Bitcoin Forum
November 03, 2024, 02:08:47 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 [77] 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 161 »
  Print  
Author Topic: [ANN] [KEY] KeyCoin | Fair Launch | Daily Updates | 8/9 Status Update  (Read 188844 times)
pr0m3theus2013
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
July 28, 2014, 04:28:45 AM
Last edit: July 28, 2014, 07:07:42 AM by pr0m3theus2013
 #1521

You remind me a lot of John Galt. You haunted the irc with constant negativity not because you are interested, but because you have a personal vendetta against me and my team. We're here to deliver on our promises and constantly improve our tech we have delivered on many things you said we would not bring thus far. I'm not avoiding the questions you ask. It's the fact that they have already been answered and you simply ask them to bring up the same conversations over and over again.
TheNewsHasCome
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
July 28, 2014, 05:04:39 AM
 #1522

remember holders and developers, attacking the poster does not invalidate his ideas and or concerns brought to the table,

To those that may think Erastos is attempting to be reasonable, please go read his post history. He has attacked the devs, spread FUD and outright lied since launch day one. This is a post he had July 19th where he predicted they would likely never have a working anon solution and that the price would likely not rise above where it was (high was 40k that day).

Exactly, luckily for you, you have historical data from CRYPT to get an idea of how KEY will play out. Although since they already played their 'anon coming' card, it's about as high as it's going to go without an actual working anon which they likely don't have, or ever will.

Caveat emptor, investors.

The devs are actually willing to answer questions and be reasonable to those who are reasonable to them. They have delivered on every promise.
Megalodon
Full Member
***
Offline Offline

Activity: 195
Merit: 100

Magic internet moneys ftw


View Profile
July 28, 2014, 05:39:15 AM
 #1523


also this market is pure speculation, sentiment is made on opinion. opinions made that i do not hold alone.

Aren't all cryptocurrency markets pure speculation? Why are you hating on this coin so much? Enough to care to buy back lower after scaring some investors away?

Twitter TA calls and news: https://twitter.com/Crypt0cracy
My BTC Beer Fund: 12cBoUbbsAAxoAzyyeEw8zV1AXp3nbW7Mu
pr0m3theus2013
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
July 28, 2014, 07:08:29 AM
Last edit: July 28, 2014, 07:30:19 AM by pr0m3theus2013
 #1524

I have reached out to the XC dev to review our code and share his findings with the community, I feel he is a trusted pair of eyes for the project code and will both serve to prove that it's not a stolen copy of XC, and also as a knowledgeable individual to comment on the quality of our anon system.

I do desire to answer all of the questions you guys have, but we also need to keep our code secure and free from being copied at this time.
keycoin (OP)
Full Member
***
Offline Offline

Activity: 140
Merit: 100


View Profile
July 28, 2014, 07:24:36 AM
 #1525

I have reached out to the XC dev to review our code and share his findings with the community, I feel he is a trusted pair of eyes for the project code and will both serve to prove that it's not a stolen copy of XC, and also as a knowledgeable individual to comment on the quality of our anon system.

Keycoin team has emailed our anon source code to prometheus' reviewer as requested.
KryptoFoo
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
July 28, 2014, 07:41:44 AM
 #1526

Assuming keycoin uses masternodes and that they are centrally operated - how many masternodes are being operated on the network, and who are they owned by?

Why isn't a description and diagram of the keycoin anon solution prominent in the original post nor on the website???
Djinou94
Legendary
*
Offline Offline

Activity: 1036
Merit: 1000


View Profile
July 28, 2014, 11:53:16 AM
 #1527

Hopefully none of you fell to that reddit fud, they left out one key thing, it's the fact that the nodes communicate with eachother through encryption AFTER mixing and then have a node that was not used to receive the coins from the sending address to process the transaction using fresh coins. This is the reason why our anonymous system works so incredibly well. This fact was left out in it's entirety from the reddit fud, which was just a bold attempt from competitors to get their volume and value back. There is no direct link between any of the nodes as the transaction is being processed. Really, to sum it up the reddit article was just technical jargon used to make them seem knowledgeable when fud attacking our coin, the reality is to anyone one the dev team including myself it's just pure BS.

