Would like to sell 230000 AEON. Preferably OTC as I don't really want to crash the price down to 0.000009.
Flexible on price but must be bought as one bulk purchase.
Message me all offers. I'll be around for a bit today.
Did anything happen with this? Did we see 230T move on the blockchain? I don't think any of the cryptonote chain explorers make it easy to answer that (they don't even display the number of coins moved in each block). Someone could write a program to do it of course.
|
|
|
Huge blocks of masternodes controlled by a few whales (hi Otoh!) and instaminers, Evan acknowledging full control over the voting system by insiders, masternode rewards going to enrich whales and insiders while ripping off people who try to use the coin for transactional purposes via inflation (assuming such people actually existed), etc. None of this is "true decentralization". ROFL #spamthread Have any new evidence to present? Found your "smoking gun"? If not, thanks for the thread bumps. You will not control the narrative about Dash through conjecture anymore, amigo. The huge blocks of masternodes controlled by a few whales (hi Otoh!) and instaminers, Evan acknowledging full control over the voting system by insiders, masternode rewards going to enrich whales and insiders while ripping off people who try to use the coin for transactional purposes via inflation (assuming such people actually existed), etc. are all highly relevant to discussion of this absurd "internet of money" premise being pushed by you and the other Dash pumpers. We agree it is important to discuss this issue, so everyone can rationally evaluate the premise, but we disagree on exactly how to best discuss it. Fair enough, that's what forum discussion threads are for. The forum would be fairly uninteresting if it were nothing but a bunch of shilling wouldn't it?
|
|
|
If you don't want 1/50K bruteforceability (i.e. you want strong end-to-end security) you have to turn off TouchID.
And then again my point remains, that open source or not, a long secure password is a PITA and Apple makes that option available. We agree on that narrow point. Now back on topic please...
|
|
|
Please explain how TouchID with a secure password is dependent on DRM?
Thank you for the link to Apple's support page. Here's what you were asking for: Every fingerprint is unique, so it is rare that even a small section of two separate fingerprints are alike enough to register as a match for Touch ID. The probability of this happening is 1 in 50,000 for one enrolled finger. 1/50K is small enough to brute force if DRM didn't prevent it. Some of DRM may be implemented in hardware on newer phones though. If you don't want 1/50K bruteforceability (i.e. you want strong end-to-end security) you have to turn off TouchID.
|
|
|
Why would a phone reset lose my fingerprint hash Ask apple. Are you saying that is a fact? Any citation on that? See edit above
|
|
|
Huge blocks of masternodes controlled by a few whales (hi Otoh!) and instaminers, Evan acknowledging full control over the voting system by insiders, masternode rewards going to enrich whales and insiders while ripping off people who try to use the coin for transactional purposes via inflation (assuming such people actually existed), etc. None of this is "true decentralization". ROFL #spamthread
|
|
|
...
But wouldn't the TouchID be creating a secure password that only the user knows (by hashing the fingerprint data)?
I am thinking Apple recommends the 6 digit only because they know most users can't remember a long secure password. That is why Apple created TouchID.
Thus I am sorry, but I think you are incorrect on this issue.
I do think Apple uses a separate password to control which s/w you can install, which I detest, but that is an orthogonal issue.
TouchID. has already been long since being cracked. https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid I mean seriously someone's phone is not going to have their fingerprints on it? Giving people a false sense of security in order to sell security theater is detestable. But that is because the user didn't wipe their fingerprint off the phone. That doesn't prove that TouchID has an insecure DRM. Precisely what sort of access would you recommend for a mobile device? Uses will not memorize a secure password. A separate key they carry on their keychain? P.S. this is important to me because my former colleague and boss if a top researcher at Apple. And I have his ear. So I don't want to present an argument to him that is flawed. TouchID is, at present, a convenience feature that allows fast unlocking functions instead of typing in a passcode. It is never required and the passcode is always required. Thus it can't possibly add any additional security beyond what the passphrase already provides. What they have planned for the future I have no idea. But if you can access with TouchID, then you can justify typing a secure passcode if you want one because you won't lose access if you forget your passcode (or only have it written down at an inconvenient location). If you are traveling away from the inconvenient location, and your phone resets for whatever reason (including an OS bug/crash, dead battery, etc.), you will lose access to it. Also some other operations you might want to perform such as upgrades require that actual passcode, not touchID. So this is, at present, impractical. Also, you will lose access entirely if you forget the strong password and don't even have it written down in an inconvenient location. I am asking for proof that doing that, will still rely on DRM which can be used to decode your private files. If you use a strong password, you wouldn't be following Apple's recommendations, which was what ArticMine's said earlier.
