Bitcoin Forum
June 07, 2024, 04:18:29 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 [257] 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 ... 444 »
5121  Other / Meta / Re: Welsh's merit source application on: June 26, 2018, 12:10:34 AM
I have been following Welsh's posts and although we may not agree on everything, I do see he's trying to get more involved.
Isn't that the beauty of this forum? Conflicting opinions which can result in one or multiple members furthering their knowledge. I've always been involved in one way or another with the forum.  I've always reported posts behind the scenes for an example.

One suggestion to improve SnR, and it also stands for many others too: Post less, increase quality of what you do post. Good quality posing posts are shitposts. When commenting complex things, you need to know what you're talking about. Lengthy comment, while maybe properly done itself, if done off the actual present discussion or without sufficient depth or knowledge of what have been discussed, decreases signal-to-noise ratio.

Most of the threads/discussions do not require that sort of stretching, though.

I guess Welsh would be OK as a merit source.
I'm not sure if you are referring to my posts or the ones quoted above. I'm going to assume you mean the ones quoted above as my posts are irrelevant to the application.

Regardless, some users are blessed with the ability to speak clearly, and concisely. I'm not one of those people, and have a tendency to waffle on a little bit. So I completely related to those who might do the same.

Although, that being said the length isn't really a factor. It's only ever a problem if someone is padding out their post for the sake of getting merit. I don't believe any of the posts above are doing this though. I would agree that you generally need to know what you are talking about, but that doesn't mean you need to be 100% correct in your post, and just because you make mistakes in your post doesn't mean that discredits what the rest of the post contains. Also, just because there's unnecessary comments within the thread doesn't discredit from their main points.
5122  Other / Meta / Re: [Guide] Reporting effectively on: June 25, 2018, 08:33:52 PM
Anyone know how many reports are needed to see the full report history? I have 273 reports (254 good, 3 bad, 16 unhandled) and don't have access. Given mdayonliner's report page, my guess is that it unlocks after 300 reports or 300 good reports.

I think I remember a user stating it opened up after 300 reports. I wasn't sure if this was 200 though, but I guess it must be 300 after all. Found the quote:

I had also missed the 'Your report history' link, but I've started to report spam from the Bitcoin Discussion topic 3 days ago (with nearly 0 report count that time). I haven't really paid attention for the number of the reports so close, so I can only guess that the magic number is somewhere around 300 reports, because today I'm over 300 and the 'Your report history' link has appeared. It's good to see which posts were reported in vain...

I would assume that this is total reports, and not just good reports. Once it appears though make sure to let us know so we can somewhat confirm it's around this figure.
5123  Other / Meta / Re: [Guide] Reporting effectively on: June 25, 2018, 07:28:04 PM
This is a very compressive guide on how to report, I have left you 5+ merit, this is useful for me since my mother language is Spanish now I have that kind of cheat sheet to make reports.

I don't have the exact list of my reports but I'll bring you a screenshot of my stats.


This isn't something I even thought about when making the thread. I'm glad it's helping you, and good job on the reports.

On a slightly unrelated note this hasn't been entirely proof read yet. Well, it has but, it's not to my standards quite yet. But, I invite anyone who wants to translate this to do so once it's been cleaned a little, and the final images have been added.

If you need any assistance with the guide or editing, let me know.
I tried to find a screenshot of my bad reports I remember I took some time ago but couldn't find any.
If I find something I'll post it here so you can use it as an example Wink
I've luckily got one bad report that I could use. (never thought I would be saying that) However, this will likely have to be included with a separate image if I'm going to use the full report history image.
5124  Other / Meta / Re: Welsh's merit source application on: June 25, 2018, 07:20:16 PM
Thanks for the overwhelming support guys I didn't expect this type of response. Much appreciated.

I often read about the flow of merit getting less, and I've only seen relatively new users "complain" about the fact that they don't have any sMerit to send. When I closed my merit source application, I still had plenty of sMerit left, and I've only recently decided to merit more posts (after I realized "good posts" deserve merit as well as "excellent posts", because the Merit system wasn't introduced to stop people with good posts from ranking up).
And here you are, running out of sMerit all the time! I've randomly checked 3 posts merited by you, and as expected from previous observations, they are good choices. I've merited one of them, and a few from your "10 posts" too.


While waiting (it took me 3.5 months), and since I have some sMerit left to give, feel free to PM me your list of worthy posts. I especially liked reading Carlton Banks' post, so reading your list may bring me to parts of the forum I don't usually read. No guarantees though, as I expect many long posts to read Tongue
I was originally going to release the list publicly, and I even started to format it for this (in fact about 20% is still formatted), however I decided against this because I knew that this would result in several replies with people listing their posts in an attempt get merit, and this isn't what I would want the thread to be centered towards. Therefore, if I was going to do this I would have to self moderate the thread. That's when I decided it would probably be better to just apply to become a merit source, and this is the reason why I hadn't applied sooner.  Instead, I looked to offload it onto merit sources, and contacted Jet Cash on what was best to do. Taking into consideration his input, and a few other members that I spoke to I opted to apply for merit source.

I'm not the type of person who sends people things in raw format. As you might of seen recently regarding the images for my report thread I'm very anal about detail, and hate sending people things that haven't been reviewed completely. In the meantime you can take a look at my merit summary as no doubt as I earn merit I'll be redistributing to some of the posts on my list.

I'll see how this application goes, and if I'm not accepted then I'll be contacting all the people I think are good merit distributors, and ask them whether they want my list, and I'll make a full review before sending it out. We all have varying standards, and I only want the good posts merited, and I find myself removing some of the posts on my list when it comes to reviewing them when I've  got merit to distribute.

Yeah good quality posts should be merited too, however with limited merit you tend to merit those who stand out above the rest. I do hope that if I'm accepted as a merit source I'll be able to merit more posts on the fly rather than picking, and choosing what I merit.

Carlton Banks is a great poster, and I quite regularly find his posts being under merited, and his posts are in my list multiple times.

You never threatened to "I'll put you on my ignore list" and other shit (as far as I know). Other than that, I think you have a good (technical) knowledge of bitcoin and blockchain. So +1 from me!
I think I  must have a high tolerance level or something as I currently have 0 people on my ignore list. Not bad considering I've been here 5 years now.

