Bitcoin Forum
May 14, 2024, 04:10:56 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: Do you Accept Komodo ICO conversion vs Reject Komodo ICO conversion and fund new dev team?
Accept - 145 (68.7%)
Reject - 66 (31.3%)
Total Voters: 211

Pages: « 1 ... 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 [350] 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 ... 547 »
  Print  
Author Topic: BTCD is no more  (Read 1328438 times)
EcoChavCrypto
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
October 13, 2014, 12:48:56 AM
 #6981

Hi,

I am currently working on the following plan.

There is a need for at least to kind of nodes. There are SuperNET privacy nodes and (Hallmarked) nxt nodes, mostly run by persons on a VPS.

For these nodes, it’s currently the case that you have to buy the VPS, install the necessary packages and build the coin wallets and libraries/API’s. Building a privacy node is still quite cumbersome and daunting for most users. When you look at what you need to do, I would say it will slow down adoption if people have to go through all this.
This does apply more for a SuperNET privacy node then a simple NRS node for NXT. But still, for both nodes I think it would help to ease things way more, so people can buy a VPS and start right away, and get up and running in no time.

What to think of all people who have their nodes running and need to keep it secure too. Some firewalling, ddos prevention, encryption, hardening of ssh, hardening of various Operating System tools and monitoring tools and all that.

The situation is now:

User buys a VPS. The user tries to find a manual and starts configuring. In the case of SuperNET nodes, they will likely get stuck along the way, and have to try to get through it.
Personalise the installation: Create accounts and passwords.
When it’s build, they can run the node, but as things do change, they have to update quite regularly. In the case of a NRS wallet, it’s less frequent, but still they need to update it.
When running the node, it should be kept up to date. When exploits and vulnerabilities arise, the user should act on that.
This node is still not secured, unnecessary services are running, no firewall is set up, no hardening on services and operating system is done AT ALL. It’s only a base setup of Linux and there is nothing done to harden it. Everything should still be done, following 10 page tutorials of how to make sure the machine is secured.
And then, still, there is nothing in place to keep it secured, and no monitoring is set up.


What if, the situation would become streamlined like this, how cool would that be:


User buys a VPS. User signs up for the Master node and gets an acknowledgementTurns on the VPS, start a script.
Drink coffee while the machine is completely installed. Personalise the installation. Create accounts and passwords.

That’s it!

Simple as that.



From now on, the user has it’s machine updated (if they wish) and don’t need to look at all the things that change, new releases and updating of the machine.
Also, a complete firewalled and secured node is  there, and lots of things are hardened on the machine, secured and unnecessary stuff is removed and all configuration to make and keep the machine secure is done for you.



I worked out this concept and it can be implemented for these Privacy nodes and NRS (hallmarked) nodes. It will be a breeze for a user to get this VPS up and running.


How will all this work?

There will be a master configuration server. There can be one, but there can be more of them for redundancy. 1,3, or 5 or whatever seems appropriate.
This master server will be setup completely to build and deliver the configuration for the nodes. It will contain configuration for NRS nodes and Privacy nodes, but I can also deliver this service for other type of coins which need nodes with wallets (and possibly other stuff).

This server has to be build, everything that will be done on a node, will be setup here in scripts, separated in various modules. These modules will contain the software which is needed and all configuration changes in such a way to get these nodes in a certain state. I can easily differentiate different kind of nodes and these nodes can get the software and configuration they need. I can reuse the needed modules and differentiate between node configurations where needed. When adding a new kind of node for a new wallet or a new type of server, I can add this to the configuration. Also, when some company/idea connected to NXT (or another crypto currency) they can talk to me to see if they can have their node configuration automated too. It can then be added to my master server and nodes can be created for it in no time.

When I’ve finished a complete node configuration I can easily deliver 100 nodes in one day, if necessary. It depends on how fast you can buy VPSes and turn them on Smiley
When someone requests a certain node, I only need to add it to my master server and when the node identifies itself with the master server, once acknowledged it gets it complete configuration pushed and the server will get its state as it should be. And the node will be kept current and secured, for the future.

Also, it’s possible to set up  different Linux distributions with this concept. It means extra work in the beginning but once done, other distributions can be set up too.

