ChainBLX collects your personal information only to the extent necessary to fulfil a precise purpose related to our tasks as an opinion based self-accreditation entity.
We do not reuse the information for another purpose that is different to the one stated;
We put in place measures to guarantee that your data is kept up-to-date and processed securely;
Under certain conditions outlined in law, we may disclose your information to third parties, (such as the European Anti-Fraud Office, the Court of Auditors, or law enforcement authorities) if it is necessary and proportionate for lawful, specific purposes;
We will never divulge your personal data for direct marketing purposes;
You have the right to access your personal information, and you can correct it any time.
We do not keep your personal information for longer than necessary for the purposes for which we collected it.
However, we may keep your information for a longer period for historical, statistical or scientific purposes or for the opinion based self-accreditation with the appropriate safeguards in place.
Cookies are short text files stored on a user’s device (such as a computer, tablet or phone) by a website.
Cookies are used for the technical functioning of a website or for gathering statistics.
Cookies are also typically used to provide a more personalized experience for a user for example, when an online service remembers your user profile without you having to login.
When you visit our website, we may collect some data on your browsing experience such as your IP address, the ChainBLX page you visited, when you visited and the website page you were redirected from.
This information is used to gather aggregated and anonymous statistics with a view to improving our services and to enhance your user experience as well as for security and protection of our community.
When you visit the ChainBlx website, we will keep the browser history of your visit for a maximum of 13 months. This information will then be deleted.
Social Media
We use social media to present our work through widely used and contemporary channels.
Our use of social media is highlighted on this website.
For instance, you can watch ChainBLX videos, which we upload to our YouTube page and follow links from our website to Twitter and LinkedIn.
Cookies are not set by our display of social media buttons to connect to those services when our website pages are loaded on your computer (or other devices) or from components from those services embedded in our web pages.
Each social media channel has their own policy on the way they process your personal data when you access their sites. For example, if you choose to watch one of our videos on YouTube, you will be asked for explicit consent to accept YouTube cookies; if you look at our Twitter activity on Twitter, you will be asked for explicit consent to accept Twitter cookies; the same applies for LinkedIn.
If you have any concerns or questions about their use of your personal data, you should read their privacy policies carefully before using them.
Complaint handling by ChainBLX
What is the purpose of the processing?
To investigate complaints submitted to ChainBLX in line with Regulation (EC) No 45/2001 (OJ L 8/1, 12.01.2001, the Regulation). Complaints against Europol will be investigated in line with Regulation (EU) 2016/794. We will only use your personal data for the investigation of the complaint submitted.
Which kinds of personal data does the ChainBLX process?
We process the personal data submitted by complainants, and members. This will include names, contact details as well as the content of the allegations (insofar as the latter qualify as personal data).
What are my rights?
You are entitled to access the personal data ChainBLX holds about you and to have them rectified where necessary. In certain cases, you also have the right to have your data blocked or erased or to object to their processing. To exercise any of these rights, please contact us using our contact form. We will reply within three months.
Who can I contact?
contact@chainblx.com
Comments
News Article Summary
We were asked by members in the community to post this as another test case: https://www.reddit.com/r/CryptoCurrency/comments/aw3293/dont_be_fooled_by_this_alibabacoin_abbc_obviously/
Failed - This whitepaper/article will no longer accept further claims. Comments are still allowed.
Status: Bounty Hunter
Send Message
We received messages from our users to continue the conversation which occurred on Reddit. You can see it in the link below.
