Bitcoin Forum
March 23, 2019, 05:56:44 AM *
News: Latest Bitcoin Core release: 0.17.1 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: Do you Accept Komodo ICO conversion vs Reject Komodo ICO conversion and fund new dev team?
Accept - 140 (68.3%)
Reject - 65 (31.7%)
Total Voters: 205

Pages: « 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 [88] 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 551 »
  Print  
Author Topic: BTCD is no more  (Read 1312708 times)
daemonfox
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
July 22, 2014, 07:52:04 AM
 #1741

Look what I found on Twitter: https://twitter.com/CryptoTherapist/status/491482611714621442 Smiley
That guy is right, someone should make Bitcoindark accepted here banners Smiley (I would but my PS skills suck)

mymenace has shown some awesome work for XXXCoin banners and infographics.

The premine holder should contact him directly and offer a bounty... as his work is top notch.

https://bitcointalk.org/index.php?action=profile;u=114706

.ZenCash. █████
█████ ██
▀▀▀▀▀ ▀▀
▄▄▄ ███
▀▀▀ ▀▀▀
   ████
   ▀▀▀▀
███   ▄
███  ▄▄▄
   ▄▄ ███
  ▄
▄▄▄▄▄
    █████
██ █████
█████
█████ ██
▀▀▀▀▀ ▀▀
▄▄▄ ███
▀▀▀ ▀▀▀
   ████
   ▀▀▀▀
███   ▄
███  ▄▄▄
   ▄▄ ███
  ▄
▄▄▄▄▄
    █████
██ █████
slack   III   ANN Thread   III   Blog
Telegram   III   forum   III   twitter

▬▬▬▬▬▬▬▬▬▬▬▬▬  ZEN
1553320604
Hero Member
*
Offline Offline

Posts: 1553320604

View Profile Personal Message (Offline)

Ignore
1553320604
Reply with quote  #2

1553320604
Report to moderator
Your Bitcoin transactions
The Ultimate Bitcoin mixer
made truly anonymous.
with an advanced technology.
Mix coins
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1553320604
Hero Member
*
Offline Offline

Posts: 1553320604

View Profile Personal Message (Offline)

Ignore
1553320604
Reply with quote  #2

1553320604
Report to moderator
1553320604
Hero Member
*
Offline Offline

Posts: 1553320604

View Profile Personal Message (Offline)

Ignore
1553320604
Reply with quote  #2

1553320604
Report to moderator
salsacz
Hero Member
*****
Offline Offline

Activity: 490
Merit: 500


View Profile
July 22, 2014, 08:11:47 AM
 #1742

share the article please http://www.coinssource.com/bitcoindark-transitions-from-pow-phase-pure-pos/

Nxt tips: NXT-R67P-6BZ2-XWAK-8RHZR | Nxt forum | Nxt Academy | Donate for Nxt at the Universities // BTCD: RVMLrnxYYy7uy8YZo9FcGfXbk1ZMnNifdg
salsacz
Hero Member
*****
Offline Offline

Activity: 490
Merit: 500


View Profile
July 22, 2014, 08:17:10 AM
 #1743

I think BitcoinDark is too much Bitcoin. Let's use DarkNotes and it will help to understand the connection between the coin and the Cryptonote technology: https://cryptonote.org/inside.php

Nxt tips: NXT-R67P-6BZ2-XWAK-8RHZR | Nxt forum | Nxt Academy | Donate for Nxt at the Universities // BTCD: RVMLrnxYYy7uy8YZo9FcGfXbk1ZMnNifdg
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 08:22:49 AM
 #1744

Hmm also having issues building pNXT but they are complications with packages in Ubuntu.