Security configuration and updating is a continuous job and can be done centrally.

All wallets will be packaged in the needed package formats. A repository will be created via Ubuntu PPA, so ANY node, also nodes that are not setup via this master-client concept can then install these packages simply via apt-get. So people who are not interested in this whole concept, can simply get these wallet packages with apt-get and can also update the wallets packages simply via apt-get, when a new release has come out.
Packaging the wallets will be quite some work, but once done, I can try to keep them up to date.

All this is part of a bigger plan I’’m working on. I will write about that soon.
I actually wanted to publish this part equally with the whole plan, but I started building this master - clientnode concept already, because SuperNET is in need of 50 to 100 servers to get launched.

This pilot phase will help NXT and SuperNET hopefully because setting up Privacy and NRS nodes will be as easy as pushing a button.



Frohike

Anything to simplify the process will definitely bring more nodes to the party.  I looked at the Digital Ocean setup guide a few weeks ago and to be honest it spun me out a bit.  I would like to rent a server and add to the network.  What is the bare minimum hardware specs that can be used and is it possible to run a node and staking wallet/wallets on the one server?  If you were to implement this easy to use master node system combined with a staking wallet I think it would further incentivise people to add to the network.  Even better if all the SuperNet coin wallets were also included in the package, that would definitely widen node adoption.

       ▄▄█████████▄▄
    ▄█████████████████
  ▄████████▀▀▀▀▀▀▀▀▀▀
 ▄███████▀   ▄▄   ▄▄▄▄▄▄▄▄
▄████████▄▄▄████  ▄▄▄▄▄▄▄▄
█████████▀▀▀▀▀▀▀  █████████
█████████   ▄▄▄▄   ▀███████
█████████   █████   ███████
 ▀▀▀▀▀▀▀▀   █████   ██████▀
 ▀▀▀▀▀▀▀▀   ███▀▀   █████▀
      ▄▄▄▄▄▄███▄▄▄▄█████▀
     █████████████████▀
       ▀▀█████████▀▀
Bitcoin Air 
 
.
█      ███
█      ███
  ██
  ██  ███
  ██  ███
  ██  ███
      ███
█  ██
  ███
█  ██
  ███
   ██
  ███
█  ██  ███
█  ██  ███
█  ██
     ██  █
███  ██  █
███  ██
███  ██  █
███  ██  █
███  ██  █
███      █
███  ██ 
███  ██ 
     ██ 
███
  ██ 
███
  ██ 
     ██
 
.
.
1715659856
Hero Member
*
Offline Offline

Posts: 1715659856

View Profile Personal Message (Offline)

Ignore
1715659856
Reply with quote  #2

1715659856
Report to moderator
1715659856
Hero Member
*
Offline Offline

Posts: 1715659856

View Profile Personal Message (Offline)

Ignore
1715659856
Reply with quote  #2

1715659856
Report to moderator
TalkImg was created especially for hosting images on bitcointalk.org: try it next time you want to post an image
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
cloudboy
Hero Member
*****
Offline Offline

Activity: 690
Merit: 501


View Profile
October 13, 2014, 01:02:56 AM
 #6982

Is BTCD like litecoindark?
It's like comparing skateboard to spaceship  Grin
You must be retarded. Here is your answer.I can also write it in your topic if you want to
https://bitcointalk.org/index.php?topic=684090.msg9166053#msg9166053


Come on now, that's not very nice. It's possible it was a legitimate question.

No, BTCD is very different from litecoindark. Please read the op of this thread and check out the website: bitcoindark.org
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 03:36:09 AM
 #6983

Each node runs a public IP privacy server. this means people will be able to link your IP to your servers' acct number, so it is suggested to just use an acct without anything in it, maybe a few NXT just so you can lock it in as yours.

This IP/acct will then participate in the DHT routing for all SuperNET packets.

To transact privately, you let people you are dealing with know your public acct. this is another throwaway acct, but it is used for authenticating that it is really you doing the transactions.

Here comes the magic!

