AgentME
Member
Offline
Activity: 84
Merit: 10
|
|
July 24, 2013, 11:22:02 PM |
|
There are thousands of developers creating open source software with Agile methodology. But the bottom line here is trust. I hope you get that. Phil Zimmerman's PGP made such a big splash not because it was such strong encryption—public key encryption had been around for over a decade—but because the cryptographic strength did not lie in obscurity, it was in the math. So it was released to the world source code and all and could not be taken back. It created a life of its own because it could be trusted. It could be reviewed by anyone to ensure that there were (are) no government (or other) back-doors. People knew it could be counted on because even if they didn't know the math or know how to read source code, they could find someone of their own choosing to look it over and make sure it was safe. The strength is in the transparency. Every detail of how it works has to be open to scrutiny because that's the only way you know that it works. I'm not an open source zealot. I use a closed-source word processor, closed-source graphics software, a closed-source database manager, play closed-source games. Heck, I might even use a closed-source Bit(or other)coin wallet if I had reason to trust the developer. But not if I didn't know that the system worked exactly the same way on open-source versions. The backbone of the monetary system is like a privacy system. There is only one way to be trusted, and that is transparency. Please read https://www.philzimmermann.com/EN/faq/index.htmlGovernment controls money because it is too important to be left in the hands of private interests. Bitcoin's existence is a declaration that money is too important to be left in the hands of government, and that money needs to exist as a transparent ecosystem. That bell can't be unrung. A closed-source cryptocoin, even with a promise that someday it will be opensourced, is not one but two steps backward to privately-issued money. The assumption really has to be that if we can't see the source, that you will be placing all sorts of devious software into the code, which you will let run for a year before removing and releasing the new version without all the nastiness. Even if I believe you when you say you won't do that, I have to assume that you will. You trust your mother, but you still cut the deck when you play cards with her. Trust, but verify. An open source monetary system gives us liberty. A closed source monetary system at best gives us license. You will do whatever you will do, but I hope that you will take the time to consider the opportunity for advancement that you are planning to squander and dispose of. That's an excellent post. 1) closed source for 12 months in order to stress-test the system and avoid silly things like forced Bitcoin-qt update
What does being closed source have anything to do with updates?
|
|
|
|
ohiwastedmylif
Member
Offline
Activity: 98
Merit: 10
|
|
July 24, 2013, 11:29:11 PM |
|
What does being closed source have anything to do with updates?
Not agreeing with them at all, but closed source allows them to protect IP for as long as possible and prevent competitors from copying code. I read in the forums another reason for it being closed-source was that it would allow them to push out updates, hard forks / forks, without the need to update clients and whatnot. The coin is not using the normal QT but rather a Java application so the update system will be different I would assume. Feel free to correct me if I am wrong.
|
|
|
|
smscotten
|
|
July 24, 2013, 11:58:39 PM |
|
Ok, so I hear many of you screaming the two reasons for eMunie's failure: 1) closed source for 12 months in order to stress-test the system and avoid silly things like forced Bitcoin-qt update 2) logo resembling IE? with professional looking " " $ sign that for some reason looks more innovative than the rest of the bunch So if eMunie fails it's either because of Dan or because of me or because of the eMunie community, fair enough! We get it. Anything else? I got no problem with your logo. And I never said that you would fail. I'm saying that you have responded to a need with something that doesn't fulfill the need. It's like you're a Tory showing up in a New Jersey bar in 1777, wondering why you're getting dirty looks after wondering aloud how Parliament will finally deal with those pesky colonials. I don't pretend to predict whether your coin will be a success or a failure. I hope it personally makes you a lot of wealth. But you are fighting against the side of freedom and that's not a fight I would want to take up. I can understand how you might be kind of butthurt about the response here to a project you have every right to be proud of, but you ought not be surprised that people who are fervent about transparency wouldn't support a closed-source money. Even just for twelve months. "Closed source only for the first twelve months" is like saying "drink up! The poison is only in the top half of the cup."
|
|
|
|
GSnak
|
|
July 25, 2013, 12:02:47 AM |
|
Not really, since no one is compelled by anything to use this coin. Also, the chances of mass public adoption within the first 12 months are low.
|
|
|
|
AgentME
Member
Offline
Activity: 84
Merit: 10
|
|
July 25, 2013, 01:14:44 AM |
|
Not really, since no one is compelled by anything to use this coin. Also, the chances of mass public adoption within the first 12 months are low.
