|
salsacz
|
|
February 09, 2014, 01:40:28 PM |
|
In order to create a new internet the central infrastructure should probably be a peer to peer social network, e-mail, search engine, cloud storage, file sharing and cryptocurrency Is it possible to transform us to the app with peer to peer social network, e-mail, search engine, cloud storage and file sharing? Probably not us, but NXT for sure. thank you, so we are looking for developers of "search engine, cloud storage and file sharing?"
|
|
|
|
ChuckOne
Sr. Member
Offline
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
|
|
February 09, 2014, 01:40:57 PM |
|
|
|
|
|
martismartis
Legendary
Offline
Activity: 1162
Merit: 1005
|
|
February 09, 2014, 01:41:40 PM |
|
Just to confirm, my public node on Android TV stick running on 0.7.2
|
|
|
|
gimre
Legendary
Offline
Activity: 866
Merit: 1002
|
|
February 09, 2014, 01:41:53 PM |
|
It's not the problem with leaving, the problem is, that some people are running old versions, and the fork probably went for few days already.
Probably? Or for sure? I don't know, I'm not on the fork We could ask mkmen, what does he see in recent blocks
|
|
|
|
BloodyRookie
|
|
February 09, 2014, 01:41:59 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil
|
Nothing Else Matters NEM: NALICE-LGU3IV-Y4DPJK-HYLSSV-YFFWYS-5QPLYE-ZDJJ NXT: 11095639652683007953
|
|
|
MyZhre
|
|
February 09, 2014, 01:42:26 PM |
|
[2014-02-09 21:18:55.677] Scanning blockchain... [2014-02-09 21:19:09.888] ...Done [2014-02-09 21:19:09.891] NRS 0.7.2 started successfully. [2014-02-09 21:22:02.461] DEBUG: Failed to accept block 12792071761809604839 at height 62244 received from 88.198.142.92, blacklisting [2014-02-09 21:22:02.462] DEBUG: Blacklisting 88.198.142.92 because of: Invalid timestamp: 6657738 current time is 6657722, previous block timestamp is 6657684
what does this mean? It does not affect the forging,right? I'm the owner of 88.198.142.92, I upgrade the vps to 0.7.2 several hours ago, so far works fine, don't known why the invalid timestamp.
|
NXT: 13997163105778396158
|
|
|
Bitventurer
|
|
February 09, 2014, 01:45:47 PM |
|
In order to create a new internet the central infrastructure should probably be a peer to peer social network, e-mail, search engine, cloud storage, file sharing and cryptocurrency Is it possible to transform us to the app with peer to peer social network, e-mail, search engine, cloud storage and file sharing? Probably not us, but NXT for sure. thank you, so we are looking for developers of "search engine, cloud storage and file sharing?" Y U NO HAVE JABBER ID ? W E NEED CONNECT !!!?
|
SP8DE - The Game of Chance. Changed.
|
|
|
ChuckOne
Sr. Member
Offline
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
|
|
February 09, 2014, 01:54:05 PM |
|
In order to create a new internet the central infrastructure should probably be a peer to peer social network, e-mail, search engine, cloud storage, file sharing and cryptocurrency Is it possible to transform us to the app with peer to peer social network, e-mail, search engine, cloud storage and file sharing? Probably not us, but NXT for sure. thank you, so we are looking for developers of "search engine, cloud storage and file sharing?" Well, not exactly sure what you need. Developers for evolving NXT or Developers for developing an app? The latter seems pre-mature because NXT needs another mechanism to handle multiple chains at once. The social part is already in place. At least messaging. Not sure about other activities. But another blockchain and solved. The file storage stuff should be the most interesting part. File sharing is 'just' a matter of access control on top of the file storage. Search engine? Sounds more like an analysis client to me. Could only search for/mine data on the blockchains. Email? Well, as far as the consensus goes, NXT core only reads/adds data from/to the blockchains. Sending emails could be done per pull principle. But don't see, why this needs NXT. In this case, I would rather recommend a more general service that is able to scan the chain and perform several actions if detecting certain patterns.
|
|
|
|
ChuckOne
Sr. Member
Offline
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
|
|
February 09, 2014, 01:56:12 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil Good point.
|
|
|
|
gimre
Legendary
Offline
Activity: 866
Merit: 1002
|
|
February 09, 2014, 01:58:55 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil I've made repo with test: https://github.com/gimer/curve25519-sign-testnxtcurve\bin> java nxtcurve.TestCurve original failed: 132 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 121 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 137 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 133 / 1000 BloodyRookie's failed: 0 / 1000 ...
