Cobaro
Member
Offline
Activity: 266
Merit: 19
|
|
March 04, 2018, 02:02:22 PM |
|
Received it, thanks!! Congrats to the winners! Congrats everybody, well deserved!
|
|
|
|
deeperx (OP)
|
|
March 04, 2018, 02:13:03 PM |
|
|
|
|
|
SEELE^^01
|
|
March 04, 2018, 02:19:09 PM Last edit: March 18, 2018, 11:39:43 AM by SEELE^^01 |
|
We are currently testing Deep Protocol (Stealth Address) and I want to share this information for the people who doesn't know how it works. Stealth addresses take care of the receiver's privacy.
In cryptocurrency, the ability to spend a certain amount of coins is the same as the knowledge of the private key to the public key associated with the coins.
So (simplifying a bit), in Bitcoin if there is 1 bitcoin associated to the public key P and if Bob knows the corresponding private key x such that P = xG, then he can spend the Bitcoin by submitting a message (transaction) to the network signed with x.
There is one privacy issue, though: if Bob keeps using the same P to receive bitcoins, then any observer will be able to see all payments were made to the same entity that controls P (Bob). This is the problem that stealth addresses solve.
In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:
Bob creates two pairs of private and public keys. Let's denote them by (a,A) and (b,B), where by definition A = aG and B = bG. Bob makes the pair of public keys (A,B) available to the network; this will be his stealth address.
Alice wishes to send 1 bitcoin to Bob; that is, she wants to assign 1 bitcoin to a public key P such that Bob knows x and P = xG. She will construct such P using Bob's stealth address by using a hashing function H, choosing a random big number r, and setting P = H(rA)G + B. Then Alice sends the bitcoin to P, the transaction is broadcast along with R = rG (but not r, which can't be recovered from R).
Now how does Bob get the money? Well he has to keep listening on the network for all new transactions in the hopes that they are for him. When he sees Alice's transaction, he performs x := H(aR)+b and realizes that:
xG = (H(aR)+b)G = H(aR)G+bG = H(arG)G+B = H(raG)G+B = H(rA)G+B = P,
that is, Bob can reconstruct x such that P = xG and is therefore the owner of the bitcoin! Notice that neither Alice nor any observer has the ability to derive x (because they don't know a and b), and that besides Alice and Bob no one knows that (x,P) was generated from Bob's stealth address (because they don't know r).
Note that, as mentioned, this protects Bob privacy, but it is still visible to the network that Alice, the entity that used to control that bitcoin, made a transaction. In order to obfuscate that action, Monero implements the use of Ring Signatures, which will allow Alice to, instead of directly signing the transaction, produce a proof that her, or several other people, did send a coin to Bob. The math behind Ring Signatures is not as simple as in Stealth Addresses, but it is still very approachable.
So, in a nutshell:
Stealth addresses take care of recipient's privacy.
Ring Signatures take care of sender's privacy.So.. ar u hodling? or are you some of those weak hands?DqKpsiHCGoBip2WrEAWoTjtgeBT84f58xovery nice explanation of stealth addresses by Vaas!
|
|
|
|
aghilesdza
Jr. Member
Offline
Activity: 350
Merit: 6
|
|
March 04, 2018, 02:21:46 PM |
|
Received it, thanks!! Congrats to the winners! Amazing !!! congrats to all winners , they all deserve it !
|
https://deeponion.org/community DeepOnion ⚡ Anonymous & Untraceable Cryptocurrency ⚡ Join DeepOnion Team NOW! ⚡
|
|
|
bykardinal
|
|
March 04, 2018, 02:21:55 PM |
|
@geppetto and @gwapogi won 2x rewards. Be active guys, be like @geppetto and @gwapogi
|
|
|
|
Cobaro
Member
Offline
Activity: 266
Merit: 19
|
|
March 04, 2018, 03:09:58 PM Last edit: March 15, 2018, 02:05:03 PM by Cobaro |
|
|
|
|
|
fadzinator
|
|
March 04, 2018, 03:26:20 PM |
|
We are currently testing Deep Protocol (Stealth Address) and I want to share this information for the people who doesn't know how it works. Stealth addresses take care of the receiver's privacy.
In cryptocurrency, the ability to spend a certain amount of coins is the same as the knowledge of the private key to the public key associated with the coins.
So (simplifying a bit), in Bitcoin if there is 1 bitcoin associated to the public key P and if Bob knows the corresponding private key x such that P = xG, then he can spend the Bitcoin by submitting a message (transaction) to the network signed with x.
There is one privacy issue, though: if Bob keeps using the same P to receive bitcoins, then any observer will be able to see all payments were made to the same entity that controls P (Bob). This is the problem that stealth addresses solve.
In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:
Bob creates two pairs of private and public keys. Let's denote them by (a,A) and (b,B), where by definition A = aG and B = bG. Bob makes the pair of public keys (A,B) available to the network; this will be his stealth address.
Alice wishes to send 1 bitcoin to Bob; that is, she wants to assign 1 bitcoin to a public key P such that Bob knows x and P = xG. She will construct such P using Bob's stealth address by using a hashing function H, choosing a random big number r, and setting P = H(rA)G + B. Then Alice sends the bitcoin to P, the transaction is broadcast along with R = rG (but not r, which can't be recovered from R).
