CREDITS - The new generation of chain chains in the financial industry

CREDITS is a blockchain platform with its own internal CREDITS (CS). It is a new and unique technical implementation of blockchain technology, smart contracts, and data protocol.
NEW GENERATION OF BLOCKCHAIN
SUPER HIGH SPEED - Blockchain with up to 1 000 000 transactions per second.
PROCESSING TIME - Average processing time is 3 second per transaction
VERY LOW PRICE - Very low transaction costs
Comparison of CREDITS platform
Popular platforms such as Ethernet are not suitable for financial transactions because the deal is very slow at 0.5-15 minutes, and the cost per transaction is around $ 0.02-0.5. The financial industry is unacceptable.
CREDITS - to create a new platform for operating financial products, in a unique way to build a chain with smart contracts / ledgers, can be achieved:
• Process transaction up to 1 million times
per second • Average processing time per transaction for 3 seconds
• Very cheap handling fee
BITCOIN / ETHEREUM
• About 100 transactions per second
• Average processing time is 0.5-15 minutes
• Cost per transaction becomes $ 0.02-0.5
CREDITS is designed to achieve one million transactions per second with an average processing time of 3 seconds and an average peak of 10 seconds.
The system is a distributed database with the principle of block chains / ledgers - the management and transactions of distributed digital assets, invariant records.
Distributed, decentralized storage and open source. Supporting public and private networks. By dealing with consensus transactions, each entry is inserted into a block / ledger database that does not have a Merkle tree and a side chain. The use of object-oriented principles based on C / C ++ languages - the ability to build other compilers. The permissions are set at the transaction level. The system can be expanded (as the number of nodes increases, the number of transactions processed per unit time increases). The transactions are added to the block to reach a later consensus. The consensus model: The combined mechanism makes the most nodes have the right to take decisions. Virtual machines (VMs) are used to perform smart contracts. Each contract runs in isolated, isolated environments to improve the security of the VM, enabling development in scripting languages (eg JavaScript), scheduled and planned. Proof-of-capacity proof-of-capacity + proof-of-capacity (PoC) . Coins are issued first with a certain amount.
Bitcoin - payment systems and currency units. Tasks can only be passed from one user to another. Slow chain block
same point: block public chain / ledger, internal currency encryption
difference CREDITS: Quick block of chains / ledgers, available intelligence contracts, financial wizards, support of different currencies
Ethereum - Emphasize the making of smart contracts and record them in chain blocks. Others through the use of third-party services to solve. For all industries. Slow chain block
same point: smart contract, internal currency encryption
differences CREDITS: Other fast chain block / book, different computing systems to support the currency, internal use, focusing on the financial sector
Ripple - only for billing and currency exchange systems. Developers and companies close
Similarities: Fast chain of blocks / books, billing systems of different currencies, specializing in finance
CREDITS difference: available intelligence contracts, an open platform developer, every company can be connected to the platform
New generation block chains
The CREDITS platform provides the implementation of a unique new block-chain technology, smart contracts, data protocols, and has its own internal encrypted currency.
It is a platform with new network technology capabilities, speed, transaction costs and total transactions per second. It is an open platform, meaning that users and companies can use block chain agreements to create online services.
We provide users of new products. We create new algorithms to create new features to find consensus; a new registry plan, an algorithm for handling and maintaining limited state machine transactions based on a joint voting nod model.
The CREDITS platform provides solutions for low speed and high transaction costs. It extends the application of potential block-chain technology in the financial and network industries.
Abstract
Full point-to-point layout is used for service delivery systems that enable financial services to be established directly among participants: money transfers, currency exchange and exchange rates, credits, funds and other services. In accordance with the principle of equality of system participants, all services do not require additional intermediaries. As a result, everyone will get cheaper, faster and better service.
The world develops directly against the direct interaction between people based on the principle of point-to-point equality. A revolution takes place! From the overthrow of the mass media can clearly see: until the 20th century, 90 years, newspapers, magazines and television were the main information providers. Currently, opinion leaders are blogs on YouTube channels and social networks, where money is publicly invested and ICO, and information is stored in a centralized cloud system.
The financial industry is probably one of the few industries left behind, which rejects the direct interaction between the introduction of the center and the participants. Although technically, creating a decentralized financial service is much easier than creating an unmanned vehicle.
