tljenson
|
|
September 20, 2014, 10:43:14 PM |
|
I know I'm not any good you should take up the marketing job, your passionate about the name. You'd do a good job at marketing the coin.
|
|
|
|
|
surfer43
Sr. Member
Offline
Activity: 560
Merit: 250
"Trading Platform of The Future!"
|
|
September 20, 2014, 10:57:05 PM |
|
Well, the vague made-up FUD is affecting XMR's price severely. BBR's price is only down to 0.0007, so I would say it affects XMR more than BBR. In the unlikely case it's not false, Boolberry will have time to fix the issue after Monero is "attacked" in a few days.
|
|
|
|
rentahash
|
|
September 20, 2014, 11:01:41 PM |
|
Well, the made-up vague FUD is affecting XMR's price severely. BBR's price is only down to 0.0007, so I would say it affects XMR more than BBR. In the unlikely case it's not false, Boolberry will have time to fix the issue after Monero is "attacked" in a few days. I know that friend, but thought maybe CZ noted problem earlier and conserved it... That would place BBR ahead of other CN coins.
|
|
|
|
windjc
Legendary
Offline
Activity: 2156
Merit: 1070
|
|
September 20, 2014, 11:11:05 PM |
|
Well, the made-up vague FUD is affecting XMR's price severely. BBR's price is only down to 0.0007, so I would say it affects XMR more than BBR. In the unlikely case it's not false, Boolberry will have time to fix the issue after Monero is "attacked" in a few days. I know that friend, but thought maybe CZ noted problem earlier and conserved it... That would place BBR ahead of other CN coins. Right. Either this is FUD (most likely) and BBR will go up in a couple of days or its not and BBR will go up A LOT in a couple of days.
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
|
September 20, 2014, 11:17:53 PM |
|
We are working on resolving this issue. I was the one that offered anonymint a bounty to research BCX's claims. This is a possible exploit that anonymint says has a fix, so as long as we can concentrate on the important things, then it should be just another day in cryptoland. My understanding of the attack is that it takes a long time to prepare, and it also requires a lot of hardware resources and only can affect some subset of tx. So, there are many conditions and few people will have the ability and resources to pull this off. Now this could all be an overreaction to some obscure edge case, but when it comes to something like this I do not want to assume it is inconsequential even if it is improbable. At the very least, this provides some intense scrutiny of the algorithms and creates new ways to harden it. James
|
|
|
|
windjc
Legendary
Offline
Activity: 2156
Merit: 1070
|
|
September 20, 2014, 11:33:20 PM |
|
We are working on resolving this issue. I was the one that offered anonymint a bounty to research BCX's claims. This is a possible exploit that anonymint says has a fix, so as long as we can concentrate on the important things, then it should be just another day in cryptoland. My understanding of the attack is that it takes a long time to prepare, and it also requires a lot of hardware resources and only can affect some subset of tx. So, there are many conditions and few people will have the ability and resources to pull this off. Now this could all be an overreaction to some obscure edge case, but when it comes to something like this I do not want to assume it is inconsequential even if it is improbable. At the very least, this provides some intense scrutiny of the algorithms and creates new ways to harden it. James Thanks for the update James.
|
|
|
|
sussex
|
|
September 20, 2014, 11:33:43 PM |
|
I would highly encourage you to stop discussing the name. It does not help in any way and it does not make an influence to the final decision. Voting has been already finished. Final official decision will be announced soon. Posting metal band pictures won't discourage us to move forward for the better good.
Stay with us and support us or leave us - it's your choice. For all the project (doesn't matter the name) supporters I would like to say big thank you!
Bitcrea
...... and the coup completes. I'll take option B thanks Bob. Good luck in Gielinor, look out for those dragons - they can inflict up to 6000 damage on you. .
|
|
|
|
sonoIO
|
|
September 20, 2014, 11:35:08 PM |
|
|
|
|
|
windjc
Legendary
Offline
Activity: 2156
Merit: 1070
|
|
September 20, 2014, 11:50:08 PM |
|
Awesome, thanks. Fair assessment of 2 coins imo.
