chaeplin
|
|
April 01, 2014, 05:31:02 PM Last edit: April 01, 2014, 05:42:04 PM by chaeplin |
|
"Fix" ? I've been mining with my R9 290s for months without issue. What exactly is it fixing?
We were about 20 to have problem with R9 290: the cards launch and mine at é.5Mh rate, but after 10 minutes a drop happened and the cards keep on mining at 2.3M. A 0.2Mh/s drop happened on all cards from various brands and bios, all kind of OS and .conf file, all models are 290. Srtrangely few people did not experiment this bug. May be you're one of them. It's not a bug. What you do export DISPLAY=:0 xset s off xset -dpms xset s noblank
is dmps off and screensaver off.
|
|
|
|
sippsnapp
|
|
April 01, 2014, 05:31:20 PM |
|
My client is not connecting to any nodes, anyone got a conf file example I could copy?
use at your own risk, i logged these darkcoi nnodes while connected to my server node http://pastebin.com/qmn8xF2s
|
Πάντα ῥεῖ Bitcoin + Altcoin node pool setup - pm
|
|
|
coin5l1
Member
Offline
Activity: 98
Merit: 10
|
|
April 01, 2014, 05:32:07 PM |
|
My client is not connecting to any nodes, anyone got a conf file example I could copy?
rpcuser= rpcpassword= rpcallowip=localhost rpcport= gen=0 server=1 addnode=23.23.186.131 addnode=50.16.206.102 addnode=50.19.116.123 addnode=98.165.130.67 addnode=54.242.50.205 addnode=50.17.98.53 addnode=54.225.43.37
|
|
|
|
eduffield (OP)
Legendary
Offline
Activity: 1176
Merit: 1036
Dash Developer
|
|
April 01, 2014, 05:41:18 PM |
|
I don't know if Darkcoin is designed to allow you to send over Tor.
Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.
There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor. The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page. Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend. Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin. Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore. Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. ( http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document) I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?
|
Dash - Digital Cash | dash.org | dashfoundation.io | dashgo.io
|
|
|
LimLims
|
|
April 01, 2014, 05:48:40 PM |
|
The way I see privacy-with-potential-exploits working in practice is similar to how bitcoin deals with the possibility of 51% attacks. They are known vulnerabilities, and the risk can be to some extent quantified and mitigated. To many, this means the risk is acceptable, and provides enough trust to bet their money on. For others, it's an unacceptable risk.
With darksend in the proposed implementation, the risk of one's anonymity being broken in a given transaction is a function of the ratio of snoops to non-snoops, and the number of stages of mixing employed. The number of snoops is unknown, but there are two points salient here:
1. We can quantify the required funds in DRK to mount an attack of a given efficacy, and 2. With 51% attacks, the hashing power available to a hypothetical attacker (like a large government or financial group) is similarly unknown, and yet this hasn't killed trust in Bitcoin.
An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."
So if our assumptions are reasonable, we can come up with scenarios that reasonably define the scope of risk.
Of course, true anonymity is infinitely better. If Anonymint has a solution for this, it'd be great if he could expand on "divide and conquer", since the phrase in this context is meaningless to me.
|
|
|
|
eltito
|
|
April 01, 2014, 05:49:57 PM |
|
My client is not connecting to any nodes, anyone got a conf file example I could copy?
Had the same problem, it took like an hour + to connect to a node but it's all good now. I just left it alone.
|
|
|
|
|
jinni7241500aa
Member
Offline
Activity: 64
Merit: 10
|
|
April 01, 2014, 05:53:17 PM |
|
I think the Dark community should implement new rules for trolls....starting NOW!
If they ask a serious question, then we answer it, if they start the FUD and trolling its immediate ignore, no quote or reply.
I don't want to have to skip through pages of people quoting their stupidly long rants of worthless dribble. Then we continue to fuel their obvious attempts at getting people worked up.
Don't waste your time, a simple ignore will do. Lets just keep this place full of useful information to better the coin/community.
The community should clean up Let the roles of the community to help us Support your proposal Get some action
|
|
|
|
tifozi
|
|
April 01, 2014, 05:53:55 PM |
|
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.
|
|
|
|
eduffield (OP)
Legendary
Offline
Activity: 1176
Merit: 1036
Dash Developer
|
|
April 01, 2014, 05:54:11 PM |
|
My client is not connecting to any nodes, anyone got a conf file example I could copy?
Had the same problem, it took like an hour + to connect to a node but it's all good now. I just left it alone. Both seed nodes were down, I forget to check them. Anyone else want to host a seed node? - It needs to be configured to 200 connections max - Must have 9999 open from the outside - Must be a static IP - Must be permanently available PM me and I'll add them to the source
|
Dash - Digital Cash | dash.org | dashfoundation.io | dashgo.io
|
|
|
CHAOSiTEC
Legendary
Offline
Activity: 1358
Merit: 1002
|
|
April 01, 2014, 06:16:48 PM |
|
My client is not connecting to any nodes, anyone got a conf file example I could copy?
