Bitcoin Forum
May 04, 2024, 01:14:50 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: What do you think about RecoveryCoin?
I'd rather keep trading bitcoin and litecoin forks - 0 (0%)
Stupid idea, it's not probable to recover private keys - 0 (0%)
I'm afraid for my bitcoins so I don't like it - 1 (50%)
All of the above - 0 (0%)
It's cool and I can't wait to mine - 1 (50%)
Total Voters: 2

Pages: « 1 2 3 [4]  All
  Print  
Author Topic: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency with fair mining  (Read 3030 times)
chris190
Legendary
*
Offline Offline

Activity: 1059
Merit: 1000



View Profile
January 23, 2017, 11:33:31 AM
 #61

how to mining?  Huh

                  ▄▄
                 ████▄
                 ██████▄
                 ███ ▀███▄
         ▄████▄▄ ███   ▀███▄
       ▄████████████▄    ▀███▄
     ▄███▀ ███▀▀▀██████▄▄  ███
   ▄███▀  ███    ███ ▀▀███████
 ▄███▀    ███    ███     ▀███
████▄▄▄▄▄███▄▄▄▄  ▀  ▄▄▄▄███▄▄▄▄▄▄▄
█████████████████   █████████████████
  ▀▀▀▀▀▀▀███▀▀▀▀  ▄  ▀▀▀▀███▀▀▀▀▀████
        ███▄     ███    ███    ▄███▀
       ███████▄▄ ███    ███  ▄███▀
       ███  ▀▀██████▄▄▄███ ▄███▀
       ▀███▄    ▀████████████▀
         ▀███▄   ███ ▀▀████▀
           ▀███▄ ███
             ▀██████
               ▀████
                 ▀▀
4NEW
███
███  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █
███
THE WORLD'S FIRST TANGIBLE WASTE TO ENERGY BLOCKCHAIN
✥     ANN Thread     ✥     Whitepaper     ✥     Facebook     ✥     Twitter     ✥     Telegram     ✥

        ███
    █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
    █  ███
        ███

                                ███
                                ███
                                ███
                        ███  ███
                        ███  ███
                ███  ███  ███
                ███  ███  ███
        ███  ███  ███  ███
███  ███  ███  ███  ███
███  ███  ███  ███  ███
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
1714785290
Hero Member
*
Offline Offline

Posts: 1714785290

View Profile Personal Message (Offline)

Ignore
1714785290
Reply with quote  #2

1714785290
Report to moderator
MirkoIta
Legendary
*
Offline Offline

Activity: 1667
Merit: 1008


Stoned & Stranged


View Profile WWW
January 23, 2017, 11:37:01 AM
 #62

how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes

ARE YOU LOOKING FOR AN ENGLISH TO ITALIAN TRANSLATOR? HIRE ME ON https://fivebucks.com/users/MirkoItalia            
     ONLY BITCOIN SV ACCEPTED
JimmyRecard
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
January 23, 2017, 11:40:21 AM
 #63

how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes

After the dev uses your private keys that you send to him so he can create REC coins from them for you.....  Roll Eyes Cheesy

bitalchemists (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
January 23, 2017, 11:45:45 AM
 #64

You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
JimmyRecard
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
January 23, 2017, 12:02:01 PM
 #65

You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.

Did you really just use a comma before an and..... ?

Very Professional Cheesy

AmoreJaz
Legendary
*
Offline Offline

Activity: 3094
Merit: 1102


Leading Crypto Sports Betting & Casino Platform


View Profile
January 23, 2017, 12:06:55 PM
 #66

The idea is great and the concept even Greater! people should give this a shot if nothing else to advance their personal aptitude!
i am totally unsure if this will go far or not as i may not be the right person to ask !
But the idea could spin in many different ways and could be a gold mine if the devs keep a solid ground and are with serious intentions to developing this even further!
ATTA BOY!

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
chris190
Legendary
*
Offline Offline

Activity: 1059
Merit: 1000



View Profile
January 23, 2017, 12:13:28 PM
 #67

how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes


wow, then I become rich!  Grin

                  ▄▄
                 ████▄
                 ██████▄
                 ███ ▀███▄
         ▄████▄▄ ███   ▀███▄
       ▄████████████▄    ▀███▄
     ▄███▀ ███▀▀▀██████▄▄  ███
   ▄███▀  ███    ███ ▀▀███████
 ▄███▀    ███    ███     ▀███
████▄▄▄▄▄███▄▄▄▄  ▀  ▄▄▄▄███▄▄▄▄▄▄▄
█████████████████   █████████████████
  ▀▀▀▀▀▀▀███▀▀▀▀  ▄  ▀▀▀▀███▀▀▀▀▀████
        ███▄     ███    ███    ▄███▀
       ███████▄▄ ███    ███  ▄███▀
       ███  ▀▀██████▄▄▄███ ▄███▀
       ▀███▄    ▀████████████▀
         ▀███▄   ███ ▀▀████▀
           ▀███▄ ███
             ▀██████
               ▀████
                 ▀▀
4NEW
███
███  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █  █
███  █
███
THE WORLD'S FIRST TANGIBLE WASTE TO ENERGY BLOCKCHAIN
✥     ANN Thread     ✥     Whitepaper     ✥     Facebook     ✥     Twitter     ✥     Telegram     ✥

        ███
    █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
█  █  ███
    █  ███
        ███

                                ███
                                ███
                                ███
                        ███  ███
                        ███  ███
                ███  ███  ███
                ███  ███  ███
        ███  ███  ███  ███
███  ███  ███  ███  ███
███  ███  ███  ███  ███
mvl
Newbie
*
Offline Offline

Activity: 32
Merit: 0


View Profile
January 23, 2017, 12:19:47 PM
 #68

You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me but please prove me wrong.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.


For the non-technical people: the "whitepaper" may seem to use some impressive words, but if you have a technical/cryptographical/software development background, it raises more questions than it answers. In fact, a number of sentences in the whitepaper are technical nonsense, and others are fundamentally wrong.
bitalchemists (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
January 23, 2017, 12:33:42 PM
 #69

You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.



Thank you for your interest in the internals of our technology. Right now, we are talking about generating an address:

1. Private keys are 32 byte, randomly generated by a secure random class, same as bitcoin.
2. The ECDSA curve used here is sepc256k1.
3. The 64 byte point is the curve's generator multiplied n times (where n=private key). Then you have 32 bytes for the X coordinate and 32 for the Y.
4. These 64 bytes are split into 4 chunks of 16 bytes, where each position is added up modulo 256, resulting in 16 bytes.
5. Network bytes are used to identify the network (testnet/mainnet/other) and to validate the address (instead of checksum). The network bytes are also added up modulo 256.
6. If all 16 bytes are below 100, then it's a valid address. This does not reduce entropy of the private key generator, it's not even related to that. If you check it, it makes it difficult to generate the address therefore making it difficult to brute-force attack it.

Hope that helps.
Pages: « 1 2 3 [4]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!