matrix961
|
|
August 27, 2014, 02:26:14 PM |
|
I'm willing to test and will be available. I have a galaxy note 2.
|
|
|
|
EmilioMann
Legendary
Offline
Activity: 2184
Merit: 1028
#mitandopelomundo
|
|
August 27, 2014, 03:04:35 PM |
|
|
|
|
|
tx42
|
|
August 27, 2014, 03:12:30 PM |
|
StealthText Proof-Of-Concept Success StealthText has been proven by the development team. As you will find out in more detail, StealthText is a system for encrypted SMS transactions. Transactions are coded in your phone by AES/CGM encryption and traverse fully encrypted until they get to your wallet and are decrypted therein. In transit, the transactions are cryptographically tamper-proof and reveal no information about the transaction. Does this mean that if I want to send XST and all I have is a dumbphone with Java and SMS texting, then I can send it anonymously? Because if so, that would be huge. And I'm certain it would be first of it's kind. Why not call it "Anonymous SMS Transactions" or something more descriptive? You guys need to hype this, especially since the Mr. Net pump is over. There are probably two dozen crap coins with higher market cap and nothing anywhere near this cool. [edit]Devs: why aren't you hyping the fact that this is decentralized because anyone can build their own pipeline from your tools? Devs? They must be asleep.
|
█ █ ██ ███ ███ ████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████ ███ ███ ██ █ ██ █ ██ ███ ███ ████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████ ███ ███ ██ █ █
|
|
|
grndnpnd
|
|
August 27, 2014, 03:20:25 PM |
|
Call for StealthText Testers!
With the pipeline complete & new wallet update rolled out, we are now in the final stages of the StealthText release. This means we need your help.
Before putting Stealthtext into the wild, we want to test it on a variety of Android handsets. We are opening a call for volunteers who will get an exclusive sneak peek of the app in the final stages of development.
If you are interested in being in this special group of testers, please reply to this post with what Android device(s) you have. We will publicly pick these testers and ask them to report back findings as a “Proof of Concept”. Within a few days of completion of this test, we shall release the application on Google Pay for the general public.
To apply, you must have:
1. Available Android device we have not tested (we have already tested on: LG Note 3, Samsung S3, & Samsung S5 ) 2. Newest StealthCoin QT installed and synced 4. You must be available 08/27/14 @ 9 pm PST for at least 2 hours 5. You must be willing to report back to the community, provide us feedback, and answer questions about your experience 6. Most importantly, you must have patience and a good attitude.
We appreciate the contributions & can’t wait to work with the vibrant StealthCoin community!
HOLY SH#T this is huge and they snuck it out while i was sleeping another amazing innovations by the stealth dev team. I really wish i could be part of the "test" but i have a LG note 3 and it looks like its been tested already. I cant wait to see the reports back tonight from those chosen to test i already have questions starting a list... Thanks dev team GREAT JOB!!!! glad i bought more at 1300
|
Hash Advisor exclusive Cryptsy vote exploit mining
|
|
|
EmilioMann
Legendary
Offline
Activity: 2184
Merit: 1028
#mitandopelomundo
|
|
August 27, 2014, 03:42:48 PM Last edit: August 27, 2014, 08:04:40 PM by EmilioMann |
|
StealthText Proof-Of-Concept Success StealthText has been proven by the development team. As you will find out in more detail, StealthText is a system for encrypted SMS transactions. Transactions are coded in your phone by AES/CGM encryption and traverse fully encrypted until they get to your wallet and are decrypted therein. In transit, the transactions are cryptographically tamper-proof and reveal no information about the transaction. Does this mean that if I want to send XST and all I have is a dumbphone with Java and SMS texting, then I can send it anonymously? Because if so, that would be huge. And I'm certain it would be first of it's kind. Why not call it "Anonymous SMS Transactions" or something more descriptive? You guys need to hype this, especially since the Mr. Net pump is over. There are probably two dozen crap coins with higher market cap and nothing anywhere near this cool. [edit]Devs: why aren't you hyping the fact that this is decentralized because anyone can build their own pipeline from your tools? Devs? They must be asleep. yes they are sleeping at this hour in silicon valley. Hondo usually appears here in a couple of hours I'm also very interested in the answer to your question!
|
|
|
|
deadliftbrah
|
|
August 27, 2014, 04:39:29 PM Last edit: August 27, 2014, 05:18:07 PM by deadliftbrah |
|
Call for StealthText Testers!
