Bitcoin Forum
November 05, 2024, 08:42:20 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 [144] 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 ... 265 »
  Print  
Author Topic: Official Anoncoin chat thread (including history)  (Read 530651 times)
mullick
Legendary
*
Offline Offline

Activity: 1064
Merit: 1002


View Profile
September 22, 2014, 06:30:48 PM
 #2861

Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved
Simcom
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
September 22, 2014, 07:23:35 PM
 #2862

Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved

We still don't really know what's going on right?  Transactions are not being incorporated into blocks for some unknown reason?  Are you sure it's related to transaction size?  If so what is the largest txn you can make before it becomes an issue?
LucyLovesCrypto
Sr. Member
****
Offline Offline

Activity: 414
Merit: 251


View Profile
September 22, 2014, 07:50:55 PM
 #2863

Thank you for merging inputs.

Over what transaction size is there an issue? Is the size (in terms of # of ANC involved) at all relevant for the deposits or withdrawals getting stuck? Or is it purely a matter of transaction size?

Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved
AnonCoinTwitter
Full Member
***
Offline Offline

Activity: 158
Merit: 100


View Profile
September 22, 2014, 07:58:06 PM
 #2864

I think it is fine to ask technical questions in this forum. However please be respectful of others whenever possible.

New potential investors will read this page (especially as we approach Zerocoin launch) and we want to give the best possible impression.

Many questions can already be answered by the Wiki page:
https://wiki.anoncoin.net/Anoncoin_Wiki

Gnosis-
Member
**
Offline Offline

Activity: 101
Merit: 10


View Profile
September 22, 2014, 08:20:19 PM
 #2865

Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved

Hi, it looks like none of us replied to you yet. Sorry about that.

So the problem is that some Cryptsy transactions are not being relayed, but they are valid if in a block, correct?

I can look at the transaction relaying logic in the Anoncoin code to see what exactly is responsible for this. Could you please give me a transaction that is relayed and a transaction that is not relayed (both hex-encoded)?

ANC:AU4hFCFZLhB2gTyG4VbaEurXGrTMNW2nu6 | BTC: 14QnfqVG3CqLGBYHgD8tPYJVLxQ2AfvPEx | GPG: E6D0 96DE 5B3E 16C7 C57F  DC3B 654D BB7A D847 993A
GroundRod
Full Member
***
Offline Offline

Activity: 206
Merit: 100


View Profile
September 22, 2014, 08:31:21 PM
 #2866

@Gnosis - wow quick response & sounded to me, like the right place to look too.

@AnonCoinTwitter - Ya agree, it's just difficult when more than 1/2 the posts are from those whom wish the project to fail.
Gnosis-
Member
**
Offline Offline

Activity: 101
Merit: 10


View Profile
September 22, 2014, 11:27:34 PM
 #2867

Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

ANC:AU4hFCFZLhB2gTyG4VbaEurXGrTMNW2nu6 | BTC: 14QnfqVG3CqLGBYHgD8tPYJVLxQ2AfvPEx | GPG: E6D0 96DE 5B3E 16C7 C57F  DC3B 654D BB7A D847 993A
alincoln
Full Member
***
Offline Offline

Activity: 175
Merit: 100


View Profile
September 22, 2014, 11:38:03 PM
 #2868

Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?
Simcom
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
September 22, 2014, 11:56:41 PM
 #2869

Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?
Gnosis-
Member
**
Offline Offline

Activity: 101
Merit: 10


View Profile
September 23, 2014, 12:15:11 AM
 #2870

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.

ANC:AU4hFCFZLhB2gTyG4VbaEurXGrTMNW2nu6 | BTC: 14QnfqVG3CqLGBYHgD8tPYJVLxQ2AfvPEx | GPG: E6D0 96DE 5B3E 16C7 C57F  DC3B 654D BB7A D847 993A
flagshipbtc
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
September 23, 2014, 01:44:22 AM
 #2871

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.

Was going to stay out of this bickering but something is definitely rotten here.

A lot of anonymous coins are coming out.
Most of the newer ones are both 'trustless' and do not involve introducing new variables that could serve as back doors.

So many people here are trying to force others to trust Anoncoin and Zerocoin. I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.
robinson5
Full Member
***
Offline Offline

Activity: 130
Merit: 100


View Profile
September 23, 2014, 02:37:50 AM
 #2872

Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

Thanks for clearing all that up!
Simcom
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
September 23, 2014, 04:06:51 AM
 #2873

I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.

Oh god, another day-old trolling account.  :/
sorrros
Full Member
***
Offline Offline

Activity: 954
Merit: 104


ludenaprotocol.io


View Profile
September 23, 2014, 04:08:51 AM
 #2874


Was going to stay out of this bickering but something is definitely rotten here.

A lot of anonymous coins are coming out.
Most of the newer ones are both 'trustless' and do not involve introducing new variables that could serve as back doors.

So many people here are trying to force others to trust Anoncoin and Zerocoin. I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.

Great, it seems you already know where not to invest; it's half the problem solved.
Now you only need to figure out what anonymous coin is right for you. Feel free to PM me for a 101 introduction and some investment tips; i can help you !


► LudenaProtocol ◄ ♦️ A Gamified Social Platform for Worldwide Gamers ♦️ ► LudenaProtocol ◄
───●●───●●───●●───●●───●●─[   Bounty Detective   ]─●●───●●───●●───●●───●●───
Website|Twitter|Medium|Telegram|Instagram|Whitepaper
niteglider
Full Member
***
Offline Offline

Activity: 126
Merit: 100

Lean into the curves.