I'm SHOCKED that (1) you're not a merit source and (2) you had not applied until now. I'd be willing to forgive this dereliction of duty if you get approved with no less than 1000 monthly merits Grin

Seriously though - I think you'd make a great merit source and I hope theymos sees it that way too. Good luck!
I'm not sure what the criteria of being selected for a merit source was initially, but I'm hoping I've demonstrated via my merit history that I'm suitable. There was several reasons why I haven't applied sooner, but is mainly because with life outside Bitcointalk, gathering the posts, formatting, and releasing the reporting thread. I considered the reporting thread to be more worthwhile, and opted to pay attention to that a lot of the time over this. I'm also a very slow editor when it comes to these type of threads. This thread was started over a week ago, and I still found myself replacing some of the posts with newer ones. It was so hard picking the ones to list here. I think I'm happy with them I think Cheesy

5125  Other / Meta / Welsh's merit source application on: June 25, 2018, 11:13:27 AM
So, I've decided to throw my hat into the mixer, and hopefully be considered as a merit source. I seem to stumble upon posts which I think deserve merit quite often, and ever since the merit system was implemented, and I ran out of my initial merit points I've been keeping a list as I go along, and find quality posts. My idea was to come back to this list, and merit those on it. However, the list keeps on growing, and I find myself meriting current posts rather than those on the list. Only when I get high amounts of merit sent to me in a short period of time do I manage to revisit the list, and merit those that are on it. This isn't the only issue that I'm running into though. I'm currently facing the issue of rewarding only 1/2 maybe 3 merit points per individual post when quite frankly the quality of the post justifies more than that.

My personal merit policy is somewhere along the lines of these, however these are generalizations rather than strict guidelines, and I'm not currently able to follow some of these due to merit restrictions:

- Rank is irrelevant to me, and this isn't a factor on whether I send the merit or how much I send.
- I don't care if your English isn't perfect as long as there's a visible effort, and it's not completely broken.
- A post doesn't have to be 100% correct. Especially, when discussing technical aspects of a subject. If they've clearly made an effort in the post even if it's slightly misguided it doesn't effect my merit distribution. As long as the user isn't ignorant, and are willing to listen to others, and haven't posted complete garbage.
- If a question is particularly interesting, and sparks a interesting discussion off or the potential for a interesting discussion I might send merit to it. This usually means that the question has been thoroughly thought out, and maybe adding their own viewpoint to the question.  
- Generally, the absolute maximum I would send would be 5 merit, and this would have to be a top notch post. Possibly, more may be sent if a post blew me out of the water. This would be exceptionally rare though judging on observations from my merit summary, and posts I have in my text document.
- Post has to be unique, and add something new to the discussion.
- Anyone that provides a thought out example to further their point will likely receive 1 extra merit. I quite like when someone goes into the effort of making a practical example which demonstrates their point in action.
- When someone goes on to correct someone's mistake, and provides the explanation why they are incorrect instead of just saying "incorrect" will generally receive some merit off of me. Generally, this would be for more complex issues rather than subjective things like "this exchange is the best", however it's not limited to complex issues. For example, if someone has made a error in a calculation, and someone corrects that error then that would likely receive merit from me.

If you take a look at my merit summary you'll see as soon as I receive merit it's flying out the doors straight away or when I come online. I think I'm active enough within a few sections to merit those that deserve it, and I would hope that I tick the box of an established member. Also, I've decided to pick posts that I've already merited, but still feel are under merited. The posts quoted below aren't objectively the "best" ones, however for sure they are worthy posts of merit which I currently feel are under merited. (some more than others)
 
1. Re: Bitcoin Forks
Most of the answers in this thread should have been really helpfull for the OP, i didn't see many mistakes being made by other posters. I did, however, wanted to elaborate on this statement.
If, for example, bitcoin forked into replayattackbitcoin (a fork without replay protection) and you have 1 unspent output funding address 1MyoriGinalAddress before the fork, what could happen if you spent this unspent output on the replayattackbitcoin network?
1) You create a transaction using the unspent output to fund 1AddressGeneratedbyAseller
2) you broadcast the transaction on replayattackbitcoin's network
3) the attacker saves this transaction and broadcasts it on bitcoin's network
4) the transaction gets included into a block on both the original and the new network's blockchain

The end result is that address 1AddressGeneratedbyAseller will become funded on BOTH chains. The attacker cannot use your transaction funding 1AddressGeneratedbyAseller to fund a thirth address owned by the attacker.
In other words, the attacker has to convice you to fund his own address on chain A, then replay the transaction on chain B, otherwise he'll gain nothing from the attack (he can still perform the attack to annoy you, but he won't have any financial motivation to do so).

I actually made this diagram a long time ago (copyright: me). It shows a replay attack and a simple way to protect yourself from such an attack.



2.
Stakes (or stake changes) in any block affect decision process in forks containing that block only, not sibling forks.

A - B0 - C0 - D0
  \ B1 - C1

Assuming B0/C0/D0 is the "honest" fork and B1/C1 is an adversarial attempt to a long-range revision attack, any stake changes in B1 and C1 do not affect decision process on the fork B0/C0 etc. Stakes for the decision process are calculated just before each block for that specific fork. More details are in Section 3.3.1 of the paper.

Hi Shunsai,

In the following example, say I had a majority of stake at block A. Then at B0, C0 all the way up to head block H0, I sell off my majority of stake, understanding that there is an upper limit on stake transfer.

Code:
A - B0 - C0 - D0 - H0
  \ B1 - C1 - D1 - H1

Then, I create a double spend of my stake using the historical private keys, which I still own, thus sending it to myself in a fork continuing fork B1 - C1 - D1 that I create and approve myself (majority stakeholder).

This is not a 50% attack, because I don't own the value held in the private keys anymore, the cost for doing this is nothing.

Why doesn't the network just accept this fork as canon, given that its the same length (or longer if I chose) than the genuine fork?
  
Quote
In another scenario, some stakeholders may only approve their own blocks in an attempt to tilt the winning chances in their own favor. This is a real possibility. A possible mechanism to deter such an "attack" is to simply "blacklist" such stakeholders temporarily. An honest stakeholder can tell within a few blocks with certainty if another stakeholder is not approving his/her valid blocks.

My question is, what does the stakeholder have to gain by approving anyone's blocks but his own? If he has an edge by not doing this, there is a very real problem.