That sounds like a self-fulfilling prophecy, if you make it closed source at first because you don't think it will be popular anyway at first. Not getting popular ever is also a possibility.
|
|
|
|
eCoinomist
Member
Offline
Activity: 112
Merit: 10
Independent Analyst
|
|
July 25, 2013, 01:25:08 AM |
|
I don't pretend to predict whether your coin will be a success or a failure. I hope it personally makes you a lot of wealth. But you are fighting against the side of freedom and that's not a fight I would want to take up. I can understand how you might be kind of butthurt about the response here to a project you have every right to be proud of, but you ought not be surprised that people who are fervent about transparency wouldn't support a closed-source money.
First, it's not a "coin". Second, it's not mine, I only did graphic stuffs. And I don't intend to fight against anything you've mentioned. This is community project, has never been and will never be mine. Don't understand where did you get hat info from. Dan, the founder, hasn't posted a thing in this thread. lol, and no way can I be butthurt, the only person who may be is Etlase2. As a professional designer, I know better than any trolls in this btt forum when something is mimic, similar or just copy-cat. And my logo design clearly falls into none. Besides using the same letter e, there is literally zero similarity with IE logo. If they are similar, then Facebook must have been successful at accusing Twitter of copying their logo icon by simply reverting the "f" letter to "t"!!! Upset trolls will always do what they can, and that means clinging to personal attacks. Sorry to disappoint, but so far I'm not hurt even slightly ROFL
|
|
|
|
Etlase2
|
|
July 25, 2013, 01:38:05 AM |
|
I am not butthurt, and especially not about your logo as your poor formatting would seem to imply. I called out bitcoin's bullshit within a week of learning of it, and my account was squelched, that is why this one is named Etlase2. I have also not resorted to personal attacks--referring to the fact that you lack significant knowledge in the area of distributed networking is not a personal attack, it is the obvious truth. Whenever I bring this up, you ignore it because you know it is true. Have I called out the emunie devs for being full of shit? Absolutely, as is my right to post on the internet until the local powers that be decide I need to be silenced. I'm not giving emunie any leeway because of promises and wishes, facts need to be provided, plain and simple. When that starts happening, I will shut up about the lack of facts and spend a little time on pointing out flaws if I can find any. To interpret this as being butthurt is your prerogative, but all it does is reek of fanboyism and continuing the lie-filled PR box surrounding cryptocurrencies that started with the huge pyramid scheme known as bitcoin.
|
|
|
|
mrvegad
|
|
July 25, 2013, 01:43:33 AM |
|
What does being closed source have anything to do with updates?
Not agreeing with them at all, but closed source allows them to protect IP for as long as possible and prevent competitors from copying code. I read in the forums another reason for it being closed-source was that it would allow them to push out updates, hard forks / forks, without the need to update clients and whatnot. The coin is not using the normal QT but rather a Java application so the update system will be different I would assume. Feel free to correct me if I am wrong. The beta is in java but the final client will be in c++
|
|
|
|
ohiwastedmylif
Member
Offline
Activity: 98
Merit: 10
|
|
July 25, 2013, 02:10:23 AM |
|
What does being closed source have anything to do with updates?
Not agreeing with them at all, but closed source allows them to protect IP for as long as possible and prevent competitors from copying code. I read in the forums another reason for it being closed-source was that it would allow them to push out updates, hard forks / forks, without the need to update clients and whatnot. The coin is not using the normal QT but rather a Java application so the update system will be different I would assume. Feel free to correct me if I am wrong. The beta is in java but the final client will be in c++ Yes but will still within a Java application and not using the typical QT.
|
|
|
|
Etlase2
|
|
July 25, 2013, 02:21:57 AM |
|
The "typical" QT? emunie is not a bitcoin clone, buddy.
|
|
|
|
eCoinomist
Member
Offline
Activity: 112
Merit: 10
Independent Analyst
|
|
July 25, 2013, 03:37:05 AM |
|
I am not butthurt, and especially not about your logo as your poor formatting would seem to imply. I called out bitcoin's bullshit within a week of learning of it, and my account was squelched, that is why this one is named Etlase2. I have also not resorted to personal attacks--referring to the fact that you lack significant knowledge in the area of distributed networking is not a personal attack, it is the obvious truth. Whenever I bring this up, you ignore it because you know it is true. Have I called out the emunie devs for being full of shit? Absolutely, as is my right to post on the internet until the local powers that be decide I need to be silenced. I'm not giving emunie any leeway because of promises and wishes, facts need to be provided, plain and simple. When that starts happening, I will shut up about the lack of facts and spend a little time on pointing out flaws if I can find any. To interpret this as being butthurt is your prerogative, but all it does is reek of fanboyism and continuing the lie-filled PR box surrounding cryptocurrencies that started with the huge pyramid scheme known as bitcoin.
