Bitcoin Forum
December 14, 2024, 10:45:05 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 »
  Print  
Author Topic: XMR vs DRK  (Read 69791 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
Macno
Legendary
*
Offline Offline

Activity: 984
Merit: 1000


View Profile
March 26, 2015, 08:14:14 AM
 #421

so what do you think guys. this thread will be a success if it managed to redirect some of the debate in our respective threads. is it a success? have you dark boys noticed a reduction in anti dark coin rhetoric in your thread since the creation of this thread? monero boys, have you noticed a reduction in anti monero rhetoric in your thread? just curious.

Well, as for the Dash thread, it kind of backfired. The smarter and more polite XMR supporters like smooth left and the trolls are still there, but they were kind of adopted as pet trolls now.
By the way: you had a "surprising" way to invite Dash "boys" to this thread with your opening statement including that picture.
As for me, the thread got me even more interested in XMR but I stil think Dash is fine.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 08:15:33 AM
 #422


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...
toknormal
Legendary
*
Offline Offline

Activity: 3066
Merit: 1188


View Profile
March 26, 2015, 09:47:52 AM
 #423


I don't think people are realising what the real target is in terms of "compromise" here.

In Dash, you can't compromise a node just because you have access to a machine thats running it. It's the collateral address on the blockchain that needs to be compromised - otherwise the 'real' owner simply has to open their wallet, move the collateral and thats that attack neutralised forever. Moreover, masternodes are as decentralised as regular wallets - in fact they "are" regular wallets.

The only difference between the Dash network and a regular network is that the wallet daemon is dual mode - i.e. it has this "enhanced mode" that allows it to provide extended services to the rest of the network. But it's not a fixed target - it's a moving target because anyone can launch one anytime, point it at an appropriate collateral address and run that daemon in extended service (masternode) mode.

As far as "corrupting the network" goes, for an attacker with unlimited funds,  it's probably more optimal to just buy up gazilions of hashpower and perform a regular 51% on the blockchain rather than trying to take control of the masternode network. 2 reasons for that:

[1] - if they get "control" of a majority of masternodes, so what ? All they can do is provide a service ot the network

[2] - hashpower is unlimited - they can acquire hashpower in direct proportion to their budget. Acquiring a lot of masternodes is far harder because you need to get control of a majority of the money supply first
dasource
Hero Member
*****
Offline Offline

Activity: 821
Merit: 1000


View Profile
March 26, 2015, 10:08:45 AM
 #424


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

^ I am with STUPID!
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 26, 2015, 10:10:03 AM
 #425


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

It's absurd because you don't know how many MNs they need to compromise. You're assuming it's a lot, but it depends on what information they're trying to get and how much. Who says they need to unmask the entire network, when they can just pick off a few people here and there to send a message? The only identity they need to reveal is yours. Are you ready to take that risk?

Look, I'm not trying to troll you. I'm trying to say that a government agency with unlimited resources to bribe, seize, extort, or hack can achieve some very "unlikely" things... and if it did happen you wouldn't necessarily know about it. There wouldn't be an anouncement telling everyone that masternodes have been compromised.

In this regard I'm not implying Monero (or any other coin) is safe. XMR has some very elegant anon tech, but I still don't trust it against such an adversary. Maybe in the future with much higher mandatory mixins and i2p I'd feel more comfortable.

TLDR: No crypto is suitable for dark market trade yet. Not zerocash, not monero, and definitely not darkcoin. Don't bet your life on any such tech at this point.
illodin
Hero Member
*****
Offline Offline

Activity: 966
Merit: 1003


View Profile
March 26, 2015, 10:11:27 AM
 #426

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

Can you explain what is the data that they would snoop after hacking into a masternode?
illodin
Hero Member
*****
Offline Offline

Activity: 966
Merit: 1003


View Profile
March 26, 2015, 10:13:05 AM
 #427

If you're trying to protect your privacy from your neighbor, sure. Darksend is probably sufficient. However, If you're concerned about illegal activity or government level adversaries, no anon tech is ready for that (yet).

TLDR: "good enough" is never good enough when it comes to three-letter agencies. It's gotta be air tight.

