Bitcoin Forum
April 20, 2024, 04:35:14 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 [101] 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 345 »
  Print  
Author Topic: [ANN][XEL] Elastic Project - The Decentralized Supercomputer  (Read 450428 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
Bgjjj2016
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250

Ben2016


View Profile
September 25, 2016, 09:53:30 PM
 #2001

hi EK, we have a great project but not much publicity. Could we have a clear webpage, road map, FAQ,...... ?


publicity will be given the exact moment XEL is added to an exchange and exactly then a webpage and FAQ will be needed. at the moment we are still in the developing and testing stage so publicity would come to soon as you cannot buy any XEL anyways.

justmy2xel.
thank you for your feedback . It makes sense, just no time frame is a little frustrating .

My " I want that Old Toyota Camry very bad" BTC Fund :1DQU4oqmZRcKSzg7MjPLMuHrMwnbDdjQRM
Join the Elastic revolution! Elastic Network: The Decentralized Supercomputer 
ELASTIC WEBSITE|ANNOUNCEMENT THREAD|JOIN THE SLACK
1713630914
Hero Member
*
Offline Offline

Posts: 1713630914

View Profile Personal Message (Offline)

Ignore
1713630914
Reply with quote  #2

1713630914
Report to moderator
Even in the event that an attacker gains more than 50% of the network's computational power, only transactions sent by the attacker could be reversed or double-spent. The network would not be destroyed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
ImI
Legendary
*
Offline Offline

Activity: 1946
Merit: 1019



View Profile
September 25, 2016, 09:56:19 PM
 #2002

hi EK, we have a great project but not much publicity. Could we have a clear webpage, road map, FAQ,...... ?


publicity will be given the exact moment XEL is added to an exchange and exactly then a webpage and FAQ will be needed. at the moment we are still in the developing and testing stage so publicity would come to soon as you cannot buy any XEL anyways.

justmy2xel.
thank you for your feedback . It makes sense, just no time frame is a little frustrating .

i think going on an exchange in 2 months is very realistic.
HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 25, 2016, 10:14:23 PM
 #2003

This leaves the question what to specify as the "weight". The base weight is 0, and "costful" operations such as inserting a variable into the symtab, or doing some elliptic curve arithmetics have some positive weight.

All operations have a cost...

Quote
Putting everything into the verify routine is of course one possibility to circumvent WCET calculation. This leaves us with the question what to account for in the weight? Should we consider 1 as the base weight? Making every operation worth 1 credit, and overriding that value for "more complex operations" which in fact require more operations internally?

I would have to think about it, I have no feeling yet for the correct definition on "weight"  Undecided
Using a base weight of 1 and accounting for the verification weight in the WCET calculation would mitigate this attack for now! Let's do it.

I'm using a "circuit size" comparison.  By synthesizing random logic into both a (minimized) BLIF-MV specification and an ElasticPL program, and then comparing relative gate counts to WCET values, it becomes pretty easy to spot cases where cost is drastically mis-estimated.

Here's a related problem, "HMC Bug #10" aka "1 WCET Indirection Machines" which allow arbitrarily large programs (again, not using the hashing or curve statements) to be encoded with a cost of 1:
The programs:
Code:
verify (m[0] = m[1]) == 1;
and
Code:
verify (m[0] = m[m[m[m[m[m[m[m[m[m[1]]]]]]]]]) == 1;
both have WCET 1, but the second example actually requires 10 times the work in the assignment....

This can also be used with the "boolean expression transform" that I described for the verify case to stuff arbitrarily large programs (even greater than the limit constant) into "1 WCET" programs.

Woops.

(Use of the hash/curve statments can usually be done as well, it just requires a more complex transform "splitting" the program at the statement.)

The RuntimeEstimator will need to count literally every execution cost along the longest path through the control flow.  This includes costs of memory accesses and control flow through shortcut boolean evaluations and... exactly *every* operation that the vm can perform.

anhpt192
Hero Member
*****
Offline Offline

Activity: 628
Merit: 500



View Profile
September 26, 2016, 04:36:32 AM
 #2004

I'll spam with this every new page untill @Lannister will be awaken.