 These swings however have been prevalent over the last few days and are often a great re entry point for the run up back to 100k.


Oh, and were working on a decentralized market and exchange platform.

Cannot wait to see that
Bravo dev team

pbremen01
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
July 28, 2014, 01:09:33 PM
 #1528

Hopefully none of you fell to that reddit fud, they left out one key thing, it's the fact that the nodes communicate with eachother through encryption AFTER mixing and then have a node that was not used to receive the coins from the sending address to process the transaction using fresh coins. This is the reason why our anonymous system works so incredibly well. This fact was left out in it's entirety from the reddit fud, which was just a bold attempt from competitors to get their volume and value back. There is no direct link between any of the nodes as the transaction is being processed. Really, to sum it up the reddit article was just technical jargon used to make them seem knowledgeable when fud attacking our coin, the reality is to anyone one the dev team including myself it's just pure BS.

 These swings however have been prevalent over the last few days and are often a great re entry point for the run up back to 100k.


Oh, and were working on a decentralized market and exchange platform.

Cannot wait to see that
Bravo dev team



Well, decentralized system by itself won't affect the first point (labelled "1)") in this FUD post:

http://www.reddit.com/r/CryptoCurrency/comments/2btj6m/reasons_why_keycoin_anonymity_doesnt_work/

This argument takes into account only blockchain and doesn't depend on the way the mixers are implemented (centralized/decentralized system, the way the mixers communicate etc.).

If someone anonymously sends you Y KEY, then you can find two transactions in the blockchain:
a) the first that has one output with X KEYs,
b) the second one that has one output with R KEYs

which satisfy the following equation:

X = Y + R

(a little bit generalized version of this equation holds for every mixer that is not stealing coins, but in the case of KeyCoin it seems that this simple equation holds).

Then the inputs of the first transaction (one that has one output with X KEYs) are from the address(es) that sent coins to the mixer. This is the original sender.

As you can see, even if the mixer implementation is changed from centralized to decentralized, ceteris paribus, you can still find two transactions that satisfy equation X=Y+R.




pr0m3theus2013
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
July 28, 2014, 01:59:00 PM
 #1529

Developer of XC's anonymous system has agreed to review our code and provide feedback to the community. This is great news for us!
WheresMyWallet
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
July 28, 2014, 02:32:54 PM
 #1530

Hopefully none of you fell to that reddit fud, they left out one key thing, it's the fact that the nodes communicate with eachother through encryption AFTER mixing and then have a node that was not used to receive the coins from the sending address to process the transaction using fresh coins. This is the reason why our anonymous system works so incredibly well. This fact was left out in it's entirety from the reddit fud, which was just a bold attempt from competitors to get their volume and value back. There is no direct link between any of the nodes as the transaction is being processed. Really, to sum it up the reddit article was just technical jargon used to make them seem knowledgeable when fud attacking our coin, the reality is to anyone one the dev team including myself it's just pure BS.

 These swings however have been prevalent over the last few days and are often a great re entry point for the run up back to 100k.


Oh, and were working on a decentralized market and exchange platform.

Cannot wait to see that
Bravo dev team



Well, decentralized system by itself won't affect the first point (labelled "1)") in this FUD post:

http://www.reddit.com/r/CryptoCurrency/comments/2btj6m/reasons_why_keycoin_anonymity_doesnt_work/

This argument takes into account only blockchain and doesn't depend on the way the mixers are implemented (centralized/decentralized system, the way the mixers communicate etc.).

If someone anonymously sends you Y KEY, then you can find two transactions in the blockchain:
a) the first that has one output with X KEYs,
b) the second one that has one output with R KEYs

which satisfy the following equation:

X = Y + R

(a little bit generalized version of this equation holds for every mixer that is not stealing coins, but in the case of KeyCoin it seems that this simple equation holds).

