483
|
Alternate cryptocurrencies / Announcements (Altcoins) / Re: ⚡ [ANN] DeepONION ⚡ TOR ⚡ DeepVault ⚡ Cryptopia ✈️ Airdrops 34/40 New Thread ✈️
|
on: March 04, 2018, 10:51:54 AM
|
Are we still planning to hire a public hero in Q1?
I think it would be better to do this once the airdrops are truly over. That would mean a conscious deviation from the roadmap. Which also has to be communicated proactively We were working on that but you need to understand that some weeks ago all Crypto tanked almost 500b... Also people were saying that Crypto will disappear.. We have a roadmap but also can be reasonable that some minor things can change due to a market/news influence.. I'm not saying that this don't gonna happen on Q1 but please be tolerant Don't worry, I am tolerant. There may be others though who are not. They will look at the roadmap in Q2, ask why there is no update and spread FUD (DO cannot deliver). I think that this can be avoided - if we foresee that there is not going to be a PH in Q1 - with early communication. People who are here and support are not the issue Because they don't read our Forum, simple like that. We are making announcements every week about our developments and how close we are to the release. Also we send a Newsletter every week... DeepOnion cannot deliver? We are to create one of the best privacy coins in less than one year without ICO.
|
|
|
484
|
Alternate cryptocurrencies / Announcements (Altcoins) / Re: ⚡ [ANN] DeepONION ⚡ TOR ⚡ DeepVault ⚡ Cryptopia ✈️ Airdrops 34/40 New Thread ✈️
|
on: March 04, 2018, 10:33:26 AM
|
Are we still planning to hire a public hero in Q1?
I think it would be better to do this once the airdrops are truly over. That would mean a conscious deviation from the roadmap. Which also has to be communicated proactively We were working on that but you need to understand that some weeks ago all Crypto tanked almost 500b... Also people were saying that Crypto will disappear.. We have a roadmap but also can be reasonable that some minor things can change due to a market/news influence.. I'm not saying that this don't gonna happen on Q1 but please be tolerant
|
|
|
485
|
Alternate cryptocurrencies / Announcements (Altcoins) / Re: ⚡ [ANN] DeepONION ⚡ TOR ⚡ DeepVault ⚡ Cryptopia ✈️ Airdrops 34/40 New Thread ✈️
|
on: March 04, 2018, 10:16:40 AM
|
We are currently testing Deep Protocol (Stealth Address) and I want to share this information for the people who doesn't know how it works. Stealth addresses take care of the receiver's privacy.
In cryptocurrency, the ability to spend a certain amount of coins is the same as the knowledge of the private key to the public key associated with the coins.
So (simplifying a bit), in Bitcoin if there is 1 bitcoin associated to the public key P and if Bob knows the corresponding private key x such that P = xG, then he can spend the Bitcoin by submitting a message (transaction) to the network signed with x.
There is one privacy issue, though: if Bob keeps using the same P to receive bitcoins, then any observer will be able to see all payments were made to the same entity that controls P (Bob). This is the problem that stealth addresses solve.
In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:
Bob creates two pairs of private and public keys. Let's denote them by (a,A) and (b,B), where by definition A = aG and B = bG. Bob makes the pair of public keys (A,B) available to the network; this will be his stealth address.
Alice wishes to send 1 bitcoin to Bob; that is, she wants to assign 1 bitcoin to a public key P such that Bob knows x and P = xG. She will construct such P using Bob's stealth address by using a hashing function H, choosing a random big number r, and setting P = H(rA)G + B. Then Alice sends the bitcoin to P, the transaction is broadcast along with R = rG (but not r, which can't be recovered from R).
Now how does Bob get the money? Well he has to keep listening on the network for all new transactions in the hopes that they are for him. When he sees Alice's transaction, he performs x := H(aR)+b and realizes that:
xG = (H(aR)+b)G = H(aR)G+bG = H(arG)G+B = H(raG)G+B = H(rA)G+B = P,
that is, Bob can reconstruct x such that P = xG and is therefore the owner of the bitcoin! Notice that neither Alice nor any observer has the ability to derive x (because they don't know a and b), and that besides Alice and Bob no one knows that (x,P) was generated from Bob's stealth address (because they don't know r).
Note that, as mentioned, this protects Bob privacy, but it is still visible to the network that Alice, the entity that used to control that bitcoin, made a transaction. In order to obfuscate that action, Monero implements the use of Ring Signatures, which will allow Alice to, instead of directly signing the transaction, produce a proof that her, or several other people, did send a coin to Bob. The math behind Ring Signatures is not as simple as in Stealth Addresses, but it is still very approachable.
So, in a nutshell:
Stealth addresses take care of recipient's privacy.
Ring Signatures take care of sender's privacy.So.. ar u hodling? or are you some of those weak hands?DqKpsiHCGoBip2WrEAWoTjtgeBT84f58xo
|
|
|
|