Bitcoin Forum
May 03, 2024, 05:06:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 [593] 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 ... 7012 »
  Print  
Author Topic: [ANN][DASH] Dash (dash.org) | First Self-Funding Self-Governing Crypto Currency  (Read 9722503 times)
chaeplin
Sr. Member
****
Offline Offline

Activity: 294
Merit: 250


View Profile
April 01, 2014, 05:31:02 PM
Last edit: April 01, 2014, 05:42:04 PM by chaeplin
 #11841


"Fix" ? I've been mining with my R9 290s for months without issue. What exactly is it fixing?
We were about 20 to have problem with R9 290: the cards launch and mine at é.5Mh rate, but after 10 minutes a drop happened and the cards keep on mining at 2.3M.
A 0.2Mh/s drop happened on all cards from various brands and bios, all kind of OS and .conf file, all models are 290.
Srtrangely few people did not experiment this bug. May be you're one of them.

It's not a bug.
What you do
Code:
export DISPLAY=:0
xset s off
xset -dpms
xset s noblank
is dmps off and screensaver off.
1714712806
Hero Member
*
Offline Offline

Posts: 1714712806

View Profile Personal Message (Offline)

Ignore
1714712806
Reply with quote  #2

1714712806
Report to moderator
1714712806
Hero Member
*
Offline Offline

Posts: 1714712806

View Profile Personal Message (Offline)

Ignore
1714712806
Reply with quote  #2

1714712806
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714712806
Hero Member
*
Offline Offline

Posts: 1714712806

View Profile Personal Message (Offline)

Ignore
1714712806
Reply with quote  #2

1714712806
Report to moderator
1714712806
Hero Member
*
Offline Offline

Posts: 1714712806

View Profile Personal Message (Offline)

Ignore
1714712806
Reply with quote  #2

1714712806
Report to moderator
1714712806
Hero Member
*
Offline Offline

Posts: 1714712806

View Profile Personal Message (Offline)

Ignore
1714712806
Reply with quote  #2

1714712806
Report to moderator
sippsnapp
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250


View Profile
April 01, 2014, 05:31:20 PM
 #11842

My client is not connecting to any nodes, anyone got a conf file example I could copy?

use at your own risk, i logged these darkcoi nnodes while connected to my server node
http://pastebin.com/qmn8xF2s

Πάντα ῥεῖ
Bitcoin + Altcoin node pool setup - pm
coin5l1
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
April 01, 2014, 05:32:07 PM
 #11843

My client is not connecting to any nodes, anyone got a conf file example I could copy?
rpcuser=
rpcpassword=
rpcallowip=localhost
rpcport=
gen=0
server=1
addnode=23.23.186.131
addnode=50.16.206.102
addnode=50.19.116.123
addnode=98.165.130.67
addnode=54.242.50.205
addnode=50.17.98.53
addnode=54.225.43.37
eduffield (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1036


Dash Developer


View Profile WWW
April 01, 2014, 05:41:18 PM
 #11844


I don't know if Darkcoin is designed to allow you to send over Tor.

Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.

There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor
Code:
darkcoind --help

Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor.

The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page.

Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend.

Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin.

Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore.

Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. (http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document)

I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?

Dash - Digital Cash | dash.org | dashfoundation.io | dashgo.io
LimLims
Sr. Member
****
Offline Offline

Activity: 1204
Merit: 272


1xbit.com


View Profile WWW
April 01, 2014, 05:48:40 PM
 #11845

The way I see privacy-with-potential-exploits working in practice is similar to how bitcoin deals with the possibility of 51% attacks. They are known vulnerabilities, and the risk can be to some extent quantified and mitigated. To many, this means the risk is acceptable, and provides enough trust to bet their money on. For others, it's an unacceptable risk.

With darksend in the proposed implementation, the risk of one's anonymity being broken in a given transaction is a function of the ratio of snoops to non-snoops, and the number of stages of mixing employed. The number of snoops is unknown, but there are two points salient here:

1. We can quantify the required funds in DRK to mount an attack of a given efficacy, and
2. With 51% attacks, the hashing power available to a hypothetical attacker (like a large government or financial group) is similarly unknown, and yet this hasn't killed trust in Bitcoin.

An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."

So if our assumptions are reasonable, we can come up with scenarios that reasonably define the scope of risk.