If you want to try XEL ( Elastic ):

Download testnet client https://github.com/OrdinaryDude/elastic-core.
Best if you download it trough git for future easy updates. Install git on your machine and:

git clone https://github.com/OrdinaryDude/elastic-core.git

Watch this video for instructions how to run it https://player.vimeo.com/video/178616474?quality=1080p and paste your address here to receive some XEL for testing and fun.

Also you can get some XEL through faucet: http://elasticexplorer.org/faucet/

For Windows you have to run compile.bat to compile and run.bat to start XEL.




unvoid, there is no file compile.bat in elastic-core folder. I want to test on windows also.
TheDR
Full Member
***
Offline Offline

Activity: 124
Merit: 100


View Profile
September 26, 2016, 10:16:02 AM
 #2005

Wow I am happy to be one of the early donors on this project after luckily finding this. It's exciting to watch this project grow and see new people getting interested.
Evil-Knievel
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
September 26, 2016, 01:28:48 PM
Last edit: September 26, 2016, 02:21:45 PM by Evil-Knievel
 #2006

I seem to be too dumb to reliably estimate the maximum stack space usage, so I (for now) just limit the allowed depth of the AST tree to 512. This should prevent exceeding the available stack space even though it's far from elegant.

The AST Tree depth limit exhaustion is detected *during* parse, and not traversed using BFS after the tree has been built. This prevents another attack where an attacker submits a job with an infinitely deep AST tree in the hope of triggering an out of memory error and shooting down once specific node.
Evil-Knievel
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
September 26, 2016, 03:51:04 PM
Last edit: September 26, 2016, 04:03:20 PM by Evil-Knievel
 #2007

However, you are right, the same computation power does not correspond to the same chance to "shuffle" the correct solution.
When I know which input numbers constitute a correct solution *before*, I can screen the entire random number stream without actually evaluating a single line of the program allowing a speedup by a factor of at most WCET. That would be a variant of the "Faster Algorithm Attack" outlined earlier. This is one problem, that would be great to eliminate (somehow) ... I think noone has come up with a solution to the FAA so far  Wink But after all, this attack is just a "race" where the the "attacker" can merely increase his chances to find Bounty certificates.

Correct, without being able to pre-compute it just becomes, on its own, a variant of FAA.  It is worth noting that, currently, the ratio by which the publisher can increase his chances is quite significant.

I think in combination with another attack it might still have some implications.  I'm still working on a "useful" approach, however.

I was brainstorming with a bunch of guys about this today.
Well, we could not come up with a solution for the bounty fund based FAA attack so far. But this is what we thought of:

1. One solution might be to make the bounties regular POW submissions which pay the very same absolute amount per submission from one single XEL fund. This limits the possibilities significantly, because you would be no longer able to set up very large bounties (which could attract some workers) for solving your task.

2. Otherwise you could stick with the idea of a bounty fund, but pay a fixed portion of it upon submission of a solution. Here, you could only try a race where you submit more bounties than allowed quickly when you see a valid submission online and hope that only yours end up in the block (effectivle all end up in a block but only the first x count). This attack could be further mitigated (not fully eliminated, as the probability of filling the first x spots increases with the number of bounties submitted) by ensuring a pseudo random order in which unconfirmed transactions have to be included in a block. This of course only helps if the attacker is not the forger at the same time. If we went for that solution we lose the funny aspect of people racing each other even after they have submitted bounties with the intention to maintain their percentual amount of bounties amongst all.

3. All ideas that include first submitting the hashes of the bounties and revealing them after they have been included in a block (at a good position so they count) are tricky as we cannot verify such bounties for correctness. This would open all work packages for a broad variety of DOS attacks through the submission of illegitimate bounties. So we would have to use "penalty" here: it could be possible to mitigate the DOS attacks by the requirement to attach a "bounty submission deposit" of x XEL to each unrevealed bounty submission and receiving it back (along with the actual reward) when the solution is revealed within the next x blocks and evaluates correctly. Otherwise the deposit is forfeited. Not sure if we want to go this way though.
HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 26, 2016, 06:09:54 PM
 #2008

1. One solution might be to make the bounties regular POW submissions which pay the very same absolute amount per submission from one single XEL fund. This limits the possibilities significantly, because you would be no longer able to set up very large bounties (which could attract some workers) for solving your task.

