Bitcoin Forum
April 30, 2024, 11:18:39 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 »
  Print  
Author Topic: XMR vs DRK  (Read 69688 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:14:05 AM
 #581

Nice graph but with CRAVE using adrenaline , drk masternodes , dual key stealth addresses and much much more , things look very intresting. https://bitcointalk.org/index.php?topic=997356.0

This is "XMR vs DRK" not "Come spam coins" Cheesy
1714475919
Hero Member
*
Offline Offline

Posts: 1714475919

View Profile Personal Message (Offline)

Ignore
1714475919
Reply with quote  #2

1714475919
Report to moderator
1714475919
Hero Member
*
Offline Offline

Posts: 1714475919

View Profile Personal Message (Offline)

Ignore
1714475919
Reply with quote  #2

1714475919
Report to moderator
Activity + Trust + Earned Merit == The Most Recognized Users on Bitcointalk
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
generalizethis
Legendary
*
Offline Offline

Activity: 1750
Merit: 1036


Facts are more efficient than fud


View Profile WWW
March 27, 2015, 09:18:03 AM
 #582

As far as metadata is concerned, I'm assuming many mn's will not be using best practices and will leak information unbeknownst to the operator, which could set-up scenarios where they are surreptitiously being observed?

well we covered all that earlier....for the sake of argument, let's go binary and say a masternode is either compromised or it isn't, then consider the numbers in the table. You need to compromise 100% of the network to reliably trace all transactions. This is obviously the most extreme case. A more useful question would be 'where do things start to get interesting'. Well, if we had 1 billion transactions per day, you'd need about 75% of the network compromised to trace just one of those transactions each day. Make of that what you will.

Quote
I don't think anyone would argue with cryptonote coins offering the best anonymity set at the moment, the question becomes,"is dark's as advertised or good enough?" The as advertised is a hard sell given the already well discussed insta/accidental mine and the re-names that look like the "under new management" sign at the local dive.

Yep fair enough, as I said I think we've covered the instamine topic Smiley

Quote
As an investor, you would have to prove to me that your numbers are correct that indeed your management was forthright and had the investor's best interest in mind with every decision, and that you are offering the best product for the service desired. If you want to act like a company, this is what would be expected by most rational investors.

OK well if that's your criteria for investment then fair enough. I disagree with your statement about 'rational investors' though....I know many professional investors, with varied styles and varying attitudes to risk. It's not a one-size-fits-all game, and you can peddle the 'DRK is crooked' argument until you're blue in the face but people are still investing in it. People invest in Enron and Haliburton.

Call DRK a scam, a cult, whatever...the market does not lie.



People investing in Enron or Haliburton, doesn't do anything for my confidence --well, it does, but certainly not in a good way. It seems like everyone involved in your project is focused on profits, but not on any redeemable goal.

generalizethis
Legendary
*
Offline Offline

Activity: 1750
Merit: 1036


Facts are more efficient than fud


View Profile WWW
March 27, 2015, 09:19:39 AM
 #583

No cop out--Evan burned the trust bridge, so I have no inclination (nor should I) to give his figures the benefit of the doubt.

majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:20:23 AM
 #584



Quote

People investing in Enron or Haliburton, doesn't do anything for my confidence --well, it does, but certainly not in a good way. It seems like everyone involved in your project is focused on profits, but not on any redeemable goal.

Dude, play fair....you gave your investment criteria, I explained the wider picture....that's all.

majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:25:58 AM
 #585



Evan burned the trust bridge, so I have no inclination (nor should I) to give his figures the benefit of the doubt.

OK, well like I said I think that's a cop-out. I put it to you that you won't debate the figures because you don't like what they demonstrate about Darksend with Masternode Blinding. If that's wrong and you think the figures do show a good level of security then by all means correct me Cheesy

Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 27, 2015, 09:29:30 AM
 #586

I still don't understand what these "probabilities" illustrate? Either a transaction is traceable or it isn't. What exactly are the probabilities for?
equipoise
Hero Member
*****
Offline Offline

Activity: 794
Merit: 1000


Monero (XMR) - secure, private, untraceable


View Profile WWW
March 27, 2015, 09:29:34 AM
 #587

OK I plotted the curve:




Here are the numbers of nodes behind the graph - sorry, Excel only renders percentages to 30 decimal places Smiley so I'll do 2 tables, one with percentages and one with numbers.