With the pipeline complete & new wallet update rolled out, we are now in the final stages of the StealthText release. This means we need your help.
Before putting Stealthtext into the wild, we want to test it on a variety of Android handsets. We are opening a call for volunteers who will get an exclusive sneak peek of the app in the final stages of development.
If you are interested in being in this special group of testers, please reply to this post with what Android device(s) you have. We will publicly pick these testers and ask them to report back findings as a “Proof of Concept”. Within a few days of completion of this test, we shall release the application on Google Pay for the general public.
To apply, you must have:
1. Available Android device we have not tested (we have already tested on: LG Note 3, Samsung S3, & Samsung S5 ) 2. Newest StealthCoin QT installed and synced 4. You must be available 08/27/14 @ 9 pm PST for at least 2 hours 5. You must be willing to report back to the community, provide us feedback, and answer questions about your experience 6. Most importantly, you must have patience and a good attitude.
We appreciate the contributions & can’t wait to work with the vibrant StealthCoin community!
Great news it won't be long before the rest of crypto get wind of this and this coin skyrockets - if Bitcoindark can reach $5 I don't see why Stealth can't. I went on a reddit mission and posted it on a few subreddits please up vote/support/interact http://www.reddit.com/r/Bitcoin/comments/2eqmms/stealthcoin_tor_network_altcoin_release/http://www.reddit.com/r/TOR/comments/2eqnyj/stealthcoin_release_stealthsend_stealthtext_huge/http://www.reddit.com/r/altcoin/comments/2eqlsk/stealth_coin_release_new_anonymous_technology/Can someone post it to the sub reddit below I'll risk getting blocked if I post again lol! http://www.reddit.com/r/DarkNetMarkets
|
|
|
|
Forbet
Member
Offline
Activity: 84
Merit: 10
|
|
August 27, 2014, 04:46:30 PM |
|
Great news! I'm glad i didnt sell during the post-pump-dump, because stealth is going to get pretty big really soon. ... and it's back on its way to 2k. Edit 1 minute later: It's at 2k.
|
|
|
|
StealthSend
Member
Offline
Activity: 85
Merit: 10
Because privacy is a basic human right.
|
|
August 27, 2014, 06:14:36 PM |
|
Stealth Text Details (Whitepaper Rough Draft) This isn't the final draft of the whitepaper, but I hope it answers some basic questions. Indeed, StealthText is the technology for " anonymous SMS transactions". The following text explains the illustration below.Let's imagine Bob wants to send 420 XST to Carol. Bob has set up his own pipeline or is a customer of an online wallet service that has provides a pipeline. Either is possible because anyone can set up his or her own pipeline. Now, Bob is operating under some constraints today. He has his phone and can SMS, but for whatever reason has no access to his data services. But he needs his transaction to get to Carol securely and privately (anonymously). He can't afford for anyone to tamper with his transaction, like "flipping a bit" to change the amount, nor can he afford for an adversary, such as a competing business, to know the nature of his transaction with Carol. Bob is in luck today, because he has installed StealthText on his phone. In his settings dialog, he has entered a secret passphrase (that could be a random string of characters), the phone number of his SMS forwarding service (like google voice), and a client ID, that is not essential but can be used for routing (in the screenshots, this is 1zrL2Jk, which is random for the sake of the example). His wallet (whether on the cloud or in his computer at home) knows this secret passphrase and his PIN , which is the second part of StealthText's two-factor authentication. To make his transaction, he enters Carol's XST address ("SGVQhkwom..", the first S has been cut off in the screenshots) the amount (420 XST) and his PIN, which he shares with no one and has memorized. He then hits "Send" and confirms the transaction. StealthText then sends the anonymous, encrypted transaction through SMS where it enters the pipeline. The SMS message with the anonymous transaction, is routed to Bob's SMS forwarding service (like google voice) which then turns it into an email that is sent to Bob's email account. If using google voice, this would be a gmail account. The mail is then handled by Bob's mail client (like Thunderbird) enabled with an addon that can send it to his file system, or in cases like OS X mail, send it directly to a simple message processor on his computer that turns it into a wallet command and sends it to his wallet. (We will provide the message processor for Thunderbird as an open source project). The XST wallet (as of