I suspect that you will eventually end up combining the pools, anyway.... heh.

Quote
2. Otherwise you could stick with the idea of a bounty fund, but pay a fixed portion of it upon submission of a solution. Here, you could only try a race where you submit more bounties than allowed quickly when you see a valid submission online and hope that only yours end up in the block (effectivle all end up in a block but only the first x count). This attack could be further mitigated (not fully eliminated, as the probability of filling the first x spots increases with the number of bounties submitted) by ensuring a pseudo random order in which unconfirmed transactions have to be included in a block. This of course only helps if the attacker is not the forger at the same time. If we went for that solution we lose the funny aspect of people racing each other even after they have submitted bounties with the intention to maintain their percentual amount of bounties amongst all.

It is perhaps worth noting that it seems there will always be opportunity for races.  A publisher could submit a refund cancellation as soon as they see a PoW/PoB tx announced and try to race it.  One could even immediately submit cancellations as soon as work is published, in hopes of just seeing some "stale" PoW/PoB certificates announced by miners who haven't realized the cancellation yet.  (EDIT: Note that while it is assumed that watching for PoW certs should be "pointless" I'm afraid that it isn't, as I'll illustrate later.  Wink)

Quote
3. All ideas that include first submitting the hashes of the bounties and revealing them after they have been included in a block (at a good position so they count) are tricky as we cannot verify such bounties for correctness. This would open all work packages for a broad variety of DOS attacks through the submission of illegitimate bounties. So we would have to use "penalty" here: it could be possible to mitigate the DOS attacks by the requirement to attach a "bounty submission deposit" of x XEL to each unrevealed bounty submission and receiving it back (along with the actual reward) when the solution is revealed within the next x blocks and evaluates correctly. Otherwise the deposit is forfeited. Not sure if we want to go this way though.

It seems like this could leave a lot of miners unhappy when their deposits aren't returned because of "natural" cause.  (Like a sudden run of "by chance" rapidly forged blocks which do not include their reveal tx, but runs out their "x blocks" counter.)

HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 26, 2016, 06:12:55 PM
 #2009

P.S.
Has the "official" bounty plan been formalized yet?  Grin
ttookk
Hero Member
*****
Offline Offline

Activity: 994
Merit: 513


View Profile
September 26, 2016, 06:14:26 PM
 #2010


(…)
3. All ideas that include first submitting the hashes of the bounties and revealing them after they have been included in a block (at a good position so they count) are tricky as we cannot verify such bounties for correctness. This would open all work packages for a broad variety of DOS attacks through the submission of illegitimate bounties. So we would have to use "penalty" here: it could be possible to mitigate the DOS attacks by the requirement to attach a "bounty submission deposit" of x XEL to each unrevealed bounty submission and receiving it back (along with the actual reward) when the solution is revealed within the next x blocks and evaluates correctly. Otherwise the deposit is forfeited. Not sure if we want to go this way though.


I'm biased, but I think sending hashes first and taxing them somehow is a valid idea. Could you elaborate on why you don't want to go that route?

(…)

It seems like this could leave a lot of miners unhappy when their deposits aren't returned because of "natural" cause.  (Like a sudden run of "by chance" rapidly forged blocks which do not include their reveal tx, but runs out their "x blocks" counter.)


This sounds like a valid concern, but it seems to me, that this is more a problem of balance, i.e. what "x Blocks" means exactly. You could probably make "X" dynamic, maybe by adjusting it every "Y" blocks, but that might open a whole new can of worms…
HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 26, 2016, 06:19:44 PM
 #2011

I seem to be too dumb to reliably estimate the maximum stack space usage, so I (for now) just limit the allowed depth of the AST tree to 512. This should prevent exceeding the available stack space even though it's far from elegant.

The AST Tree depth limit exhaustion is detected *during* parse, and not traversed using BFS after the tree has been built. This prevents another attack where an attacker submits a job with an infinitely deep AST tree in the hope of triggering an out of memory error and shooting down once specific node.

Well obviously submitting an *infinitely* deep program is impossible in finite bandwidth, but yah - there were opportunities to leverage the parser to cripple nodes.