Each session, you generate a new keypair and without the current keypair's public key, nobody can transact with you. So you publish your session's pubkey into the cloud. Now anybody that knows your public NXT acct can get your current pubkey. If you want to prevent this, you can encrypt the pubkey and only share this with a small number of people, but divulging the pubkey is not so bad, so additional steps are for the truly cautious.

For super private comms, both parties generate a "sphere" of deaddrop acct numbers that minimizes the distance difference between your privacyServer's acct # and its neighbors. What this means is that even if the deaddrop acct number(s) are compromised, there is no direct link to your IP address. This exchange is done under encryption and is automated process and only needs to be done once per session.

Each side would split up each packet into M of N fragments, M of N chosen so enough of the packets are within the maxdistance limit of being routed the DHT packets. From the natural DHT routing process, your server will route these M of N packets to the closest nodes to each deaddrop acct #, but there is not even an acct behind the deaddrop acct. it is just an address that just happens to be close to your server's address, but far enough away that it could be close enough to any number of other IP addresses. Using M of N, allows the sphere of addresses to be significantly larger than what is hardcoded to be routed to your node. This is build into the DHT, eg. sphere of radius 28, and all packets destination within 24 bits guaranteed delivery.

Now the packets that are flowing through are fully encrypted so only your node can decrypt it. Output packets are randomly delayed so timing analysis cant determine if your node decrypted it or not based on packet traffic. All packets (other than ping) are fixed size 1400 byte UDP packets. Using UDP prevents TCP DOS attack locking up the sockets for the tcp timeout.

James

TL:DR it is possible to transact with someone without ANYBODY actually knowing the IP address of the destination, and therefore very private comms are possible. If these comms happen to have telepods and funds are being transacted, then commerce can happen using this method.

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 07:15:44 AM
 #6984

pushed new version with bugfixes and is a bit incompatible with new version
please update with:
./m_unix


http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 08:48:13 AM
 #6985

running some simulations and when we get to ~500 nodes, within a few minutes I am finding a deaddrop address that has the exact distance to ~20 nodes. this is at distance 24, which I believe is about 1/256 of total nodes and with a K factor of 7 even without any special relaxing of distance requirements, the packets will automatically arrive at your IP

The larger the distance, the easier it is to find matches. At bigger distances, 10% or even more of the sample set are exact matched. The good thing is that when the total network size is small, we can just cache all the nodes so big distance wont matter.

I also got it so that each node creates a list of addresses to match against and when the network is bigger, each node will hav a slightly different list it will be optimizing against.

It looks like we can have a set of deaddrop addresses that each have exact distance match to 10 to 100 public privacy servers and also decent distances to a lot of other nodes. Then we can choose 64 of these deaddrop addresses to establish a super secure link.

Since the only one that actually knows the IP address is the person running the node, I think that short of it being compromised there is no practical way of correlating your IP address. keep in mind that packets are sent to 64 different deaddrop addresses that dont really exist, so I am not sure how anybody would setup a sybil attack or any other attack to link your IP address to your acct.

Now even if somehow this info leaked, just knowing your acct # and IP address is still not enough as you would be transacting with telepods which themselves have no acct linked to you. Since people had a hard time understanding the simpler form of Teleport, I fear that few will be able to understand the new deaddrop approach. Hopefully somebody will provide some feedback on its weaknesses, if it has any.

I feel this is a fundamental improvement in privacy. In all prior versions, there was at least a statistical linkage of your acct # with IP address. Now, all that is happening is that packets are being sent to dead addresses so there is nothing to correlate. Other than the distances to the other nodes, but with the mining of equidistant addresses, this only gives a statistical correlation, and that is a dynamically changing thing, especially with the randomized sending of packets to the set of deaddrop addresses.

This is a bit of unexpected extra work, but the qualitative increase in privacy is well worth it. Not sure if you realize that this does the "impossible", routing packets to someone on the Internet (IP) without knowing their IP address and without broadcasting or wasting bandwidth.

Imagine being able to send email to someone without knowing their email address and without spamming everyone. This is on that level of crazy.