I've also added class files to the repo, so it's enough to replace "nxt-0.7.2\webapps\root\WEB-INF\classes\nxt\crypto\Curve25519.class" with file from the repo and it should work.
|
|
|
|
gs02xzz
|
|
February 09, 2014, 02:00:06 PM Last edit: February 09, 2014, 02:33:04 PM by gs02xzz |
|
Hi allwelder, can you not use the Future Coin as the Chinese translation for Nxtcoin since as many people mentioned before that Nxt is a reality already and it will confuse people with another coin which English name is really futurecoin and Chinese name is the future coin in Chinese as well? It is just IMHO. yes ,I also think so and agree with you. But the owner of the above website said they must set an Chinese name for every coin,so they set Nxt as 未来币; I can contact them to modify the name if Nxt can have another Chinese name. 奈克斯特,奈克斯特币 or 耐克斯特,耐克斯特币 or 纳克斯特,纳克斯特币
|
|
|
|
ChuckOne
Sr. Member
Offline
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
|
|
February 09, 2014, 02:05:42 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil I've made repo with test: https://github.com/gimer/curve25519-sign-testnxtcurve\bin> java nxtcurve.TestCurve original failed: 132 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 121 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 137 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 133 / 1000 BloodyRookie's failed: 0 / 1000 ...
I've also added class files to the repo, so it's enough to replace "nxt-0.7.2\webapps\root\WEB-INF\classes\nxt\crypto\Curve25519.class" with file from the repo and it should work. Ah, now, we need a code audit on your code.
|
|
|
|
drsnuggles
Newbie
Offline
Activity: 56
Merit: 0
|
|
February 09, 2014, 02:12:21 PM |
|
Upgraded to 0.7.2 as well and no real problems so far. What I did notice while upgrading from 5.9->5.10->5.11->5.12->6.1->7.12 is that if I delete all blacklisted peers, I never get on a fork. If I leave peers blacklisted, there is quite a change of getting on a fork, even twice in a row. What is a good source to know the latest block number? I always use Nxt block explorer ( http://87.230.14.1/nxt/nxt.cgi?action=100), but it's always a few blocks ahead of my own hallmarked NRS.
|
|
|
|
VanBreuk
|
|
February 09, 2014, 02:24:58 PM |
|
0.7.2 running like a champ If you are open to non-english languages, nxtspain.org is updated daily.
|
|
|
|
wesleyh
|
|
February 09, 2014, 02:35:48 PM |
|
Asset API needs to add volume to getAsset - (24 hour volume). Perhaps also the 24 hour high, 24 hour low, and last trade info.
|
|
|
|
ChuckOne
Sr. Member
Offline
Activity: 364
Merit: 250
☕ NXT-4BTE-8Y4K-CDS2-6TB82
|
|
February 09, 2014, 02:42:42 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil I've made repo with test: https://github.com/gimer/curve25519-sign-testnxtcurve\bin> java nxtcurve.TestCurve original failed: 132 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 121 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 137 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 133 / 1000 BloodyRookie's failed: 0 / 1000 ...
I've also added class files to the repo, so it's enough to replace "nxt-0.7.2\webapps\root\WEB-INF\classes\nxt\crypto\Curve25519.class" with file from the repo and it should work. Ah, now, we need a code audit on your code. Waoh, made the mistake and had a look at: https://github.com/gimer/curve25519-sign-test/blob/master/src/nxt/crypto/Curve25519.javaMy eyes are bleeding as does my computer science heart. Mathematicians, physicists and cryptographists should NOT write code. Please! Pleeeease! You want us to audit but reading this is like reading a best-seller that has been injected grammar errors and typos each in every sentence. So, how to find the errors in content if you can barely tell them apart from the former ones. I really get the impression that programmed cryptography is not so difficult in the end; except when people having no idea how to write it down write it down. Sorry for being emotional.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
February 09, 2014, 02:49:06 PM |
|
It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil I did read it and think that it's better to do a work-around. It looks safer to me.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
February 09, 2014, 02:52:40 PM |
|
I don't understand this code so I cannot change it. It is up to CfB and BCNext to decide if and when this should be fixed. Only crypto audit will tell if it's a bug or not. Right now there is another way to fix unverifable signatures in Crypto.sign(). We can't use BloodyRookie's fix without a formal proof that this won't break Curve25519 security. Actually, if the fix gets rid of unverifable signatures completely then we shouldn't use it. It's a normal situation that sometimes we have to recompute signatures generated with EC-KCDSA. It is a bug. Did you even read my post completely? You need only basic knowledge in algebra to understand it. The EC-KCDSA signature algorith can fail sometimes that's why sign() returns a boolean value. But that happens very rarely and simply means v=(x-h)s = 0 mod q. Maybe you should ask Doctor Evil I've made repo with test: https://github.com/gimer/curve25519-sign-testnxtcurve\bin> java nxtcurve.TestCurve original failed: 132 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 121 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 137 / 1000 BloodyRookie's failed: 0 / 1000 original failed: 133 / 1000 BloodyRookie's failed: 0 / 1000 ...
I've also added class files to the repo, so it's enough to replace "nxt-0.7.2\webapps\root\WEB-INF\classes\nxt\crypto\Curve25519.class" with file from the repo and it should work. I hope that u won't create a "solution" that leaks private key bits. I'm against the changes until I see a formal proof, so u better talk to Jean-Luc.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
February 09, 2014, 02:54:10 PM |
|
Asset API needs to add volume to getAsset - (24 hour volume). Perhaps also the 24 hour high, 24 hour low, and last trade info.
U have trade history API, why is it not enough?
|
|
|
|
|