I'll have to re-check one of my remaining (DoS) attacks (which I've been calling the "max backtrack attack") against the parser.  Although I suspect that this change will prevent a node from being knocked out entirely by the attack, I also suspect that the attack could still be used to "temporarily hang" a node.  (Short version explanation:  use the production order of the parser to craft "worst case parse time" expressions and then spam them at a node.)
HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 26, 2016, 06:21:49 PM
 #2012

This sounds like a valid concern, but it seems to me, that this is more a problem of balance, i.e. what "x Blocks" means exactly. You could probably make "X" dynamic, maybe by adjusting it every "Y" blocks, but that might open a whole new can of worms…

Another problem, as mentioned before, is that it precludes people with 0 XEL from becoming work miners to get XEL.  If you want to mine XEL you'd first have to buy XEL, which is less than ideal from the miner's perspective.
ttookk
Hero Member
*****
Offline Offline

Activity: 994
Merit: 513


View Profile
September 26, 2016, 06:26:45 PM
 #2013

This sounds like a valid concern, but it seems to me, that this is more a problem of balance, i.e. what "x Blocks" means exactly. You could probably make "X" dynamic, maybe by adjusting it every "Y" blocks, but that might open a whole new can of worms…

Another problem, as mentioned before, is that it precludes people with 0 XEL from becoming work miners to get XEL.  If you want to mine XEL you'd first have to buy XEL, which is less than ideal from the miner's perspective.

Awww, come on, if you spend xxxxx on mining equipment, buying what is probably a two figure $ amount of XEL is not that big of a deal, is it?

I mean, I get what you mean and XEL will miss out on lots of mining power that is pointed elsewhere due to inconvenience, but it would lose even more mining power, if miners would avoid it because of the risk of being outrun. Kind of a "lesser evil" deal.

Additionally, there may be ways to get XEL "outside" of the system,to incentivise new miners to get in. You could create a loan service, where miners can loan a start amount of XEL for BTC or whatever they have laying around.
Evil-Knievel
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
September 26, 2016, 06:36:24 PM
 #2014

It seems like this could leave a lot of miners unhappy when their deposits aren't returned because of "natural" cause.  (Like a sudden run of "by chance" rapidly forged blocks which do not include their reveal tx, but runs out their "x blocks" counter.)

Awww, come on, if you spend xxxxx on mining equipment, buying what is probably a two figure $ amount of XEL is not that big of a deal, is it?

I mean, I get what you mean and XEL will miss out on lots of mining power that is pointed elsewhere due to inconvenience, but it would lose even more mining power, if miners would avoid it because of the risk of being outrun. Kind of a "lesser evil" deal.

Additionally, there may be ways to get XEL "outside" of the system,to incentivise new miners to get in.

Or you create a loan service, where miners can loan a start amount of XEL for BTC or whatever they have laying around.

Actually, in my scheme you would be able to submit PoW submissions with 0 XEL, just no bounty submissions. SO you would have to keep PoW'ing until you have enough for the bounty deposit fee.

Also having to reveal the bounties in "x blocks" might be very well "x seconds" based on the next blocks' timestamps (which can no be tampered that much by a malicious forger) as well.

Just brainstorming.

Quote
  (EDIT: Note that while it is assumed that watching for PoW certs should be "pointless" I'm afraid that it isn't, as I'll illustrate later.  Wink)

Im really interested ....

Quote
I'll have to re-check one of my remaining (DoS) attacks (which I've been calling the "max backtrack attack") against the parser.  Although I suspect that this change will prevent a node from being knocked out entirely by the attack, I also suspect that the attack could still be used to "temporarily hang" a node.  (Short version explanation:  use the production order of the parser to craft "worst case parse time" expressions and then spam them at a node.)