1.00%   0.000000000000000000000000000000%
2.00%   0.000000000000000000000000000000%
...

This is just the upper bound of the probability to brake it if there are no flaws at all in the master nodes (but there is no way for you to prove so). With the current Dash "model" you can't know what the lower bound is. The lower bound could be just a straight vertical line at 0. So the best you could say about the probability of braking it with owning no master nodes at all is that it's between 0% and 100%.

About me | zRMicroArray - phase 2 - Gene Expression Analysis software | [Weed Like to Talk - Bulgaria] Start a wave of cannabis seminars in Europe | Monero weighted average price stats: moneroprice.i2p
BTC: 1KoCX7TWKVGwqmmFw3CKyUSrKRSStueZar | NMC: NKhYEYpe1Le9MwHrwKsdSm5617J4toVar9 | XMR (Tip me a beer OpenAlias Monero address): tip.changetheworldwork.com
[XMR] Monero - A secure, private, untraceable cryptocurrency: 4AyRmUcxzefB5quumzK3HNE4zmCiGc8vhG6fE1oJpGVyVZF7fvDgSpt3MzgLfQ6Q1719xQhmfkM9Z2u NXgDMqYhjJVmc6KX
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:34:06 AM
 #588

I still don't understand what these "probabilities" illustrate? Either a transaction can be traced or it cannot. What exactly are the probabilities of?

If you compromise a masternode and spy on it's activity, you can theoretically start to piece together all the required information to trace a Darksend transaction back to a user's wallet. Since nodes are selected randomly for Darksend, you would need to compromise the correct nodes to do so. These are the probabilities of you having compromised the correct nodes and therefore being able to decode the transaction.
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 27, 2015, 09:38:13 AM
 #589

I still don't understand what these "probabilities" illustrate? Either a transaction can be traced or it cannot. What exactly are the probabilities of?

If you compromise a masternode and spy on it's activity, you can theoretically start to piece together all the required information to trace a Darksend transaction back to a user's wallet. Since nodes are selected randomly for Darksend, you would need to compromise the correct nodes to do so. These are the probabilities of you having compromised the correct nodes and therefore being able to decode the transaction.

Okay that makes sense. Thank you.
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 27, 2015, 09:48:31 AM
 #590

Correct me if I'm mistaken: these are probabilities for tracing a specific transaction.

What are the probabilities of being able to trace any non-specific transaction?
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:49:51 AM
 #591

OK I plotted the curve:




Here are the numbers of nodes behind the graph - sorry, Excel only renders percentages to 30 decimal places Smiley so I'll do 2 tables, one with percentages and one with numbers.

1.00%   0.000000000000000000000000000000%
2.00%   0.000000000000000000000000000000%
...

This is just the upper bound of the probability to brake it if there are no flaws at all in the master nodes (but there is no way for you to prove so). With the current Dash "model" you can't know what the lower bound is. The lower bound could be just a straight vertical line at 0. So the best you could say about the probability of braking it with owning no master nodes at all is that it's between 0% and 100%.

Fair comment and one of the most interesting points made so far. It's not the number of Masternodes you have to compromise, but how easily you can compromise them. e.g. an exploit could be found and suddenly you have the whole network and can trace the transactions. There are obviously other points to consider there, but I get the idea.

XMR relies on cryptography, DRK relies on secure Masternode code to protect anonymity at any given point in time (since mixing is off-chain).

You could draw parallels with BTC. People have been trying to break it for years, no joy. I'm sure people are trying to break DASH given the effort going into trolling it Cheesy - will be interesting to see how it plays out.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 09:52:14 AM
 #592

Correct me if I'm mistaken: these are probabilities for tracing a specific transaction.

What are the probabilities of being able to trace any non-specific transaction?

good point.

thinking out loud.....at 1 billion transactions per day, if you captured all the activity of 75% of the MNs for a whole day, somewhere in that dataset is all the information you need to piece together 1 complete transaction.....go find it Cheesy
Johnny Mnemonic
Hero Member
*****
Offline Offline

Activity: 795
Merit: 514



View Profile
March 27, 2015, 10:08:49 AM
 #593

Correct me if I'm mistaken: these are probabilities for tracing a specific transaction.