Agree, my formatting was pure, in the rush to push post button. What I meant to imply is that you are butthurt because Dan took your ideas and implemented them while you are still musing over your white paper, which Dan still seems to lack to date. I did not imply that you were resorting to personal attacks, it were the other people, I know you just want your factual questions answered, which none of us who have posted inthis thread has been able to answer so far. And just to clarify, my ideas regarding filtering MAC Addresses are not silly, I was well aware of the fact that it can be gamed, but your too technical mind never seemed to understand the real purpose of doing so - it was to make gaming the system costly and troublesome, not impossible. People only want to break rules when there is an economic advantage for them to do so. Take that economic advantage away and they wouldn't even bother doing it.
|
|
|
|
ohiwastedmylif
Member
Offline
Activity: 98
Merit: 10
|
|
July 25, 2013, 03:57:33 AM |
|
The "typical" QT? emunie is not a bitcoin clone, buddy.
I'm not your buddy, guy!
|
|
|
|
Etlase2
|
|
July 25, 2013, 04:09:13 AM |
|
What I meant to imply is that you are butthurt because Dan took your ideas and implemented them while you are still musing over your white paper, which Dan still seems to lack to date. I am not musing over a whitepaper having never had an intention to write one. I have been musing over how to make sure everything can work rather than diving into coding something with various and numerous flaws. From this, I have a fairly unique perspective on how to design a cryptocurrency that is not reliant on proof-of-work for its security, nor centralization. The emunie devs could benefit greatly from this, but would apparently rather protect the first-run flawed design and flawed philosophy of programming first and bugfixing second. This *is not* the correct way to do it. There are far too many things that can go wrong. And Dan did not take my ideas, at least not by any stretch that I can figure. And just to clarify, my ideas regarding filtering MAC Addresses are not silly, I was well aware of the fact that it can be gamed, but your too technical mind never seemed to understand the real purpose of doing so - it was to make gaming the system costly and troublesome, not impossible. MAC addresses are not transmitted over a WAN. MAC addresses are used to identify hardware over a local network, or hardware to an ISP to verify that you're a customer. They cannot be used to keep track of people connected to a distributed network. And they are easily spoofed. And there is no way to come to a distributed consensus as to what MAC addresses or IP addresses are connected to the network. It is a completely flawed premise. If you don't understand that--whatever. If Dan doesn't understand that, emunie has serious problems ahead of it.
|
|
|
|
eCoinomist
Member
Offline
Activity: 112
Merit: 10
Independent Analyst
|
|
July 25, 2013, 04:34:00 AM |
|
MAC addresses are not transmitted over a WAN.
What stops the client from retrieving MAC address from the device running it and distributing it to the network?
|
|
|
|
Etlase2
|
|
July 25, 2013, 04:45:14 AM |
|
What stops the client from retrieving MAC address from the device running it and distributing it to the network?
:sigh: Open source software, for one. For two, it would be fairly trivial to detect and intercept a packet prior to it leaving the computer and replace the MAC address with anything, without having access to the source code. For three, whatever mechanism that is used for compiling a list of MAC addresses could be also easily intercepted and have added any number of addresses of a malicious node's choosing. A way around this would be to have some way to hide a private and common signing key in each client (assuming closed source, of course), but that would be fairly easily for any ASM hacker to break, too. If there were some way to obfuscate the signing key in memory from the computer itself (bitcoin could sure benefit from this knowledge because as of yet there is no such thing), even then there are side-channel attacks on ECDSA when one is in control of the hardware and it could eventually be broken, assuming anyone gave a shit to put the effort into it--which I think would be excessively unlikely as few if any would be using this software.
|
|
|
|
eCoinomist
Member
Offline
Activity: 112
Merit: 10
Independent Analyst
|
|
July 25, 2013, 05:23:53 AM |
|
What stops the client from retrieving MAC address from the device running it and distributing it to the network?
:sigh: Open source software, for one. For two, it would be fairly trivial to detect and intercept a packet prior to it leaving the computer and replace the MAC address with anything, without having access to the source code. For three, whatever mechanism that is used for compiling a list of MAC addresses could be also easily intercepted and have added any number of addresses of a malicious node's choosing. A way around this would be to have some way to hide a private and common signing key in each client (assuming closed source, of course), but that would be fairly easily for any ASM hacker to break, too. If there were some way to obfuscate the signing key in memory from the computer itself (bitcoin could sure benefit from this knowledge because as of yet there is no such thing), even then there are side-channel attacks on ECDSA when one is in control of the hardware and it could eventually be broken, assuming anyone gave a shit to put the effort into it--which I think would be excessively unlikely as few if any would be using this software. There we go, in the earlier reply you said MAC addresses cannot be transmitted over WAN, and now you are just giving me a bunch of options on how that info can actually be retrieved! And didn't I tell you in the first place that the MAC Adress thing in place wasn't designed to stop people from cheating? but just to make their life harder bit by bit? Beside, the things you mentioned only nerds like you can do, most people like me have never even heard of it. Which is all we ever need, as long the the majority of eMunie holders don't cheat, the minority who do will have little to zero impact on demand/supply model, which the whole MAC addresses filtering was designed for. I don't know why you even decided to pick up on MAC addresses again and again, sigh... as I'm sure in my original list of ideas, there were at least 8 of them.