https://www.reddit.com/r/CryptoCurrency/comments/aw3293/dont_be_fooled_by_this_alibabacoin_abbc_obviously/
3057a3d9154f8d4ab16d0ca3be95d3f3Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551531619
Quote - most of the Crypto currenciesare still using manual management system,
Claim
The majority of cryptocurrencies have the same level of automation as Alibaba coin is looking to implement. This is a false statement intended to increase the appearance of Alibaba coin as a superior product over current market leaders. 59ba324ba080eda4a8148ebbed98ce2fStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1551532363
Quote - There is no known way to find B satisfying other than iterating through all possible variables in the block header repeatedly. The higher the value of D, the more iterations are needed to find a validblock; the expected number of operations is exactly D. The time period T(r) for a miner with hardware capable of performing r operations per second to find a valid block is distributed exponentially with the rate r/D
Claim
The entire POW section is plagiarised.https://courses.cs.ut.ee/MTAT.07.022/2018_fall/uploads/Main/behzad-report-f18-19.pdf
d7863104242f2188a5e2724d2576b606
Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551532490
Quote - Perl includes a number of popular UNIX facilities such as sed, awk, and tr. It can be compiled just before execution into either C code or cross-platform bytecode. When compiled, a Perl program is almost as fast as a fully precompiled C language program. A plug-in can be installed for some servers, such as Apache, so that Perl is loaded permanently in memory, thus reducing compile time and resulting in faster execution of CGI Perl scripts
Claim
Perl section is plagiarisedhttps://whatis.techtarget.com/definition/Perld9a4b1040a34de5dfad1d7f6a421e044
Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551532589
Quote - n proof of stake algorithms, inequality is modified to depend on the user’s ownership of the particular Proof-of-Stack protocol cryptocurrency and not on block properties. Consider a user with address A and balance bal(A). A commonly used proof of stake algorithm uses a condition as hash(hash(Bprev), A, t) ⩽bal(A)M/D,
Claim
The POS section is plagiarisedhttps://bitfury.com/content/downloads/pos-vs-pow-1.0.2.pdf
716ef104b73500d973637c05e07368d0
Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551532746
Quote - n one sense online web wallet providers are creating their own ecosystem –they are vertically integrated sometimes and offer both trading and storage options –such as Coinbase. This raises the issue of anonymity as wallet holders and exchanges generally are being pushed to hold documentation about users to combat AML and KYC financial regulations –especially in America.
Claim
PC Web-Wallet section is plagiarisedhttps://www.cryptocompare.com/wallets/guides/what-is-a-bitcoin-web-wallet/80680734cfdcadaeff268574f3c475f5
Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551533533
Quote - What Are We Going To Do With the ICO Funds?System Maintenance:We will be operating several platforms to provide services such as the facial recognition, shopping, pc and mobile apps, and crypto exchange. Personnel funding, building contracts, server fees, and related taxation will be issues to be dealt with the assets gathered by the upcoming ICO.New Technology Development:Our HD multi-crypto walletwill be provided and distributed in various platforms around the world. For stable service providence, it will need a stronger server and a larger base for safe and secure transactions. The funds will be used to provide these massive maintenance expenditures.
Claim
no details have been provided on how much will be spent on each area of development. 641f19cd8ac045bae3dfcb684d97a870Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551535736
Quote - The manual handling ofthecryptocurrency system has always been a difficult task and less secure,so the sub-objective is to identify the requirement and design the Digital currency system that will resolve the above problem of manual system, by designing and implementing the proposed system successfully and securely.
Claim
According to my personal opinion Alibaba.coin is trying to show that it can identify and design digital currency system which will replace manual system.According to my observation,this statement is false.Alibaba.coin is trying to showing that it can come up with superior features for storage of cryptocurrency.211bb31ea9077a8a21b46d57992ffe5cStatus: Bounty Hunter
Send Message
So far for fake news the controversial graph in reddit is not part of the white paper.
02a0730f8e7774455fa2a2c1933ecd2eStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1551599504
Quote - here is a large number of cryptocurrencies using the Scrypt PoW algorithm as well as, probably due to legacy reasons, another large number of cryptocurrencies is still using the SHA-256 PoW algorithm.
Claim
According to my personal opinion,it is a number of cryptocurrencies which uses scrypt PoW algorithm.In addittion, it is also a number of cryptocurrencies using SHA-256 PoW algorithm.Each cryptocurrencies, determines which algorithm to use.Therefore, according to my personal opinion, the above statement is misleading.ae7e858d8a402ff16603d6e607e24100Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551712337
Quote - The Crypto - Currency market is growing at an enormous rate, and many governmental organizations are fearing that they might overtake the fiat currencies in no time.
Claim
This type of statement must be supported by some type of data, study, or at least a news report.f485aa26213861f2595f163f35c8a2feStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1551714384
Quote - Bitcoin is an electronic analog of cash in the online world. It is decentralized: there is no central authority responsible for the issuance of Bitcoins and there is no need to involve a trusted third party when making online tra nsfers. However, this flexibility comes at a price: the entire history of Bitcoin transactions is publicly available which makes it vulnerable to de - anonymization attacks.
