 Hello, hello, hello, and hopefully you can see my screen. I just wanted to say, I just wanted to start with like a quick explainer of the project before moving on to the demo. So our project basically consists in like checkpointing the fight coin chain onto the Bitcoin blockchain. And the idea is like by doing so, we are going to leverage the security of proof of work. And basically it's going to be some added security for the falcon chain. So the way this checkpoint is going to work, we are going to use threshold signature. So the idea is like the file coin miners, they are going to perform like a threshold signature in order to sign the transaction that is going to end up in the big question. So this is leveraging the type of upgrade if you heard of it. So the it's a recent upgrade Bitcoin that allows for a special signature. So basically there are two components in this protocol. So the first one is the distributed key generation. So if we want the fight coin miners to do a threshold signature, first they need to compute an aggregate key. Right, that's going to be associated with this. So that's going to be the first one. And the idea is that whenever the fight coin miners set is going to change this, the new set of miners will need to recompute a new key. So basically for each set of miners in fight coin, we're going to have a new distributed key generation algorithm. And then the other part of the of the protocol is the site. So the idea is like, if we have, you know, one key PKI, and then we have like a new set of miners that have computed like they're going to be PKI plus one. The previous set of minor is going to send a transaction. So we're going to have a transaction in Bitcoin that's going to transfer all the amounts associated with PKI to PKI plus one and the idea is like next, the minor associated with aggregated key PKI plus one are going to be able to do the check. So in addition to transferring this amount, we are going to add some data here, CID, onto the Bitcoin blockchain. And the idea is that everyone can then like get the data that is associated with our transaction and use a file system for example, our PFS or fight coin, and then this like a checkpoint at CID is going to give back some information about the chain. So everyone basically can use the Bitcoin chain in order to retrieve all the information necessary to know that your fight coin chain is correct like hasn't been attacked. Okay, so now on to the deal. First here on my machine, I have, I have Bitcoin testnet that is already running. So basically this demo, it's going to be running on the testnet. So let me start. I am going to basically launch three notes. You're going to have Alice, Bob and Charles. And the idea is like Alice is going to be the one that is going to be mining fight coin blocks. We are using like a not the real fight coin network. We are using Utico, which is like a mocked, let's say a consensus protocol. So here Alice is basically the only one that is mining block and the other Bob, Bob and Charlie they are just like fetching fetching the block from her. So at the moment you see like the block are being created. So at the moment nothing is happening. So first what we are going to do in order to get started is that we are going to basically add power, like add miners to Utico. So as I said, this is only Alice mining. So it's just going to be like fake miners. So here what I say is like I send a transaction that said, oh, now we are just pretending that Bob and Charlie are also mine. And then what this has just triggered that you see here on my screen is the distributed key generation algorithm. So as I said before, when you have new miners, they need to do this distributed key generation, so that they have their key. So now that they have their aggregated key. Well, basically they can check. And what I've done here so here basically like you see this transaction, that is the one that being that is being sent on the, on the Bitcoin testnet. And here what I did is like every 15 block there is, there is a new, a new check point being created. So now let's do something else. Let's add a new node. So first I'm going to create a new node. So that's going to be Dominic. Okay, so Dominic now is basically syncing its file coin slash Utico chain. So now Dominic is. So now I'm going to do what I've done just before it just I'm going to basically add Dominic power to the chain. This is like mocked power. I'm going to pretend that Dominic is a minor, even though he's not. Okay, and here you see again that I had Dominic and so this has triggered a new distributed key generation protocol. So now the idea is like the next check point Dominic is going to be participating. So we need to wait because we, we first need the transaction that's going to go from the key of Alice Bob and Charlie to transfer the amount to the key of Alice Bob Charlie and Dominic. And basically, once this has happened, we see that now done is also doing the check point. Okay, let's just wait for one more thing. Then we'll stop and we're going to have a look at the, okay. So now let's have a look at the Bitcoin shape. Okay, so what I'm going to do is I'm going to go on the, on the Bitcoin like this net explorer that is just available online. I'm going to pass the last transaction and here basically we see like this is the last checkpoint that everyone has done we see here that it is unspits because I've just stopped the building. So now let's have a look at the transaction. So that's the input so basically that's the previous key. And here we see that here we have our aggregated key. And we have the second output that I have mentioned before, which is like the data the CI. So now what we are going to do is that we're going to take the CI again. And well, for the moment, I'm using a new year, but that's just for a demo purpose later on we will be using like something else. For example, IPFS or just like Bitcoin and here I'm going to pass the data that I just got from the Bitcoin transaction. And I see that here indeed the, the, the data is in my storage. So I can look at it. Okay. Okay, so now I can look at it. And basically what we see here is like the first line is the UDPo check point. So basically I can use this to verify that the chain that I have is the correct chain. And then this line, this is the ID, IDs of my miners. So Alice, Bob, Charlie, and them. So basically I can use like these IDs if I like a new cover that say, in order to connect to the right here so by connecting to them. I know that I have like the right people. Basically, like here you know I started from the, from the last checkpoint, but the thing that is nice is that you can, you know, like just here like follow the chain of transactions. So for example, you would go from, you know, the first key that you are aware of, and by just like following how the transaction has been spent, you can just see like where we are at. And basically have a new dating version of a file. So that's, that's mostly it for the demo. And I'm just on time. Perfect.