3. Re: Private Key missing 4 characters
In which case, I think the search space is something like (58chars*47positions)*(58chars*47pos)*(58chars*47pos)*(58chars*47pos)... (58*47)4 = 5.5220891*1013 possible combinations Undecided
---snip---
I think your calculation is a bit off. Also we can save computation power by narrowing down search space,
the first 2 chars always start with '5H', '5J', '5K', 51-2 = 49 positions and 49-4 = 45 characters known
if exact position of 4 lost characters are known = 58^4 = 11,316,496 iterations
if exact position is unknown = 58^4 * 4-combination
= (58^4) * ( 49! / 4! (49-4)! ) = (58^4) * (46*47*2*49)
= (58^4) * 211876 = 2,397,693,906,496 iterations = 2.39 * 1012
do I get this right?



I am pretty sure you made a small mistake there. You do ignore the order of the 4 missing words with your statement: ( 49! / 4! (49-4)! )
You do iterate through each position with your words, but you have to iterate within the words too.

This should be the correct calculation:



There are 58 choose 4 possible combinations to pick the 4 correct chars from the charspace (without considering the order).


Now consider the first two characters as already known. Only looking at the private key without the first two chars here:

To put the first unknown char into the correct place, you can choose between 1) before of each already existing char (45 possibilities) and 2) behind the last one (45+1).
For the second one you choose either before each char in your privkey (46 possibilities) or behind the last one (46+1)...

Overall there are 46 * 47 * 48 * 49 possible combinations to place the 4 chars into a private key with 45 known characters (ignoring the first two) into the right order. This assumes the already known characters are in a correct order already.


The total search space (for the private key without the first 2 chars) therefore is 46 * 47 * 48 * 49 * (58 choose 4) = 2.1574231*1012.
Multiplied with 4 (combinations the priv key can start with) = total amount of combinations = 8.6296925 * 1012


Considering the birthay paradox, there is a 50% chance to find the correct private key after 1/2 of this space.



Feel free to correct me if i have made a mistake!


4. Re: [2018-05-16] EU Adopts Rules to Reduce Anonymity for Crypto Users
There's an unfortunate endgame to the central bank paradigm.


In principle, once sovereign debt of any state becomes too high (as a % of GNP), the debt becomes unpayable (and it is convincingly argued that because the interest on sovereign bonds isn't created as part of the money supply in the same way that the principal is, that all national debts will end in default on some timescale). Argentina's creditors have recently attempted to use any means necessary (both legal judgements and force) to re-coop their losses, and they go after state assets. That means productive infrastructure that taxpayers supposedly own (lol).

And so the conclusion may well be that the central banking system is the most spectacular long-con ever conceived. When we consider that (for instance) those who instituted the US Federal Reserve provided zero capital for the institution in the first place, it can be argued that central banks represent a leveraged buy-out (where money is borrowed to buy up a company) of an entire country, on behalf of those who buy the bonds (often acquaintances of the central bankers).

It's spectacularly clever if designed that way. All the labour and resources needed to build all that infrastructure existed, the infrastructure itself wouldn't exist if not. The financial system basically lies: all this infrastructure wasn't affordable today, so we'll just throw the part that couldn't be afforded on the national debt. This is essentially a system that creates distortions in prices such that no public money ever gets spent on public infrastructure, it's always borrowed from the central banks, who literally have and provide nothing of value in return (except their debt tokens!). Then the phantom debt can be used to buy the entire state apparatus over the course of a few centuries. It's so clever that the general public sort of deserve to be treated like this, it's so sophisticated as a form of theft that there's not much point in trying to explain it to most people.

5. Re: Can you think of ways to use LN offline?
I remember someone like achow, nullius or theymos saying that right now, you need that both parties are online, otherwise it wouldn't work, which is a big fail and will never get anywhere when it comes to mainstream adoption, but then again, I heard that they are working in ways to mitigate this and avoid needing to have both parties online at the time of the payment which is just ridiculous, it will never catch up, people don't like that, they will most likely resort to third party stuff which will come with a decrease in privacy unfortunately. I wish there was a way to leave the transacion "on hold" until the other peer connected or something.
You're missing the point.
The Lightning Network is a layer on the bitcoin blockchain; it does not have the infrastructure that the underlying blockchain does.
In bitcoin, the recipient of a UTXO does not need to be online because there are other people doing that job: nodes.
Nodes track UTXOs and store unconfirmed transactions in their mempool.
The Lightning Network is just a layer, it does not have nodes.

Even though bitcoin transactions are technically peer-to-peer, the nodes act as facilitators to Every transaction and UTXO.
The Lightning Network, however, is strictly peer-to-peer.
Transactions between peers in a LN channel are just signed bitcoin transactions that aren't broadcast to the bitcoin blockchain, so they are sent DIRECTLY between themselves, without need for nodes or miners.

If Alice is sending bitcoins to Bob, Bob doesn't need to be online to track or receive the transaction because other nodes do the work because Alice's bitcoin node BROADCASTS the transaction to the other nodes in the blockchain.

If Alice and Bob are peers in a channel, and Alice sends some funds to Bob in form of a commitment transaction, it will fail because Alice is sending the transaction DIRECTLY to Bob's node, not broadcasting it, and if his node is not there to sign the transaction too, then it will fail.
There are no other nodes involved in the transaction so there is no mempool for transactions to reside till the other peer comes online.

Also, commitment transactions are multisig bitcoin transactions (2-of-2 multisig p2wsh transactions to be precise) have to be signed by BOTH parties so if Bob is not online then he can't sign the transaction. A third party, Charlie, can't act in lieu of Bob, because that would require them having Bob's private key.

To summarise the reasons why payments fail when a counterparty is offline are:
1) transactions require the signature of both parties, and obviously won't work with just one signature
2) the transactions are relayed directly p2p, and there are no other nodes that are involved to store transactions

6. Re: Strategies to prevent shit-posting
There are two overall, often conflicting, strengths in this forum that need to come to terms. On the one hand, there are those that vouch for a spam free forum, centered on Bitcoin discussion. On the other hand, we’ve got a set of Campaigns that are here for their own profit (but that are also a core asset to the Forum’s financial structure), using the Forum as a means to their objectives, but with little regards for the former annotated conflicting strength. This duality of focus, that coexists within a single closed space, leads to the current situation.

Campaigns seem to be here to stay, but that does not mean that the rules that apply to them cannot be tweaked in favour of overall content quality. Merit is an approach in this sense, but it focused on the labour side of Campaign, whilst no additional focus has been placed on the root of the problem, being that Campaigns and Campaign Managers themselves.
Self-awareness by forum elders that also manage campaigns is creating a ripple in the system, by tightening the rules to specific campaigns for those campaigns that they manage, but the main core of campaigns are still running wild and remain rather much exempt for responsibility over their recruits.