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
tj303
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile
October 13, 2014, 03:49:32 PM
 #6986

That is an entirely different level of crazy.
Way to go james!
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 04:40:15 PM
 #6987

That is an entirely different level of crazy.
Way to go james!
couldnt sleep due to this idea!

have to tweak the Kademlia DHT calls a bit as this was not part of the original method, but I almost have it solved

The really cool part is that all this privacy of the IP<->account is extra protection as the telepods themselves are not directly linked to your published accounts. But what extra protection it is!

Imagine you are trying to figure out who is sending packets to each other, this is really required to be able to make any sort of linkage. With the Internet, basically all comms are tagged with the IP address, so if the attacker has packet level data, then they can see who you are talking to. With encryption, they cant tell what you are saying, now they wont be able to tell who is talking to who.

A. Alice and Bob publish their public keys to the cloud
B. Alice and Bob exchange the deaddrop addresses (actually I have an improvement on this, but let us use B. for now)
C. Alice and Bob send fragments of each packet to random deaddrop addresses
D. All the nodes process these packets normally, but they end up in a dead end as no node actually uses these deaddrop addresses. Ideally the deaddrop addresses are equidistant from a large number of nodes, but they are random distances from Alice and Bob so the possible nodes that are Alice and Bob are dozens if not 100+, basically random guessing.
E. It just so happens that both Alice and Bob's nodes were close enough (using XOR metric) so that their nodes processed at least M/N of the packets from C and decrypted them as they were handled.

F. Attacker gets a new job Smiley

For those who thought the DHT was a waste of time and a distraction from completing Teleport, please realize the magnitude of this breakthrough. Whatever extra time it takes (and it is not clear we will lose much time overall as Windows build, GUI and larger network are still not in place) will be well worth it as with this deaddrop level of privacy, it is safe to say that there is nothing that compares to this. At least nothing I am aware of. Maybe somebody knows of something remotely as good as this?

Originally I didnt think I could actually solve this part of the puzzle, so I made the Teleport design strong enough in other parts so that even if the IP<->acct relation was leaked, it wouldnt matter. Before Teleport was dark, now it is invisible. I guess we got a cloaking device Smiley

James

P.S. I realize B is the weakest link now as this is the only "direct" contact between Alice and Bob, granted it is via onion routed same sized packets, but I have an idea to make this part invisible also.

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Cassius
Legendary
*
Offline Offline

Activity: 1764
Merit: 1031


View Profile WWW
October 13, 2014, 04:49:11 PM
 #6988

This is pretty cool Smiley
Today I happened to read this article: http://www.bbc.co.uk/news/technology-29567782
in which the head of Europol's Cybercrime Centre says, "There is confusion among the good guys on the internet between anonymity and privacy. I don't think they are the same. I think that you have right to privacy but that doesn't mean that you have the right to anonymity."

The increasing trend towards greater encryption of online communications is not acceptable, he said.

"Imagine in the physical world if you were not able to open the trunk of a car if you had a suspicion that there were weapons or drugs inside... we would never accept this.

"I think that should also count for the digital world. I hate to talk about backdoors but there has to be a possibility for law enforcement, if they are authorised, to look inside at what you are hiding in your online world."
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 04:57:34 PM
 #6989

This is pretty cool Smiley
Today I happened to read this article: http://www.bbc.co.uk/news/technology-29567782
in which the head of Europol's Cybercrime Centre says, "There is confusion among the good guys on the internet between anonymity and privacy. I don't think they are the same. I think that you have right to privacy but that doesn't mean that you have the right to anonymity."

The increasing trend towards greater encryption of online communications is not acceptable, he said.

"Imagine in the physical world if you were not able to open the trunk of a car if you had a suspicion that there were weapons or drugs inside... we would never accept this.

"I think that should also count for the digital world. I hate to talk about backdoors but there has to be a possibility for law enforcement, if they are authorised, to look inside at what you are hiding in your online world."

law enforcement can always simply break down your door and confiscate your computer and torture you to get you to divulge your passwords. What I am doing does not prevent this. law enforcement has to go through your physical door, no backdoors in any of my code!

In any case this is non-communications as who did you really contact by sending packets to addresses that nobody actually uses? If a packet falls into a dead drop, did anybody decrypt it?