|
|
|
Respectfully, I'd ask the Monero supporters to either stay on topic and explain why the premise is nonsense as I have done in the past (I don't have an easy link to the post but I broke down the specific chronology and cited sources showing how the crippled miner only accounted for a few percent of the coins at most, with well-documented non-involvement of the coin team) or just ignore this obvious troll thread.
It is no more legitimate to respond to this thread with comments about Dash, charts of the Dash instamine, etc. than it is for Dash supporters to respond to criticism of their instamine scam with comments about Monero.
EDIT: nice chart comparing XMR and BTC over a longer term view. It looks like from 2020 or so, XMR and BTC will be very similar in terms of coin supply and inflation, until XMR passes BTC in supply around 2040 and maintains its slightly higher <1% inflation going forward long term.
|
|
|
...
But wouldn't the TouchID be creating a secure password that only the user knows (by hashing the fingerprint data)?
I am thinking Apple recommends the 6 digit only because they know most users can't remember a long secure password. That is why Apple created TouchID.
Thus I am sorry, but I think you are incorrect on this issue.
I do think Apple uses a separate password to control which s/w you can install, which I detest, but that is an orthogonal issue.
TouchID. has already been long since being cracked. https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid I mean seriously someone's phone is not going to have their fingerprints on it? Giving people a false sense of security in order to sell security theater is detestable. But that is because the user didn't wipe their fingerprint off the phone. That doesn't prove that TouchID has an insecure DRM. Precisely what sort of access would you recommend for a mobile device? Uses will not memorize a secure password. A separate key they carry on their keychain? P.S. this is important to me because my former colleague and boss if a top researcher at Apple. And I have his ear. So I don't want to present an argument to him that is flawed. TouchID is, at present, a convenience feature that allows fast unlocking functions instead of typing in a passcode. It is never required and the passcode is always required. Thus it can't possibly add any additional security beyond what the passphrase already provides. What they have planned for the future I have no idea.
|
|
|
That's one the most ignorant things I've ever read. The rules (if that's what you want to call them) are just standards to ensure that the cryptocurrency is antifragile enough to disrupt fiat and legacy banking. Dash fails at being decentralized, fails at privacy and fails at being fungible because the idiots who built it didn't and don't understand these standards and that they aren't required out of some petty authoritarian concept, but the only way a cryptosystem is strong enough to work for the people and not the government--some day you'll wake up and realize that you slowly built ripple 2.0, and I'll be there to tell you, "I told you so, dumbass."
Bitcoin fails at being decentralized. So what? There are 1000+ other coins. Even if Bitcoin implodes into a singularity of melted chinese ASICs tomorrow, that doesn't mean any other coin would succeed and if one did that it would be the grandaddy of all instamine scams, Dash, of all choices.
|
|
|
...
ArticMine thank you. I learned something new and important. Do you have any citation to backup your claim of Apple's recommend policy of using an insecure password and their DRM?
Tap Turn Passcode On. Enter a six-digit passcode. Or tap Passcode Options to switch to a four-digit numeric code, a custom numeric code, or a custom alphanumeric code. https://support.apple.com/en-ca/HT204060Edit: I stand corrected Apple's default is a 6 digit numeric number as the password also trivial to crack. This was changed fairly recently, and yes I agree it is still pretty trivial to crack. Interestingly there are some, err, "bugs" that will sometimes require you to set specifically a 4 digit passcode. You can change it later, but some people won't...
|
|
|
...
But wouldn't the TouchID be creating a secure password that only the user knows (by hashing the fingerprint data)?
I am thinking Apple recommends the 6 digit only because they know most users can't remember a long secure password. That is why Apple created TouchID.
Thus I am sorry, but I think you are incorrect on this issue.