Had the same problem, it took like an hour + to connect to a node but it's all good now. I just left it alone. Both seed nodes were down, I forget to check them. Anyone else want to host a seed node? - It needs to be configured to 200 connections max - Must have 9999 open from the outside - Must be a static IP - Must be permanently available PM me and I'll add them to the source ill run one on lotterymining
|
node-vps.com - Tron / Masternode hosting services
|
|
|
White Lion
Newbie
Offline
Activity: 27
Merit: 0
|
|
April 01, 2014, 06:17:10 PM |
|
I am running a permanent node. pm'd you eduffield
|
|
|
|
CHAOSiTEC
Legendary
Offline
Activity: 1358
Merit: 1002
|
|
April 01, 2014, 06:23:57 PM |
|
Come and help mine darkcoin, and get a chance of winning the lottery pool. for the next week im going to do a lottery EVERY day, ill even trow in 200 DRK of my own. So each day 1 lucky winner will get 50% of fees, AND 28.57 DRK Pool Pays Witdrawal fee: 0.0 Dedicated pool, we only run Darkcoin mining DDOS Protected pool, resistant to: fake shares & scrypt ddos Stable Fast Server, but dont take my word for it, see what others have said in this thread ALSO
|
node-vps.com - Tron / Masternode hosting services
|
|
|
fra55
Member
Offline
Activity: 105
Merit: 10
|
|
April 01, 2014, 06:26:13 PM |
|
Wow 14 Ghash and difficulty at 705, nice!
|
|
|
|
AnonyMint
|
|
April 01, 2014, 06:31:06 PM Last edit: April 01, 2014, 06:52:27 PM by AnonyMint |
|
I don't know if Darkcoin is designed to allow you to send over Tor.
Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.
There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor. The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page. Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend. Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin. Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore. Would you feel Darkcoin is threatened if another altcoin has true cpu-only and very strong anonymity? Any way I am happy to read below you are thinking about how to improve the anonymity. Your prior reply had me worried that you actually wanted to make it weaker on purpose. Now I see you are open to improving it. That is 2012 document. Many think NSA has control over most or many of the nodes on Tor. Remember these servers cost a lot of money and who is providing that for free and getting nothing in return? Warning FAQ: Tor doesn't protect you from a global adversary: https://tails.boum.org/doc/about/warning/index.en.html#index7h1http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping"If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on. Who would pay for this and be anonymous?" https://www.schneier.com/blog/archives/2013/03/our_internet_su.html#c1238550Attacking Tor: How the NSA Targets Users' Online Anonymity: https://www.schneier.com/essay-455.htmlI was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?
Agreed it is. I think I had figured that out before when I mentioned it in the CoinJoin thread and dismissed it. I apparently forgot that since. I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage. I think most users wouldn't mind expending 5 minutes computing time before they send a mix transaction. I have another idea as well. On failure only, every input into the mix could reveal which collateral payment they sent in the output stage, so you can isolate the input that was the adversary. Then you blacklist that input. The inputs anonymity isn't destroyed because no mix transaction was completed. But how can you blacklist system wide? How can you trust that node didn't lie just so it could blacklist someone's coins?
|
|
|
|
iwillimust
Member
Offline
Activity: 64
Merit: 10
|
|
April 01, 2014, 06:34:12 PM |
|
This new X11 algo is very interesting for me. I'll spend some time to study on it.
The new algorithm will always attract more people's eyes Get more attention Hope that the new algorithm can solve many problems Give us hope
|
|
|
|
coins101
Legendary
Offline
Activity: 1456
Merit: 1000
|
|
April 01, 2014, 06:36:12 PM |
|
I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.
Thats HashCash PoW for email to stop spam. In the Satoshi paper. That was my suggestion. Hey, you. Stop 51% me with a new fork.
|
|
|
|
AlexGR
Legendary
Offline
Activity: 1708
Merit: 1049
|
|
April 01, 2014, 06:42:25 PM |
|
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.
In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything. IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market. Btw, enjoying the brainstorming between Evan & Anonymint.
|
|
|
|
AnonyMint
|
|
April 01, 2014, 06:45:14 PM |
|
An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."
Would you accept that 20% of your coins are not anonymous? If you are trying to hide from an oppressive totalitarian regime where death or jail time waits you if you are discovered, then you want something 1 in million, not 20%. 20% is analogous to pulling the trigger on a 5 round revolver with one bullet pointed at your head, i.e. Russian Roulette. Try redoing your calculation with 1%, 0.1%, 0.01%, etc.
|
|
|
|
AnonyMint
|
|
April 01, 2014, 06:49:22 PM |
|
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.
In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything. IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market. Btw, enjoying the brainstorming between Evan & Anonymint. Anoncoin already has IP obfuscation.
|
|
|
|
|