version 1.2.0.1) is enabled to recognize this this command and the anonymous, encrypted transaction. The wallet decrypts the transaction. Because the transaction is encrypted on Bob's phone but never decrypted until it hits his wallet, it remains secure and anonymous until the transaction is created inside the wallet. As with all transactions, the wallet broadcasts Carlol's 420 XST to the TOR network, which ensures that Carol gets her funds securely and privately. Note that StealthText has the following attributes: AnonymousStealthText is anonymous because no one except for Bob can know the contents of the encrypted transaction while on transit to his wallet. Once there, it remains anonymous because StealthCoin uses the Tor network. SecureStealthText uses AES encryption combined with GCM encrypted authentication. This means that a multitude of attacks which try to blindly manipulate the encrypted transaction to change it's value, destination, or otherwise corrupt it, will be detected by the wallet. In fact, the transaction will be rejected by the wallet if just one bit of one byte of the encrypted transaction is modified ("bit flip attack"). Moreover the wallet has safeguards against delayed transactions and "replay attacks". That is, once the wallet broadcasts the transaction, it will not accept the same transaction again. So, if an adversary intercepts the message and sends it numerous times to Bob's wallet, the wallet will not re-send the funds no matter how many replays the adversary attempts. SMSStealthText does not rely on Bob's phone having data capabilities. This allows Bob to send funds anonymously and securely from any part of the world where SMS is available, or when his data services experience outage due to adversarial attack or natural causes. DecentralizedAny person or servcie can establish their own pipeline. They only need the StealthText app and a StealthCoin wallet greater than or equal to version 1.2.0.1. Any SMS forwarding service can send the message to any media of delivery. Email is the most convenient for me, but it could also be http or any other protocol. For the proof-of-concept, I used google voice and gmail. The only glue in the entire chain is a program that can change an email with the message, for example, into a wallet command that looks like this: StealthCoind decryptsend '1zrL2Jk,IDlf0wy....'
As mentioned above, we will provide the glue in the form of a message processor for the Thunderbird email client. I hope this answers questions. I'm also looking forward to writing a more detailed whitepaper and to see it incarnate with the awesome graphics that I'm sure our designer will produce (I'll admit that my graphics are a bit primitive). We will release the StealthText Android app as soon as we have some testers try it out. Our Android dev is on vacation in the Mediterranean region right now, so hopefully we can get ahold of him to put it up on google play. If not, we will simply release a bundle that can be installed manually fairly easily. In such a case, we'll put it on google play when he returns from vacation. Either way, it will be available to users within a day or so, after beta testing. Also, we do plan an iOS version for iPhone users and soon after that we will port StealthText to platforms that are not considered "smartphones". -- Hondo
|
|
|
|
grndnpnd
|
|
August 27, 2014, 06:26:35 PM |
|
Stealth Text Details (Whitepaper Rough Draft) This isn't the final draft of the whitepaper, but I hope it answers some basic questions. Indeed, StealthText is the technology for " anonymous SMS transactions". The following text explains the illustration below.Let's imagine Bob wants to send 420 XST to Carol. Bob has set up his own pipeline or is a customer of an online wallet service that has provides a pipeline. Either is possible because anyone can set up his or her own pipeline. Now, Bob is operating under some constraints today. He has his phone and can SMS, but for whatever reason has no access to his data services. But he needs his transaction to get to Carol securely and privately (anonymously). He can't afford for anyone to tamper with his transaction, like "flipping a bit" to change the amount, nor can he afford for an adversary, such as a competing business, to know the nature of his transaction with Carol. Bob is in luck today, because he has installed StealthText on his phone. In his settings dialog, he has entered a secret passphrase (that could be a random string of characters), the phone number of his SMS forwarding service (like google voice), and a client ID, that is not essential but can be used for routing (in the screenshots, this is 1zrL2Jk, which is random for the sake of the example). His wallet (whether on the cloud or in his computer