I almost agree, except that I would also include illegal activities to the list of Darksend (and XMR) being sufficient to. Obviously I don't know, but I doubt your local police or even state police or IRS can just go to NSA and ask them to help out with their case concerning some drug dealer or tax evasion. Much less your neighbor, employer, or your insurance company.

If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.
smooth
Legendary
*
Offline Offline

Activity: 2968
Merit: 1198



View Profile
March 26, 2015, 10:17:13 AM
 #428

If you're trying to protect your privacy from your neighbor, sure. Darksend is probably sufficient. However, If you're concerned about illegal activity or government level adversaries, no anon tech is ready for that (yet).

TLDR: "good enough" is never good enough when it comes to three-letter agencies. It's gotta be air tight.

I almost agree, except that I would also include illegal activities to the list of Darksend (and XMR) being sufficient to. Obviously I don't know, but I doubt your local police or even state police or IRS can just go to NSA and ask them to help out with their case concerning some drug dealer or tax evasion. Much less your neighbor, employer, or your insurance company.

There's no way to know what the hell is going on. We get tiny glimpses is all, often inaccurate or incomplete, possibly misleading information that was deliberately leaked for reasons that are hard to fathom. The iceberg principle applies, strongly.

http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/05/the-nsa-is-giving-your-phone-records-to-the-dea-and-the-dea-is-covering-it-up/
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:20:02 AM
 #429


I don't think people are realising what the real target is in terms of "compromise" here.

In Dash, you can't compromise a node just because you have access to a machine thats running it. It's the collateral address on the blockchain that needs to be compromised - otherwise the 'real' owner simply has to open their wallet, move the collateral and thats that attack neutralised forever. Moreover, masternodes are as decentralised as regular wallets - in fact they "are" regular wallets.

The only difference between the Dash network and a regular network is that the wallet daemon is dual mode - i.e. it has this "enhanced mode" that allows it to provide extended services to the rest of the network. But it's not a fixed target - it's a moving target because anyone can launch one anytime, point it at an appropriate collateral address and run that daemon in extended service (masternode) mode.

As far as "corrupting the network" goes, for an attacker with unlimited funds,  it's probably more optimal to just buy up gazilions of hashpower and perform a regular 51% on the blockchain rather than trying to take control of the masternode network. 2 reasons for that:

[1] - if they get "control" of a majority of masternodes, so what ? All they can do is provide a service ot the network

[2] - hashpower is unlimited - they can acquire hashpower in direct proportion to their budget. Acquiring a lot of masternodes is far harder because you need to get control of a majority of the money supply first


tok, the argument they are making is that if you surreptitiously control enough MNs you can spy on what the nodes are doing and trace DS transactions.....it's nothing to do with controlling the money supply, just plain old hacking / compromising servers.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:21:25 AM
 #430


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?
BlockaFett
Sr. Member
****
Offline Offline

Activity: 392
Merit: 255


View Profile
March 26, 2015, 10:23:50 AM
 #431

I would urge DRK people not to get involved in the debate here.  The idea is to try to legitamise XMR as a contender to DRK by giving the pumpers on Poloniex text they can link to to show how 'xmr is the next dash!!! when XMR takes over LTC...!'.  Any argument you make will just get drowned out by one of the 5 Monero devs trolling here and you will never get a straight answer as they just repeat the same accusations whatever you say and avoid backing anything up.

check the market situation and how no one on big exchange like Bittrex or BTER will touch XMR and hence why the big exchanges never added it even after 1 year...no Poloniex pumping and XMR market cap will go < $100k like all the other cryptonote hack jobs...

dasource
Hero Member
*****
Offline Offline

Activity: 821
Merit: 1000


View Profile
March 26, 2015, 10:26:57 AM
 #432

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

Can you explain what is the data that they would snoop after hacking into a masternode?

Pretty much anything in/out of that VPS ... so IPs connecting on the drkcoin p2p network, DS transactions, ssh logins, grab the wallet.dat file and pull all the address this MN has used for DS transactions etc etc etc ... now if you have access to lots of MN with this data you could start to slowly piece things together.