I agree therefore that the focus has to be placed there, and that is the reason for the OPs thread, as well as other interesting proposal we’ve seen recently such as this week’s thread by d5000 on the matter ( The core of Bitcointalk's spam problem ), knowing full well that this kind of thread will be buried soon on the nth page of Meta and probably lead nowhere in practice.

But we do have a right to a tantrum and hope to actually get somewhere eventually, so let’s add our two cents to the thread.

<…>
1) Allow forum moderators to penalize users by revoking signature display rights for a month for poor posting habits.
It sounds good, but adds the difficulty of management and an overhead of time to forum moderators which I suspect are not too empty handed right now. If such cases were sort of rare to manage, the overhead would be small, but as we often see, the amount of spammers grows with ease and one signature block on a low ranked account could easily be replaced by another low ranked alt account taking on from there.

Quote
2) Penalize bounty campaigns and ICO's that use bumping by shit-posting by displaying their thread permanently on page 10 or a special penalty page which reduces the size of their images and fonts.
A lot of bumping goes on in the Ann section, but so long as it affects the Ann section only, the spill on other Forum sections is not an issue, and delimits only to competing for prime space within the Ann thread. It is not a spam issue, but a “play by the rules of the book”concern as I see it. So long as the bumps are legit (i.e. not paid to bots or serviced accounts that deploy that kind of service), they seem to conform to the organic positioning within the Ann thread.
Bump cheaters could be forced as you say to have a kind of visibility punishment within the Ann Forum Section, but from a the spam point of view at least, what goes on there, if confined to the Ann section, is a lesser issue.

Quote
3) Provide preferential listing on page 1 for ICO's and Bounty campaigns that pay to be listed there. Rather than paying an army of shills they could be paying bitcointalk to be listed on the first (featured) page.
The price would have to be heavy though, since I guess that the idea would be that the first page be for paid positioning ICOs and from the second onwards for natural organic bumped ICOs.

I would rather prefer for them to compete for the space than to pay for it. We could bring Merit in to the equation here. For example, we could play with positioning based on three variables:
-   Accumulated pre-signature Merit of Campaign´s signatories (this could be gained Merit and not Airdropped Merit for the signatories instead).
-   Accumulated Merit of Campaign´s signatories during the actual campaign.
-   Natural bumps.

The algoritm would create a scoring based on those three variables, being the second and third more relevant. For example, whenever a signatory is merited, the score for the positioning would be incremented, and thus the ICO’s positioning thread within the Ann section. Gained merit would have more weight than a bump, and a longer time effect in the positioning algorithm.
The above would play on the lines of basing positioning both in terms of participation (natural organic bumping) and quality/interest based by the signatories posting capabilities. Good posters would draw more attention to their signature through their natural activity, whilst rising collaterally the ANN thread’s position. Crappy posters would benefit the Campaign on neither accounts.

7. Re: Proof-of-Approval: A Better Blockchain Consensus Protocol
Am I right that the goals of this protocol are primarily to reduce the finality time in comparison to Bitcoin as well as reduce the cost of running the system?

The image of how blocks are set up (https://cdn-images-1.medium.com/max/1000/1*fPsB4-t6J_1u1UpF37dYHw.png) reminds me strongly of the way blocks are chained in the "two-hop blockchain" (https://eprint.iacr.org/2016/716.pdf). I would like to see more in-depth comparisons to other consensus protocols, especially DPoS which seems particularly close in mechanism to Proof-of-Approval.

Your comparison table claims Proof-of-Approval is fully finalized after a single block,  however, you also talk about how there may be multiple top-level blocks where the "preferred" chain is unresolved. Doesn't this imply that your transaction being inside a valid block doesn't mean its been fully finalized? How do you reconcile that?

Since any node can produce a candidate block, this seems like it would potentially cause unbounded network traffic with everyone and their mother suggesting blocks to vote on. How is this resolved in the case of, say, an adversarial ddos attack? But I have the same question as monsterer2, why would anyone with stake approve the block of anyone without stake? In fact, why would anyone with stake approve *anyone* else's blocks? It seems there's no incentive to mine on top of someone else's blocks. This could manifest in more subtle attacks where you have stakeholders who refuse to mint on top of a competitor. It could also manifest in deadlock as nodes try to maximize their probability of winning the minted block.

I have a hard time seeing the purpose of having nodes pay attention to timestamps and comparing them to their receive-time. At its core, the mechanism is just voting, right? I don't see why the protocol doesn't just let nodes vote for whatever blocks they want. I see the appeal of a simple stake-voting process for block creation (similar to DPoS), but the Proof of Approval method seems like rational profit-seeking minters would make things devolve into the top 50% stakeholders passing around permission to mine the blocks, completely excluding the other 50%.

Also, could you provide a glossary of variables you use in this paper? Its hard for me to keep track of which variables mean what and find their definition in the prose when I need to refer to what they mean later.

@monsterer2 Are you suggesting that greater permissionlessness is desriable? Also, I've come to the conclusion that bootstrap poisoning can be entirely solved by blockchain checkpoints hardcoded into whatever software you use - since the software should be audited, and malicious software can make your client choose whatever chain it wants, hardcoded checkpoints don't reduce security in any meaningful way and yet completely remove the possibility of long range attacks including bootstrap poisoning.

Also @monsterer2 I would actually call your most recent proposed attack a 51% attack, since you *did* own a majority stake, and are using that fact to attack the network. I'd say its just an interesting twist on a 51% attack.

8.    
Re: Noncentral hypergeometric distribution biased by the power-law distribution?
For Dfinity, they give the probabilities in the paper for adversarial nodes at 33%, 25%, and 20% of the total nodes.

Correct.

I shouldn’t have posted this thread when I was so sleepy and looking at the screen cross-eyed. I try to push too hard which can be my undoing.

My concern turns out to not really be about the math, because it requires a political-economic assumption as to the maximum percentage of the stake that will collude. And I was incorrect to think we would need a noncentral hypergeometric distribution. The standard hypergeometric distribution is applicable after we choose a threshold level for the maximum colluding set.

With a fresher mind, clearly the DFINITY paper is computing the case where one (or one colluding set of) entity(ies) would have of the (e.g. stake deposited) permissioned nodes. That’s the maximum attack threat they consider, presumably because above that exceeds the ½ safety and liveness thresholds of their design, so the attacker could double-spend or stall the consensus indefinitely.