Code:
Building dependency tree      
Reading state information... Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 libboost-all-dev : Depends: libboost-dev but it is not going to be installed
                    Depends: libboost-atomic-dev but it is not going to be installed
                    Depends: libboost-chrono-dev but it is not going to be installed
                    Depends: libboost-context-dev but it is not going to be installed
                    Depends: libboost-date-time-dev but it is not going to be installed
                    Depends: libboost-exception-dev but it is not going to be installed
                    Depends: libboost-filesystem-dev but it is not going to be installed
                    Depends: libboost-graph-dev but it is not going to be installed
                    Depends: libboost-graph-parallel-dev but it is not going to be installed
                    Depends: libboost-iostreams-dev but it is not going to be installed
                    Depends: libboost-locale-dev but it is not going to be installed
                    Depends: libboost-math-dev but it is not going to be installed
                    Depends: libboost-mpi-dev but it is not going to be installed
                    Depends: libboost-mpi-python-dev but it is not going to be installed
                    Depends: libboost-program-options-dev but it is not going to be installed
                    Depends: libboost-python-dev but it is not going to be installed
                    Depends: libboost-random-dev but it is not going to be installed
                    Depends: libboost-regex-dev but it is not going to be installed
                    Depends: libboost-serialization-dev but it is not going to be installed
                    Depends: libboost-signals-dev but it is not going to be installed
                    Depends: libboost-system-dev but it is not going to be installed
                    Depends: libboost-test-dev but it is not going to be installed
                    Depends: libboost-thread-dev but it is not going to be installed
                    Depends: libboost-timer-dev but it is not going to be installed
                    Depends: libboost-wave-dev but it is not going to be installed
E: Unable to correct problems, you have held broken packages.
I hate boost even more. Sorry I cant help, I got lucky. I think I installed boost from boost.org, the built in Ubuntu is usually out of date

On a happier note, I am 80% debugged! At least in my one off test cases. Of course more rigorous testing could well find some edge cases I miss, but gotta get these "easy" cases working first.
So decent progress today. The price going crazy was a bit distracting, I really need to close the market pages when coding!

client -> privacyServer selection (non-encrypted) - works
client -> privacyServer encrypted UDP channel - works
client -> privacyServer encrypted TCP channel - works
privacyServer -> client non-encrypted handshake - works
privacyServer -> client encrypted UDP channel - transmits but error decrypting
privacyServer -> client encrypted TCP channel - untested (actually currently this path is not used)
client -> privacyServer -> another client via two layer onion routing - untested

I was thinking about each privacyServer keeping a directory of clients that it is responsible for. Just the public acct # and the public key. However now I am leaning toward just broadcasting any client -> client comms that are not connected via the same privacyServer. This would add bandwidth, but it eliminates a potential attack vector. I cant think of how an attacker can use the directory of public addresses and keys, but if there is no directory, then I think it is one less piece of data that is available. The less data to be correlated, the better.

So the logic will be:
client selects privacyServer. Now most commands are routed through the privacyServer. API calls like getOrderbooks, placeBid, etc. These just go to the privacyServer and it handles it. OK, so that's the easy stuff. The hard part is what to do when you want to communicate with someone else. Let us assume that the privacyServer can magically know how to communicate to everyone, but we dont want other people to be able to snoop and find out that you are.

Is this even possible? Well, this is where the fact that we trust the privacyServer comes in really handy.

Say A wants to send a message to B without letting anybody except the privacyServer know and the only thing the privacyServer will know is that A send something to B, but even the privacyServer wont know WHAT was sent.

A first makes the message then tokenizes it with a timestamp. This both proves that A made the message and at what time. It prevents not only spoofing, but also replay attacks. A replay attack is where the attacker makes a copy of a valid message and rebroadcasts it. Maybe it doesnt do anything bad, but it could certainly confuse things, so I like to timestamp, tokenize and then encrypt. OK, so here is one problem I need B's public key to encrypt the message to him. So I need to magically get that somehow, maybe from a query to the server or simply processing broadcasts of the public keys. Either with pros/cons, I will decide later on specifics for that.