Of course, true anonymity is infinitely better. If Anonymint has a solution for this, it'd be great if he could expand on "divide and conquer", since the phrase in this context is meaningless to me.

████
██
██
██
██
██
██
██
██
██
██
██
████
█████████████████████████████████████████████████████████████████████████████████


████████████████████████▄▄▄█████▄▄▄██████████████████████████████████████████████
████▄█████▄█▄███▄█▄██████████▄██▀▀▀██████████████████████████████████████████████
████████▀████▄████▀██████████████████████████▄█████▄██▄█████▄████▄████▄████▄██
███████████▐█████▌███████████▄█████▀███▀▀████████▀▀▀▀█████▀▀▀██████▀▀███▀▀█████
████████▄████▀████▄██████████████████▄▄▄▄▄███▄▄▄▄█████▄▄▄██████████████████
██████████▀█▀███▀█▀██████████▀███████▀█████████▀█████▀██▀█████▀█████████████████
████████████████████████▀▀▀██████████████████████████████████████████████████████



█████████████████████████████████████████████████████████████████████████████████
████
██
██
██
██
██
██
██
██
██
██
██
████
.
█▀▀▀











█▄▄▄
.
WELCOME BONUS UP TO 7 BTC!
▀▀▀█











▄▄▄█
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
█▀▀▀▀▀











█▄▄▄▄▄
.
BET NOW
▀▀▀▀▀█











▄▄▄▄▄█
eltito
Full Member
***
Offline Offline

Activity: 322
Merit: 105



View Profile
April 01, 2014, 05:49:57 PM
 #11846

My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.
coins101
Legendary
*
Offline Offline

Activity: 1456
Merit: 1000



View Profile
April 01, 2014, 05:51:51 PM
 #11847

Feds finding ways to get through TOR

http://online.wsj.com/news/articles/SB10001424052702303949704579461641349857358?mod=WSJ_TechWSJD_NeedToKnow

Roll-up, roll-up, roll-up....expect new users of DarkCoin (and DarkDogeCoin too.  Much $$, Much anonymous, So moon)
jinni7241500aa
Member
**
Offline Offline

Activity: 64
Merit: 10


View Profile
April 01, 2014, 05:53:17 PM
 #11848

I think the Dark community should implement new rules for trolls....starting NOW!

If they ask a serious question, then we answer it, if they start the FUD and trolling its immediate ignore, no quote or reply.

I don't want to have to skip through pages of people quoting their stupidly long rants of worthless dribble. Then we continue to fuel their obvious attempts at getting people worked up.

Don't waste your time, a simple ignore will do. Lets just keep this place full of useful information to better the coin/community.



The community should clean up
Let the roles of the community to help us
Support your proposal
Get some action

Energycoin - Save Energy, Pure POS (Free IPO). eMCxi5oLMPEw778dvh7voARyTR8j9mQpPY
tifozi
Hero Member
*****
Offline Offline

Activity: 742
Merit: 501


View Profile
April 01, 2014, 05:53:55 PM
 #11849

Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.
eduffield (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1036


Dash Developer


View Profile WWW
April 01, 2014, 05:54:11 PM
 #11850

My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.

Both seed nodes were down, I forget to check them. Anyone else want to host a seed node?

- It needs to be configured to 200 connections max
- Must have 9999 open from the outside
- Must be a static IP
- Must be permanently available  

PM me and I'll add them to the source

Dash - Digital Cash | dash.org | dashfoundation.io | dashgo.io
CHAOSiTEC
Legendary
*
Offline Offline

Activity: 1358
Merit: 1002


View Profile
April 01, 2014, 06:16:48 PM
 #11851

My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.

Both seed nodes were down, I forget to check them. Anyone else want to host a seed node?

- It needs to be configured to 200 connections max
- Must have 9999 open from the outside
- Must be a static IP
- Must be permanently available  

PM me and I'll add them to the source
ill run one on lotterymining

node-vps.com - Tron / Masternode hosting services
White Lion
Newbie
*
Offline Offline

Activity: 27
Merit: 0


View Profile
April 01, 2014, 06:17:10 PM
 #11852

I am running a permanent node. pm'd you eduffield
CHAOSiTEC
Legendary
*
Offline Offline

Activity: 1358
Merit: 1002


View Profile
April 01, 2014, 06:23:57 PM
 #11853



Come and help mine darkcoin, and get a chance of winning the lottery pool.

for the next week im going to do a lottery EVERY day, ill even trow in 200 DRK of my own.