Appropriate technical environment is required to build decentralized finance products and services based on distributed ledgers:
High execution speed (in seconds), and ability to handle large numbers of transactions (hundreds of thousands of seconds) at low cost (for micro and non-cash payment transactions). Establish a system that combines all participants and the nature of the required financial sorting service: personalized users, KYC, credit bureaus, clearing clearing centers of law, withdrawals and encrypted currency exchange.
This is the latest barrier to the development of point-to-point financial products from two main tasks.
We introduce you to the solution of these tasks, we are in the aid of CREDIT's financial system to achieve it.
CREDITS A single de-centric technology platform can combine all financial service participants with the principles of the ledger distributed safely and quickly perform all transactions. The principle of implementing smart contract and joint voting system creates a unique opportunity for all participants to interact with various financial products. The platform opens up huge new markets and has the potential to use block and financial block projects in the financial and other industries, which were previously unusable due to the speed and transaction costs.
1.Network ledger network classification book
Definition Definition
The system is a set of decentralized network nodes that perform processing, store transactions, execute and confirm intelligent contract requirements, handle requests from third party systems, and provide data information on demand. A network node is a computer that installs a complete network client, connected to a public system , validate transactions and write them down to the ledger. Secret book is a list of transactions that are confirmed and stored by the system on all network nodes. Transactions are system issues that represent the demand to perform smart contracting methods or any operations on the network and record the results in the block system. Smart contracts are system projects, computer protocols that facilitate, validate, or ensure compliance with transaction requirements. They usually have a user interface that often simulates the logic of the contractual relationship. The key feature of an intelligent contract is its centralization and independence from the center. The way smart contract is the program code, which is responsible for calculating the work of the term smart contract and recording it in a secret book. The parties are the highest network participants and system users.
Network node network node
We use several types of nodes, depending on the purpose of building a decentralized network based on free access and node connections:
Common node (ОУ) is a node that participates in transaction validation, but with the smallest trust factor. It is also a role candidate for a reliable node and is the current processing node in the selection of node roles in the next cycle of the network. The credentials (ДУ) are the nodes that participate in transaction verification, and have the maximum trust factor (1), that is the role candidate from the current processing node and common node. In calculating the number of mathematical calculations and polling cycles between nodes, nodes can not be trusted. The mathematical calculation depends on the number of nodes and the complexity of the network. The network's main conclusion (ГУ) is the node that participates in the verification and is responsible for adding transactions to the classification of transactions. In a mathematical calculation of the voting cycle, the node can not be a trusted node or current processing node, which depends on the number of nodes and the complexity of the network.
The system uses the trust factor - the absolute fraction value from 0 to 1, expressed as the total number of nodes in the network mathematically with the number of trusted nodes +1. The maximum number of trusted nodes must not exceed 50% of the network node.
The Last Saved Block Block saved last
The generalization ledger (CRB) of the block is the overall synchronization status of the ledger block in all system nodes. .
With block of content books, we refer to the unit for storing information, which contains the previous block list and the previous hash code associated with the ledger associated with the data block. When a block is received from another node, the block is placed on the same account as the block based on that number. This saves network bandwidth.
During synchronization, only block numbers are checked first. If the node is missing a block, the node is downloaded and stored.
As a result, the system contains a copy of the ledger at any time. We call it the last ledger (LR). After reaching consensus, the knot formed by the ledger is automatically created. Blocks are sent to all system nodes to keep the last account pool unification across all system nodes.
Each node is associated with all other nodes in the network and continues to exchange new blocks with its transactions to keep up-to-date information relevant at all times. All blocks form a set of transactions waiting to be added to the ledger. At the same time, each server generates a set of hypothetical candidate nodes and a set of proposed transactions for other servers. The decision is taken at check to determine whether the document is added to the ledger.
As a result, you can store the ledger data many times on multiple servers (system nodes) and protect all information. The more nodes in the system, the higher the reliability.
Sync node
Each new node is initiated and synced after defining the definition and verification of trust thoroughly. To improve the speed of information processing, all processes are handled at the same time, independent of each other. If no variables are entered, create an empty bookstore - leave space in RAM for easy access. If the required ledger is not available, the request is sent to the trusted node to receive all transactions created for the sync account.
If the input parameter is the object that characterizes the transaction, the search starts on all running sync threads. This operation generates a numeric code - a number number on a trusted node of the current thread or an error number with a value less than zero. If the thread method ends with a connection error, the thread will end completely.