That very low ½ safety threshold is a significant weakness of their design in the proof-of-stake context, but if they choose instead safety threshold then the liveness drops to making it much more likely the chain can become stuck if it is not controlled by a “benevolent” (less overt) oligarchy. Moreover, the typical attack on proof-of-stake is not to stuck the chain but rather to be a less obviously malevolent oligarchy and employ the control to extract maximum rents from the system such as by maximizing the transaction fees and/or capturing disproportionately all or most of the minted block rewards (which in the case of Steem is to cartelize control over the voting algorithm, see also). Which could be especially onerous if DFINITY employs the random beacon (as they propose to do) to supply randomness to the smart contracts, then the attacker can do more than just double-spend his own tokens and actually infiltrate smart contracts in presumably insidious ways.

I think they should have computed the maximum adversarial percentage threshold to be more congruent with the reality of power-law distribution of wealth:

The economist Edward N Wolff, of New York University, has pointed out that, as of 2007, the top 1% of households in America owned 34.6% of all privately held wealth, and the next 19% had 50.5% of the wealth. This means that just 20% of the people owned 85% of the wealth, leaving only 15% for the bottom 80% of the people.

And the reality of how easy it is for an oligarchy to take control of 80+% of the stake of any proof-of-stake project token.

Based on the above reality, I presumed in my analysis of DFINITY that they would have to choose instead safety threshold and thus the liveness drops to . That very low liveness is a significant risk of chain getting stuck, but they really have no choice given the reality above. And also typically the attacker will not choose the stuck chain approach of maximizing profits by shorting the token.

So with 10,000 permissioned nodes, 50% of them controlled by the adversary, and with a safety threshold, then I compute roughly the same group size as computed for the adversary case in the whitepaper (with ½ safety threshold). So the safety threshold seems viable as long as the adversarial stake remains below 50%. I still don’t think it’s very secure (because of the nothing-at-stake cost free attacks) but that is less unrealistic than their adversarial stake assumption.

If adversarial majority is selected, presumably from there they could create a chain that continues to select them as a majority ad infinitum.

Correct. The random beacon can be biased when the safety threshold is exceeded. And I do not know if their BLS threshold signature scheme can be made to function with a safety threshold instead of ½. If not, the design is very unrealistic. Presumably it can be. But still the security is weak because of nothing-at-stake and the fact that nothing-at-stake incentivizes an oligarchy to obtain 80+% of the stake. My assertion is that proof-of-stake is not viable unless the nothing-at-stake incentive is removed somehow. But no extant non-proof-of-work design has figured out how to do it. I think I know how to do it.

However, and I probably do not understand the protocol fully, but I wonder why the resulting signature of the majority group is used for the next group's selection.  If you set up the whole set to be selected in a complete order at once, it would seem to reduce this vulnerability to only being able to stop fault the network, rather than being able to create a chain that continuously selects your members forever, and thus able to create forks at will with no retribution. If the whole set has a complete order, as long as one honest majority group exists, they can prevent censorship during their window and provably punish certain behavior, AFAICT.

Because the BLS threshold signature does not scale to unbounded set size at the desired slot confirmation delay. And that wouldn’t ameliorate the security issue you are concerned about anyway, because then either it would still be adversarial always or never, because there can be no other additional randomness injected by running the protocol.

The BLS threshold signature is fast enough that they can do it every block (slot), unlike in Ouroboros which can only do unbiased (i.e. secure) multiparty signature every epoch. And this is perhaps related to Dan Larimer’s criticism of Ouroboros. Algorand isn’t even unbiased.

EDIT: I have more carefully read Dan’s criticisms of Ouroboros and I think he is being very disingenuous. I have rebutted on his blog.

9. Re: Would it be possible to implement a cryptocurrency with distribution of wealth?
You should look into universal basic income, if you haven't already. If you look into UBI you will find some ideas that pretty much align with what you are suggesting. There are also practical experiments, both past and ongoing, looking into the matter. Using a cryptocurrency as means of distribution would of course lend itself to the idea, but it's not an easy problem to solve, especially with both UBI and cryptocurrencies being rather unexplored fields.

Here's a list of pilot projects that may interest you:
https://en.wikipedia.org/wiki/Basic_income_pilots


I see that nobody here knows how a socialist or communist person is, you guys never talked to one I notice that, that is why you say nobody will be motivated by the currency, not all people in the world is motivated by the money like you guys, for example think about almost any scientist or a lot of students, they don't learn and do science for the money, they do it because they like knowledge, and that is just a quick example.

Of course there are a lot of passion jobs where money is secondary, but at the end of the day they still require money to continue their work. You can't just look at individuals in isolation without their socio-economic surroundings.

Also note that while researchers may not be in it for the money, a lot of them still get paid fairly well and rightfully so.

Point being, it doesn't matter if parts of the population don't care about money. As long as there are some people striving for wealth, they will try to exploit the current system. And if they are able to exploit the system, that's exactly what they will do -- at the cost of everyone else who "doesn't care about money".

Even if your main intention is to spread wealth evenly amongst the populace, as long as there are some angles to exploit or positions of power to obtain, the approach is prone to failure due to human nature. Case in point, every implementation of Communism so far either digressed into a dictatorship or some form of centrally controlled capitalism.

Communism is easy to romance with if you never lived in it, but it's not a pretty system due to being relatively easy exploited from the top down. Maybe even moreso than Capitalism.


That being said, I'm convinced that due to technological and economical progress, some form of UBI will become a necessity in the future. It's going to be a very hard problem to solve though, regardless of whether it will involve cryptocurrencies or not.

10. Safe storage of data. GUIDE
Often I see questions pop up on the forum regarding safe keeping of passwords and data. I decided to write up a detailed instructions on the encryption of data.
For creating encrypted data base, I use software called VeraCrypt. It is free and open source. More details on the software here: https://en.wikipedia.org/wiki/VeraCrypt
Download and install the software here: https://www.veracrypt.fr/en/Downloads.html

1. Open the software, double click "Create Volume:


2. Now we click the check mark next to "Create an encrypted file container" and click next


3. During the next step we decide whether we want to create a regular encrypted volume or one with double encryption. In these instructions I am going to show regularly encrypted volume. So, we choose "Standard VeraCrypt volume" and click next


4. New we connect our usb drive to the computer. During this step we have to manually enter the path to the file which is going to be placed on the USB. For this open "my computer" and see under which name is our USB (in my case it is E). So, we enter our path for the file being created and click next.