OK, so now we have a time validated, account validated and encrypted message to B. Only the fact that it is addressed to B is possible to be determined by getting this packet.

So can we send that? Well, not quite. What if the attacker has taps into the major internet routers? You dont want to be sending stuff in the clear (unencrypted). That would allow the attacker to know that A is sending something to B. So, we add another layer of encryption by re-encrypting the packet so that only the privacyServer can decode it. Now the attacker that is monitoring all internet packets will only see that you sent something to the privacyServer, but you send everything through the privacyServer, so it really doesnt divulge much information.

If you are with me so far, we now look at what the privacyServer gets. It is an encrypted packet that it is able to decode and it sees that what it gets is another encrypted packet that is addressed to B. So, it then "just" sends it to the privacyServer that B selected, or broadcasts it to all nodes. Now anybody that intercepts this packet will only know that it came from the privacyServer and not A.

So, B finally gets the packet, is able to decrypt it and gets the message from A.

Now that I write this, I do think it is better for the privacyServers to keep a directory of all accts/publickeys and then each client can query the privacyServer for the public key. There is much less info divulged by doing this as each acct can broadcast to everyone its public key when it comes online. So there is no correlation possible and the queries about B's publickey is done under encryption, so no info leaked.

It helps me think about things by writing these long emails. I hope I didnt bore you with wall of text. If anybody can see ANY flaws in this logic, please let me know ASAP. just describing this has not been easy, imagine coding and debugging it!
I hope you can see that once there is this encryption network in place, then all sorts of things become possible, all while remaining private. Businesses can conduct business using a public address, but its privacyServer will route everything to private addresses that only it knows about. This will allow businesses to conduct business without letting their competitors know all their income and expenses and even from whom.

So if you followed this so far, you can see why I am not so concerned about the exact anon algo as any of them will fit nicely into this system, they can even be combined. For those of you waiting for a selloff, I apologize.

James

@Azeh: I think the description in this post is pretty useful to start getting people understanding how privacyServers create privacy, hopefully it is useful for marketing and especially making pretty charts.

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 08:33:13 AM
 #1745

I just thought of a small leak of info
If I allow different length messages, then an attacker could deduce the type of message you are sending by tracking the size of the packets. Not sure how big of a problem this is. The problem with fixed sized messages is that it will waste a fair amount of bandwidth.

Ah, maybe this is one of the differences in privacy levels!
Yes, I like that. At lower levels of privacy, such small info leakage is accepted,but at higher levels of privacy, all messages will be of fixed size

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Aptidude
Member
**
Offline Offline

Activity: 89
Merit: 10


View Profile
July 22, 2014, 08:49:12 AM
 #1746

This coin's cray.
zhonghao110
Full Member
***
Offline Offline

Activity: 224
Merit: 100

goog


View Profile
July 22, 2014, 08:52:44 AM
 #1747

This coin's cray.

 Grin Grin,Miss the train
SpringfieldM1A
Hero Member
*****
Offline Offline

Activity: 966
Merit: 550



View Profile
July 22, 2014, 09:01:26 AM
 #1748

Holding my btcd like mad. Just withdrew all from bittrex, I was planning on day trading but seeing the potential here I won't risk it. James my man, you seriously rock.
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 09:05:04 AM
 #1749

Holding my btcd like mad. Just withdrew all from bittrex, I was planning on day trading but seeing the potential here I won't risk it. James my man, you seriously rock.
thanks!
I try to do my best to make sure people that believe in me, end up making money.