Network Consensus
CREDIT conception is a group decision making. The goal is to develop a final solution that all network nodes can accept.
Comparison of Consensus
The definition of the principle of CREDIT ledger is used to compare different types of consensus:
- Availability of ledger (nodes can write data from the ledger at any time);
- Modifications to all participating network nodes;
- All system path consistency (all nodes view the same ledger version, can be updated after the change);
- barriers to separation (if the node becomes inoperable, this does not affect the overall operation of the ledger).
The concept of the main network node
All network nodes are decentralized and have no priority. It is necessary to specify the network nodes that will handle the transaction queues stored on different network nodes. After that, he must write the newly generated transaction block in the ledger.
The CREDITS platform uses its own combination protocol to improve transaction processing speed and ensure complete security for data storage, processing, and transport transactions. This protocol is based on calculating the mathematical functions of all ledger transactions, applying the working proof principle. It accurately determines the amount of storage (proof capacity) required for the latest version of the ledger and software update on the node by calculating the overall value of the check contents (hash code). The file size is also specified as a hash code proving that this is the latest copy and the last transaction recorded on the system.
In order to be the primary network node, the node looks for the value of the hash function calculated based on the last saved ledger. We build a healthy competitive environment between network nodes, create opportunities into key nodes, and generate and store new ledgers.
Once the function is calculated and the result is obtained, it is sent to all network nodes for verification. The result contains a calculated timestamp and the value is calculated based on the ledger file and software function. All nodes receive calculated values, compare calculated timing assigned to the primary web server, verify and confirm node trust factors, and confirm their chances of competing - into the main network node.
After receiving confirmation from all network nodes, a list is formed by a node that correctly calculates a function value and contains a timestamp. The node that receives the correct result and gets the confirmation in the fastest time becomes the current main network node.
The concept of SHA2 algorithm is used to calculate the hash of files and.
The hash function of the SHA2 series is based on the MerkleDamgard structure.
The initial message after join is divided into blocks, each block is divided into 16 words. The algorithm passes one circle each message block through 64 or 80 iterations (round). At each iteration, two words are converted, and the rest of the word determines the conversion function. The results of each block processing are summarized. And is the value of hash function. However, the internal state is initialized based on the result of previous block processing. Therefore, it is not possible to process the blocks independently and collect the results.
Network equipment node network equipment node
We work to build platforms with the fastest transaction processing characteristics, so we recommend using material incentives to keep network nodes in top condition: high performance server devices and high internet bandwidth.
As a matter of material compensation, the owner of the main network node will receive the CREDIT currency of several commissions for each transaction from which the ledger is processed. The rest (½) is intended for user support, up-to-date functionality and overall product development budget for new product development. Percentages can be changed, and also assigned to the system of level formation through a joint vote from the network node, at least three years after the initial currency problem.
Therefore, we encourage server owners to keep servers at the highest performance and maintain high-speed high-speed communication lines.
Building Consensus Building Consensus
So we have all the nodes selected by the main network node. The main task of the master node is to get transactions from the candidate countries, add them from all nodes to the ledger, process them, create the last relevant booklet, and send new ledgers to all the network nodes. The last relevant process of transactions and the process of compiling the last major book is to find a consensus solution. The final result of the last major book is a consensus solution.
The whole process can be divided into the following steps:
Find the main network node Establish a trusted node Receive a list of transactions and create a list of candidates to include in the ledger Process the candidate list, vote on the node (trust and common nodes have different weighting factors (trust factor) confirmed, unverified or unconfirmed from the list of candidates Create a list of confirmed transactions to be added to the ledger Add a transaction with a timestamp and hashcode containing transaction information to the ledger Send transactions to all network nodes When you receive them, registry of all nodes.
Build and Start a ledger
The whole process can be done in the following order:
The end user of the network system generates a transaction.When all conditions of the specified smart contract are met, the user initiates the action (transaction) using the method required by the call platform software.To follow the basic principles of chain block, the kernel of the validator tracks sync and invariant versions the latest ledger. When building consensus, all transactions received during the cycle are collected in the block. A number are assigned to the block, consisting of a time stamp and a node identifier that is converted to hash code, which is then placed in the consensus module. After editing the white list candidates, only the transaction hash code written to the ledger, but also the written block hash code, and the source code is always validated on it. This hash code is the signature of the block and is the signature of the block with the transaction information. After reaching the consensus by using the algorithm federation search, transa The ction added to the block is passed to the kernel of the validator to write to the ledger.
