tubesteak
|
|
July 31, 2014, 07:54:04 AM |
|
These muthafuckaz desperate as fuck! I'm starting to get used to these weak minded maggots. It's more like entertainment watching them hate on us so much, because they scared little babies. CLOAK making moves!!!
|
SLG: SPWZuB9HsZVQNiHCbLQyw32EdRdVtt87We
|
|
|
smokim87
|
|
July 31, 2014, 07:54:21 AM |
|
I just cannot believe that this instamined shitcoin managed to survive this long. Shitcoin without any working features. The anon code is not open source. One Market LMFAO not working. Like it's hard to make a design. God fucking DAMN. You can slap the sheep with a dick across the face and still couldn't understand the obvious.
I really need some popcorn. I don't wanna miss this flash dump. It will be the funniest shit in crypto.
You must of got scammed with so many new shitcoins..hating on every coin now? Anon code is not open source, why open it so another 1000x shitcoins pop up with working anon to scam you again? Onemarket is in development, its not even done to be "Not working"
|
|
|
|
KenChanYu
|
|
July 31, 2014, 07:57:31 AM |
|
I just cannot believe that this instamined shitcoin managed to survive this long. Shitcoin without any working features. The anon code is not open source. One Market LMFAO not working. Like it's hard to make a design. God fucking DAMN. You can slap the sheep with a dick across the face and still couldn't understand the obvious.
I really need some popcorn. I don't wanna miss this flash dump. It will be the funniest shit in crypto.
In 6 months time this coin will be a forgotten memory to day traders. Just enjoy the current ride and get out when you have made a decent profit and wait for the next coin promising the world.
|
|
|
|
alwa1
|
|
July 31, 2014, 07:59:27 AM |
|
Wow this guy is still here.
|
|
|
|
tubesteak
|
|
July 31, 2014, 08:00:14 AM |
|
LMAO! every one of these fuck heads is a drk cock sucker. Damn, We must be doing shit right to attract this much attention. drk lil bitches, We at Cloak are so flattered.
|
SLG: SPWZuB9HsZVQNiHCbLQyw32EdRdVtt87We
|
|
|
humski
|
|
July 31, 2014, 08:02:48 AM |
|
drkman, who is this poor guy... you? haha
|
|
|
|
YackBallz
|
|
July 31, 2014, 08:03:44 AM |
|
Jealousy is a powerful drug
Meanwhile, Cloak is still TITS
|
|
|
|
alwa1
|
|
July 31, 2014, 08:04:01 AM |
|
Your posts are being deleted because when a new investor come he doesn't have to read your silly 5 questions repeated 50times.
|
|
|
|
TheDagger (OP)
|
|
July 31, 2014, 08:08:19 AM |
|
Please stop quoting Drkman, he's been reported to the moderators several times with 100% success rate.
All posts of his posts and anyone quoting him will continue to be removed due to his insistence on trashing talking this thread.
|
|
|
|
smokim87
|
|
July 31, 2014, 08:11:55 AM |
|
Dagger. can you PM me so we can talk. Thanks!
Finally! You could of did that 12 hours ago and saved everyone including yourself alot of time!
|
|
|
|
youngmike
|
|
July 31, 2014, 08:12:42 AM |
|
I just cannot believe that this instamined shitcoin managed to survive this long. Shitcoin without any working features.
You are right about DarkCoin.
|
|
|
|
tubesteak
|
|
July 31, 2014, 08:14:35 AM |
|
This shit is ridiculous. These trolls are giving crypto and the coin they represent a shity image. So classless. I myself apologize for talking shit in response. CLOAK ALL DAY EVERYDAY!
