse!
-
Bitcoin Classic believes that the maximum value of this field should be adjusted to 2M, and in the future, there are plans to take the median size of the previous 2,016 blocks and multiply it by an agreed factor to determine the upper limit of the next batch of blocks.
-
Bitcoin XT believes that this value should be modified to 20M and doubled every two years until the upper limit reaches 8.3G (gigabytes).
-
Bitcoin Unlimited believes that this value can be any size, even infinitely large, determined by the mining pool. The characteristics of hard forks are as follows:
-
There is no forward compatibility; previous versions will become unusable and must be upgraded;
-
There will be two chains at the blockchain level, one old chain and one new forked chain;
-
Agreement on the fork upgrade must be reached at a certain point in time; those who disagree will enter the old chain.
The definition of a soft fork is as follows:
A soft fork refers to a change in the data structure of Bitcoin transactions, where non-upgraded nodes can verify blocks produced by upgraded nodes, and upgraded nodes can also verify blocks produced by non-upgraded nodes.
-
There is good compatibility; some functions of previous versions can be used without upgrading;
-
There is no forked chain at the blockchain level; there are just new and old blocks in the chain;
-
For a relatively long time, it is allowed not to upgrade and continue using the original version to generate old blocks alongside new blocks.
Blockchain technology is essentially a distributed database where accounting is not controlled by individuals or a centralized entity, but is maintained and recorded collectively by all nodes. No single node can tamper with it.
If you want to tamper with a record, you need to control more than 51% of the nodes or computing power in the entire network simultaneously, which is practically impossible since the number of nodes in the blockchain is infinite and constantly increasing, and the cost of tampering is extremely high, almost unaffordable for anyone.
Characters#
Whoever he is, whenever he appears, whether he will appear again in this life, he has realized the dream I shouted out loud in my childhood—"I want to change the world" "I want to become the world's unsolved mystery." Now let's talk specifically about the legendary experiences of this legendary figure.
The legendary Satoshi Nakamoto is depicted as a figure who embodies an economist, mathematician, cryptographer, and top hacker. His legendary history began on November 1, 2008, when he published a paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System." He then put the theory into practice by creating the first block in the Bitcoin world on January 4, 2009, which we call the "Genesis Block." On January 11 of the same year, he developed a client with a very simple name—Bitcoin Client Version 0.1, calling on various partners to join in.
The story gradually evolved, Bitcoin finally had its first transaction, Bitcoin had an exchange rate, Bitcoin technology enthusiasts had chat rooms, Bitcoin mining difficulty was adjusted, Bitcoin was recognized by the laws of a certain country, and Bitcoin's market value reached nearly 40 billion dollars (estimated based on May 2017 data)... Of course, Bitcoin's growth process also accompanied some "negative energy," such as Bitcoin's soaring and plummeting, Bitcoin being stolen, and being sued. In short, the history of Bitcoin is colorful, and we will elaborate on it later.
In these events, what role did Satoshi Nakamoto play? The creator of the events. Why do I say this? Because he disappeared; no one in the world has seen Satoshi Nakamoto, nor has anyone heard his voice. The FBI and the media worldwide are searching for him, but no one has found him. Everyone can see his statements on forums, emails, and website homepages during the early days of Bitcoin's founding in 2008, but investigations into these seemingly clue-filled statements ultimately lead to dead ends.
Satoshi Nakamoto is always depicted with a silhouette, but we look forward to the 99 legends created by "every Satoshi Nakamoto."
When Nick Szabo was "hit" by a vending machine, just as Newton was hit by the "apple of God" falling from a tree, he had a sudden realization and invented Newton's laws of motion. In the blockchain field, there is also a person who was "hit" by a vending machine, and he invented smart contracts.
Nick Szabo is a computer scientist, cryptographer, and legal scholar, a pioneer of innovative concepts such as smart contracts, and he has been suspected of being Satoshi Nakamoto. Currently, he is raising funds to establish a blockchain technology company.
Once the above three conditions are met, we will find that smart contracts have become like today's Alipay; you don't need to know the underlying technology, but you trust it, and you have to use it to complete transactions. In the world of blockchain, smart contracts will be ubiquitous.
Blockchain female leaders emerging from Wall Street
Because Bitcoin and the blockchain technology behind it inherently carry a geeky aura and a proud quality of "you mere mortals cannot understand the darkness of night," the authorities and opinion leaders in the blockchain industry are more often low-key men who do not like to express opinions.
However, there are still a few female opinion leaders who are as capable as men, such as Catherine Nicholson, CEO of the blockchain startup BlockCypher, which has raised $3.5 million, and Bryce Master, CEO of a digital asset holding company.
Self-taught Basic language from a young age
Let's briefly talk about the resume of this legendary figure. Marc Andreessen may not be as famous as Bill Gates or Steve Jobs, but every step he has taken is closely related to the development of the internet, and we can discuss his entrepreneurial experiences.