5. Choosing type of encryption as "Twofish", and clicking next


6. Need to choose the encryption size. Here you are going to have to judge yourself. If you are planning to have encrypted just password database and private keys, you will not need much space. My recommendation then would be to take up a small amount of the USB and the rest of it to fill up with various files. This is done so if ever your usb was lost or stolen, and open by a third party, the file would not stick out.
My usb drive size is 3.7gb so I am choosing 1gb for encryption file size and leaving 2.7 gb empty


7. Now need to come up with a password. Password needs to be new and not something you use everywhere else. Better to make something out of 15-20 various symbols with different sizes. Write it down on the paper for you. After a few days on constant input you can throw away the paper


8. Start up the generation of you key encryption, move your mouse around, the key will be generated quicker. When the bar is fully green, press Format


9. The process of encryption itself has began. The larger size you picked during step 6, the longer it will take. For example when I was encrypting 60 gb it took me 30 minutes. Process is complete when you see this message


On the next window press Exit. On this step the process of encryption is complete. Now I will show you how to use it. Access your USB and we see this kind of file. It can ONLY be opened with the software VeraCrypt AND putting in your set password

Upon accessing VeraCrypt we see many different unused volumes in your system. Choose one, say A. Click select file and our created file on the usb and click mount


On the next window enter the password you created during step 7 and click ok. Access my computer and we observe the new local drive.

This is our encrypted volume which appeared only after we entered the password from it. In it we can store our password, private keys etc....

IMPORTANT: Upong ending your work, do not forget to close the volume, otherwise you may risk of losing your data. For this we press Dismount in VeraCrypt


After this we can dismount the USB from the PC (not forgetting about the safe way to eject the usb and not just pulling it out). The process of creating encrypted volume/database will take about 20 minutes but save you a lot of time you could have spent worrying about keeping your data safe



Regardless, of the outcome of this thread. At the very least I hope this provides some exposure to some posts which are currently under merited, and also some exceptional members which continue to make great posts.
5126  Other / Meta / Re: Trust system abuse on: June 25, 2018, 12:10:08 AM
No.
Your trust list does not say anything about how trustworthy a person is.
Your trust list should include people who "give good trust", i.e. whose trust ratings are useful for yourself and possibly others.
You could even add a known Scammer to your trust list if, and only if this person is careful about giving meaningful trust ratings (even though I would advise against it).
Your trust list should explicitly exclude people whose positive trust ratings have been given to untrustworthy people or whose negative ratings have been given as "retaliation" or whatever.
You make a good point that I completely overlooked when I made that post. Although, I would like to argue that your very likely not going to include people you don't trust no matter if they leave accurate feedback or not. I would argue that they both go hand in hand.

That's the way I use my trust list. I also offer to delete negative ratings once I see "betterment" or a reasonable explanation for someones behavior. I even sometimes delete "old" trust ratings when I no longer deem them appropriate, maybe because the user in question has "changed" in my eyes. Obviously, I can only do the latter for users I know quite well from our local community.
I've deleted old feedback a few times. However, I normally tend to leave an update especially if we've made a trade recently because after all we did complete a deal, and they showed they were trustworthy in that deal. Honestly, I'm not very active on the trust front anymore, and mostly rely on others to do it for me now. (Thanks!)
5127  Other / Meta / Re: Trust system abuse on: June 24, 2018, 10:50:37 PM
I "strongly believe that this person is a scammer" may not be equivalent to, but certainly is an emphasized version of "I don't trust this guy", semantically.
At least that's the way I understand it.
Then again, I've always been known for shooting first and asking questions later Cool
Generally, in most cases excluding them from your trust list would be the best option if it's the simple matter of "I don't trust this person". However, I would agree that sometimes a negative to warn others might be the better option. Entirely subjective of course, but if you believe someone is gearing up to scam or has shown scammy behaviour without scamming then leaving negative feedback could probably be justified to a certain extent. Which is probably why Vod's feedback is justified, and the only thing I see that could be considered misleading is the fact that he's stated Anduck scammed, although this entirely dependson your interpretation of what a scam is, and whether you consider cultural differences.  

I'll need to catch up with the thread just in case I've missed the justification from Anduck why the item wasn't sold right after the auction, and when this was inquired by another user he replied to the user to send him a personal message, and stated the item was not sold. Again, this depends on your interpretation of things, and you may come to the conclusion that Anduck had no intentions of selling the item to the higher bidder which he since has. After all, if he was truly bidding on the item, and won it he wouldn't want to sell it again would he? There's a justifiable answer to this, but I would be interested what Anduck says instead of giving him this information outright.
5128  Economy / Gambling discussion / Re: Bitcointalk's FIFA World Cup Pool Discussion Thread on: June 24, 2018, 10:43:35 PM
I've been rushed off my feet today, and missed all the matches.

I had England 2-0 but I had Senegal to win 1-2 and I thought I got it when they scored the second goal but Japan did equalize few minutes after. At least I got 30 points for finding the correct answer to the question which was Senegal to have the most number of shots on target and off target.
If I recall correctly I had them down to win 2-1, and they were my joker match too. Senegal are my underdogs of the tournament. Had that result come in I would of shot up the board. I'm getting much closer to the scores now though so maybe it's signs for things to come.
5129  Economy / Reputation / Re: forum stuff xandry is merit Abuser or Coincidence ??? on: June 24, 2018, 10:33:47 PM
Nah.  I took a look at a couple posts he merited and it looked like they were in Russian.  That board definitely needs a merit source, and it looks like xandry is fulfilling his duty there.  I don't speak Russian, so I can't attest to the quality of the posts he merited, but I don't think there's anything inappropriate going on.

If you have a board on ignore, when you look at a merited post it shows up as deleted/ignored.  Even if xandry merited some posts that got deleted, so what?  If you're insinuating that he's selling merits or somehow giving them out inappropriately, I don't see the evidence.  He's given them out repeatedly to some of the same individuals, but look at how many times pugman or TMAN has given me merits.  They just like some of my posts, and I think the same thing is going on with xandry.

The posts that he is meriting are for reporting the post, and letting the person who infringed the guidelines know what they did wrong. Here's a quote of Xandry's reply which was translated by the user "esmanthra" here

I've voiced my concerns, but also came to the conclusion that what Xandry is doing is probably fine in the thread TryNinja linked.