Transactions not included in the register do not include transactions in the registry
Transactions not included in the current trading list are marked as rejected. Information about this will be immediately displayed on the sender (originator) of the transaction.
Transactions not included in the ledger remain in the candidate group and are stored in the network node. All new transactions received by the server arrive there when consensus is reached and the search process continues. This continuous network loop operation allows transactions to be done in a relatively short time while maintaining high levels of reliability and relevance of information.
Transaction processing
Transaction
Transactions are the smallest unit of the system, notification platforms execute contract methods or direct transfers between accounts without making smart contracts, and then place the results on a point-to-point network.
Building Consensus Building Consensus
This system uses a model to build a common consensus - as to build a reliable verification node, and work together to build algorithms by a finite state automaton. Through the cycle (time step), each time step, the transaction is extracted and placed in the pool (one-dimensional array) for consensus. Once placed in the pool, all transactions will be sent to the trusted node to receive the response. If the response is received, the transaction that sent the request can be added to the classifier of the validator. After that, it is sent to the next validator on the network. When the transaction is fully confirmed the final legality of the chain to build consensus, the transaction is sent to the validator, and marked is written and stored in the ledger.
Transaction processing
To achieve a decentralized system, each server must have two general ledger repositories, as well as a complete transaction handler for all transactions.
The system uses the system's kernel concepts. Through the kernel, we refer to data processing procedures that perform certain production tasks, regardless of the availability and operation of other system components. Each kernel receives a series of variables to process when run. And always give the result of output - positive, there are others or error. Therefore, in addition to the main data set, the system kernel always contains the response code. This structure is required for the highest speed of each process, and must work independently of each other.
Entry Structure Ledger
In order to achieve the essential book performance, but at the same time without compromising security, we recommend the use of book databases, without having to build Merkle trees from hash codes and transaction processing results in blocks.
The Merkle Tree (TTH - Tiger Tree Hashing) is a hash function used to check the integrity of data used to obtain unique chain identifiers and to restore order. The data is divided into small sections - using the Tiger Leaf Hash hash separately from the block, and then calculate the internal Tiger hash value of each pair of hash values. If the hash is not paired, it will always be transmitted to the new chain. Next, calculate the internal Tiger Hash again in each pair of chains. Repeat this process until there is a hash.
When the ledger is operated using the Merkle tree, transaction processing speed is very low and the load of computing resources is very high. In our opinion, this is not a reasonable use of data storage.
CREDIT ledger Structure of CREDIT
We left the Merkle tree and used the transaction ledger in the CREDIT system; each entry consists of a hash code of the transaction block, which is added to the candidate list beside the ledger. Additionally, the entry has a knot identifier and a timestamp when it is created. The ledger entry contains the direction of the transaction, the start and end accounts, the type of cancellation, the number of cancellation units, the deposit type, and the deposit unit amount. This principle increases transaction processing speed, increases the complexity of illegal ledger changes, and eliminates the possibility of changes in the ledger entries.
Block size
The timing is based on the search period of the master node and trusted node, and the cycle time is calculated based on the complexity of the network. In each time unit, the network contains N transactions that are generated and moved from the end of the previous cycle to the network until the start of the next cycle to get the "Add to the Ledger Candidate" status. The transactions selected from the N network are placed on the block. Block size depends on the number of transactions in it.
Finding Transaction Participants Find transaction participants
The peer-to-peer CREDITS network can be described as a graphical user account in the form of a node and some possible transactions to connect two nodes (accounts) in the form of a directed edge. Since all sides have the beginning and end nodes, you can create digraphs at any time.
If we take the following conditions have been identified:
every transaction is always sender and receiver;
each vertex (account) can always connect to the vertex to the other side (transaction), and
each Graphics (account) Node has a number of targeted edges (both incoming and outgoing transactions).
In connection with the above, we can say that the chart contains the necessary routes to meet the required transaction requirements and to build a simple chain. Because it is a sequence of consecutive nodes, where each node (except the last one) is connected to the next node in sequence through the edge.
Data Transmission Channels
Each communication channel between the main network node and the common network node CREDITS is a separate thread (multi-threaded), and data is sent in encrypted form when the transaction is executed.