|
|
|
|
slapper
Legendary
Offline
Activity: 2044
Merit: 1102
Leading Crypto Sports Betting & Casino Platform
|
|
September 21, 2014, 12:46:25 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check
|
..Stake.com.. | | | ▄████████████████████████████████████▄ ██ ▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄ ██ ▄████▄ ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██ ██████ ██ ██████████ ██ ██ ██████████ ██ ▀██▀ ██ ██ ██ ██████ ██ ██ ██ ██ ██ ██ ██████ ██ █████ ███ ██████ ██ ████▄ ██ ██ █████ ███ ████ ████ █████ ███ ████████ ██ ████ ████ ██████████ ████ ████ ████▀ ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██ ██ ▀▀▀▀▀▀▀▀▀▀ ██ ▀█████████▀ ▄████████████▄ ▀█████████▀ ▄▄▄▄▄▄▄▄▄▄▄▄███ ██ ██ ███▄▄▄▄▄▄▄▄▄▄▄▄ ██████████████████████████████████████████ | | | | | | ▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄ █ ▄▀▄ █▀▀█▀▄▄ █ █▀█ █ ▐ ▐▌ █ ▄██▄ █ ▌ █ █ ▄██████▄ █ ▌ ▐▌ █ ██████████ █ ▐ █ █ ▐██████████▌ █ ▐ ▐▌ █ ▀▀██████▀▀ █ ▌ █ █ ▄▄▄██▄▄▄ █ ▌▐▌ █ █▐ █ █ █▐▐▌ █ █▐█ ▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█ | | | | | | ▄▄█████████▄▄ ▄██▀▀▀▀█████▀▀▀▀██▄ ▄█▀ ▐█▌ ▀█▄ ██ ▐█▌ ██ ████▄ ▄█████▄ ▄████ ████████▄███████████▄████████ ███▀ █████████████ ▀███ ██ ███████████ ██ ▀█▄ █████████ ▄█▀ ▀█▄ ▄██▀▀▀▀▀▀▀██▄ ▄▄▄█▀ ▀███████ ███████▀ ▀█████▄ ▄█████▀ ▀▀▀███▄▄▄███▀▀▀ | | | ..PLAY NOW.. |
|
|
|
iCEBREAKER
Legendary
Offline
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
|
|
September 21, 2014, 01:01:43 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK. BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it.
|
██████████ ██████████████████ ██████████████████████ ██████████████████████████ ████████████████████████████ ██████████████████████████████ ████████████████████████████████ ████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ████████████████████████████████ ██████████████ ██████████████ ████████████████████████████ ██████████████████████████ ██████████████████████ ██████████████████ ██████████ Monero
|
| "The difference between bad and well-developed digital cash will determine whether we have a dictatorship or a real democracy." David Chaum 1996 "Fungibility provides privacy as a side effect." Adam Back 2014
|
| | |
|
|
|
slapper
Legendary
Offline
Activity: 2044
Merit: 1102
Leading Crypto Sports Betting & Casino Platform
|
|
September 21, 2014, 01:13:07 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK. BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it. Attaboy. Show em who is the boss.
|
..Stake.com.. | | | ▄████████████████████████████████████▄ ██ ▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄ ██ ▄████▄ ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██ ██████ ██ ██████████ ██ ██ ██████████ ██ ▀██▀ ██ ██ ██ ██████ ██ ██ ██ ██ ██ ██ ██████ ██ █████ ███ ██████ ██ ████▄ ██ ██ █████ ███ ████ ████ █████ ███ ████████ ██ ████ ████ ██████████ ████ ████ ████▀ ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██ ██ ▀▀▀▀▀▀▀▀▀▀ ██ ▀█████████▀ ▄████████████▄ ▀█████████▀ ▄▄▄▄▄▄▄▄▄▄▄▄███ ██ ██ ███▄▄▄▄▄▄▄▄▄▄▄▄ ██████████████████████████████████████████ | | | | | | ▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄ █ ▄▀▄ █▀▀█▀▄▄ █ █▀█ █ ▐ ▐▌ █ ▄██▄ █ ▌ █ █ ▄██████▄ █ ▌ ▐▌ █ ██████████ █ ▐ █ █ ▐██████████▌ █ ▐ ▐▌ █ ▀▀██████▀▀ █ ▌ █ █ ▄▄▄██▄▄▄ █ ▌▐▌ █ █▐ █ █ █▐▐▌ █ █▐█ ▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█ | | | | | | ▄▄█████████▄▄ ▄██▀▀▀▀█████▀▀▀▀██▄ ▄█▀ ▐█▌ ▀█▄ ██ ▐█▌ ██ ████▄ ▄█████▄ ▄████ ████████▄███████████▄████████ ███▀ █████████████ ▀███ ██ ███████████ ██ ▀█▄ █████████ ▄█▀ ▀█▄ ▄██▀▀▀▀▀▀▀██▄ ▄▄▄█▀ ▀███████ ███████▀ ▀█████▄ ▄█████▀ ▀▀▀███▄▄▄███▀▀▀ | | | ..PLAY NOW.. |
|
|
|
slapper
Legendary
Offline
Activity: 2044
Merit: 1102
Leading Crypto Sports Betting & Casino Platform
|
|
September 21, 2014, 01:26:59 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK. BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it. Please advice What should be do iCEBREAKER? Are you a professional coder too? At dinner I suddenly had an epipheny on the exploit. I initially thought I would short Monero, because it seemed it was doomed no matter what I did, because I also see another related attack against Monero because it doesn't have BBR's safety feature. I will detailing this in my next post.