at home) knows this secret passphrase and his PIN , which is the second part of StealthText's two-factor authentication. To make his transaction, he enters Carol's XST address ("SGVQhkwom..", the first S has been cut off in the screenshots) the amount (420 XST) and his PIN, which he shares with no one and has memorized. He then hits "Send" and confirms the transaction. StealthText then sends the anonymous, encrypted transaction through SMS where it enters the pipeline. The SMS message with the anonymous transaction, is routed to Bob's SMS forwarding service (like google voice) which then turns it into an email that is sent to Bob's email account. If using google voice, this would be a gmail account. The mail is then handled by Bob's mail client (like Thunderbird) enabled with an addon that can send it to his file system, or in cases like OS X mail, send it directly to a simple message processor on his computer that turns it into a wallet command and sends it to his wallet. (We will provide the message processor for Thunderbird as an open source project). The XST wallet (as of version 1.2.0.1) is enabled to recognize this this command and the anonymous, encrypted transaction. The wallet decrypts the transaction. Because the transaction is encrypted on Bob's phone but never decrypted until it hits his wallet, it remains secure and anonymous until the transaction is created inside the wallet. As with all transactions, the wallet broadcasts Carlol's 420 XST to the TOR network, which ensures that Carol gets her funds securely and privately. Note that StealthText has the following attributes: AnonymousStealthText is anonymous because no one except for Bob can know the contents of the encrypted transaction while on transit to his wallet. Once there, it remains anonymous because StealthCoin uses the Tor network. SecureStealthText uses AES encryption combined with GCM encrypted authentication. This means that a multitude of attacks which try to blindly manipulate the encrypted transaction to change it's value, destination, or otherwise corrupt it, will be detected by the wallet. In fact, the transaction will be rejected by the wallet if just one bit of one byte of the encrypted transaction is modified ("bit flip attack"). Moreover the wallet has safeguards against delayed transactions and "replay attacks". That is, once the wallet broadcasts the transaction, it will not accept the same transaction again. So, if an adversary intercepts the message and sends it numerous times to Bob's wallet, the wallet will not re-send the funds no matter how many replays the adversary attempts. SMSStealthText does not rely on Bob's phone having data capabilities. This allows Bob to send funds anonymously and securely from any part of the world where SMS is available, or when his data services experience outage due to adversarial attack or natural causes. DecentralizedAny person or servcie can establish their own pipeline. They only need the StealthText app and a StealthCoin wallet greater than or equal to version 1.2.0.1. Any SMS forwarding service can send the message to any media of delivery. Email is the most convenient for me, but it could also be http or any other protocol. For the proof-of-concept, I used google voice and gmail. The only glue in the entire chain is a program that can change an email with the message, for example, into a wallet command that looks like this: StealthCoind decryptsend '1zrL2Jk,IDlf0wy....'
As mentioned above, we will provide the glue in the form of a message processor for the Thunderbird email client. I hope this answers questions. I'm also looking forward to writing a more detailed whitepaper and to see it incarnate with the awesome graphics that I'm sure our designer will produce (I'll admit that my graphics are a bit primitive). We will release the StealthText Android app as soon as we have some testers try it out. Our Android dev is on vacation in the Mediterranean region right now, so hopefully we can get ahold of him to put it up on google play. If not, we will simply release a bundle that can be installed manually fairly easily. In such a case, we'll put it on google play when he returns from vacation. Either way, it will be available to users within a day or so, after beta testing. Also, we do plan an iOS version for iPhone users and soon after that we will port StealthText to platforms that are not considered "smartphones". -- Hondo And the good news keeps coming Great job
|
Hash Advisor exclusive Cryptsy vote exploit mining
|
|
|
BlackMarket
Sr. Member
Offline
Activity: 322
Merit: 250
Super Smash Bros. Ultimate Available Now!
|
|
August 27, 2014, 06:28:18 PM |
|
THIS IS AMAZING !!!!
|
|
|
|
objectofawareness
|
|
August 27, 2014, 06:56:18 PM |
|
Great work Hondo!!!