|
|
|
|
eCoinomist
Member
Offline
Activity: 112
Merit: 10
Independent Analyst
|
|
July 25, 2013, 05:37:01 AM |
|
If you don't understand that--whatever. If Dan doesn't understand that, emunie has serious problems ahead of it.
So you think you understand and know everything? How come Decrits is still in paper? You may be a good technical know how person, but honestly, I don't think you understand economics. Dan, however, understands both sides and that I know for a fact.
|
|
|
|
Etlase2
|
|
July 25, 2013, 05:49:20 AM Last edit: July 25, 2013, 06:42:10 AM by Etlase2 |
|
I said MAC addresses are not transmitted, not can not. As in, it is not part of the TCP/IP protocol, as in, anyone with the slightest bit of networking background should realize that any "MAC address" received by a peer can not be verified as valid in any way, shape, or form other than it is a 6-byte string. Ergo, it is a completely meaningless metric. "Here are 1 billion 6-byte strings, award me lots of emunie pls"--"prove it"--"here are 1 billion 6-byte strings"...
I picked up on MAC addresses again and again because it is an easy one to poke holes in and show that you are not qualified to be making suggestions of this nature.
I shall go line by line quickly if you want:
1) Total balance of hatchers. -- Relies on a small, unpredictable subset of people who can collude, likely not even on purpose, to create more money for themselves. The basis of new money creation is one where hatchers are paid significantly more of the new money than the rest of the network as a reward for service. How hatchers come to be and how they acquire transactions and how they prove work are all completely unanswered questions, so there is little to do but grossly speculate on how those systems can be abused to put nefarious people in control of the hatchers and collude on purpose. 2-5) Are all essentially based on the "emugraph" concept which is likely unscalable to any reasonable degree (how much information must be kept, how often must this information be accessed, how is a consensus on what this information is reached, etc.) -- and again there is no information at all as to how it works so specific attacks can't be easily surmised at this point. But as I have already stated to your head which seems to be firmly planted in the sand--this will be easily manipulated in an open source protocol. If emunie is to remain closed source, it would be significantly more difficult to game (but far from impossible), but also completely untrustworthy. 6) Is irrelevant 7-8) Both rely on clients reporting honest information in a distributed network. It is a complete failure of design that ignores any notion of a sybil attack. It also somehow presumes that this information can be transmitted and agreed upon by a multitude of nodes who have no way of proving whatsoever that the information is reliable. It is ridiculously easy to game. No cost other than the small amount of time required to reverse engineer a very small part of the network protocol in the case of closed source, or compile in a few extra lines in open source.
|
|
|
|
Etlase2
|
|
July 25, 2013, 05:57:47 AM |
|
You may be a good technical know how person, but honestly, I don't think you understand economics. Dan, however, understands both sides and that I know for a fact.
Economics is irrelevant. As I have said, the monetary scheme is tertiary to the security of the protocol. Maybe Dan understands "both", maybe he doesn't, but he has been unwilling or unable to provide a defense for the obvious vulnerabilities in his so-written design. I think the reality is that Dan knows how to program, but he does not know how to truly design a defensible system of this nature. Or perhaps he does, but he has made a very big mistake in attempting to work on the code without fully fleshing out the design. That is going to cost him a lot of time in rewriting the protocol over and over. So you think you understand and know everything? How come Decrits is still in paper? This is of course irrelevant to the topic at hand, but the answer is quite simply because I did take the other route in design, one where I would be confident in the proposed design before attempting to program it. I also spent a significant amount of time researching cryptography, network protocols (and the attacks that can be made on them), economics and monetary systems, and more. Dan hasn't mentioned even a whit about the cryptography or the network protocol used in emunie. This is scary and should be ringing alarm bells.
|
|
|
|
philipkdick
Member
Offline
Activity: 84
Merit: 10
|
|
July 25, 2013, 07:00:00 AM |
|
I'm no C++ coder but I know people in fairly advanced areas of network security , MAC is completely flawed as per Etlase explains . Its just a supposed " Hard code identifier " that runs on a certain protocol but it is easily faked .
|
|
|
|
|