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
mikesbmw
Sr. Member
****
Offline Offline

Activity: 339
Merit: 250


View Profile
July 22, 2014, 09:09:32 AM
 #1750

Boy was I wrong about this one...
Luckily I trusted James and Hodled! (although just 2000 BTCD, that's all I could afford)

The volume has picked up quite nicely. Good call on this one James  Wink

NXT: Next Generation of Cryptocurrency http://nxtcrypto.org
NEM:New Economy Movement http://www.ournem.com/
id10tothe9
Hero Member
*****
Offline Offline

Activity: 623
Merit: 500



View Profile
July 22, 2014, 09:51:07 AM
 #1751

I'm loving this shit, it's seriously interesting Shocked! I also loved the IRC chat you had and would like to participate in testing and running a privacyServer! I'll be watching for the info when you're ready! (never done such a thing before but I hope it's not that complicated to learn)
Also james, what are your NXT AE related to this? I'd like to purchase some too Grin

           ▀██▄ ▄██▀
            ▐█████▌
           ▄███▀███▄
         ▄████▄  ▀███▄
       ▄███▀ ▀██▄  ▀███▄
     ▄███▀  ▄█████▄  ▀███▄
   ▄███▀  ▄███▀ ▀███▄  ▀███▄
  ███▀  ▄████▌   ▐████▄  ▀███
 ███   ██▀  ██▄ ▄██  ▀██   ███
███   ███  ███   ███  ███   ███
███   ███   ███████   ███   ███
 ███   ███▄▄       ▄▄███   ███
  ███▄   ▀▀█████████▀▀   ▄███
   ▀████▄▄           ▄▄████▀
      ▀▀███████████████▀▀
DeepOnion★  Anonymity Guaranteed
★  Anonymous and Untraceable
★  Guard Your Privacy
      ▄▄██████████▄▄
    ▄███▀▀      ▀▀█▀   ▄▄
   ███▀              ▄███
  ███              ▄███▀   ▄▄
 ███▌  ▄▄▄▄      ▄███▀   ▄███
▐███  ██████   ▄███▀   ▄███▀
███▌ ███  ███▄███▀   ▄███▀
███▌ ███   ████▀   ▄███▀
███▌  ███   █▀   ▄███▀  ███
▐███   ███     ▄███▀   ███
 ███▌   ███  ▄███▀     ███
  ███    ██████▀      ███
   ███▄             ▄███
    ▀███▄▄       ▄▄███▀
      ▀▀███████████▀▀
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 10:05:22 AM
 #1752

It was looking like "privacyServer -> client encrypted UDP channel - transmits but error decrypting" was a tricky memory trashing issue, so I was going to call it a night, but turned out it was just a simple control flow issue, so:

privacyServer -> client encrypted UDP channel - transmits but error decrypting works

Now I will test the doubly encrypted message, but from my acct to privacyServer back to my acct. Not exactly useful, but will test out the software paths. It will probably not work, and then I will call it a night

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 10:06:39 AM
 #1753

I'm loving this shit, it's seriously interesting Shocked! I also loved the IRC chat you had and would like to participate in testing and running a privacyServer! I'll be watching for the info when you're ready! (never done such a thing before but I hope it's not that complicated to learn)
Also james, what are your NXT AE related to this? I'd like to purchase some too Grin
InstantDEX is the most direct asset that is publicly traded now. NXTprivacy and Privatebet are still private assets not for public, only for whales who buy big gobs of assets

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 10:10:10 AM
 #1754

It was looking like "privacyServer -> client encrypted UDP channel - transmits but error decrypting" was a tricky memory trashing issue, so I was going to call it a night, but turned out it was just a simple control flow issue, so:

privacyServer -> client encrypted UDP channel - transmits but error decrypting works

Now I will test the doubly encrypted message, but from my acct to privacyServer back to my acct. Not exactly useful, but will test out the software paths. It will probably not work, and then I will call it a night

James

OK, that was spooky. It seemed to just work! The first time, so I think this is good place to stop for today. Low level comms all encrypted and even a single hop onion routed doubly encrypted packet came through:

QUEUEALLMESSAGES.({"requestType":"sendmessage","dest":"8989816935121514892","msg":"test","time":1406023635}) size.0
QUEUE MESSAGES from NXT.8989816935121514892 (test) size.1

I am sure there will be some edge cases, but those only possible to find under heavier load than just me testing.