... and even more! Thanks for everything so far!!
ttookk
Hero Member
*****
Offline Offline

Activity: 994
Merit: 513


View Profile
September 26, 2016, 07:08:06 PM
Last edit: September 26, 2016, 10:04:04 PM by ttookk
 #2015

Ok, this is just me, brainstorming bullshit again. I know, that right now, XEL is supposed to be a standalone currency, and there are a lot of people who want to keep it that way, so that they have tokens to speculate with. I am one of those and to be honest, what makes me most excited is a fat ROI at some point.
However, at the moment, I am working on an idea to create blockchains, that ultimately use tokens backed one-to-one with Bitcoin. The basic idea is that you pay BTC into a generated address and get the corresponding amount of tokens out of it. With this, you get a return address, to which you can send the tokens back. This pays out the corresponding amount of BTC held in the wallet (or parts of it, if only parts get sent in.) to a stated address, burning the tokens. This way, you would have a framework in which you can effectively use BTC, which has some significant advantages:
- You don't have to get XEL somewhere, if you have BTC, you're fine
- If you want to use Elastic, you are not subjected to volatility due to market movements that have nothing to do with XELs usability. Granted, BTC is volatile as well, but is still less volatile than most cryptocurrencies, probably including XEL. I am vary of single-use tokens overall, since i see dangers regarding their worth*, but that is probably besides the point.
- You might incentivise miners to point their power towards XEL, because they can effectively earn BTC directly, probably even mre easily than by traditional mining.

There are obviously a lot of questions to be answered and at this point, this is a mere idea. I am not saying that we should change the direction and move towards the ideas pointed out above, but at some point in the future, it might be interesting to copy XELs code and create something like mentioned above.

This idea is not limited to XEL, but XEL looks like a posterboy use case for it. Ideally, you would create a framework on top of which you can put any blockchain technology, that doesn't require new tokens to be mined (I mean, technically you could implement PoW/PoS in those scenarios, but you would dilute the BTC invested).
This idea is in its very early stages, probably not that unique anyway and if it is, it won't come to life until someone else gets it, too, because I am neither technically nor financially able to execute it.

As I tried to point out, I highly dout that no one is working on exactly this idea, since it sounds really basic to me. I'd love for someone to gie me some pointers where I could read more about it.

Feel free to ignore ths post, btw. just some stuff I had to get off my back.



*In fact, I suspect that volatility is one of the reasons why blockchain technology is not mass-adopted yet. I think the more use cases a currency has, the less volatile it gets.
HunterMinerCrafter
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
September 26, 2016, 10:31:05 PM
 #2016

Actually, in my scheme you would be able to submit PoW submissions with 0 XEL, just no bounty submissions. SO you would have to keep PoW'ing until you have enough for the bounty deposit fee.

Well, that is cool, but I'm still not so sure about the proposition...

Quote
Quote
 (EDIT: Note that while it is assumed that watching for PoW certs should be "pointless" I'm afraid that it isn't, as I'll illustrate later.  Wink)

Im really interested ....

I think that some of the assumed distinctions between PoW and PoB are problematic.  This is directly related to the "really interesting" attacks.

Quote
Quote
I'll have to re-check one of my remaining (DoS) attacks (which I've been calling the "max backtrack attack") against the parser.  Although I suspect that this change will prevent a node from being knocked out entirely by the attack, I also suspect that the attack could still be used to "temporarily hang" a node.  (Short version explanation:  use the production order of the parser to craft "worst case parse time" expressions and then spam them at a node.)

... and even more! Thanks for everything so far!!

Turns out that this is probably far less interesting.  With the current repo state, most of these manifest as java stack exception.  About the most that I can "hang" the parser right now is 3-7 second at a time. (i7@2.5Ghz, sun "jre 8")  Not sure if that is a problem.  Noticed heap GC got a little crazy though, so it might be that it could still be tuned into a combination problem.
Evil-Knievel
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
September 26, 2016, 10:39:23 PM
 #2017

Turns out that this is probably far less interesting.  With the current repo state, most of these manifest as java stack exception.  About the most that I can "hang" the parser right now is 3-7 second at a time. (i7@2.5Ghz, sun "jre 8")  Not sure if that is a problem.  Noticed heap GC got a little crazy though, so it might be that it could still be tuned into a combination problem.

java stack exception as in "maximum allowed AST depth reached?" or a true java stack exception?
In my eyes 7 seconds is bad enough  Wink

I will send you a BTC from my own savings soon, to express my gratitude for helping me with the parser.
We still have to figure out what to do with this awful FAA ;-) And, generally, with all those other "really interesting attacks".

