Bitcoin Forum
April 25, 2024, 11:15:37 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 [836] 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 »
  Print  
Author Topic: [ANN][KMD][dPoW] Komodo - An Open, Composable Smart Chain Platform, Secured by B  (Read 1191683 times)
R-J-F
Sr. Member
****
Offline Offline

Activity: 1078
Merit: 310


AKA RJF - Member since '13


View Profile
October 19, 2018, 05:04:20 PM
 #16701

KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."

"Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." Ben Franklin
TalkImg was created especially for hosting images on bitcointalk.org: try it next time you want to post an image
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
VoskCoin
Sr. Member
****
Offline Offline

Activity: 1414
Merit: 487


YouTube.com/VoskCoin


View Profile WWW
October 19, 2018, 06:09:21 PM
 #16702

Covered KMD some as well as a new independent chain that has a lot of contributions from the KMD devs PIRATE

https://www.youtube.com/watch?v=YCRwXTW95Kc

Check out my Crypto YouTube channel
https://www.youtube.com/VoskCoin
If you enjoy my content click Subscribe
dolvelan
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
October 19, 2018, 06:18:14 PM
 #16703

Covered KMD some as well as a new independent chain that has a lot of contributions from the KMD devs PIRATE

https://www.youtube.com/watch?v=YCRwXTW95Kc
https://i.imgur.com/dDvkqCGl.jpg
Big up to the team, they are doing a very excellent job. Eventually those hard work will be pay off massively.
Sab69
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
October 19, 2018, 06:32:31 PM
 #16704

KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust
polycryptoblog
Sr. Member
****
Offline Offline

Activity: 383
Merit: 252


View Profile
October 19, 2018, 06:56:33 PM
 #16705

KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust

Prove to me that someone has the key
Sab69
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
October 19, 2018, 10:19:11 PM
 #16706

KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust

Prove to me that someone has the key

Its your Choice to invest in a project where human trust is needed. I can also put my money on a bank. Instead of investing in blockchain.

With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.

Its not possible for digital money to become global money   if its not 100% trustless.

Why should the mayority choose trusted digital money if there are other better trustless solutions out there.
hansen.ng
Sr. Member
****
Offline Offline

Activity: 632
Merit: 250



View Profile
October 19, 2018, 11:43:39 PM
 #16707



Its your Choice to invest in a project where human trust is needed. I can also put my money on a bank. Instead of investing in blockchain.

With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.

Its not possible for digital money to become global money   if its not 100% trustless.

Why should the mayority choose trusted digital money if there are other better trustless solutions out there.
Sorry bud, but it's already global , there are buyers from Russia, South Korea, India, Indonesia, China , European countries , African countries , etc , more to come. You have to always trust in human bud, even in bitcoin, trust that there will always be human who will deem it valuable.

.
PROTECTING YOUR PRIVACY
WITH BITCOIN'S HASHRATE






.
POWERS SuperNET
TECHNOLOGY
.
░░░░░░░░░▀▀▀█████████
░░░░░░░░░░░░░░░████████
░░░░▄███████▄░░░░████████
░░░░███████████░░░░██████
░░░▀███████████░░░░████░░
███▄░░░░░░░░░░▀████░░░███░░██
█████▄▄▄▄▄▄▄▄▄▄▄████░░░██░░██
█████████████▄░░████░░░░░
░░█████████████░░█████
░░░░█████████▀░░░██████▌
░░░░░░░▀▀▀▀░░░░▄████████▌
░░░░░░░░░░▄▄▄▄███████
SuperNET.org
ComputerGenie
Hero Member
*****
Offline Offline

Activity: 1092
Merit: 552


Retired IRCX God


View Profile
October 20, 2018, 12:22:54 AM
 #16708

...
Its not possible for digital money to become global money   if its not 100% trustless.

Why should the mayority choose trusted digital money if there are other better trustless solutions out there.
Said no one who understands how post-1987 banking works, ever....

If you have to ask "why?", you wouldn`t understand my answer.
Always be on the look out, because you never know when you'll be stalked by hit-men that eat nothing but cream cheese....
alevlaslo
Hero Member
*****
Offline Offline

Activity: 1988
Merit: 593


View Profile
October 20, 2018, 07:21:38 AM
 #16709



With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.


China may an attack 51% on the bitcoin, so the ETH is better

Sale the first NFT of the first foto
Sab69
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
October 20, 2018, 09:34:49 AM
 #16710

I think if KMD switch to a trustless setup it will be golden. I Hope that they can make the swith soon with new tech.
ComputerGenie
Hero Member
*****
Offline Offline

Activity: 1092
Merit: 552


Retired IRCX God


View Profile
October 20, 2018, 12:51:46 PM
 #16711

China may an attack 51% on the bitcoin, so the ETH is better
True story:
China is a total sum of 4 blocks in size and everyone does everything together.
 Roll Eyes

If you have to ask "why?", you wouldn`t understand my answer.
Always be on the look out, because you never know when you'll be stalked by hit-men that eat nothing but cream cheese....
hansen.ng
Sr. Member
****
Offline Offline

Activity: 632
Merit: 250



View Profile
October 20, 2018, 01:36:58 PM
 #16712



With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.


