Bitcoin Forum
November 17, 2018, 03:38:57 AM *
News: Latest Bitcoin Core release: 0.17.0 [Torrent].
 
   Home   Help Search Login Register More  
Pages: « 1 ... 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 [1897] 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 ... 2017 »
  Print  
Author Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency  (Read 4385508 times)
explorer
Legendary
*
Offline Offline

Activity: 1568
Merit: 1126



View Profile
March 09, 2018, 11:42:31 PM
 #37921

Did you guys read the Bittrex statement regarding upcoming fork? Was that the reason why fork was postponed?

Monero's fork has nothing to do with bittrex, and it was not postponed.  It was delayed slightly to wait for Ledger to catch up, since a date had not yet been set.
Bittrex makes statement that they won't support XMR/XMV fork because team has not contacted them earlier and now there is no time to go through review process until 14th of March and then Boom! fork gets delayed. Is that a coincidence?

XMV is not Monero.  Wrong thread. 
1542425937
Hero Member
*
Offline Offline

Posts: 1542425937

View Profile Personal Message (Offline)

Ignore
1542425937
Reply with quote  #2

1542425937
Report to moderator
1542425937
Hero Member
*
Offline Offline

Posts: 1542425937

View Profile Personal Message (Offline)

Ignore
1542425937
Reply with quote  #2

1542425937
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Call_Me_Bambi
Sr. Member
****
Offline Offline

Activity: 504
Merit: 259


View Profile
March 10, 2018, 02:17:26 AM
 #37922

Well if the fork has been delayed then this makes it a good time to stock up on some more Monero, which exchanges will be issuing the forked coin.

The recent surprise growth in XMR price had got the support from a looming hard fork – which is expected to take place in mid of this month.  MoneroV would be the new form of Monero token; investors who hold Monero will obtain 10 coins of MoneroV against each Monero coin.
https://cryptocurrencynews.com/daily-news/altcoins/monero-price-lead/
Globb0
Legendary
*
Offline Offline

Activity: 1675
Merit: 1111


Knight of the new WO


View Profile
March 10, 2018, 08:45:34 AM
 #37923

If all the xmv gets created in 5 huge transactions 1 on each exchange would that make a difference to the breach potential? instead of thousands of sets of keys shared.



I think they have realise most users don't run a home wallet so there will be no customers like that.


I cant see it getting on exchanges, but I do worry they may be using the Monero name + lies to get in the door.


I mean read any of the links people post to their material





Umbongo
ozkraut
Sr. Member
****
Offline Offline

Activity: 520
Merit: 266


View Profile
March 10, 2018, 08:59:07 AM
 #37924

If all the xmv gets created in 5 huge transactions 1 on each exchange would that make a difference to the breach potential? instead of thousands of sets of keys shared.



I think they have realise most users don't run a home wallet so there will be no customers like that.


I cant see it getting on exchanges, but I do worry they may be using the Monero name + lies to get in the door.


I mean read any of the links people post to their material






I can' believe any exchanges will list this thing? Why? We have decimals....so we dont need 25ish million coins to express a value?
Its a joke really. And makes me worried how stupid and greedy we are as a species. Maybe we deserve all we get.
We should for monerovi of v immediately. 25 trillion coins. So everyone can be a millionaire. 15% to the dev (me)

Monero - Wir sind die Leute vor denen uns unsere Eltern gewarnt haben!
ZipperCoin
Newbie
*
Offline Offline

Activity: 60
Merit: 0


View Profile WWW
March 11, 2018, 09:45:09 AM
 #37925

CoinGenome listed XMR https://coingenome.com/coin/xmr

3M and 6M chart looks solid.
Dart315
Member
**
Offline Offline

Activity: 124
Merit: 12


View Profile
March 11, 2018, 09:50:06 AM
Merited by Globb0 (2)
 #37926

Well if the fork has been delayed then this makes it a good time to stock up on some more Monero, which exchanges will be issuing the forked coin.

The recent surprise growth in XMR price had got the support from a looming hard fork – which is expected to take place in mid of this month.  MoneroV would be the new form of Monero token; investors who hold Monero will obtain 10 coins of MoneroV against each Monero coin.
https://cryptocurrencynews.com/daily-news/altcoins/monero-price-lead/

Do I need to expose my private keys to get MoneroV?

I doubt it's fine to share your private key to get a fork coin.
Globb0
Legendary
*
Offline Offline

Activity: 1675
Merit: 1111


Knight of the new WO


View Profile
March 11, 2018, 11:20:49 AM
 #37927

You deduced well.

And who would ask you to do that?


Umbongo
explorer
Legendary
*
Offline Offline

Activity: 1568
Merit: 1126



View Profile
March 11, 2018, 12:42:08 PM
 #37928

You deduced well.

And who would ask you to do that?


I know!  I know!