I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.
Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).
|
..Stake.com.. | | | ▄████████████████████████████████████▄ ██ ▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄ ██ ▄████▄ ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██ ██████ ██ ██████████ ██ ██ ██████████ ██ ▀██▀ ██ ██ ██ ██████ ██ ██ ██ ██ ██ ██ ██████ ██ █████ ███ ██████ ██ ████▄ ██ ██ █████ ███ ████ ████ █████ ███ ████████ ██ ████ ████ ██████████ ████ ████ ████▀ ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██ ██ ▀▀▀▀▀▀▀▀▀▀ ██ ▀█████████▀ ▄████████████▄ ▀█████████▀ ▄▄▄▄▄▄▄▄▄▄▄▄███ ██ ██ ███▄▄▄▄▄▄▄▄▄▄▄▄ ██████████████████████████████████████████ | | | | | | ▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄ █ ▄▀▄ █▀▀█▀▄▄ █ █▀█ █ ▐ ▐▌ █ ▄██▄ █ ▌ █ █ ▄██████▄ █ ▌ ▐▌ █ ██████████ █ ▐ █ █ ▐██████████▌ █ ▐ ▐▌ █ ▀▀██████▀▀ █ ▌ █ █ ▄▄▄██▄▄▄ █ ▌▐▌ █ █▐ █ █ █▐▐▌ █ █▐█ ▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█ | | | | | | ▄▄█████████▄▄ ▄██▀▀▀▀█████▀▀▀▀██▄ ▄█▀ ▐█▌ ▀█▄ ██ ▐█▌ ██ ████▄ ▄█████▄ ▄████ ████████▄███████████▄████████ ███▀ █████████████ ▀███ ██ ███████████ ██ ▀█▄ █████████ ▄█▀ ▀█▄ ▄██▀▀▀▀▀▀▀██▄ ▄▄▄█▀ ▀███████ ███████▀ ▀█████▄ ▄█████▀ ▀▀▀███▄▄▄███▀▀▀ | | | ..PLAY NOW.. |
|
|
|
crypto_zoidberg (OP)
|
|
September 21, 2014, 01:32:52 AM |
|
We are working on resolving this issue. I was the one that offered anonymint a bounty to research BCX's claims. This is a possible exploit that anonymint says has a fix, so as long as we can concentrate on the important things, then it should be just another day in cryptoland. My understanding of the attack is that it takes a long time to prepare, and it also requires a lot of hardware resources and only can affect some subset of tx. So, there are many conditions and few people will have the ability and resources to pull this off. Now this could all be an overreaction to some obscure edge case, but when it comes to something like this I do not want to assume it is inconsequential even if it is improbable. At the very least, this provides some intense scrutiny of the algorithms and creates new ways to harden it. James I let myself to uncover a little anonymint's research that we was privately discussed this evening: imo it's not critical, it's not about stealing money and it's not coin killer. it's about anonymity that could be compromised on very rare situations(with some specific conditions) and untypical for current transactions distribution(if could call it so). It similar to flaw that i fixed in august ( https://bitcointalk.org/index.php?topic=577267.msg8548412#msg8548412 ), so this also could be fixed without pain, and as i said - imo it's still not critical. Anyway, his research was helpful(thanks to anonymint), but it looks like BitcoinEXpress mean something else. Also many thanks to James for organization efforts!
|
|
|
|
iCEBREAKER
Legendary
Offline
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
|
|
September 21, 2014, 01:41:36 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK. BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it. Please advice What should be do iCEBREAKER? Are you a professional coder too? I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.
Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).
We should make popcorn and coffee and order Grubhub chow fun delivery. The next three days will be very interesting. Maybe BBR and XMR will switch market caps?
|
██████████ ██████████████████ ██████████████████████ ██████████████████████████ ████████████████████████████ ██████████████████████████████ ████████████████████████████████ ████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ████████████████████████████████ ██████████████ ██████████████ ████████████████████████████ ██████████████████████████ ██████████████████████ ██████████████████ ██████████ Monero
|
| "The difference between bad and well-developed digital cash will determine whether we have a dictatorship or a real democracy." David Chaum 1996 "Fungibility provides privacy as a side effect." Adam Back 2014
|
| | |
|
|
|
vipgelsi
Legendary
Offline
Activity: 1736
Merit: 1001
|
|
September 21, 2014, 01:44:40 AM |
|
Whats the deal with the name of this coin?
|
|
|
|
sonoIO
|
|
September 21, 2014, 02:10:25 AM Last edit: September 21, 2014, 04:10:34 AM by sonoIO |
|
Whats the deal with the name of this coin?
It is playful and it smell as berries. But in a couple of days you will find out if it is going to change to something ancient and mystical
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
|
September 21, 2014, 02:12:38 AM |
|
We are working on resolving this issue. I was the one that offered anonymint a bounty to research BCX's claims. This is a possible exploit that anonymint says has a fix, so as long as we can concentrate on the important things, then it should be just another day in cryptoland. My understanding of the attack is that it takes a long time to prepare, and it also requires a lot of hardware resources and only can affect some subset of tx. So, there are many conditions and few people will have the ability and resources to pull this off. Now this could all be an overreaction to some obscure edge case, but when it comes to something like this I do not want to assume it is inconsequential even if it is improbable. At the very least, this provides some intense scrutiny of the algorithms and creates new ways to harden it. James I let myself to uncover a little anonymint's research that we was privately discussed this evening: imo it's not critical, it's not about stealing money and it's not coin killer. it's about anonymity that could be compromised on very rare situations(with some specific conditions) and untypical for current transactions distribution(if could call it so). It similar to flaw that i fixed in august ( https://bitcointalk.org/index.php?topic=577267.msg8548412#msg8548412 ), so this also could be fixed without pain, and as i said - imo it's still not critical. Anyway, his research was helpful(thanks to anonymint), but it looks like BitcoinEXpress mean something else. Also many thanks to James for organization efforts! Anytime there is any possible exploit anywhere near a coin's codebase it is best to do whatever it takes to get to the bottom of the threat. If it turns out to be a false alert, then it is just a few BTC spent. If it is ignored, well, the results could be pretty bad. i think the expression is "better safe than sorry" BCX's cryptic "implementation" specific phrasing seems to indicate it is specific to XMR and that BBR already fixed this, or at least most of the exposure to this. In this case, it highlights the thing that we all know for a while. CZ is the leading cryptonote dev, bar none. Now it could be that there are additional vectors to the one that is found so far, so we must always be on the alert. BCX is a serious guy and I have much respect for him. I am glad that both communities are working closely to get through the next 72 hours. Any attack against XMR will not be good for all the cryptonotes, regardless if BBR is already immune or not. James https://bitcointalk.org/index.php?topic=789978.msg8907625#msg8907625
|
|
|
|
jl777
Legendary
Offline
Activity: 1176
Merit: 1134
|
|
September 21, 2014, 02:14:24 AM |
|
BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK. BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it. Please advice What should be do iCEBREAKER? Are you a professional coder too? I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.
Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).
We should make popcorn and coffee and order Grubhub chow fun delivery. The next three days will be very interesting. Maybe BBR and XMR will switch market caps? switching marketcaps is a bit much for a single exploit patched and it is quite possible that BCX noticed BBR's fix of this vulnerability and the lack of XMR's fix. However, the 5:1 price disparity is clearly silly and I expect this to be corrected before yearend James
|
|
|
|
|