So each day 1 lucky winner will get 50% of fees, AND 28.57 DRK

Pool Pays Witdrawal fee: 0.0


Dedicated pool, we only run Darkcoin mining
DDOS Protected pool, resistant to: fake shares & scrypt ddos

Stable Fast Server, but dont take my word for it, see what others have said in this thread



ALSO


we have our very own dice game http://dice.lotterymining.com

node-vps.com - Tron / Masternode hosting services
fra55
Member
**
Offline Offline

Activity: 105
Merit: 10


View Profile
April 01, 2014, 06:26:13 PM
 #11854

Wow 14 Ghash and difficulty at 705, nice!
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
April 01, 2014, 06:31:06 PM
Last edit: April 01, 2014, 06:52:27 PM by AnonyMint
 #11855


I don't know if Darkcoin is designed to allow you to send over Tor.

Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.

There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor
Code:
darkcoind --help

Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor.

The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page.

Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend.

Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin.

Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore.

Would you feel Darkcoin is threatened if another altcoin has true cpu-only and very strong anonymity?

Any way I am happy to read below you are thinking about how to improve the anonymity. Your prior reply had me worried that you actually wanted to make it weaker on purpose.  Now I see you are open to improving it.


Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. (http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document)

That is 2012 document. Many think NSA has control over most or many of the nodes on Tor. Remember these servers cost a lot of money and who is providing that for free and getting nothing in return?

Warning FAQ: Tor doesn't protect you from a global adversary:
https://tails.boum.org/doc/about/warning/index.en.html#index7h1

http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping

Quote
"If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on. Who would pay for this and be anonymous?"

https://www.schneier.com/blog/archives/2013/03/our_internet_su.html#c1238550

Attacking Tor: How the NSA Targets Users' Online Anonymity:
https://www.schneier.com/essay-455.html

I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?

Agreed it is. I think I had figured that out before when I mentioned it in the CoinJoin thread and dismissed it. I apparently forgot that since.

I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.

I think most users wouldn't mind expending 5 minutes computing time before they send a mix transaction.

I have another idea as well. On failure only, every input into the mix could reveal which collateral payment they sent in the output stage, so you can isolate the input that was the adversary. Then you blacklist that input. The inputs anonymity isn't destroyed because no mix transaction was completed. But how can you blacklist system wide? How can you trust that node didn't lie just so it could blacklist someone's coins?

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
iwillimust
Member
**
Offline Offline

Activity: 64
Merit: 10


View Profile
April 01, 2014, 06:34:12 PM
 #11856

This new X11 algo is very interesting for me.
I'll spend some time to study on it.

The new algorithm will always attract more people's eyes
Get more attention
Hope that the new algorithm can solve many problems
Give us hope
 Cheesy

Energycoin - Join Energ Foundation. e5ogakoi6ykGzWeyKnRHCtyTxBseibQcpk
coins101
Legendary
*
Offline Offline

Activity: 1456
Merit: 1000



View Profile
April 01, 2014, 06:36:12 PM
 #11857

Quote
I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.

Thats HashCash PoW for email to stop spam. In the Satoshi paper. That was my suggestion.  Hey, you. Stop 51% me with a new fork.
AlexGR
Legendary
*
Offline Offline

Activity: 1708
Merit: 1049



View Profile
April 01, 2014, 06:42:25 PM
 #11858

Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.

In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything.

IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market.

Btw, enjoying the brainstorming between Evan & Anonymint.
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
April 01, 2014, 06:45:14 PM
 #11859

An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."

Would you accept that 20% of your coins are not anonymous?

If you are trying to hide from an oppressive totalitarian regime where death or jail time waits you if you are discovered, then you want something 1 in million, not 20%.

20% is analogous to pulling the trigger on a 5 round revolver with one bullet pointed at your head, i.e. Russian Roulette.

Try redoing your calculation with 1%, 0.1%, 0.01%, etc.

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
April 01, 2014, 06:49:22 PM
 #11860

Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.

In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything.

IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market.

Btw, enjoying the brainstorming between Evan & Anonymint.

Anoncoin already has IP obfuscation.

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
Pages: « 1 ... 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 [593] 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 ... 7012 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!