To ensure network security, all data between the authenticator nodes are transmitted in encrypted form, and any connections based on the network library node are low. If an error occurs in the data transfer, the thread should be automatically interrupted and the corresponding entry will be written to the logging system and then to the log file. The data is transmitted by representing the variable. The transmitted data is encrypted using a symmetric RC4 algorithm. Because the algorithm works under a public key, the key is transmitted when a connection is made between nodes and sent in encrypted form according to the DiffieHellman algorithm.
The RC4 algorithm, like any password, is built with a pseudo-random bit generator. The key is written to the input generator and the pseudo-random number is read at the output. The key length can be 40 to 2048 bits. The resulting bit has a uniform distribution.
The DiffieHellman algorithm allows both parties to use an unprotected channel to receive a public key, which is unaffected by changes to the communication channel. Accepted keys can be used to exchange messages using symmetric encryption. This algorithm is based on calculating the discrete logarithmic complexity. Where, as in many other algorithms with public keys, calculations are modeled to obtain large primes.
First, choose natural number A less than P in a special way. If we want to encrypt the value of X, then we count
Y = AX mod P1
With X it is easy to calculate y. The inverse problem of X from Y is complex. Index X is called discrete logarithm Y. Thus, by knowing the complexities of discrete logarithm counting, it is possible to publicly transmit the value of Y on any communication channel, since the initial value of X is almost impossible to select due to the large modulus P. The DiffieHellman algorithm used to generate keys based on this mathematical fact.
Each operation in the system is associated with a time stamp, previous block count, user login name, and smart contract ID. This lets you find duplicate items at the time of execution. If the invention is repeated, then we get the first transaction from the pool, the rest is considered illegal.
Action in System
Actions in the system are transactions that are marked by the simplest transfer of value from account to account or transfer of contract results to verifier to then look for solutions in the consensus search subsystem.
To prevent duplicate transactions in the same block with the same identifier, the system uses the protocol that the only real and true transaction is the first transaction sent to the validator subsystem for processing. A consensus can not be found because the transaction has been recorded in the validator system of the checking account and there is no residual value in the account. Therefore, the problem of double waste has been solved.
When the transaction is executed, the information is received to the validator and confirmed, information about the general ledger status changes are distributed automatically from the trusted list to all vertices, and the ledger is synchronized.
In order to always have the latest transaction class books in all valid node node nodes, you need to sync newly arrived transactions in each account class. To resolve this issue, you must use a separate synchronization port (if there is such an opportunity). Due to the allocation of loads in the port, this opportunity will increase the processing information speed of the validator kernel. Thread sync is always executed and looped. Priority allocates RAM and CPU load (using CPU cycles) is below average. The memory stores the last 1,000 operations and their account status (using sync algorithms in encrypted form), which increases response to requests from other validator nodes.
Adding Transactions for Validation to add transactions for verification
Adding transactions to ledgers is directly called from the verification subsystem in case consensus and whitelist is created and the transaction is stored in the ledger. Calls from third-party systems do not allow for increased security.
Incoming parameters - transaction features. Result ResultValue <0 - Run abort error, result value is possible error code / 0
Transaction Fees
The system uses CREDITS currency and can be used to:
as an internal payment method used by the system;
exchange different currencies
in system ; exchange values in the system;
making and processing business in accordance with smart contracts;
purchase from the system Three sources of information are used for services.
Transaction costs may vary depending on the network load of a particular system user, which could theoretically generate a large number of transactions at certain peak times. We recommend using material methods and their impact on system users to control network loads.
The transaction execution fee for the first three years of operation will be set separately for various types of transactions and operations. Going forward, we will develop an algorithm to generate transaction costs automatically.
Smart Contract
preliminary
Smart contracts in CREDITS systems are electronic algorithms that describe a set of conditions through which events and events can be attributed in the real world or digital systems.
To apply autonomous control over smart contracts, the need to completely eliminate the human factor of environmental concentration, and to make intelligent contractual transfer fees, you must be independent of the encrypted currency center institution.
Entity Entity
The smart contract in CREDIT consists of the following entities:
- Property (public variable) - The system entity stores the general data required for the contract work in the CREDIT system.
- The method is the CREDITS system entity, which is responsible for observing the logic and sequence of action in the contract.