Finally, tomorrow, order matching can be started

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
CTRLX
Hero Member
*****
Offline Offline

Activity: 665
Merit: 501


Stake & Vote or Become a IoTeX Delegate!


View Profile
July 22, 2014, 10:16:02 AM
 #1755

It was looking like "privacyServer -> client encrypted UDP channel - transmits but error decrypting" was a tricky memory trashing issue, so I was going to call it a night, but turned out it was just a simple control flow issue, so:

privacyServer -> client encrypted UDP channel - transmits but error decrypting works

Now I will test the doubly encrypted message, but from my acct to privacyServer back to my acct. Not exactly useful, but will test out the software paths. It will probably not work, and then I will call it a night

James

OK, that was spooky. It seemed to just work! The first time, so I think this is good place to stop for today. Low level comms all encrypted and even a single hop onion routed doubly encrypted packet came through:

QUEUEALLMESSAGES.({"requestType":"sendmessage","dest":"8989816935121514892","msg":"test","time":1406023635}) size.0
QUEUE MESSAGES from NXT.8989816935121514892 (test) size.1

I am sure there will be some edge cases, but those only possible to find under heavier load than just me testing.

Finally, tomorrow, order matching can be started

James

Enjoy your well deserved rest man, the speed by which you deliver is mindblowing.


               `^cder.         
          '-`ryRQQ#@@#O}-       
       .)ydi`!]PQQ#@@@@@#d}!   
  `:'`rU9660ZL:')TZ@@@@@@####O)
  `lVx<,:xWg@@@#g)iQB##@@##@@@M
  `lVcyWRBsy@@Q8Z*iQQQQB##@@@@M
  `x|G#@@@m)T<:<v~iB##@@#QQB#@M
     `)I$#m,-' `>]ZB#@@@#QQQB#3
  .>LKlxxxx_`<YUaKOQQQB#BB####P
:V5MMMTx^=*` .~xeaOQQg$RB@@@##P
 .<}ab*' .QQK\_`;<YMRO66B@@@@B}
     .`  .Q#@#Q3v`rcvvY3B#Mx_   
         .OKx*rxv`x66OX]=`     
               .!`xRdyr,       
                  !<'

IoTeX





▬▬A DECENTRALIZED NETWORK.▬▬
▬▬▬▬▬▬▬▬FOR▬▬▬▬▬▬▬▬.
▬▬▬▬INTERNET OF THINGS▬▬▬▬.





        ▄███████████████████▄
        █████████████████████
▄█████  █████████████████████
██████  ████             ████
███     █████████████████████
██████  ████             ████
██████  █████████████████████
███     █████████████████████
███████ ▀███████████████████▀
▀███████▄▄▄▄▄▄▄       ▀████
  ████▌                 ██   
  ▐██▌                       
   █▌








TWITTER
MEDIUM
REDDIT
TELEGRAM
FORUM
BITCOINTALK
shitcointerd
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
July 22, 2014, 10:27:01 AM
 #1756

i want to be able to see what coins are about to be added to bittrex they need at least a page displaying favourites!
PhilipMorris
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
July 22, 2014, 10:45:29 AM
 #1757

Is it still a good time to buy this coin ?
mozurt
Sr. Member
****
Offline Offline

Activity: 286
Merit: 250


View Profile
July 22, 2014, 10:46:29 AM
 #1758

0.01 cooming soon  Grin
Slipknot79
Copper Member
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500


Blockchain Just Entered The Real World


View Profile WWW
July 22, 2014, 10:56:11 AM
 #1759

Wat explains dat rise? Milestone in tha hood? What is it?

jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1089


View Profile WWW
July 22, 2014, 10:58:26 AM
 #1760

Wat explains dat rise? Milestone in tha hood? What is it?
I think the Chinese are coming, rumors of BTER or BTC38 listing

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Pages: « 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 [88] 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 551 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!