Claim
This statement is plagiarized from page 221 of the book: "Security and Privacy in social networks." On page 221, under the section "6 Conclusions". This section starts virtually word-for-word in lines 5 through 9 of the paragraph. Here is a link to the page on Google books: https://goo.gl/tR9AM562896df8ec0528716f6a49e4ca844575Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551714795
Quote - “blockchainâ€, ensures that everyone agrees on the transaction record. It also ensures that nobody can tamper with bl ocks in the chain since re - mining all the following blocks would be computationally infeasible. As long as nobody has more than half of the computational resources, mining remains competitive and nobody can control the blockchain.
Claim
This statement is plagiarized from: http://www.righto.com/2014/02/bitcoin-mining-hard-way-algorithms.htmlFrom the 4th paragraph under the section "The purpose of mining"
d86797dfb2b224f8d0a85607c197d6ac
Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551716380
Quote - The system cannot be hacked for the reason that it has deep and complex security platform used
Claim
Claiming that the system cannot be hacked (because it has a complex security platform) is absurd. No system has been proven unhackable. Furthermore, the security features described are very basic and do not represent anything novel enough to be characterized as unhackable.acd7f3de7f664d712cc26b2b624d4a6a
Status: Member
Send Message
It was decided to release 5% of the funds. The jury voted in their opinion to release an average of 5% of the bounty and a median of 7% of the bounty.
Please see below for the opinion of the jury:
Claim: The majority of cryptocurrencies have the same level of automation as Alibaba coin is looking to implement. This is a false statement intended to increase the appearance of Alibaba coin as a superior product over current market leaders.
Highlight: most of the Crypto currenciesare still using manual management system,
fd207ef020c2bedbb07b0f82672afe24Status: Member
Send Message
It was decided to release 7% of the funds. The jury voted in their opinion to release an average of 16% of the bounty and a median of 7% of the bounty.
Please see below for the opinion of the jury:
Claim: The entire POW section is plagiarised. https://courses.cs.ut.ee/MTAT.07.022/2018_fall/uploads/Main/behzad-report-f18-19.pdf
Highlight: There is no known way to find B satisfying other than iterating through all possible variables in the block header repeatedly. The higher the value of D, the more iterations are needed to find a validblock; the expected number of operations is exactly D. The time period T(r) for a miner with hardware capable of performing r operations per second to find a valid block is distributed exponentially with the rate r/D
7f6eba45778654fc4000bff05350bfd8Status: Member
Send Message
It was decided to release 1% of the funds. The jury voted in their opinion to release an average of 2% of the bounty and a median of 1% of the bounty.
Please see below for the opinion of the jury:
Claim: Perl section is plagiarised https://whatis.techtarget.com/definition/Perl
Highlight: Perl includes a number of popular UNIX facilities such as sed, awk, and tr. It can be compiled just before execution into either C code or cross-platform bytecode. When compiled, a Perl program is almost as fast as a fully precompiled C language program. A plug-in can be installed for some servers, such as Apache, so that Perl is loaded permanently in memory, thus reducing compile time and resulting in faster execution of CGI Perl scripts
0a1784d855413d0217d9a707b643ec60Status: Member
Send Message
It was decided to release 6% of the funds. The jury voted in their opinion to release an average of 6% of the bounty and a median of 6% of the bounty.
Please see below for the opinion of the jury:
Claim: The POS section is plagiarised https://bitfury.com/content/downloads/pos-vs-pow-1.0.2.pdf
Highlight: n proof of stake algorithms, inequality is modified to depend on the user’s ownership of the particular Proof-of-Stack protocol cryptocurrency and not on block properties. Consider a user with address A and balance bal(A). A commonly used proof of stake algorithm uses a condition as hash(hash(Bprev), A, t) ⩽bal(A)M/D,
9d387c1fc281d28e93b6b39e2c1ad166Status: Member
Send Message
It was decided to release 17% of the funds. The jury voted in their opinion to release an average of 17% of the bounty and a median of 20% of the bounty.
Please see below for the opinion of the jury:
Claim: no details have been provided on how much will be spent on each area of development.