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Drai
Sr. Member
****
Offline Offline

Activity: 567
Merit: 270



View Profile
October 13, 2014, 05:20:13 PM
 #6990

This is pretty cool Smiley
Today I happened to read this article: http://www.bbc.co.uk/news/technology-29567782
in which the head of Europol's Cybercrime Centre says, "There is confusion among the good guys on the internet between anonymity and privacy. I don't think they are the same. I think that you have right to privacy but that doesn't mean that you have the right to anonymity."

The increasing trend towards greater encryption of online communications is not acceptable, he said.

"Imagine in the physical world if you were not able to open the trunk of a car if you had a suspicion that there were weapons or drugs inside... we would never accept this.

"I think that should also count for the digital world. I hate to talk about backdoors but there has to be a possibility for law enforcement, if they are authorised, to look inside at what you are hiding in your online world."

very good to know
Maybe WhiteCoin is on the right path Smiley

jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 06:31:57 PM
 #6991


If a packet falls into a dead drop, did anybody decrypt it?

 Cheesy
I am coding group deaddrops and random packet injection

the deaddrop addresses will be shared by the nodes that are close to it, so just knowing the deaddrop address used (not easy) will not help much. It will also allow all the nodes to be mining these deaddrop addresses!

the one loose end is the node that starts the DHT, it is possible for the traffic pattern to indicate which node started a particular DHT request. At least that is what I would do to try to figure out who is doing what.

The solution is to use the onion routing to randomly pick a node that will inject the DHT request. Since the onion packets will include DHT traffic and non-DHT traffic and they are all the same size, it seems that packet analysis will not be very useful.

Did I miss anything?

James




http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
ASICHEAD
Hero Member
*****
Offline Offline

Activity: 552
Merit: 500


View Profile
October 13, 2014, 07:13:50 PM
 #6992


If a packet falls into a dead drop, did anybody decrypt it?

 Cheesy
I am coding group deaddrops and random packet injection

the deaddrop addresses will be shared by the nodes that are close to it, so just knowing the deaddrop address used (not easy) will not help much. It will also allow all the nodes to be mining these deaddrop addresses!

the one loose end is the node that starts the DHT, it is possible for the traffic pattern to indicate which node started a particular DHT request. At least that is what I would do to try to figure out who is doing what.

The solution is to use the onion routing to randomly pick a node that will inject the DHT request. Since the onion packets will include DHT traffic and non-DHT traffic and they are all the same size, it seems that packet analysis will not be very useful.

Did I miss anything?

James





Hi James

Thanks for your elaborate hard work . Wink

▄███▄
███████▄
██████▀██▄
█████▄  ▀██▄
████▀  ▄  ▀██▄
███▄ ▄██▀   ▀
██████▀  ▄█▄
███████▄█████▄
███████████████▄
████████████████▀
█████████▀
███████▀
 ▀███▀
Safein     
.M A K E   I S I M P L E.
A   R E V O L U T I O N A R Y   W A Y   T O   P A Y   O N L I N E
.
[WHITEPAPER]
▬▬▬▬▬▬▬▬▬▬▬▬▬▬

██
██
██
██
██
██
██
██
██
██
██
▄█████████████████████████▄
███████████████████████████
████████████████▀░░░░░▐████
███████████████░░░░░░░▐████
██████████████▌░░░▐████████
██████████████▌░░░▐████████
███████████░░░░░░░░░░░█████
███████████░░░░░░░░░░▐█████
██████████████▌░░░▐████████
██████████████▌░░░▐████████
██████████████▌░░░▐████████
██████████████▌░░░▐████████
▀█████████████▌░░░▐███████▀

██
██
██
██
██
██
██
██
██
██
██
▄█████████████████████████▄
███████████████████████████
███████████████████████████
██████▀███████▀░░░▀▀▀▄█████
█████▌░░▀▀███▌░░░░░░░▄█████
█████▀░░░░░░░░░░░░░░░██████
█████▄░░░░░░░░░░░░░░███████
██████▄░░░░░░░░░░░░████████
███████▄▄░░░░░░░░▄█████████
██████▄░░░░░░░▄████████████
███████████████████████████
███████████████████████████
▀█████████████████████████▀