Then the inputs of the first transaction (one that has one output with X KEYs) are from the address(es) that sent coins to the mixer. This is the original sender.

As you can see, even if the mixer implementation is changed from centralized to decentralized, ceteris paribus, you can still find two transactions that satisfy equation X=Y+R.


I hope once the XC dev comes back to talk about the anon system in use you will finally stop trying to push your mixers stealing coins FUD.
You seem hell bent on pursuing your point without any sort of proof or even time to do your own analysis, as I mentioned before in a previous response.
Take the 1-2hr you spend writing your "technically based post and rigorous mathematical equations" and actually do something about it.

First though, follow the guide again and get your anon working like everyone else has.
If you want to take your first baby steps and need a bit of hand holding, I'm sure someone technical in here can talk in laymens terms for you to grasp.
CrazyLeoW
Full Member
***
Offline Offline

Activity: 126
Merit: 100

XC


View Profile
July 28, 2014, 02:44:37 PM
 #1531

Developer of XC's anonymous system has agreed to review our code and provide feedback to the community. This is great news for us!

KEYCOIN is SCAM entirely. Just a joke.

xchat: XNvUSCdvZgZcXsYd3Gs91w8tKQmeMKHS9G
Pubkey: 2Ax9bYXwifbqyxsmC9pbhfGyPoLJNf3wdtQ7dFdzKK1ZX
pbremen01
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
July 28, 2014, 02:57:13 PM
 #1532

Developer of XC's anonymous system has agreed to review our code and provide feedback to the community. This is great news for us!

Are you sure that this developer can give impartial review?

The source code code of KeyCoin is based on XC's code. If there is flaw is in KeyCoin, then the similar flaw may exist in XC's code also. Do you think that he/she's will admit that XC code is also flawed?

WheresMyWallet
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
July 28, 2014, 03:05:32 PM
 #1533

Developer of XC's anonymous system has agreed to review our code and provide feedback to the community. This is great news for us!

Are you sure that this developer can give impartial review?

The source code code of KeyCoin is based on XC's code. If there is flaw is in KeyCoin, then the similar flaw may exist in XC's code also. Do you think that he/she's will admit that XC code is also flawed?


Are you sure that you can give impartial review, because I'm not really seeing it so far?
I didn't realise you were now also questioning the trustworthiness of the XC devs, (sorry XC devs).
Are there any developers at all in the crypto currency world that you do trust?
If there are, maybe you should stick to only investing in their coin instead of doing a little hedging.
Or are you just trying to be the "voice of reason" in this fickle world of crypto?
Paladin69
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000


View Profile
July 28, 2014, 03:05:52 PM
 #1534

Developer of XC's anonymous system has agreed to review our code and provide feedback to the community. This is great news for us!

Are you sure that this developer can give impartial review?

The source code code of KeyCoin is based on XC's code. If there is flaw is in KeyCoin, then the similar flaw may exist in XC's code also. Do you think that he/she's will admit that XC code is also flawed?



Won't you look stupid when everyone finds out that KEY did not "steal" XC's code?

You FUD'ers aren't getting cheaper coins.  You can stop trying now lol
pbremen01
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
July 28, 2014, 03:10:53 PM
 #1535


I hope once the XC dev comes back to talk about the anon system in use you will finally stop trying to push your mixers stealing coins FUD.
You seem hell bent on pursuing your point without any sort of proof or even time to do your own analysis, as I mentioned before in a previous response.
Take the 1-2hr you spend writing your "technically based post and rigorous mathematical equations" and actually do something about it.

First though, follow the guide again and get your anon working like everyone else has.
If you want to take your first baby steps and need a bit of hand holding, I'm sure someone technical in here can talk in laymens terms for you to grasp.


I did manage to send one anonymous transaction (and only one because the things stopped working after this one).

And I can confirm that that I could find transactions that satisfy equation X=Y+R (plus minus transaction fees). The first transaction (that sent X coins) is my original transaction. The second transaction is transaction that sent coins to my change address. You can easily determine both transactions from qt client. I didn't check thoroughly if there are also other transactions that satisfy this equation (but there are probably not).