China may an attack 51% on the bitcoin, so the ETH is better
ETH doesn't need attacker, it's users can attack itself, cryptokitties is doing a great job at attacking, more dapps will be attacking soon Cheesy

.
PROTECTING YOUR PRIVACY
WITH BITCOIN'S HASHRATE






.
POWERS SuperNET
TECHNOLOGY
.
░░░░░░░░░▀▀▀█████████
░░░░░░░░░░░░░░░████████
░░░░▄███████▄░░░░████████
░░░░███████████░░░░██████
░░░▀███████████░░░░████░░
███▄░░░░░░░░░░▀████░░░███░░██
█████▄▄▄▄▄▄▄▄▄▄▄████░░░██░░██
█████████████▄░░████░░░░░
░░█████████████░░█████
░░░░█████████▀░░░██████▌
░░░░░░░▀▀▀▀░░░░▄████████▌
░░░░░░░░░░▄▄▄▄███████
SuperNET.org
oblox
Legendary
*
Offline Offline

Activity: 1442
Merit: 1018


View Profile
October 20, 2018, 05:27:06 PM
 #16713



With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.


China may an attack 51% on the bitcoin, so the ETH is better
ETH doesn't need attacker, it's users can attack itself, cryptokitties is doing a great job at attacking, more dapps will be attacking soon Cheesy

*spits out coffee*
hiphoptrail
Jr. Member
*
Offline Offline

Activity: 462
Merit: 2


View Profile
October 21, 2018, 11:00:16 AM
 #16714

  author=hansen.ng link=topic=1605144.msg47082727#msg47082727 date=1540042618]


With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.


China may an attack 51% on the bitcoin, so the ETH is better
ETH doesn't need attacker, it's users can attack itself, cryptokitties is doing a great job at attacking, more dapps will be attacking soon Cheesy
[/quote]

 Cheesy Cheesy
fast2fix
Legendary
*
Offline Offline

Activity: 1612
Merit: 1001


View Profile
October 21, 2018, 01:47:25 PM
 #16715



With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.


China may an attack 51% on the bitcoin, so the ETH is better
i don't think they will do such an idiotic thing [even if it was possible] , they make money off bitcoin why would they go on destroying that?
altcoin.wallet
Newbie
*
Offline Offline

Activity: 124
Merit: 0


View Profile WWW
October 23, 2018, 09:03:04 AM
 #16716

Hello! We are the developers of the mobile wallet Altcoin Wallet. Now we add to the wallet different coins. Is there a desire to be added to the wallet? Payment only after we add your coin and you'll like it.

for listing we take 0.2 BTC

The following coins have already been added:

- GoaCoin
- Innova
- Crowdcoin
- Innova
- Rapture
- Trezar
- Emergency
- Sobercoin
- Unitus

Our Website: https://altcoin-wallet.online/
Play Market: https://play.google.com/store/apps/details?id=com.altcoin.wallet
for questions to contact:
Email - altcoin.wallet.info@gmail.com
yubit
Hero Member
*****
Offline Offline

Activity: 796
Merit: 529



View Profile
October 24, 2018, 03:22:36 PM
 #16717

tell please, can I use new Agama version 0.2.43a or it is for test only?

   
████▄▄████████████▄▄████
██▄██████████████████▄██
██████████████████████
████████████████████████
█████████████████████
████████████████████████
████████████████████████
█████████████████████
████████████████████████
██████████████████████
██▀██████████████████▀██
████▀▀████████████▀▀████
  Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
Ҝ
MrSunshine
Sr. Member
****
Offline Offline

Activity: 1181
Merit: 259


View Profile
October 24, 2018, 05:25:51 PM
 #16718

tell please, can I use new Agama version 0.2.43a or it is for test only?

They wouldn't put it on their website unless it was tested and ready.
Pink Panther
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
October 24, 2018, 08:07:57 PM
 #16719

What's up guys. Any handy fuide for barter-dex aroung? I don't my assets in barter-dex after loading my seed in.
yorklab
Full Member
***
Offline Offline

Activity: 223
Merit: 105


Utrum OOT


View Profile
October 25, 2018, 12:36:15 AM
 #16720

tell please, can I use new Agama version 0.2.43a or it is for test only?

The latest is 2.42c.

★   utrum   ★   Your Crypto Playbook   ★   Got an opinion? Get paid for it!   ★
●  ●  WHITE PAPER   |   EXCHANGES   |   ANN THREAD  ●  ●
TWITTER   ▬   FACEBOOK   ▬   LINKEDIN   ▬   GITHUB   ▬   YOUTUBE
Pages: « 1 ... 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 [836] 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!