If you're wondering about that, you should REALLY be wondering how Dashcoin is calling itself Dashcoin when there is already a Dashcoin seen here: https://bitcointalk.org/index.php?topic=678232.1540You guys stole a name first, now others are just following your lead. It's Dash not dashcoin.
|
|
|
Hello syntax, I enabled the google auth, but, if I have not missed them, it did not showed me the backup codes in order to recover in case my mobile phone gets broken/lost. Is there a way to recover the codes?
Cheers
|
|
|
They all have me blocked but I did nothing that could be construed as trolling.
That says a lot right there. Come on it is normal when you speak to a vast community. Every community has its retards, noobs, fanboys, etc. For every ICEbreaker here you'll find at least 3 of kind there.
|
|
|
1. How is running a MN different from running a tor or a bitcoin node? 2. A MN uses around 500MB in and 500MB out per days, that's 5.7 kb/s. Tor would handle it with no slowing down.
1. VASTLY different. The incentives are what takes us into FinCEN / SEC territory. There's also a very big difference between being paid to facilitate illegal activities (which gives LEA so much leverage against you using tax laws etc.) vs. unknowingly or unwittingly facilitating it (eg. running a Tor / i2p router) 2. Latency is the issue, and the reason that Tor works well against DoS attacks is because it purposely slows routing down (also to prevent timing attacks). Moving all the MNs behind Tor is a commendable attempt, but ultimately futile in that it restricts the level of functionality available (eg. imagine InstantX transactions taking 10-20 seconds because of routing failures). Also just to clarify, in case there was any doubt, these are hypotheticals. I'm not stating that MNs definitely do require an MSB license, just that it appears on the face of it that they do, or that they are at least going to be up against the wall on income tax. Similarly, I'm not saying that routing InstantX transactions on Tor would definitely take 20 seconds each time, just that my thumb-sucked paper-napkin calculations indicate something in that bracket. 1. I miss the point where running a MN facilitates illegal activities. You are just providing the service of obfuscating the coins and broadcasting the instantXs. You are not responsible of how the coins are gonna be spent. Also, coins get mixed WITHIN the wallet, they don't flow through the MNs and come back to your wallet, so, no money laundering involved. It looks like me that running a MN is the same of running a tor node. 2. I do not have acknowledge on the latency issue, but I remember a guy that was pretty sure, on the subject, that a latency of 50ms was not a huge deal. Claiming that only the first connection would have took 1 or 2 seconds (assuming they are connected 24/7), but after that all data transfer would be almost instant.
|
|
|
Those people in the dark coin thread are crazy! Its like some sort of cult or something over there. They all have me blocked but I did nothing that could be construed as trolling. They think it was part of some sort of elaborate plan, that i was "laying spider webs" and that it was going to all climate in some sort of very clever troll trap.
It's actually really bad because I run something of a little business on bitcoin talk by selling my impeccable reputation and I cant have people ignoring me. In fact I was tip toeing around the whole time precisely because of this. But it's just apparently SO easy to offend their delicate sensitivities that i somehow managed to do it.
*edit* part of me wants to go over there and try to repair the damage i somehow caused but the smarter part of me knows that if i do ill make things worse.
I believe that the latest weeks on btctalk had raised a sense of paranoia in dash supporters.
|
|
|
1. Reporting to the FinCEN, the FBI, and the SEC for which law infringement? How would they seize the coins considering that the majority of the MN operator hold their funds in hot/cold storage?
2. Running MNs under Tor can avoid this, making DDoSsing the network expensive as fuck.
Thoughts?
1. Not holding an MSB license (FinCEN), involvement in a security unregistered with the federal government (SEC), facilitating the purchase of child pornography / drugs / firearms (FBI). They would seize the coins through rubber-hose cryptanalysis. 2. It would also make the network significantly slower - those MNs would have exclusively use Tor for everything, any normal IP connections would leak that they're an MN by virtue of them broadcasting Darksend TXs etc. Additionally, this doesn't prevent MN operator collusion etc. 1. How is running a MN different from running a tor or a bitcoin node? 2. A MN uses around 500MB in and 500MB out per days, that's 5.7 kb/s. Tor would handle it with no slowing down.
|
|
|
1. Reporting to the FinCEN, the FBI, and the SEC for which law infringement? How would they seize the coins considering that the majority of the MN operator hold their funds in hot/cold storage?