[...] Indeed, when merit system appeared, I got the opportunity to encourage users for help in moderation, which was frankly lacking. (Note: In Russian section.) At first I tried to apply it to "service" threads (about bans, ranks, forum rules, etc.), but sometimes I haven't got enough time to watch if something useful in these topics appeared, so when I click on a link in report and notice that person not only sent a report, but also, for example, explained to author of violating post what they did wrong (thereby I don't need to explain it myself), I endeavor to gratitude them in a merit form. By the way, it turned out, that "violators" often take such user warnings into consideration and move their topics to the correct sections or delete their posts.
Regarding the possibility of obtaining merits this way. Here're some situations when I don't give them:
1. You were wrong and I do not see any violations.
2. You wrote a message with an explanation, but I trivially did not read it.
3. You didn't reach even a Jr. Member rank "naturally".
3. You collected too much merit in the last 30 days, try again later. This is not my personal limitation - it's set by the forum.

Therefore, we have some kind of game of chances here.
5130  Other / Meta / Re: [Request] [Report to moderator] Limit unhandled reports to the last week. on: June 24, 2018, 10:28:33 PM
It's probably in there to fill in the gaps. For example, if someone had 5 good reports, 3 unhandled, and 2 bad in the past year, but the unhandled reports weren't visible someone would be wondering why the stats don't match up. So, it just showed 5 good reports, and 2 bad, but the user can see they have 5 total reports it might lead to confusion.

Although, having said this I generally agree that it's not that useful, and would be more useful if it reset periodically. However, I'm well aware what unhandled reports are, but someone new or out of the loop might well not know this.
5131  Other / Meta / Re: Trust system abuse on: June 24, 2018, 10:02:10 PM
Counter rating is stupid. It doesn't change the bad rating and messes up the system. Correct way is to make bad ratings untrusted.

Why shouldn't there be multiple "counter ratings" against a bad negative rating? Why should only one DT member have a say in there?

I assume it's to prevent abuse by the cartel that apparently exists here in the forum. Counter ratings are fine as they are good for when someone may disagree with a negative, but can't justify removing the user who left the rating off their trust list, because they generally agree with the rest of the feedback they have left, and still trust that member.
5132  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 09:38:15 PM
Okay, so I've now done a edit of the full "Your report history" page, and blurred out the usernames. I was considering blurring out the topic titles, however I would like to keep as much information openly visible as possible. Plus, the topic title doesn't necessarily mean it was the topic starter. Someone could scan the modlog for the post that was deleted, and see by what user made the post, but I don't know why anyone would go into this much effort. If anyone thinks I should blur the topic title for privacy issues please let me know your thoughts.

So, I'm looking for opinions on the follow:

Include a image of the full "Your report history" page like so:


Instead of including separate images for each report; Bad, Good, Unhandled, and deleted (Strikedthrough) reports like so: (rough edit)


I've also considered doing a colour coded image which outlines each area of the page; Report time, Post, User, Status, and including a explanation which would correspond to the colour. For example: (rough edit)

or this:

Explanation: Time the report was made

I could include this colour code system for the full report history page if the community thinks that's the better option over the separate images.

I would like if you add a note or something that highlights how reporting stuff is always better than creating a new thread. For instance, a lot of new comers recently have started creating threads for stuff like "x User is shit-posting" or "x user is Trolling". An example thread for the same could be : Can this guy (cryptoaeronet) be ban?. This unnecessarily opens up a thread which instead can be effectively handled by the 'Report To Moderator' function by explaining the case properly.

I do report such cases very often and moderators do take the respective action..

Edit : To check your previous reports simply use this URL once you're logged in : https://bitcointalk.org/index.php?action=reportlist;mine (doesn't work for all the accounts, I guess only works for accounts with good amount of reports)
I'll be sure to add something along the lines of this. Thanks for the suggestion.


5133  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 08:57:39 PM
- You can send me one on my way if you want me to colorize it or however you want it.
I'll hang fire until hopefully I've received some feedback on the the way to go about doing the images. (blur, full, partial, coloured etc)
5134  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 08:43:11 PM
Let me know which one I got right?
That "Your report history" is exactly what I was looking for. Do you mind if I steal borrow that for the purpose of this thread? Your other images are somewhat similar to what I was thinking. However, I'm looking for opinions on which ones the best to do; Full report history, separate report examples, and separate colour coded examples.

Also, opinions on whether blurring the name is beneficial, and only using a report that the topic has been deleted to prevent someone finding out the identity of the user that was reported by visiting that thread. For example, my image right now which has blurred the user out is fairly easy to find. I think I would prefer to protect the identity of the user as much as possible, but if theymos/others think a full report page is probably better so that people who haven't reported enough yet can get a sneak peak to data they can get access to once they have reported enough then I'll likely not be able to blur out the details without hindering the explanations/examples.

I think I've got a bad report lying around somewhere.
5135  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 08:24:50 PM
This is the screenshot of my report page history: https://i.imgur.com/nCeFpxX.png
Is that something you are looking for?
I know theymos specifically said the full report page, but I'm not sure if that's needed, and if it would just result in a bigger image to load. I was thinking of separating the good, bad, unhandled, and deleted (strikethrough) reports into different images which would allow me to edit out sensitive data, and only include threads which are deleted to avoid any privacy issues. These are the examples I've whipped up: (rough edits)



or this:

I was thinking with this one to include different coloured borders for each box; Report time, Topic, User reported, and whether it's been marked as good, bad or is still unhandled. Probably colouring the explanation relative to the borders on the image. Example: This is the time the report was made.

Maybe, the full report page is necessary. I would probably make a image which blurs out the usernames of users. Someone could still find out their username from the topic title, but I could include examples which have been deleted so this would be harder, however if I'm going to include the full report page then this is going to be impossible. Thoughts?  




- It does not show all the reports though. I am sure after certain numbers the oldest ones were cut off from the page.
Yeah that is the case, and it's around 30 days AFAIK.

Some people might be interested in screenshots of the full Report History. (I can't actually see it myself without generating dummy data, since I don't report posts...)
Would also appreciate your thoughts on this if possible as well as the possibility of adding this to the "report to moderator" page as a drop down menu. Of course, ironing out some of the issues, and possibly editing a few things to your suiting? Or perhaps the Help page would be more suitable. Although, I don't know how much exposure it would have there. 
5136  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 07:51:35 PM
Some people might be interested in screenshots of the full Report History. (I can't actually see it myself without generating dummy data, since I don't report posts...)
Okay, when I eventually get round to doing the "Your report history" I'll take a look at doing it at the same time. Although, I invite anyone else to do this for me as my cropping, and editing skills are shocking.