CREDITS system participants sign smart contracts using methods to modify the contract properties to begin the process of validating compliance and coordination conditions.
Smart contracts come into effect after the parties sign it. To ensure that obligations are met automatically, there must be an environment in which contract terms are fully automated. This means that smart contracts can only exist in environments where unlimited access to executable code for smart contract items.
All contracts must have a clear mathematical description and implementation logic. Thus, the main principle of smart contracting is the complete automation and reliability of the contractual relationship between the parties.
Intelligent Contract Method
Smart Contract Methods CREDITS is a system entity that is responsible for observing the logic of conduct and order (contractual action) during a transaction.
The logic and sequence of actions is explained by the program code (module) that contains the command; sequential execution allows the desired results to be obtained. The code can handle system commands (eg, allocation commands), user commands (separate written functions), contract properties (static or dynamic initialisation variables can be created from contract methods), and only owners (third parties) other third-party contract methods. To be more popular, its development uses a scripting language (such as JavaScript).
The method (program code) allows the use of all widely used scripting language (command) (task, conditional and unconditional jump), function and procedure (subroutine), and connection to third-party libraries.
Virtual Execution Engine Virtual executable
CREDITS contract system in the virtual system environment (Virtual Machine, hereinafter referred to as virtual machine) in its implementation. When a method is called for a given contract, the VM allocates a memory area and contains a contract bytecode (or redefines when another contract method is invoked) that contains method variables and initialization. The VM begins bytecode processing, at run time, variables and codes are inserted into the storage area, and commands are executed in sequence, and the results are sent to the point-to-point network for subsequent storage to the ledger.
The proponent of the execution method is the system user, which is the beginning of this method.
Term Value
CREDITS The encrypted currency is also an indicator of the value of the contract unit used to compare two completely different units and reach a consensus when the parties implement or accept the contract. Instead of registering each individual value / gateway combination, the CREDITS encrypted currency acts as a bridge to implement the value transfer function. This is possible because there is a value that flows for the CREDITS currency, which means that any value can flow for any other value.
Conduct Smart Contract Conditions
The term contract in the CREDITS system is the value of the field requested to trigger (checked) the closing (completion) contract.
Completion of intelligent contract requirements is the process when the expected trigger field of the expected value matches checked. There are three possible ways to find solutions to meet contract requirements:
The value of contract transfer between two or more Parties. In this case, the performance of the contract comes from the recipient to the transferor to provide a considerable cost value. The value of the transactions between the parties to the contract sign an agreement, but must meet certain requirements (such as delivery of value to the recipient) in the case of payment. convert the value into another value placed in the system in the form of equivalent cost in the form of a CREDITS token. In this case, the platform starts searching for the shortest path to exchange other values through conversions in other contracts. Any contract fulfillment can be made through a transaction or multiple transactions, which will provide an opportunity to collect the value of the units required to complete the contract.
Data source
For the right and thoroughly mature job, check and provide additional information to create a more balanced and optimal solution for CREDITS using a third-party data provider. The need to introduce additional data sources in this system is due to a lack of disclosure of information about one or more parties (eg, to obtain the borrower's credit status to decide whether to issue credit).
To use a third-party information system, the platform may request an integrated bus to generate a presentation format data request for third-party systems (sites) for system participants through remote access and in the form of payments paid by CREDITS.
Requests are sent in encrypted form to ports and addresses provided by information systems other than standard information systems. The result of the request may be a response to a service that contains information required to make a decision, or an error code indicating that it is impossible to receive the desired response and possible steps to remove the error.
Cryptococcal CREDITS
After the system release release, a fixed amount of 1 billion CREDIT will be issued. They will be redeemed for a standard token issued by ERC20 at the beginning of the token. They will be redeemed at a flat rate: 1 standard token ERC20 = 1 unit of CREDIT currency.
FOR MORE INFORMATION PLEASE VISIT LINKS BELOW
Website: http://credits.com
White Paper: https://credits.com/Content/Docs/TechnicalWhitePaperCREDITSEng.pdf
Twitter: https://twitter.com/CreditsCom
Facebook: https://www.facebook.com/creditscom/
Telegram: https://t.me/creditscom

Author
BITCOINTALK: https://bitcointalk.org/index.php?action=profile;u=1509226
ETH WALLET: 0xE4CD89c1339FBC336Fd478270d4b304f8adF0Cb4
Komentar
Posting Komentar