View Profile
September 23, 2014, 11:26:24 AM
 #2875

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.

Was going to stay out of this bickering but something is definitely rotten here.

A lot of anonymous coins are coming out.
Most of the newer ones are both 'trustless' and do not involve introducing new variables that could serve as back doors.

So many people here are trying to force others to trust Anoncoin and Zerocoin. I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.

Welcome to the forum.... if you are genuinely interested and not like some others who are new here.

Actually the opposite is true.  Shrill posters are attempting to force us to not trust in ANC/ZC in spite of the fact that they are not reading the readily available info, and in spite of contradicting themselves while searching for potential weak points to exploit in what seem to be childishly repetitive arguments.

Mostly we have let them harp on the points they have chosen, until the have enough rope to hang themselves, and then we show how they are wrong/misinformed/lying.

Most of us here who have been posting for a year or more have read what's out there... many have contributed in fact, as they are able. 

The trolls therefore seem to be focused on the new arrivals and those with casual interest in ANC.  First they argued against holding the posting of code until ZC is live on the main net; then they tried to harp on the missed deadlines; they have attacked devs directly; now they are trying to exploit a slightly complicated implementing of the method of blind encryption the devs have chosen to create the anonymous mixing of coins.

Stick around all who are interested.  All will be made clear very soon, and then all the fakes and fakers will be forced to sit down and shut up.  Personally, I'm looking forward to that.

varun555
Full Member
***
Offline Offline

Activity: 182
Merit: 100


View Profile
September 23, 2014, 12:07:22 PM
 #2876

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.

Was going to stay out of this bickering but something is definitely rotten here.

A lot of anonymous coins are coming out.
Most of the newer ones are both 'trustless' and do not involve introducing new variables that could serve as back doors.

So many people here are trying to force others to trust Anoncoin and Zerocoin. I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.

Welcome to the forum.... if you are genuinely interested and not like some others who are new here.

Actually the opposite is true.  Shrill posters are attempting to force us to not trust in ANC/ZC in spite of the fact that they are not reading the readily available info, and in spite of contradicting themselves while searching for potential weak points to exploit in what seem to be childishly repetitive arguments.

Mostly we have let them harp on the points they have chosen, until the have enough rope to hang themselves, and then we show how they are wrong/misinformed/lying.

Most of us here who have been posting for a year or more have read what's out there... many have contributed in fact, as they are able. 

The trolls therefore seem to be focused on the new arrivals and those with casual interest in ANC.  First they argued against holding the posting of code until ZC is live on the main net; then they tried to harp on the missed deadlines; they have attacked devs directly; now they are trying to exploit a slightly complicated implementing of the method of blind encryption the devs have chosen to create the anonymous mixing of coins.

Stick around all who are interested.  All will be made clear very soon, and then all the fakes and fakers will be forced to sit down and shut up.  Personally, I'm looking forward to that.

I am too!!!!
matthewh3
Legendary
*
Offline Offline

Activity: 1372
Merit: 1003



View Profile WWW
September 23, 2014, 12:11:42 PM
 #2877

Anoncoin's Zerocoin protocol is by far the most difficulty anonymous transaction technique to implement.  It's not a matter of using 'big' words to try and confuse people.  It's very complex and that's why no one else has managed to date to implement Zerocoin.  Although if implemented successfully it will offer by far the most anonymous transaction technique.

gunzeon
Member
**
Offline Offline

Activity: 73
Merit: 10


There's a new king in the streets


View Profile
September 23, 2014, 02:05:14 PM
 #2878

More infos: http://blog.agilebits.com/2014/04/01/large-even-prime-number-discovered/

read down a bit my friend:

What to trust in this article says:

This article was posted on April 1, 2014. The claim that an even prime number other than two has been found is bogus. The notion of odd and even holds for all integers, no matter how large. The fictitious University of Southern North Dakota at Hoople is the creation of the real Peter Schickele. The fictitious mathematician Paul Forester is my resurrection of the great 20th century mathematician, Pál Erdős. Everything else here is actually meant to be reliable information. Including those bits that are un-ee-cue in all the world.

Joke's on you !!! so be careful or you'll become laughing stock !

BTC: 1gunzeo8X7iYznsnmgveUQDuRj6vhzyK6 ~~~
lunokhod2
Sr. Member
****
Offline Offline

Activity: 249
Merit: 250


View Profile
September 23, 2014, 04:45:40 PM
 #2879

We've made some progress on the wiki article Anonymity of cryptocurrencies, but is still needs some work. Who is up for a challenge?
ToxicDartFrog
Full Member
***
Offline Offline

Activity: 196
Merit: 104



View Profile
September 23, 2014, 05:01:28 PM
 #2880

There is a big mistake with your probability and timespan to broke the 13 RSA keys. You take in consideration that the attacker will do only one attack per key. If the attacker do multiple attacks on the 13 keys at the same time, the timespan to broke them decrease considerably.

For someone who clearly doesn't understand probability you sure have a lot to say. I'd recommend if you don't believe in ZC go find a different coin to invest in or possibly contribute something useful to this project. I doubt the latter as you're obviously here to post pre-written wall-of-text talking points by someone who funds you. It's kind of weak trolling. You may have been more convincing if you wrote less and didn't post with the name "rsa_ufo_attack" LOL
Pages: « 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 [144] 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 ... 265 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!