In the first decade, the halo surrounding Andreessen was "Netscape," the creator of the first generation of browsers. In 1992, Andreessen and his friends developed the first web browser with image elements, Mosaic. In 1993, Andreessen and his partners founded Netscape. In 1995, Netscape went public in New York, reaching a market value of $2.9 billion. The 24-year-old Andreessen became a billionaire overnight. Later, due to the rise of the IE browser (Microsoft's web browser), Netscape was forced to sell to AOL in 1999, marking the end of Andreessen's first entrepreneurial experience.
Andreessen's second entrepreneurial experience also rode the wave of the internet; he and his partners founded a cloud computing company called "Loudcloud." However, from 2002 to 2006, the United States entered the era of the internet bubble burst, and venture capital firms were unwilling to fund internet companies. In 2007, the company was sold to HP for $1.6 billion.
Afterward, Andreessen joined the board of Facebook and served as a consultant to Twitter's then-CEO Evan Williams. In 2009, Andreessen and Ben Horowitz founded the Andreessen Horowitz venture capital firm.
Marc Andreessen's connection to blockchain is also related to this venture capital firm, which invested in the Bitcoin trading platform Coinbase, the Bitcoin startup 21Inc, and the blockchain data provider TradeBlock. Of course, these alone cannot serve as strong evidence for him being a prominent figure in the blockchain field.
Digital Currency Group has the power to invest, acquire, and hold capital permanently. We are not a fund; we do not need to return funds to limited partners but redeploy capital within the company. Our goal is to accelerate the development of a better financial system. Barry Silbert
References#
-
Smart contracts will make banks and lawyers unnecessary in the future [EB/OL]. (2016–06–21) [2017–05–18]. http://it.sohu.com/20160621/n455402402.shtm
-
Babyt, Digital Asset CEO: Banks will apply blockchain technology within two years, but it will take 5-10 years to become mainstream [EB/OL]. (2016–04–07) [2017–05–18]. http://www.8btc.com/blockchain-in-banks-a-reality.
-
Barry Silbert talks about DCG's investment strategy in the digital currency field [EB/OL]. (2016–02–01) [2017–05–18]. http://www.okcoin.cn/t-1010622.h
Blockchain technology has been recognized by many banks, and several banks have established related blockchain laboratories dedicated to using blockchain technology to create an ultimate transformation tool for bank backends. A report from Spain states that if all banks internally use blockchain technology, they could save $15-22 billion annually by 2022.
Blockchain + Cross-border Payments
The current mainstream traditional cross-border remittance method is wire transfer, which generally takes 3-5 working days. In addition to the intermediary banks charging certain fees, SWIFT (Society for Worldwide Interbank Financial Telecommunication) also charges high communication fees for message exchanges through its system. For example, in China, a single cross-border remittance through a bank incurs a communication fee of 150 yuan.
Blockchain + Supply Chain
Supply chain finance, simply put, is a financing model where banks connect core enterprises with upstream and downstream enterprises to provide flexible financial products and services, treating funds as a solvent for the supply chain to increase its liquidity.
In today's supply chain finance system, the supply chain of a specific product includes everything from raw material procurement to the production of intermediate and final products, ultimately delivered to consumers through a sales network, linking suppliers, manufacturers, distributors, retailers, and end users into a whole.
Blockchain + Information
Once banks establish their own blockchain, due to its tamper-proof characteristics, customer information and transaction records, once confirmed, will not be subject to any human intervention or tampering. This helps banks identify abnormal transactions and prevent fraud.
At the same time, banks can also use blockchain technology to establish a distributed ledger information system to detect and analyze the transaction behaviors of all node users. If any abnormal behavior occurs, the system will issue a report, effectively preventing fraud, money laundering, and other illegal activities.
Behind the surge in blockchain enthusiasm, governments, large financial institutions, and corporate groups around the world are investing significant resources into blockchain research. The application OKLink under OKCoin is a next-generation global financial network built on blockchain technology and is China's first commercial blockchain application. It aims to promote the efficiency of global value transmission while enhancing the user experience of global remittance. This application currently covers more than 20 countries and regions, including China, Japan, South Korea, and Southeast Asian countries. Its main clients are small and medium-sized financial participants globally, including banks, remittance companies, and internet financial platforms, with monthly transaction volumes reaching tens of millions of dollars.
The disadvantages of traditional cross-border remittance methods are long cycles and high fees. However, OKLink, based on blockchain technology, allows users to complete cross-border transfers at lower costs and faster speeds under a decentralized mechanism. OKLink uses blockchain technology to enable remitters and recipients to make payments and settlements directly, eliminating all intermediary fees. The entire network only charges no more than 0.5% based on the intermediary exchange rate, with no hidden fees, and ensures that the recipient receives the agreed amount.