I'm not sure whether to include the brief explanation/description which is on this page or if I should just crop the reports only. I know you suggested the full report history ,but I would think having a smaller image would be better? Does everyone have access to how many good, bad, unhandled reports they have on the "report to moderator" page or are they too locked behind a certain amount of reports? Maybe I should just crop one good report, bad and unhandled report for an example which would also be a smaller images.

EDIT:
Just whipped up something quick, and looking for feedback:


That's obviously an example of a good report, and I would need to include ones for unhandled, and bad reports. I've blurred the users name for obvious reasons, and I should probably blur the title if that is the case. However, I would prefer to keep the title of the topic so it's a little bit easier to explain.
5137  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 06:37:58 PM
If their post history is the same, maybe it can be reported both, mentioning this in the report, to let the mod have a look too and decide if this means spam or not...
What happens if we report a user with copper membership? (Paid membership). I haven't reported any copper yet. Does that mean any kind of protection against vulnerability?
The only factor rank has when I'm reporting is whether I check their history or not to see if they are making the same type of replies I'm reporting them for which I'll then leave a comment like "Please check this users post history".

As newbies don't generally have too many posts. Anything Jr member, and above are more like to have a post history. Although, I take a look at their post count, and that usually is more of a factor for lower ranked members than rank itself.
5138  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 08:02:20 AM
I'll be adding a few suggestions made by others later on today, and fixing some errors that I see. Hopefully, when this topic is perfect, and doesn't have any major problems we can either see it stickied or as a pop up on the report page. Possibly both?

So this thread encouraged me to do reporting more actively, I think step by step we'll clean this forum from shitposters. But the thing which I noticed and it looks weird to me when I report somebody my report count and accuracy increases instantly, it's at 100% accuracy right now, but reported posts stays in the place, without any actions. Is my account somehow broken and I can't report anyone, because looks like my reports didn't even get to the mods.
First of all good job on reporting that's exactly what I was hoping this thread would achieve!

If you've reported it, and it hasn't been moved or marked as bad it's likely that the moderators haven't seen it yet. However, it could of just remained unhandled due to the moderator not knowing what to do with it. (quite common if a topic could fit into two sections)

Wait a little bit as it's incredibly unlikely that just your account is broken. Remember, there's several factors that you should take into account when waiting for a report to be dealt with. Depending on the complexity an admin might be needed to verify information that moderators can't see. Also, if the user is higher ranked then it usually takes a little bit longer as well as if the section hasn't got a dedicate moderator it's normally dealt with by global moderators then which can take a little bit longer because of the increased amount of reports that they have.
5139  Other / Meta / Re: Done with this forum on: June 24, 2018, 07:54:35 AM
By the way, you're right about what you've said. Also almost 90% of people here really just registered to earn money as their priority, not even worrying about the quality of posts. But I can assure you that I'm different from those people. I earn money by posting Good post as long as I can make it good.
I  think that percentage is exaggerated. A lot of the older members here that haven't been hacked registered to learn, and discuss about Bitcoin. Even though I wear a signature today it wasn't the reason I signed up. In fact I don't think they were even a thing back in 2013. I might be wrong there, but they certainly weren't as popular as they are now.  

Plus, if you are posting to earn money then that's part of the problem. They generally aren't quality posts, and just seem constructive at quick glance due to them being longer than the general spam you see. I don't have a problem with people earning on signature campaigns otherwise I would be a hypocrite wouldn't I? However, the attitude is wrong if you are posting to get paid. It should be that you are posting anyway so might as well get paid for it.

The telltale factors of someone posting for money is that during their downtime (when they aren't on a sig) is they don't make anywhere near the amount of posts that they make once they apply, and get accepted on a signature campaign.

Sir, Do you think that my posts are spams? Or they are just fine enough to be called "constructive"? I just really want to know. Because I'm risking my reputation here saying over and over that my posts are not spams. But, I really don't know if you guys accepts my posts and consider it as constructive.

Having said that your posts seem fine, however your likely to get painted with the same brush by a few people if you keep addressing everyone as "sir".

That’s completely new for me. I’d say this guy having earned 61 merits means he has made a good contribution to the forum.

It’s perfectly compatible to want to make money and to be a good forum member.

Yeah, I wouldn't agree with Vod that quality doesn't matter. I don't really care the motives for someone posting as long as it's constructive, and isn't something being rehashed in an attempt to seem constructive or earn merit.
5140  Other / Meta / Re: [Guide] Reporting effectively on: June 24, 2018, 06:32:54 AM
I’m all in for it too. It would even be better to have it on the actual Report to Moderator pop-up screen as a link to the guide, being therefore more effective than a pinned post, although I figure we won’t see this happening.
I like this idea. Hopefully theymos sees this suggestion, and at least gives it some thought.

EDIT
Just found something interesting:
Archive
Post/Topic:
https://bitcointalk.org/index.php?topic=4524527.0

A few thoughts to inspire debate and discussion on the end of conventional central banking (it is a surprisingly recent historical phenomenon anyway) and cryptocurrencies taking over sovereign currencies (because many countries had given up their sovereign currency already anyway) here: https://bitcointalk.org/index.php?topic=4524280

So if I want to report this, it's not nr. 33 copypaste, because the source is included....

...
33. When reporting plagiarized content first make sure that they haven't included an original source. If they haven't then provide the original source that the content was plagiarized from in the report field. There are several tools which can identify plagiarized content as well as manual searches via a search engine.

Maybe this fits the nr. 1 'pointless' type of post, but I have to describe why it's pointless. It's pointless, because it's a copypaste of some other member's post, but the source has mentioned, so it's not a copypaste, so I'm stuck.
The reason why I'm asking this that I don't want to ruin my 99% accuracy (have nearly 650 reports and only 10 bad, so if I can reach the 1000 reports with 10 bad, I hope the system will round the 99% up to 100% Cheesy )

Reporting it for low quality content is probably the best. They are just linking to one of their threads in order to gain more exposure. It's sort of a duplicate post, but I think just saying something along the lines of "Low quality content" You could go on to explain that they've copied the first paragraph, and just added a link to their thread. However, it's probably not needed.

In fact their recent posts on their post history page is doing the exact same thing for other threads.
Pages: « 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 [257] 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 ... 444 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!