Now how does Bob get the money? Well he has to keep listening on the network for all new transactions in the hopes that they are for him. When he sees Alice's transaction, he performs x := H(aR)+b and realizes that:
xG = (H(aR)+b)G = H(aR)G+bG = H(arG)G+B = H(raG)G+B = H(rA)G+B = P,
that is, Bob can reconstruct x such that P = xG and is therefore the owner of the bitcoin! Notice that neither Alice nor any observer has the ability to derive x (because they don't know a and b), and that besides Alice and Bob no one knows that (x,P) was generated from Bob's stealth address (because they don't know r).
Note that, as mentioned, this protects Bob privacy, but it is still visible to the network that Alice, the entity that used to control that bitcoin, made a transaction. In order to obfuscate that action, Monero implements the use of Ring Signatures, which will allow Alice to, instead of directly signing the transaction, produce a proof that her, or several other people, did send a coin to Bob. The math behind Ring Signatures is not as simple as in Stealth Addresses, but it is still very approachable.
So, in a nutshell:
Stealth addresses take care of recipient's privacy.
Ring Signatures take care of sender's privacy.So.. ar u hodling? or are you some of those weak hands?DqKpsiHCGoBip2WrEAWoTjtgeBT84f58xoMy brain get's scrambled for the firs time All I know is that, this is an exciting update! Keep it up team!
|
|
|
|
CryptoZombi00
Member
Offline
Activity: 139
Merit: 19
MARCHE OU CREVE / WALK OR DIE
|
|
March 04, 2018, 03:48:24 PM |
|
Why ONION is more better than DASH, MONERO, PIVX, VERGES
|
|
|
|
Cobaro
Member
Offline
Activity: 266
Merit: 19
|
|
March 04, 2018, 04:01:34 PM |
|
Why ONION is more better than DASH, MONERO, PIVX, VERGES Because it's all in one. Some of coin have 1-2 features, while DeepOnion will have all of them.
|
|
|
|
|
GambleTime
Member
Offline
Activity: 168
Merit: 11
|
|
March 04, 2018, 04:24:25 PM |
|
|
|
|
|
hodlftw
Full Member
Offline
Activity: 326
Merit: 104
Santa Coin
|
|
March 04, 2018, 04:26:43 PM |
|
Are we still planning to hire a public hero in Q1?
I think it would be better to do this once the airdrops are truly over. That would mean a conscious deviation from the roadmap. Which also has to be communicated proactively We were working on that but you need to understand that some weeks ago all Crypto tanked almost 500b... Also people were saying that Crypto will disappear.. We have a roadmap but also can be reasonable that some minor things can change due to a market/news influence.. I'm not saying that this don't gonna happen on Q1 but please be tolerant Don't worry, I am tolerant. There may be others though who are not. They will look at the roadmap in Q2, ask why there is no update and spread FUD (DO cannot deliver). I think that this can be avoided - if we foresee that there is not going to be a PH in Q1 - with early communication. People who are here and support are not the issue Because they don't read our Forum, simple like that. We are making announcements every week about our developments and how close we are to the release. Also we send a Newsletter every week... DeepOnion cannot deliver? We are to create one of the best privacy coins in less than one year without ICO. What I believe Benezim is trying to say is that deviation from the roadmap is already with the community, granted it is discussed prior. But outsiders are going to take one quick glance and keep yelling scam. While I don't really care what fudders do, you must admit this wlll put outside investors on hesitation. We would like bigger investors after the airdrops, the last thing we need is a fresh scam campaign at the end of it.
|
|
|
|
|
|
CryptoKyddie
Member
Offline
Activity: 182
Merit: 15
|
|
March 04, 2018, 05:48:10 PM |
|
Received it, thanks!! Congrats to the winners! Amazing !!! congrats to all winners , they all deserve it ! Congratulations to all. Another generous week for the awesome supporter of DeepOnion. 8 months of giving and the project is still a baby. The community and features just get better each and everyday.
|
|
|
|
RobRunZenStyle
Newbie
Offline
Activity: 81
Merit: 0
|
|
March 04, 2018, 06:03:27 PM |
|
It’s really amazing to follow this project. Really good to see 100% private and anonym.
|
|
|
|
Cobaro
Member
Offline
Activity: 266
Merit: 19
|
|
March 04, 2018, 06:09:22 PM |
|
It’s really amazing to follow this project. Really good to see 100% private and anonym.
Oh...wait till it becomes 149% Private and anonymous
|
|
|
|
mrchef111
Member
Offline
Activity: 490
Merit: 14
|
|
March 04, 2018, 06:43:10 PM |
|
@geppetto and @gwapogi won 2x rewards. Be active guys, be like @geppetto and @gwapogi Yeah they do great work! I am always excited to see what those guys will do next. Good work guys!! Well deserved!
|
|
|
|
alphacoco
Member
Offline
Activity: 110
Merit: 10
|
|
March 04, 2018, 06:44:41 PM |
|
Well done @whoknows. Most undervalued privacy coin with an amazing community I think was his words
|
|
|
|
GambleTime
Member
Offline
Activity: 168
Merit: 11
|
|
March 04, 2018, 06:45:35 PM |
|
Are you having doubts about PoS and PoW ?Here is a good explanation of PoS and PoW algorithm and DeepOnion hybrid Technology -> https://goo.gl/vNAHDH
|
|
|
|
|