What are the probabilities of being able to trace any non-specific transaction?

good point.

thinking out loud.....if you captured all the activity of 75% of the MNs for a whole day, somewhere in that dataset is all the information you need to piece together 1 complete transaction.....go find it Cheesy

Well that's not the concern. The concern is an adversary spying on a small but significant portion of masternode activity (say 15%). Your one tx might have an astronomically low probability of being revealed, but other transactions on the network won't be so lucky. Meanwhile the NSA*cough*I mean our adversary, is just collecting these unmasked transactions and saving them in a giant database for some time in the future when they might want to extort the revealed parties.

Suddenly those probabilities don't look as good, because the cost of revealing non-specific transactions may be very low, and adversaries can simply "cast a net" and collect their victims.
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 10:16:42 AM
 #594

Quote

Well that's not the concern. The concern is an adversary spying on a small but significant portion of masternode activity (say 15%). Your one tx might have an astronomically low probability of being revealed, but other transactions on the network won't be so lucky.


yes they will, that's how probability works Smiley

if there is an unbelievably tiny probability or catching a DS transaction with 15% of the network, you will catch an unbelievably tiny number of transactions....i.e. none in any sensible timeframe.
fluffypony
Donator
Legendary
*
Offline Offline

Activity: 1274
Merit: 1060


GetMonero.org / MyMonero.com


View Profile WWW
March 27, 2015, 10:47:49 AM
 #595

Fair comment and one of the most interesting points made so far. It's not the number of Masternodes you have to compromise, but how easily you can compromise them. e.g. an exploit could be found and suddenly you have the whole network and can trace the transactions. There are obviously other points to consider there, but I get the idea.

XMR relies on cryptography, DRK relies on secure Masternode code to protect anonymity at any given point in time (since mixing is off-chain).

So in other words, you've finally come to the same conclusion I've already expressed: everything hinges on the opsec of the MasterNode operators.

majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 10:50:14 AM
Last edit: March 27, 2015, 11:04:23 AM by majamina
 #596

Fair comment and one of the most interesting points made so far. It's not the number of Masternodes you have to compromise, but how easily you can compromise them. e.g. an exploit could be found and suddenly you have the whole network and can trace the transactions. There are obviously other points to consider there, but I get the idea.

XMR relies on cryptography, DRK relies on secure Masternode code to protect anonymity at any given point in time (since mixing is off-chain).

So in other words, you've finally come to the same conclusion I've already expressed: everything hinges on the opsec of the MasterNode operators.

Nope, not at all....we went over all that.

It's the 'hardness' of the MN code that's important. How remotely exploitable it is, I would say.

edit: OK, giving this more consideration...remote exploitability of a given MN does have dependencies on Opsec. Let's assume what I think is fair to assume, that basic Opsec is in place similar to what we might expect on the BTC network....i.e MNs are at least behind a firewall and only listening on TCP/9999

GTO911
Hero Member
*****
Offline Offline

Activity: 672
Merit: 500



View Profile
March 27, 2015, 10:54:24 AM
 #597

Why do we need masternodes when we have always available on chain cryptographic anonymity?
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 10:58:57 AM
 #598

Why do we need masternodes when we have always available on chain cryptographic anonymity?

why do we need bloaty on-chain anonymity when we have masternodes providing off-chain anonymity that's fit-for-purpose?
GTO911
Hero Member
*****
Offline Offline

Activity: 672
Merit: 500



View Profile
March 27, 2015, 11:04:17 AM
 #599

why do we need bloaty on-chain anonymity when we have masternodes providing off-chain anonymity that's fit-for-purpose?

Bloat?? bahahaha

http://www.digitaltrends.com/computing/intel-3d-nand-10tb-solid-state-drive/

We will have smaller size in future

https://bitcointalk.org/index.php?topic=972541.0
majamina
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 27, 2015, 11:08:01 AM
 #600

why do we need bloaty on-chain anonymity when we have masternodes providing off-chain anonymity that's fit-for-purpose?

Bloat?? bahahaha

http://www.digitaltrends.com/computing/intel-3d-nand-10tb-solid-state-drive/

yep, nice tech coming there...bottleneck on the network then (half-joking) Smiley

ok you can remove the word 'bloaty' from my statement if you like Smiley
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!