██
██
██
██
██
██
██
██
██
██
██
▄█████████████████████████▄
███████████████████████████
███████████████████████████
██████████████████▀▀███████
█████████████▀▀▀░░░░███████
████████▀▀▀░░░▄▀░░░████████
█████▄░░░░░▄█▀░░░░░████████
████████▄░█▀░░░░░░█████████
█████████▌▐░░░░░░░█████████
██████████░▄██▄░░██████████
████████████████▄██████████
███████████████████████████
▀█████████████████████████▀

██
██
██
██
██
██
██
██
██
██
██
A
▬▬

█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
█▀▀
.GET IT ON               
Google Play
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 13, 2014, 08:05:35 PM
 #6993

just pushed a new version with the deaddrop coded (but not tested yet) and a new SuperNET.conf field "debug"
if you like all the printouts just set "debug":1 or 2

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
dollux
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
October 13, 2014, 11:42:07 PM
 #6994

Hey crackfoo, am I correct in thinking that you are the proprietor of btcd.xpool.ca.

If you are can you please help as I am seemingly not getting paid out.
No big rush but I would like some assistance, thank you.
crackfoo
Legendary
*
Offline Offline

Activity: 3458
Merit: 1126



View Profile WWW
October 13, 2014, 11:44:11 PM
 #6995

Hey crackfoo, am I correct in thinking that you are the proprietor of btcd.xpool.ca.

If you are can you please help as I am seemingly not getting paid out.
No big rush but I would like some assistance, thank you.

PM me the workername you have set in your miner's config.

ZPOOL - the miners multipool! Support We pay 10 FLUX Parallel Assets (PA) directly to block rewards! Get paid more and faster. No PA fee's or waiting around for them, paid instantly on every block found!
dollux
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250



View Profile
October 13, 2014, 11:54:02 PM
 #6996

Hey crackfoo, am I correct in thinking that you are the proprietor of btcd.xpool.ca.

If you are can you please help as I am seemingly not getting paid out.
No big rush but I would like some assistance, thank you.

PM me the workername you have set in your miner's config.

Done.

Thank you for swiftness, right on the ball.  Smiley
mezzovide
Member
**
Offline Offline

Activity: 101
Merit: 10


View Profile
October 14, 2014, 04:18:02 AM
 #6997

Hi, what kind of hardware specs do you need for privacyserver testing, i think i could provide some if its not too high requirement, i have sufficient IPv4 but lack of hardware resources.

Btc : 12LMdyWoyjJ1BZxfWmaZMWjTXn7S9y5EdK
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 14, 2014, 05:09:52 AM
 #6998

Hi, what kind of hardware specs do you need for privacyserver testing, i think i could provide some if its not too high requirement, i have sufficient IPv4 but lack of hardware resources.
I think 2GB RAM is all that is needed

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
October 14, 2014, 05:12:52 AM
 #6999

pushed a new version
I finally got onion routing of DHT calls working
pretty crazy stuff, but it seems to work and I am sending stuff to addresses that nobody actually has and during the DHT routing, the node that it was meant for decrypts it on the fly

and the DHT call is started by randomly selected node, L layers of the onion away from the actual originator.

still have some bugs, but I fixed a LOT of small things and I think now the onion routing will work much better and it is enable for all calls other than pong.

ping is unencrypted and no onion layers of course
pong is encrypted with a direct transmission
all other API are encrypted and adds a random number of onion layers up to Lfactor in your SuperNET.conf file

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
mezzovide
Member
**
Offline Offline

Activity: 101
Merit: 10


View Profile
October 14, 2014, 06:38:09 AM
 #7000

Hi, what kind of hardware specs do you need for privacyserver testing, i think i could provide some if its not too high requirement, i have sufficient IPv4 but lack of hardware resources.
I think 2GB RAM is all that is needed

is 1GB enough? I could fire up probably 4 nodes with different distro/version and public IPs with 4 vCPU and 1GB RAM, or 2 nodes if u want 2GB right now. It doesnt count much i know, just willing to help if u need it  Smiley

Btc : 12LMdyWoyjJ1BZxfWmaZMWjTXn7S9y5EdK
Pages: « 1 ... 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 [350] 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 ... 547 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!