2. Running MNs under Tor can avoid this, making DDoSsing the network expensive as fuck.
1. They come to you, and take your coins, ask ross ulbricht. 2. Hyprocrites, i thought u guys are advertising your high speed masternodes and now u want to hide them behind tor? 1. For what law infringement? 2. Tor is not as slow as back in the days, you would not see any performance difference since MN bandwidth usage is really low.
|
|
|
It have been announced that the develop cycle would have been slowed down after the InstantX release. Anyway I am interested in the part quoted below: So obviously you want to double your ROI, which means you have to take half of the MasterNodes out of commission. You don't want to take down all or even most of them, you just want the total number of MasterNodes reduces to 1000. So you do this through a variety of tactics: 1. Report US-based and/or US-owned MasterNodes to FinCEN, the FBI, and the SEC, assist them in shutting them down and seizing the coins held by their operators. 2. Repeatedly DDoS MasterNodes at a particular ISP / datacenter until they change their ToS to not allow MasterNodes. 3. Hack into a portion of the remaining MasterNodes and install a rootkit that watches for Darkcoin source code and modifies it when compiled (or just randomly crashes the daemon if they aren't compiling it themselves). This ensures that these daemons appear to be working to the operator, but they receive so few payments they may as well be offline. This is all very surreptitious, because 1. looks like The Man has got it in for Darkcoin, 2. looks like the ISP is just being problematic, and 3. is mostly undetectable. You can keep doing this ad infinitum to keep half the MasterNodes offline, and nobody will realise what you're doing. It'll look like the sort of attacks the community expects to come, and they'll rationalise it for you by loudly claiming that 1000 MasterNodes is good enough. 1. Reporting to the FinCEN, the FBI, and the SEC for which law infringement? How would they seize the coins considering that the majority of the MN operator hold their funds on hot/cold storages? 2. Running MNs under Tor can avoid this, making DDoSsing the network expensive as fuck. Thoughts?
|
|
|
hi , can anyone help me out. im trying to run shadow client from my iMAC but somehow i can't find the map Shadowcoin in Application Data folder. I also did the command to show hidden files but its still not there.
I also have loaded the shadow client to create the map upon searching for it.
thanks
It should be located in ~/Library/Application Support/
|
|
|
It would be nice, if enabled, to request also the google auth code when I input sensitive commands such as dumpprivkey. I do really not know if you can implement that tho . Cheers I can =) The next release of the daemon will have a modified theft-recovery system inside of it as well as some of this functionality. I can't wait, you are doing a really great job sir.
|
|
|
What are the benefits of superNET wallet over NXT's?
|
|
|
It would be nice, if enabled, to request also the google auth code when I input sensitive commands such as dumpprivkey. I do really not know if you can implement that tho . Cheers
|
|
|
Hello Syntax I was wondering is there a way to dump the private keys from the wallet?
There is via commandline for sure. I'll make a note to put that in the wallet interface under 'tools' though. I'm working on rolling out some patches right now and then fixing the backup tool. I'll get on top of that immediately though - I've been meaning to. Best regards, syntaks Can you please tell me how to get to the command line? Yeah it would be great to have it under tools! Cheers type this: neos dumpprivkey <neos address> Oh you mean directly from the linux terminal, I was looking for the console within the wallet! Cheers
|
|
|
Hello Syntax I was wondering is there a way to dump the private keys from the wallet?
There is via commandline for sure. I'll make a note to put that in the wallet interface under 'tools' though. I'm working on rolling out some patches right now and then fixing the backup tool. I'll get on top of that immediately though - I've been meaning to. Best regards, syntaks Can you please tell me how to get to the command line? Yeah it would be great to have it under tools! Cheers
|
|
|
Hello Syntax I was wondering is there a way to dump the private keys from the wallet?
|
|
|
Is Navajo better than SDC?
|
|
|
|