SCAMMERZ!

LTCMAXMYR
Hero Member
*****
Offline Offline

Activity: 602
Merit: 500

DMD,XZC


View Profile
March 11, 2018, 01:28:55 PM
 #37929

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Never buy any ICO altcoin.
Never buy any ASIC altcoin.
Anon136
Legendary
*
Offline Offline

Activity: 1624
Merit: 1180



View Profile
March 11, 2018, 03:00:56 PM
 #37930

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
xs.over
Full Member
***
Offline Offline

Activity: 362
Merit: 103


View Profile
March 11, 2018, 03:11:04 PM
 #37931

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA
Anon136
Legendary
*
Offline Offline

Activity: 1624
Merit: 1180



View Profile
March 11, 2018, 03:22:17 PM
 #37932

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

A FPGA is not an ASIC. This change will stop ASICs but not FPGAs. I don't think anything can do that except maybe an intentionally developed FPGA resistant algorithm.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Hueristic
Legendary
*
Offline Offline

Activity: 1806
Merit: 1091


Doomed to see the future and unable to prevent it


View Profile
March 11, 2018, 05:32:17 PM
 #37933

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

FPGA (field Grid Programmable Array) is a system that can be programmed to act as an asic but it does not have even close to asic speed because the chips used are much slower than if you had made the asic on die.

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

What happened to the hoard of reddit supporters? They have no issue funding marketing bullshit so they can line their greedly little pockets but when it comes to the most important core parts of the project they are no where to be found. It's almost as if security is kicked from the back seat into the trunk. I bet if we put up a funder to get some second rate hack actor like Seagal it would be funded in 10 minutes.

https://forum.getmonero.org/8/funding-required/90007/bulletproofs-audit-fundraising

We want Carlos from bitconnect!

Come on now 170 xmr in 3 days is not bad at all.

It used to be hours tops for this stuff.

All done.  3 days.  240 xmr ain't peanuts anymore either.

120k subs on reddit. Typically 3000-4000+ online at any given time.  Ya, not much for community support given the numbers.  But we still get it done.

Nice to see you guys still supporting the core ideals over here and I'm glad Fluffy used the Dev fund for the remainder. It's weird with the FFS sometimes I forget that there is a Dev fund that gets a cut of most pools.


Anyone know how much is in the development fund?

Good question, I'm sure there is a view key around somewhere but I have no clue where. It would be nice to see a spreadsheet to see how it's been used over the years. I only disagreed with one thing it was used for (at least that I know) so that's pretty damn good over all as in any organization having that kind of agreement from the community is pretty unheard of.


BITSLER                 ▄███
               ▄████▀
             ▄████▀
           ▄████▀  ▄██▄
         ▄████▀    ▀████▄
       ▄████▀        ▀████▄
     ▄████▀            ▀████▄
   ▄████▀                ▀████▄
 ▄████▀ ▄████▄      ▄████▄ ▀████▄
█████   ██████      ██████   █████
 ▀████▄ ▀████▀      ▀████▀ ▄████▀
   ▀████▄                ▄████▀
     ▀████▄            ▄████▀
       ▀████▄        ▄████▀
         ▀████▄    ▄████▀
           ▀████▄▄████▀
             ▀██████▀
               ▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄            
▄▄▄▄▀▀▀▀    ▄▄█▄▄ ▀▀▄         
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄      
█  ▀▄▄  ▀█▀▀ ▄      ▀████   ▀▀▄   
█ █▄  ▀▄   ▀████       ▀▀ ▄██▄ ▀▀▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█  ▀▀       ▀▄▄ ▀████      ▄▄▄▀▀▀  █
█            ▄ ▀▄    ▄▄▄▀▀▀   ▄▄  █
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█ ▄▄   ███   ▀██  █           ▀▀  █ 
█ ███  ▀██       █        ▄▄      █ 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  
▀▄            █        ▀▀      █  
▀▀▄   ███▄  █   ▄▄          █   
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀    
▀▀▄   █   ▀▀▄▄▄▀▀▀         
▄▄▄▄▄▄▄▄▄▄▄█▄▄▀▀▀▀              
              ▄▄▄██████▄▄▄
          ▄▄████████████████▄▄
        ▄██████▀▀▀▀▀▀▀▀▀▀██████▄
▄     ▄█████▀             ▀█████▄
██▄▄ █████▀                ▀█████
 ████████            ▄██      █████
  ████████▄         ███▀       ████▄
  █████████▀▀     ▄███▀        █████
   █▀▀▀          █████         █████
     ▄▄▄         ████          █████
   █████          ▀▀           ████▀
    █████                     █████
     █████▄                 ▄█████
      ▀█████▄             ▄█████▀
        ▀██████▄▄▄▄▄▄▄▄▄▄██████▀
          ▀▀████████████████▀▀
              ▀▀▀██████▀▀▀
            ▄▄▄███████▄▄▄
         ▄█▀▀▀ ▄▄▄▄▄▄▄ ▀▀▀█▄
       █▀▀ ▄█████████████▄ ▀▀█
     █▀▀ ███████████████████ ▀▀█
    █▀ ███████████████████████ ▀█
   █▀ ███████████████▀▀ ███████ ▀█
 ▄█▀ ██████████████▀      ▀█████ ▀█▄
███ ███████████▀▀            ▀▀██ ███
███ ███████▀▀                     ███
███ ▀▀▀▀                          ███
▀██▄                             ▄██▀
  ▀█▄                            ▀▀
    █▄       █▄▄▄▄▄▄▄▄▄█
     █▄      ▀█████████▀
      ▀█▄      ▀▀▀▀▀▀▀
        ▀▀█▄▄  ▄▄▄
            ▀▀█████
[]
Anon136
Legendary
*
Offline Offline