Highlight: What Are We Going To Do With the ICO Funds?System Maintenance:We will be operating several platforms to provide services such as the facial recognition, shopping, pc and mobile apps, and crypto exchange. Personnel funding, building contracts, server fees, and related taxation will be issues to be dealt with the assets gathered by the upcoming ICO.New Technology Development:Our HD multi-crypto walletwill be provided and distributed in various platforms around the world. For stable service providence, it will need a stronger server and a larger base for safe and secure transactions. The funds will be used to provide these massive maintenance expenditures.
3db0f754d0655426ec65748dea66fb8fStatus: Member
Send Message
It was decided to release 0% of the funds. The jury voted in their opinion to release an average of 0% of the bounty and a median of 0% of the bounty.
Please see below for the opinion of the jury:
Claim: According to my personal opinion Alibaba.coin is trying to show that it can identify and design digital currency system which will replace manual system.According to my observation,this statement is false.Alibaba.coin is trying to showing that it can come up with superior features for storage of cryptocurrency.
Highlight: The manual handling ofthecryptocurrency system has always been a difficult task and less secure,so the sub-objective is to identify the requirement and design the Digital currency system that will resolve the above problem of manual system, by designing and implementing the proposed system successfully and securely.
6cade3fcbf65353d46801a17df1c37adStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1551796963
Quote - Special attention has been placed on enhancing the technology required to sell Alibabacoin. At present, you could select a particular item of a coin and put it on any crypto currency in our crypto coin fitting room and see how it would look on a trading or investment time. T
Claim
The accuracy is so precise that most people don't even realize they're looking at real money in virtual form.According to my personal observation,this statement will make clients doubt the Alibaba.coin system.Clients needs to have confidence in this system.9a9d8b8b3e1073fe1a14f0893209aac9Status: Bounty Hunter
Send Message
Hi
da030ee907fdd1eb5067c0e20d8aec88Find attached claims, on strategy, errors, sourcing and other limitations.
Status: Bounty Hunter
Send Message
@HARISIO185 I don't see attachment could you pls put it in the post as its not showing. @admin pls fix why its not showing
e7c90d6cdcf90e06bdb696a69c173e0bStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1551845472
Quote - •Security issues.•Frudentlants.•Sacmes.The manual handling ofthecryptocurrency system has always been a difficult task and less secure,so the sub-objective is to identify the requirement and design the Digital currency system that will resolve the above problem of manual system, by designing and implementing the proposed system successfully and securely.
Claim
Misspelled words Frudentlants - Sacmes3fb693295dec527ba555f91479163fa6Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1551847649
Quote - Overview Following the Token Sale, the current system will be fully decentralized and will assume the following architecture.As opposed to other projects, the future ALIBABACOIN architecture is not just a solution relying on Ethereum for smart contracts and implementing core functionality; it’s a powerful development RequirementAnalysisDesigning TestingDocumentationImplementation
Claim
This project will not be "Fully Decentralized" they have the main group looking after day to day transactions and can have access to private information31cbb9adb60dbf83b5325d85fe38e470Status: Member
Send Message
It was decided to release 0% of the funds. The jury voted in their opinion to release an average of 0% of the bounty and a median of 0% of the bounty.
Please see below for the opinion of the jury:
Claim: According to my personal opinion,it is a number of cryptocurrencies which uses scrypt PoW algorithm.In addittion, it is also a number of cryptocurrencies using SHA-256 PoW algorithm.Each cryptocurrencies, determines which algorithm to use.Therefore, according to my personal opinion, the above statement is misleading.
Highlight: here is a large number of cryptocurrencies using the Scrypt PoW algorithm as well as, probably due to legacy reasons, another large number of cryptocurrencies is still using the SHA-256 PoW algorithm.
0c91f96fa9b5060115efe6bd722dcdf4Status: Member
Send Message
It was decided to release 9% of the funds. The jury voted in their opinion to release an average of 27% of the bounty and a median of 9% of the bounty.
Please see below for the opinion of the jury:
Claim: This statement is plagiarized from page 221 of the book: "Security and Privacy in social networks." On page 221, under the section "6 Conclusions". This section starts virtually word-for-word in lines 5 through 9 of the paragraph. Here is a link to the page on Google books: https://goo.gl/tR9AM5
Highlight: Bitcoin is an electronic analog of cash in the online world. It is decentralized: there is no central authority responsible for the issuance of Bitcoins and there is no need to involve a trusted third party when making online tra nsfers. However, this flexibility comes at a price: the entire history of Bitcoin transactions is publicly available which makes it vulnerable to de - anonymization attacks.