^ I am with STUPID!
smooth
Legendary
*
Offline Offline

Activity: 2968
Merit: 1198



View Profile
March 26, 2015, 10:27:32 AM
 #433


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

Maybe not directly. But the hosting companies my be compromised (you know google was/is right?), or there may be third party channels, like the NSA has a cooperation deal with Armenia which has a deal with Bulgaria. Or the NSA trades some intel on Uyghurs to the Chinese government in exchange for cooperation with something in a data center in China the Chinese government doesn't much like anyway. The possibilities are endless.


majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:29:07 AM
 #434

I would urge DRK people not to get involved in the debate here.  The idea is to try to legitamise XMR as a contender to DRK by giving the pumpers on Poloniex text they can link to to show how 'xmr is the next dash!!! when XMR takes over LTC...!'.  Any argument you make will just get drowned out by one of the 5 Monero devs trolling here and you will never get a straight answer as they just repeat the same accusations whatever you say and avoid backing anything up.


I dunno, I think the debate has been quite reasonable and I'm enjoying it.

Nothing the XMR guys have said so far convinces me that DRK is not fit-for-purpose, so I'm keeping my masternodes for now and watching the market with interest.
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 26, 2015, 10:30:57 AM
Last edit: March 26, 2015, 10:53:31 AM by Johnny Mnemonic
 #435


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

How do you know they can't glean enough data just from domestic servers? Can you specify which masternodes to use while mixing?
equipoise
Hero Member
*****
Offline Offline

Activity: 794
Merit: 1000


Monero (XMR) - secure, private, untraceable


View Profile WWW
March 26, 2015, 10:32:53 AM
 #436


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?
Talking about Bulgaria - they definitely could and in Bulgaria about 75% of the ISP providers will silently and gladly cooperate. They don't even need to do that - they could get to the terminal where all those are centralized and skip the ISP providers and mobile operators. Again the Bulgarian government will most probably gladly cooperate. Hey, they don't even need to do that - there is a FinSpy server in Bulgaria: https://bivol.bg/en/finspy-bulgaria-mtitc-english.html

About me | zRMicroArray - phase 2 - Gene Expression Analysis software | [Weed Like to Talk - Bulgaria] Start a wave of cannabis seminars in Europe | Monero weighted average price stats: moneroprice.i2p
BTC: 1KoCX7TWKVGwqmmFw3CKyUSrKRSStueZar | NMC: NKhYEYpe1Le9MwHrwKsdSm5617J4toVar9 | XMR (Tip me a beer OpenAlias Monero address): tip.changetheworldwork.com
[XMR] Monero - A secure, private, untraceable cryptocurrency: 4AyRmUcxzefB5quumzK3HNE4zmCiGc8vhG6fE1oJpGVyVZF7fvDgSpt3MzgLfQ6Q1719xQhmfkM9Z2u NXgDMqYhjJVmc6KX
smooth
Legendary
*
Offline Offline

Activity: 2968
Merit: 1198



View Profile
March 26, 2015, 10:34:57 AM
 #437

If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:36:19 AM
 #438

Quote

Maybe not directly. But the hosting companies my be compromised (you know google was/is right?), or there may be third party channels, like the NSA has a cooperation deal with Armenia which has a deal with Bulgaria. Or the NSA trades some intel on Uyghurs to the Chinese government in exchange for cooperation with something in a data center in China the Chinese government doesn't much like anyway. The possibilities are endless.


sure, but there are lots of hosting companies in play, plus plenty of people not using hosting companies.....masternodes are running on raspberry pi for instance.

regardless, to compromise the MN network in the way you describe would require a massive international conspiracy between all governments where masternodes are hosted...sounds ridiculous to me.





majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:37:51 AM
 #439


Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

How do you know they can't glean enough data just from domestic servers? Can you specify which masternodes to use when you transact?

masternodes are selected randomly - there is no way to predict where the transactions will take place, and with masternode blinding the masternodes themselves can't see which other masternodes are participating.

majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 26, 2015, 10:40:57 AM
 #440

If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.


quite possibly, which renders obsolete all the argument in here about global TLA/governemnt conspiracies to compromise the MN network.

So, DASH is fit-for-purpose as an enhanced Bitcoin clone with decent privacy features, instant transactions and other cool stuff in the pipleine
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!