Activity: 1624
Merit: 1180



View Profile
March 11, 2018, 06:05:56 PM
 #37934

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

No you aren't missing anything. I was just trying to be as clear as possible. Said differently, one would use the ouput from that algorithm, call it N, to select the Nth valid prospective ring signature partner.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Hueristic
Legendary
*
Offline Offline

Activity: 1806
Merit: 1091


Doomed to see the future and unable to prevent it


View Profile
March 11, 2018, 06:31:07 PM
 #37935

Holy crap you guys. Eureka! I figured it out! Not just a stop gap measure to address the fork ring sig reuse problem. The actual solution! I was just laying in bed trying to fall asleep and it hit me like a tire iron to the face.

It is possable to deterministically derive ring sig partners but in a way that would be functionally random to any outside observer. I'll give an example of one way of doing it. Take

Code:
sha256([your private key] [transaction hash of most recent input]) mod [number of prospective ring signature partners]

Then make all of the prospective ring signature partners into an ordered numbered set and use the resulting modulus from the pseudo code above to select one. Continue wrapping around the clock face as many times as needed to arrive at the number of ring signature partners desired.

There would be 0 information leak from the outside, the ring signature partners would be functionally random to any outside observer BUT, and here is the beautiful thing, the same ring signature partners would end up being selected on both the main chain AND the fork chain!

Of course what I outlined above almost certainly isn't the best way to achieve this. It was just to outline the concept.


Merits! I deserve all of the merits. Bequeath unto me thine merits! (well, after peer review, and not just if my specific idea is right but if I'm barking up close enough to the right tree to inspire someone smarter than me)

The prospective ring signature partners is a numbered order set consisting of the total number of transactions so what is the benefit of using that as it can easily be determined? Or am I just missing something there?

AFA as the concept itself,I cannot comment on except it sounds doable.

No you aren't missing anything. I was just trying to be as clear as possible. Said differently, one would use the ouput from that algorithm, call it N, to select the Nth valid prospective ring signature partner.

Got ya. Smiley

BITSLER                 ▄███
               ▄████▀
             ▄████▀
           ▄████▀  ▄██▄
         ▄████▀    ▀████▄
       ▄████▀        ▀████▄
     ▄████▀            ▀████▄
   ▄████▀                ▀████▄
 ▄████▀ ▄████▄      ▄████▄ ▀████▄
█████   ██████      ██████   █████
 ▀████▄ ▀████▀      ▀████▀ ▄████▀
   ▀████▄                ▄████▀
     ▀████▄            ▄████▀
       ▀████▄        ▄████▀
         ▀████▄    ▄████▀
           ▀████▄▄████▀
             ▀██████▀
               ▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄            
▄▄▄▄▀▀▀▀    ▄▄█▄▄ ▀▀▄         
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄      
█  ▀▄▄  ▀█▀▀ ▄      ▀████   ▀▀▄   
█ █▄  ▀▄   ▀████       ▀▀ ▄██▄ ▀▀▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█  ▀▀       ▀▄▄ ▀████      ▄▄▄▀▀▀  █
█            ▄ ▀▄    ▄▄▄▀▀▀   ▄▄  █
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█ ▄▄   ███   ▀██  █           ▀▀  █ 
█ ███  ▀██       █        ▄▄      █ 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  
▀▄            █        ▀▀      █  
▀▀▄   ███▄  █   ▄▄          █   
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀    
▀▀▄   █   ▀▀▄▄▄▀▀▀         
▄▄▄▄▄▄▄▄▄▄▄█▄▄▀▀▀▀              
              ▄▄▄██████▄▄▄
          ▄▄████████████████▄▄
        ▄██████▀▀▀▀▀▀▀▀▀▀██████▄
▄     ▄█████▀             ▀█████▄
██▄▄ █████▀                ▀█████
 ████████            ▄██      █████
  ████████▄         ███▀       ████▄
  █████████▀▀     ▄███▀        █████
   █▀▀▀          █████         █████
     ▄▄▄         ████          █████
   █████          ▀▀           ████▀
    █████                     █████
     █████▄                 ▄█████
      ▀█████▄             ▄█████▀
        ▀██████▄▄▄▄▄▄▄▄▄▄██████▀
          ▀▀████████████████▀▀
              ▀▀▀██████▀▀▀
            ▄▄▄███████▄▄▄
         ▄█▀▀▀ ▄▄▄▄▄▄▄ ▀▀▀█▄
       █▀▀ ▄█████████████▄ ▀▀█
     █▀▀ ███████████████████ ▀▀█
    █▀ ███████████████████████ ▀█
   █▀ ███████████████▀▀ ███████ ▀█
 ▄█▀ ██████████████▀      ▀█████ ▀█▄
███ ███████████▀▀            ▀▀██ ███
███ ███████▀▀                     ███
███ ▀▀▀▀                          ███
▀██▄                             ▄██▀
  ▀█▄                            ▀▀
    █▄       █▄▄▄▄▄▄▄▄▄█
     █▄      ▀█████████▀
      ▀█▄      ▀▀▀▀▀▀▀
        ▀▀█▄▄  ▄▄▄
            ▀▀█████
[]
SillyGirl
Newbie
*
Offline Offline