42102f6f2464c7f21492ad833eff3010Status: Member
Send Message
It was decided to release 0% of the funds. The jury voted in their opinion to release an average of 0% of the bounty and a median of 0% of the bounty.
Please see below for the opinion of the jury:
Claim: This type of statement must be supported by some type of data, study, or at least a news report.
Highlight: The Crypto - Currency market is growing at an enormous rate, and many governmental organizations are fearing that they might overtake the fiat currencies in no time.
b4b5993f571b3a68460b7a3cd7060e95Status: Member
Send Message
It was decided to release 8% of the funds. The jury voted in their opinion to release an average of 8% of the bounty and a median of 9% of the bounty.
Please see below for the opinion of the jury:
Claim: This statement is plagiarized from: http://www.righto.com/2014/02/bitcoin-mining-hard-way-algorithms.html From the 4th paragraph under the section "The purpose of mining"
Highlight: “blockchain”, ensures that everyone agrees on the transaction record. It also ensures that nobody can tamper with bl ocks in the chain since re - mining all the following blocks would be computationally infeasible. As long as nobody has more than half of the computational resources, mining remains competitive and nobody can control the blockchain.
9364e228eaf6250a92648899a9153182Status: Member
Send Message
It was decided to release 37% of the funds. The jury voted in their opinion to release an average of 37% of the bounty and a median of 40% of the bounty.
Please see below for the opinion of the jury:
Claim: Claiming that the system cannot be hacked (because it has a complex security platform) is absurd. No system has been proven unhackable. Furthermore, the security features described are very basic and do not represent anything novel enough to be characterized as unhackable.
Highlight: The system cannot be hacked for the reason that it has deep and complex security platform used
6ce4f9d0c946795071a0cac86d63cee8Status: Bounty Hunter
Send Message
Automatic Claim Number - cla1552132161
Quote - ABBC Foundation will be able to multiply and improve all of the existing technology in our world today
Claim
They claim that their tech "WILL be able to multilply and improve ALL of the existing technology in our WORLD". This is completely absurd, impossible, and not a reasonable claim by any measure. By using the word "will" they are saying that it is for sure. By saying, "all" they are claiming that every type of technology, every piece of hardware and/or software, on the planet will be multiplied and improved by their tech.0e9c245240f78c94e5fa8dfc313822aeStatus: Bounty Hunter
Send Message
Automatic Claim Number - cla1552403769
Quote - AliBabaCoin is an open - source platform to develop the digital crypto currency market spaces and objects of any purpose, as well as their quick launch and integration into a unique ecosystem.
Claim
The name AliBabaCoin misleads investors into believing that the coin is associated with Alibaba Group of China. This is certainly intentional, as the Alibaba Group is one of the most recognizable brands in e-commerce (a closely-related sector to cryptocurrency). In fact, a court has just ordered AliBabaCoin to stop using the name Alibaba. Please see this article about the court injunction: https://cointelegraph.com/news/crypto-startup-behind-alibabacoin-agrees-to-stop-using-alibaba-name-after-legal-action0c75ce961ef59d06ba9345b9f004942eStatus: Member
Send Message
It was decided to release 66% of the funds. The jury voted in their opinion to release an average of 66% of the bounty and a median of 90% of the bounty.
Please see below for the opinion of the jury:
Claim: The name AliBabaCoin misleads investors into believing that the coin is associated with Alibaba Group of China. This is certainly intentional, as the Alibaba Group is one of the most recognizable brands in e-commerce (a closely-related sector to cryptocurrency). In fact, a court has just ordered AliBabaCoin to stop using the name Alibaba. Please see this article about the court injunction: https://cointelegraph.com/news/crypto-startup-behind-alibabacoin-agrees-to-stop-using-alibaba-name-after-legal-action
Highlight: AliBabaCoin is an open - source platform to develop the digital crypto currency market spaces and objects of any purpose, as well as their quick launch and integration into a unique ecosystem.
70faae7f48143aeb3fc4161adda0c90d