|
SLG: SPWZuB9HsZVQNiHCbLQyw32EdRdVtt87We
|
|
|
xibeijan
Legendary
Offline
Activity: 1232
Merit: 1001
|
|
July 31, 2014, 08:15:59 AM |
|
Just reviewing the cloak coin anonymity claims. This is an interesting quote from the Whitepaper. "Again in the Phase 2 pass the originator and recipient are not recorded, instead the transaction occurs between the Phase 1 and Phase 2 nodes." My problem with this is: 1) the transaction are broadcast and, thus, propagated to all nodes. A malicious node could simply record all these transactions and easily publish the records linking the transactions. 2) the elected node could itself be a spy and publish records of these transactions for all transactions it pretends to anonymise. Further, there are a few other serious problems: 3) there are only two levels of mixing, which is hardly enough to provide any real guarantees 4) no mechanism is described that would prevent an anonymising node from stealing outputs 5) it is still easy to see between which nodes funds have transferred based on the amounts transferred. No mechanism is incorporated to split up the transfers into smaller units. Hopefully my concerns and questions can help put the discussion back on to a productive track. Thanks.
|
|
|
|
YackBallz
|
|
July 31, 2014, 08:17:41 AM |
|
It's another beautiful day. Let's go for an All Time High for the fifth consecutive day! Cloak is the best alt coin on the market - it has profited this week as BTC lost value Innovation, creativity, and quality make cloak a coin for the future. Go to cloaktalk.com to learn more! Highest volume on Mintpal! Highest volume on Cryptsy! People who do diligent research know this is the coin to put your money into. Go to cloaktalk.com to learn more! The people who come to this channel to tell you negative things about cloak are afraid, only fear leads someone to behave this way.... Alt coins are all about making money speculating, why would someone flame another coin? FEARCloak has made people exceptional profits earned through development people can see and test for themselves. See for yourself at www.cloaktalk.com
|
|
|
|
stealth923
Legendary
Offline
Activity: 1036
Merit: 1000
|
|
July 31, 2014, 08:22:56 AM |
|
Just reviewing the cloak coin anonymity claims. This is interesting quote from the Whitepaper: "Again in the Phase 2 pass the originator and recipient are not recorded, instead the transaction occurs between the Phase 1 and Phase 2 nodes."
My problem with this is:
1) the transaction are broadcast and, thus, propagated to all nodes. A malicious node could simply record all these transactions and easily publish the records linking the transactions.
2) the elected node could itself be a spy and publish records of these transactions for all transactions it pretends to anonymise.
Further, there are a few other serious problems:
3) there are only two levels of mixing, which is hardly enough to provide any real guarantees
4) no mechanism is described that would prevent an anonymising node from stealing outputs
Hopefully my concerns and questions can help put the discussion back on to a productive track.
Thanks.
shhh no real discussions are allowed in here - you will upset the pump. Also whats to stop a bad actor from creating as many wallets/nodes as he/she wishes and capturing the data / stealing incoming transactions. This was done with XC rev 1.0 and the same applies to Cloak's design.
|
|
|
|
Thomas-s
|
|
July 31, 2014, 08:24:35 AM |
|
Just reviewing the cloak coin anonymity claims. This is interesting quote from the Whitepaper: "Again in the Phase 2 pass the originator and recipient are not recorded, instead the transaction occurs between the Phase 1 and Phase 2 nodes."
My problem with this is:
1) the transaction are broadcast and, thus, propagated to all nodes. A malicious node could simply record all these transactions and easily publish the records linking the transactions.
2) the elected node could itself be a spy and publish records of these transactions for all transactions it pretends to anonymise.
Further, there are a few other serious problems:
3) there are only two levels of mixing, which is hardly enough to provide any real guarantees
4) no mechanism is described that would prevent an anonymising node from stealing outputs
Hopefully my concerns and questions can help put the discussion back on to a productive track.
Thanks.