And I hope that we will soon see official bounty bug hunting guidelines here, but until then I strongly assume that you will be rewarded by Lannister for sure  Wink Thanks once again for all your help, without you we would be 10 steps behind.
unvoid
Hero Member
*****
Offline Offline

Activity: 535
Merit: 500



View Profile
September 26, 2016, 10:59:53 PM
 #2018

If you want to try XEL ( Elastic ):

Download testnet client https://github.com/OrdinaryDude/elastic-core.
Best if you download it trough git for future easy updates. Install git on your machine and:

git clone https://github.com/OrdinaryDude/elastic-core.git

Watch this video for instructions how to run it https://player.vimeo.com/video/178616474?quality=1080p and paste your address here to receive some XEL for testing and fun.

Also you can get some XEL through faucet: http://elasticexplorer.org/faucet/

There is no compile script for Windows at the moment but I'll provide pull request to main github with it once I'll have time for it.



If you want to try out a miner:

1. Download it from: https://github.com/OrdinaryDude/elastic-miner
Best if you download it trough git for future easy updates. Install git on your machine and:

git clone https://github.com/OrdinaryDude/elastic-miner.git

2. ./compile.sh
3. ./run.sh
4. Give it your passphrase (after you hit a key make sure visible XEL address is yours)
5. Give it a XEL running daemon IP address (default localhost)
6. Hit enter and submit work to the network in your XEL client UI as shown here https://player.vimeo.com/video/178616474?quality=1080p. If someone else will submit work to the network your miner will automatically start working on it.
7. Example work are here https://github.com/OrdinaryDude/elastic-reference-client/tree/master/elasticpl_examples. no_bounties_found.epl will not found any bounty! Be warned that this is debug job that will just expire after 250 blocks without any submissions.

Suggestions:

run miner with lower cpu priority for optimal experience. Especialy if you running miner on the same machine that you running XEL node.

i. e.

Code:
screen nice -n 20 ./run.sh
20 is lowest possible priority in most linux env.



If you want to update XEL to the newest version:

Stop your node (CTRL + C)
Go to main directory of XEL and:
Code:
git pull
./compile.sh
rm -rf nxt_test_db/
screen ./run.sh



If you want to update miner to the newest version:

Stop your miner (CTRL + C)
Go to main directory of miner and:
Code:
git pull
./compile.sh
screen nice -n 20 ./run.sh

BTC: 1CMgHWx4wkAaAy2FfeCyPdedUExmhGhfi5
XEL: XEL-HCM8-KB6E-YFLK-8BWMF
unvoid
Hero Member
*****
Offline Offline

Activity: 535
Merit: 500



View Profile
September 26, 2016, 11:03:13 PM
 #2019

I strongly assume that you will be rewarded by Lannister for sure  Wink

Let the @Lannister reward us all as community with little help with OP. Give him a sign if you have better contact with him.

Thanks!

BTC: 1CMgHWx4wkAaAy2FfeCyPdedUExmhGhfi5
XEL: XEL-HCM8-KB6E-YFLK-8BWMF
Evil-Knievel
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
September 26, 2016, 11:04:24 PM
 #2020

@unvoid: Maybe we should start writing a Wiki? And we could polish your small tutorial to be published in the OP posting. I am sure if we prepare everything, Lannister will easily swap out the content (am I correct, Lanniser?)


Btw. I have added a compile.bat in the development tree
https://github.com/OrdinaryDude/elastic-core/tree/development
Not sure if it works for the master branch, though.

Quote
Let the @Lannister reward us all as community with little help with OP. Give him a sign if you have better contact with him.

If Bitmessage would only work more reliably. Sometimes I get a message through very quickly, on different days I wait hours to get an "Ack" for my sent message.

We could also consider letting him close this thread and have someone else open a new one? If everyone agrees, of course.
We will also need a reliable person to take care of the website anyway, not sure what happened with Isarmatrose but he registred www.elastic-project.org. Its just that the content is poor at the moment. We could maybe get this domain from him (or convince him to become more active again) to fill it with content.

Examples could be: introduction, programmers reference for elastic PL, download links, faucet and explorer links, some background information on how everything works, ...

The thing is, I am totally busy with the reference client and the programming language parser at the moment so I have no time for a website or anything  Wink
Pages: « 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 [101] 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 345 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!