Over time you will continue to separate yourself from the "hype" developers and show that XST will be the choice for true anonymous transactions.
It's only a matter of time before the crypto community will have to take a serious look at XST and realize that it's ahead of the other coins, in terms of what it can deliver.
It's refreshing to see a dev who isn't all about bells and whistles but about delivering real utility!
Keep up the good work!!!
|
|
|
|
copychicken
|
|
August 27, 2014, 07:00:01 PM |
|
thats talent... very nice... thank you stealth devs...
|
|
|
|
xtent
|
|
August 27, 2014, 07:05:27 PM |
|
I think it would be very beneficial for Hondo to reach out to jl777 and get mgwSTEALTH created, with the option to join the supernetwork.
|
|
|
|
EmilioMann
Legendary
Offline
Activity: 2184
Merit: 1028
#mitandopelomundo
|
|
August 27, 2014, 07:27:16 PM |
|
Stealth Text Details (Whitepaper Rough Draft) This isn't the final draft of the whitepaper, but I hope it answers some basic questions. Indeed, StealthText is the technology for " anonymous SMS transactions". The following text explains the illustration below.Let's imagine Bob wants to send 420 XST to Carol. Bob has set up his own pipeline or is a customer of an online wallet service that has provides a pipeline. Either is possible because anyone can set up his or her own pipeline. Now, Bob is operating under some constraints today. He has his phone and can SMS, but for whatever reason has no access to his data services. But he needs his transaction to get to Carol securely and privately (anonymously). He can't afford for anyone to tamper with his transaction, like "flipping a bit" to change the amount, nor can he afford for an adversary, such as a competing business, to know the nature of his transaction with Carol. Bob is in luck today, because he has installed StealthText on his phone. In his settings dialog, he has entered a secret passphrase (that could be a random string of characters), the phone number of his SMS forwarding service (like google voice), and a client ID, that is not essential but can be used for routing (in the screenshots, this is 1zrL2Jk, which is random for the sake of the example). His wallet (whether on the cloud or in his computer at home) knows this secret passphrase and his PIN , which is the second part of StealthText's two-factor authentication. To make his transaction, he enters Carol's XST address ("SGVQhkwom..", the first S has been cut off in the screenshots) the amount (420 XST) and his PIN, which he shares with no one and has memorized. He then hits "Send" and confirms the transaction. StealthText then sends the anonymous, encrypted transaction through SMS where it enters the pipeline. The SMS message with the anonymous transaction, is routed to Bob's SMS forwarding service (like google voice) which then turns it into an email that is sent to Bob's email account. If using google voice, this would be a gmail account. The mail is then handled by Bob's mail client (like Thunderbird) enabled with an addon that can send it to his file system, or in cases like OS X mail, send it directly to a simple message processor on his computer that turns it into a wallet command and sends it to his wallet. (We will provide the message processor for Thunderbird as an open source project). The XST wallet (as of version 1.2.0.1) is enabled to recognize this this command and the anonymous, encrypted transaction. The wallet decrypts the transaction. Because the transaction is encrypted on Bob's phone but never decrypted until it hits his wallet, it remains secure and anonymous until the transaction is created inside the wallet. As with all transactions, the wallet broadcasts Carlol's 420 XST to the TOR network, which ensures that Carol gets her funds securely and privately. Note that StealthText has the following attributes: AnonymousStealthText is anonymous because no one except for Bob can know the contents of the encrypted transaction while on transit to his wallet. Once there, it remains anonymous because StealthCoin uses the Tor network. SecureStealthText uses AES encryption combined with GCM encrypted authentication. This means that a multitude of attacks which try to blindly manipulate the encrypted transaction to change it's value, destination, or otherwise corrupt it, will be detected by the wallet. In fact, the transaction will be rejected by the wallet if just one bit of one byte of the encrypted transaction is modified ("bit flip attack"). Moreover the wallet has safeguards against delayed transactions and "replay attacks". That is, once the wallet broadcasts the transaction, it will not accept the same transaction again. So, if an adversary intercepts the message and sends it numerous times to Bob's wallet, the wallet will not re-send the funds no matter how many replays the adversary attempts. SMSStealthText does not rely on Bob's phone having data capabilities. This allows Bob to send funds anonymously and securely from any part of the world where SMS is available, or when his data services experience outage due to adversarial attack or natural causes. DecentralizedAny person or servcie can establish their own pipeline. They only need the StealthText app and a StealthCoin wallet greater than or equal to version 1.2.0.1. Any SMS forwarding service can send the message to any media of delivery. Email is the most convenient for me, but it could also be http or any other protocol. For the proof-of-concept, I used google voice and gmail. The only glue in the entire chain is a program that can change an email with the message, for example, into a wallet command that looks like this: StealthCoind decryptsend '1zrL2Jk,IDlf0wy....'