shhh no real discussions are allowed in here - you will upset the pump. Also whats to stop a bad actor from creating as many wallets/nodes as he/she wishes and capturing the data / stealing incoming transactions. This was done with XC rev 1.0 and the same applies to Cloak's design. Sorry that your precious DRK is a worthless shitcoin, not too late to jump on the CLOAK train
|
|
|
|
|
,gaaaaaaaagaaaaaaaaaaaaagaaaaaaaag, ,aP8b _,dYba, ,adPb,_ d8Ya, ,aP" Yb_,dP" "Yba, ,adP" "Yb,_dP "Ya, ,aP" _88" )888( "88_ "Ya, ,aP" _,dP"Yb ,adP"8"Yba, dP"Yb,_ "Ya, ,aPYb _,dP8 Yb ,adP" 8 "Yba, dP 8Yb,_ dPYa, ,aP" YdP" dP YbdP" 8 "YbdP Yb "YbP "Ya, I8aaaaaa8aaa8baaaaaa88aaaaaaaa8aaaaaaaa88aaaaaad8aaa8aaaaaa8I `Yb, d8a, Ya d8b, 8 ,d8b aP ,a8b ,dP' "Yb,dP "Ya "8, dI "Yb, 8 ,dP" Ib ,8" aP" Yb,dP" "Y8, "YaI8, ,8' "Yb, 8 ,dP" `8, ,8IaP" ,8P" "Yb, `"Y8ad' "Yb,8,dP" `ba8P"' ,dP" "Yb, `"8, "Y8P" ,8"' ,dP" "Yb, `8, 8 ,8' ,dP" "Yb, `Ya 8 aP' ,dP" "Yb, "8, 8 ,8" ,dP" "Yb, `8, 8 ,8' ,dP" "Yb, `Ya 8 aP' ,dP" "Yb, "8, 8 ,8" ,dP" "Yb,`8, 8 ,8',dP" "Yb,Ya8aP,dP" "Y88888P" "Y8P" " | | Free TON
| │ │ │
| PEER-TO-PEER MULTY-BLOCKCHAIN SYSTEM ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ ▬▬▬▬TON SURF - OFFICIAL WALLET ▬▬▬▬ | │ │ │
| ▄███████████████████▄ █████████████████████ ▄█████ █████████████████████ ██████ ████ ████ ███ █████████████████████ ██████ ████ ████ ██████ █████████████████████ ███ █████████████████████ ███████ ▀███████████████████▀ ▀███████▄▄▄▄▄▄▄ ▀████ ████▌ ██ ▐██▌ █▌
| | | | │ │ │
| | | | │ │ │
| | TELEGRAM FORUM WIKI |
|
|
|
voxelot
|
|
July 31, 2014, 08:26:20 AM |
|
Just reviewing the cloak coin anonymity claims. This is interesting quote from the Whitepaper: "Again in the Phase 2 pass the originator and recipient are not recorded, instead the transaction occurs between the Phase 1 and Phase 2 nodes."
My problem with this is:
1) the transaction are broadcast and, thus, propagated to all nodes. A malicious node could simply record all these transactions and easily publish the records linking the transactions.
2) the elected node could itself be a spy and publish records of these transactions for all transactions it pretends to anonymise.
Further, there are a few other serious problems:
3) there are only two levels of mixing, which is hardly enough to provide any real guarantees
4) no mechanism is described that would prevent an anonymising node from stealing outputs
Hopefully my concerns and questions can help put the discussion back on to a productive track.
Thanks.
Obfuscation. You have to think about PoSA like tor. 1. We can black list malicious nodes and rely on the fact that there will be so many nodes on the network (unlike centralized masternodes) that the majority will not be spy nodes and to find any relevant data will be next to impossible. Nothing is 100% approaching limits is the best way to handle things. 2. Same question as 1 3. 2 levels out of a random selection. powers of two magnify probabilities of not being interfered with exponentially. 4. Again the same questions Thank you for the technical post. Hope this answers some.
|
|
|
|
InvestorPerson
|
|
July 31, 2014, 08:27:54 AM |
|
this just started, the current price is WAY UNDERVALUED buy NOW, if you hesitated you'll just miss it again
|
whoever sells below 29k now must be a complete retard....
|
|
|
Sleepyx
Member
Offline
Activity: 112
Merit: 10
|
|
July 31, 2014, 08:28:13 AM |
|
Mooooon!
|
|
|
|
voxelot
|
|
July 31, 2014, 08:28:17 AM |
|
Also whats to stop a bad actor from creating as many wallets/nodes as he/she wishes and capturing the data / stealing incoming transactions. This was done with XC rev 1.0 and the same applies to Cloak's design.
A system we have put in place to require a small investment to be a node thus stopping unlimited bad nodes by investment deterrence.
|
|
|
|
|