Activity: 85
Merit: 0


View Profile
March 11, 2018, 09:39:01 PM
 #37936

Waited for Monero to come out of the dip. +10% today! Check out the fluctuations in the charts:https://www.coinranker.net/cryptocurrency/monero
Drhiggins
Sr. Member
****
Offline Offline

Activity: 301
Merit: 250



View Profile
March 11, 2018, 11:59:54 PM
 #37937

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?

Monerohash.com   U.S. Mining Pool
nioc
Legendary
*
Offline Offline

Activity: 1568
Merit: 1005

out of the blue and into the black


View Profile
March 12, 2018, 12:30:18 AM
 #37938

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?


the minimum and default for ringsize is 5 (that is the same as mixin 4) ring size has replaced mixin as the descriptor. No need to change this.

when you type help you will see "transfer" and that is the format to use. and it describes it as well

transfer [<priority>] [<ring_size>] <address> <amount> [<payment_id>]

you don't need to set ring size.  If you want to lower priority and therefore the fee use [1]  I usually just set the priority before a transfer by "set priority 1" so as not to be concerned with the order of things and then just use "transfer <address> <amount>"

for the PID, whoever you are sending to will give that to you.  If receiving then I am unsure.  I have found no need for it

With the new release and hardfork at the end of the month subaddresses can be used instead of PID.  They will work better but it will probably take a while before exchanges start using them. 


If you don't know where you're going any road will get you there
Drhiggins
Sr. Member
****
Offline Offline

Activity: 301
Merit: 250



View Profile
March 12, 2018, 12:32:34 AM
 #37939

I need some help.  Ever since v0.11.1.0 I can not figure out how to send a payment through the CLI wallet feature.  I typed help and get this in the wallet help menu but I don't know how to format it correctly.

Ring size does this matter and what values do you use min max?  Also what is the minimum mixinn these days?   Can someone please place an example of how to transfer here please.

how do you generate a payment ID now has this changed as well?


the minimum and default for ringsize is 5 (that is the same as mixin 4) ring size has replaced mixin as the descriptor. No need to change this.

when you type help you will see "transfer" and that is the format to use. and it describes it as well

transfer [<priority>] [<ring_size>] <address> <amount> [<payment_id>]

you don't need to set ring size.  If you want to lower priority and therefore the fee use [1]  I usually just set the priority before a transfer by "set priority 1" so as not to be concerned with the order of things and then just use "transfer <address> <amount>"

for the PID, whoever you are sending to will give that to you.  If receiving then I am unsure.  I have found no need for it

With the new release and hardfork at the end of the month subaddresses can be used instead of PID.  They will work better but it will probably take a while before exchanges start using them. 



Thank you good sir.

Monerohash.com   U.S. Mining Pool
LTCMAXMYR
Hero Member
*****
Offline Offline

Activity: 602
Merit: 500

DMD,XZC


View Profile
March 12, 2018, 12:38:07 AM
 #37940

ASIC is coming ,XVG and DGB are killed by AISC,obviously,XMR will dump to floor.

Monero's POW algorithm is soon to be changed slightly. This will render any asics useless.
Are you sure that minor changes in hash algorithm can help to avoid asics, cause they probably can update/reprogramming their FPGA

i mean this ASIC,not FPGA.
http://www.baikalminer.com/product12.php

Never buy any ICO altcoin.
Never buy any ASIC altcoin.
Pages: « 1 ... 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 [1897] 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 ... 2017 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!