As mentioned above, we will provide the glue in the form of a message processor for the Thunderbird email client. I hope this answers questions. I'm also looking forward to writing a more detailed whitepaper and to see it incarnate with the awesome graphics that I'm sure our designer will produce (I'll admit that my graphics are a bit primitive). We will release the StealthText Android app as soon as we have some testers try it out. Our Android dev is on vacation in the Mediterranean region right now, so hopefully we can get ahold of him to put it up on google play. If not, we will simply release a bundle that can be installed manually fairly easily. In such a case, we'll put it on google play when he returns from vacation. Either way, it will be available to users within a day or so, after beta testing. Also, we do plan an iOS version for iPhone users and soon after that we will port StealthText to platforms that are not considered "smartphones". -- Hondo Great job! We need to spread this news around the world Let's go to tweeter
|
|
|
|
deadliftbrah
|
|
August 27, 2014, 07:47:16 PM |
|
Stealth Text Details (Whitepaper Rough Draft) This isn't the final draft of the whitepaper, but I hope it answers some basic questions. Indeed, StealthText is the technology for " anonymous SMS transactions". The following text explains the illustration below.Let's imagine Bob wants to send 420 XST to Carol. Bob has set up his own pipeline or is a customer of an online wallet service that has provides a pipeline. Either is possible because anyone can set up his or her own pipeline. Now, Bob is operating under some constraints today. He has his phone and can SMS, but for whatever reason has no access to his data services. But he needs his transaction to get to Carol securely and privately (anonymously). He can't afford for anyone to tamper with his transaction, like "flipping a bit" to change the amount, nor can he afford for an adversary, such as a competing business, to know the nature of his transaction with Carol. Bob is in luck today, because he has installed StealthText on his phone. In his settings dialog, he has entered a secret passphrase (that could be a random string of characters), the phone number of his SMS forwarding service (like google voice), and a client ID, that is not essential but can be used for routing (in the screenshots, this is 1zrL2Jk, which is random for the sake of the example). His wallet (whether on the cloud or in his computer at home) knows this secret passphrase and his PIN , which is the second part of StealthText's two-factor authentication. To make his transaction, he enters Carol's XST address ("SGVQhkwom..", the first S has been cut off in the screenshots) the amount (420 XST) and his PIN, which he shares with no one and has memorized. He then hits "Send" and confirms the transaction. StealthText then sends the anonymous, encrypted transaction through SMS where it enters the pipeline. The SMS message with the anonymous transaction, is routed to Bob's SMS forwarding service (like google voice) which then turns it into an email that is sent to Bob's email account. If using google voice, this would be a gmail account. The mail is then handled by Bob's mail client (like Thunderbird) enabled with an addon that can send it to his file system, or in cases like OS X mail, send it directly to a simple message processor on his computer that turns it into a wallet command and sends it to his wallet. (We will provide the message processor for Thunderbird as an open source project). The XST wallet (as of version 1.2.0.1) is enabled to recognize this this command and the anonymous, encrypted transaction. The wallet decrypts the transaction. Because the transaction is encrypted on Bob's phone but never decrypted until it hits his wallet, it remains secure and anonymous until the transaction is created inside the wallet. As with all transactions, the wallet broadcasts Carlol's 420 XST to the TOR network, which ensures that Carol gets her funds securely and privately. Note that StealthText has the following attributes: AnonymousStealthText is anonymous because no one except for Bob can know the contents of the encrypted transaction while on transit to his wallet. Once there, it remains anonymous because StealthCoin uses the Tor network. SecureStealthText uses AES encryption combined with GCM encrypted authentication. This means that a multitude of attacks which try to blindly manipulate the encrypted transaction to change it's value, destination, or otherwise corrupt it, will be detected by the wallet. In fact, the transaction will be rejected by the wallet if just one bit of one byte of the encrypted transaction is modified ("bit flip attack"). Moreover the wallet has safeguards against delayed transactions and "replay attacks". That is, once the wallet broadcasts the transaction, it will not accept the same transaction again. So, if an adversary intercepts the message and sends it numerous times to Bob's wallet, the wallet will not re-send the funds no matter how many replays the adversary attempts. SMSStealthText does not rely on Bob's phone having data capabilities. This allows Bob to send funds anonymously and securely from any part of the world where SMS is available, or when his data services experience outage due to adversarial attack or natural causes. DecentralizedAny person or servcie can establish their own pipeline. They only need the StealthText app and a StealthCoin wallet greater than or equal to version 1.2.0.1. Any SMS forwarding service can send the message to any media of delivery. Email is the most convenient for me, but it could also be http or any other protocol. For the proof-of-concept, I used google voice and gmail. The only glue in the entire chain is a program that can change an email with the message, for example, into a wallet command that looks like this: StealthCoind decryptsend '1zrL2Jk,IDlf0wy....'
As mentioned above, we will provide the glue in the form of a message processor for the Thunderbird email client. I hope this answers questions. I'm also looking forward to writing a more detailed whitepaper and to see it incarnate with the awesome graphics that I'm sure our designer will produce (I'll admit that my graphics are a bit primitive). We will release the StealthText Android app as soon as we have some testers try it out. Our Android dev is on vacation in the Mediterranean region right now, so hopefully we can get ahold of him to put it up on google play. If not, we will simply release a bundle that can be installed manually fairly easily. In such a case, we'll put it on google play when he returns from vacation. Either way, it will be available to users within a day or so, after beta testing. Also, we do plan an iOS version for iPhone users and soon after that we will port StealthText to platforms that are not considered "smartphones". -- Hondo Posted on r/darknetmarkets please support and up vote TOR vendors need to be aware of this! http://www.reddit.com/r/DarkNetMarkets/comments/2er669/tor_based_crypto_stealthcoin_xst_makes_major/
|
|
|
|
BlackMarket
Sr. Member
Offline
Activity: 322
Merit: 250
Super Smash Bros. Ultimate Available Now!
|
|
August 27, 2014, 08:16:51 PM |
|
back to 2k going to 10k
|
|
|
|
EmilioMann
Legendary
Offline
Activity: 2184
Merit: 1028
#mitandopelomundo
|
|
August 27, 2014, 08:37:48 PM |
|
|
|
|
|
statdude
Legendary
Offline
Activity: 1498
Merit: 1000
|
|
August 27, 2014, 08:45:46 PM |
|
|
|
|
|
zeerobje
Sr. Member
Offline
Activity: 326
Merit: 250
SHPING Presale:22-31 JAN / Crowdsale:22 FEB-23 MAR
|
|
August 27, 2014, 08:57:34 PM |
|
Thanks dev to launch it on the right time.....
|
|
|
|
StealthDevs (OP)
|
|
August 27, 2014, 09:19:46 PM Last edit: August 27, 2014, 10:06:46 PM by StealthDevs |
|
Unlike other SMS transactions, StealthText is fully scalable, cross-platform, and decentralized, as anyone can build and host their own pipeline.
StealthText is: 1) Anonymous 2) Secure 3) Decentralized 4) SMS
We really look forward to seeing it in action within our community, very soon!
Please post here or otherwise contact us with any questions or feedback!
|
STEALTH | XST | stealth.org
|
|
|
|