Blockchain technology also has significant advantages in internet security management and authentication, frequently used in social networks, identity verification, educational credential verification, etc. In this section, we will start from a more specific aspect—identity cards. What kind of chemical reaction occurs when blockchain meets identity cards? If there were identity cards in the blockchain world, what would they look like? Now, let's explore a magical term—"Distributed Smart Identity Authentication System," which is the "identity card" of the blockchain world. Identity cards are magical things; they are usually inconspicuous, but without them, one cannot move an inch. An identity card is a document used to prove the identity of the holder; we use it everywhere, such as when checking into a hotel or buying train tickets. Losing, forgetting, or having it stolen can be a disaster. If you are still worried about the various issues caused by identity cards, then the smart identity authentication system based on blockchain technology may help you eliminate your troubles. Your blockchain identity card will display your passport photo, online avatar, and a non-modifiable key creation date and key identifier below your name. This identity card will also include a signature area, a unique QR code, a transaction number, and a hash algorithm proof.
Below are the steps to create and use a blockchain identity card, generally divided into three steps:
- Choose a unique name
This way, others can find your blockchain ID. As long as you keep your password safe, no one can take your name away.
- Create and confirm your personal profile
Connect your blockchain identity card with your social network profile to prove that this is your blockchain identity card and confirm your personal information.
- Start using your blockchain identity card
Your blockchain identity card is shared on your webpage, social network profile, and business cards, making it easy for people to find you online. The blockchain identity card has two advantages: it securely and conveniently solves the problem of information loss; it will never be lost and will never be tampered with.
The "Appreciation" expects to standardize the exercise and tracing of all work rights through smart contracts while introducing copyright service providers for transactions during the creation process. This can be called a one-stop copyright service of blockchain, from source to product, once rights are confirmed, they cannot be modified. We can imagine that if blockchain copyright proof is widely promoted, those plagiarists would not be as rampant as they are today. Using blockchain technology to solve copyright maintenance issues seems like a beautiful thing, but in reality, it faces three major challenges:
-
The commercialization and popularization of blockchain technology, just like the currently popular VR (virtual reality), although the concept is well-known, the penetration rate is still very low.
References#
-
Australian Startup Cyph MD uses Blockchain Technology For Data Sharing in Healthcare [EB/OL]. (2016–08–09) [2017–05–18].http://www.the-blockchain.com/2016/08/09/australian-startup-cyph-md-uses-blockchain-technology-datasharing-healthcare/.
-
Babyghost and VeChain: Fashion on the Blockchain [EB/OL]. (2016–10–18) [2017–05–18].https://bitcoinmagazine.com/articles/babyghost-and-vechain-fashionon-the-blockchain-1476807653/.
-
Blockchain Going for a Song: New Tech Tunes Up Music Industry [EB/OL]. (2016–05–22) [2017–05–18].https://cointelegraph.com/news/blockchain-going-for-asong-new-tech-tunes-up-music-industry.
-
Filament Nets $5 Million for Blockchain-Based Internet of Things Hardware [EB/OL]. (2015–08–18) [2017–05–18].http://www.coindesk.com/filamentnets-5-million-for-blockchain-based-internet-of-things-hardware/.
-
IBM Reveals Proof of Concept for Blockchain-Powered Internet of Things [EB/OL]. (2015–01–17) [2017–05–18].http://www.coindesk.com/ibm-revealsproof-concept-blockchain-powered-internet-things/.
-
[1] History of Blockchain Technology Evolution [EB/OL]. (2016–04–25) [2017–05–18].http://tech.hexun.com/2016–04–25/183507891.html.
-
[2] Distributed Consistency Algorithm—Paxos [EB/OL]. (2016–06–27) [2017–05–18].http://www.cnblogs.com/cchust/p/5617989.html.
-
[3] The Technology Behind the BTC Electronic Currency System [EB/OL]. (2013–12–20) [2017–05–18].http://it.dataguru.cn/article-3986-1.html.
-
[4] The Five-Year Journey of Bitcoin (Full Text Updated) [EB/OL]. (2016–08–13) [2014–01–08].http://8btc.com/thread-2603-1-1.html.
-
[5] Protocol Vulnerability Produces 184 Billion Bitcoins [EB/OL]. (2010–08–15) [2017–05–18].http://www.8btc.com/184-billion-bitcoins.
-
[6] Bitcoin: The "Mining" World of the Digital Age [EB/OL]. (2017–03–03) [2017–05–18].http://www.fx361.com/page/2017/0303/922619.shtml.
-
[7] BitPay Launches Bitcoin E-Wallet [EB/OL]. (2011–06–29) [2017–05–18].http://www.8btc.com/bitpay-launches-e-wallet.
-
[8] Bitcoin Sales Terminal (POS) Successfully Developed [EB/OL]. (2011–11–10) [2017–05–18].http://www.8btc.com/bitcoin-pos.
-
[9] FBI Receives Bitcoin from Silk Road, Becomes New Billionaire [EB/OL]. (2013–10–25) [2017–05–18].http://www.8btc.com/fbi-ross-ulbricht-2.