I do think Apple uses a separate password to control which s/w you can install, which I detest, but that is an orthogonal issue.
TouchID. has already been long since being cracked. https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid I mean seriously someone's phone is not going to have their fingerprints on it? Giving people a false sense of security in order to sell security theater is detestable. Also, TouchID is only a secondary mechanism. When you power cycle an iOS device you always have to unlock it with he password first, only then can you use TouchID. Later, you can use the password instead (necessary if TouchID doesn't work, which apparently is not so uncommon). Finally, I don't think the phone in question had TouchID
|
|
|
Can you summarize or provide a timestamp link. It is within the first minute or so. He gets straight to it once he begins speaking. Okay, thanks. It wasn't clear you were specifically linking the beginning. I'll watch it.
|
|
|
The reason the FBI could get a third party to access the iPhone is because DRM, unlike real encryption such as what is used in Monero, is based on snake oil rather than sound mathematics.
Edit 2: The same or similar Apple DRM that the FBI broke, was used from 2009 to 2014 to censor Bitcoin and is currently used to censor Monero
Are you saying that Apple is lying when it says the user has the private keys and not Apple? Probably not lying, but these systems are complex, always under development to implement the complex, possibly conflicting, and often shifting demands of DRM, and therefore very unlikely to actually ever be very secure. Also, it is well known that intelligence agencies have infiltrated tech companies in the past and no reason to think this doesn't continue so there may well be back doors (facilitated by complexity in which they can hide) that "Apple" as an entity doesn't even know about even though someone working for Apple or an Apple vendor put it there.
|
|
|
Can you summarize or provide a timestamp link.
|
|
|
Personally I think GPU vs. botnet is going to become an irrelevant distinction as more and more botnet nodes will be sufficiently GPU-capable to mine effectively. TPTB posted link to a story like a year and a half ago about a large botnet that was made up of higher end gaming computers, but even lower end computers are showing rapid technological progress in terms of integrated GPU capabilities.
On a current AMD APU, you can effectively mine Monero on both the CPU and the GPU. I don't know if more GPU-focused algorithms like ethhash are effectively mineable there, but if not then clearly that is just a generation or two away.
Ultimately even ASICs will be captured by botnets if network security continues to suck and such ASICs are widespread enough. There have been a few attacks on ASIC mining already that involved redirecting the miners, but if ASICs did somehow become more widely dispersed in the future (as some suggest might happen if and when the chips become commoditized) this would explode.
As long as security is crap, botnets will infect everything.
But at the same time, they seem very self-limiting for specifically mining in practice for now. It is very unlikely there is anything close to the million+ botnet nodes it would take to mine most of Monero, so they are just a small-ish part of the network. If Monero continues to grow their share will probably continue to decrease.
|
|
|
More off topic back and forth deleted. Guys, get a room (and not this room).Its pure speculation! [wink] Smooth can clarify if he is speculating that I have a mental disease. Your dribble is irrelevant. Can't you see I asked him? Something wrong with your eyes?
|
|
|
Well if you are not hiding from the government and just want privacy, then we could just use a centralized mixer.
Maybe, Panama Papers seem relevant here, if you are relying on a third party to not disclose information then you may not be safe from future leaks of whatever source. Some of the Panama Papers cases involve divorce settlements, business partners, etc., for example, and nobody really believes that divorce lawyers have the NSA working for them. They too have the info now too, regardless. Same could be said for nosy neighbors. If you aren't very good at security, maybe you can't even trust yourself not to accidentally disclose in the future, but at least with Monero you can personally retire the wallet, securely delete the keys and not have to worry about that. I was not arguing for the superiority of centralized trust. But I framed my statement in the holistic context (scalability, what society will allow, etc), not pigeon-holed to this one consideration you are highlighting. I'm just adding another perspective. I don't disagree there are trade offs to be made.
|
|
|
That is a personal attack. Diagnoses implies there is a mental disease to diagnose. Are you sticking with that choice of word? It could be an incorrect diagnosis (and very likely unqualified anyway). I do not assume that anything anyone posts is correct (good advice to investors as well, BTW). It was certainly a personal attack as well, which is why it was deleted
|
|
|
|