I won't post details of my transaction here because I don't trust the operators of mixer nodes and they could probably use this information to track me.

But you can do the same thing with your qt client. If the anonymous sending feature is working, then it is about 1-2 minutes of your work.

There is nothing to be "proved" about equation X=Y+R. If you send X coins and the other party receives Y coins, then the mixer must send you back R coins (to change address). If you don't get R coins back, then the mixer is stealing your coins. What is so hard to understand here?

Btw, some bitcoin mixers actually do this. But they hide it in a "fee".

pbremen01
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
July 28, 2014, 03:11:56 PM
 #1536


Are you sure that you can give impartial review, because I'm not really seeing it so far?

No, I cannot give you impartial review. How did you come to this conclusion?
WheresMyWallet
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
July 28, 2014, 03:23:58 PM
 #1537


Are you sure that you can give impartial review, because I'm not really seeing it so far?

No, I cannot give you impartial review. How did you come to this conclusion?

Being impartial and objective would require you discussing both sides of an argument fully, which you clearly haven't
Biased is your standpoint, "prove me wrong or my words must be gospel"
pbremen01
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
July 28, 2014, 03:35:05 PM
 #1538


Are you sure that you can give impartial review, because I'm not really seeing it so far?

No, I cannot give you impartial review. How did you come to this conclusion?

Being impartial and objective would require you discussing both sides of an argument fully, which you clearly haven't
Biased is your standpoint, "prove me wrong or my words must be gospel"

You cannot expect objectivity from some random internet person. You never know what kind of (nefarious?) motives he has.

And I don't expect anyone to take anything I say for granted. People can always check things for themselves if they want. The only question is if they want to invest enough time and mental energy into this.

"Prove me wrong or my words must be gospel" does not hold in the context of computer security. The assumption in computer security is that systems are not secure unless proven otherwise. If somebody cannot rigorously prove that his security method (anonymity method) is really secure (anonymous), then you MUST assume that it is not secure (anonymous).

"Being secure" means "resistant to all known (or feasible) attacks".


Hel
Member
**
Offline Offline

Activity: 78
Merit: 10


View Profile
July 28, 2014, 03:46:03 PM
 #1539


Are you sure that you can give impartial review, because I'm not really seeing it so far?

No, I cannot give you impartial review. How did you come to this conclusion?

Being impartial and objective would require you discussing both sides of an argument fully, which you clearly haven't
Biased is your standpoint, "prove me wrong or my words must be gospel"

You cannot expect objectivity from some random internet person. You never know what kind of (nefarious?) motives he has.

And I don't expect anyone to take anything I say for granted. People can always check things for themselves if they want. The only question is if they want to invest enough time and mental energy into this.

"Prove me wrong or my words must be gospel" does not hold in the context of computer security. The assumption in computer security is that systems are not secure unless proven otherwise. If somebody cannot rigorously prove that his security method (anonymity method) is really secure (anonymous), then you MUST assume that it is not secure (anonymous).

"Being secure" means "resistant to all known (or feasible) attacks".




I think the basic point trying to be put across to you is "give it some time". you want answers now while things are being done to provide those answers. Your motivation is suspect simply because you are constantly asking the same question and only seemingly in accordance with market price. asking questions is nothing that should be considered nefarious, but it is on record that you have asked this question... several times. Maybe wait for an answer, and if you don't receive one after the next statement from the dev, then ask it again. But repeating the same thing ad nauseam is, and should be considered, trolling. You've asked it, now kindly wait.

p.s. "I don't expect anyone to take anything I say for granted", I don't think this phrase means what you think it means.
WheresMyWallet
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
July 28, 2014, 03:56:58 PM
 #1540


Are you sure that you can give impartial review, because I'm not really seeing it so far?

No, I cannot give you impartial review. How did you come to this conclusion?

Being impartial and objective would require you discussing both sides of an argument fully, which you clearly haven't
Biased is your standpoint, "prove me wrong or my words must be gospel"

You cannot expect objectivity from some random internet person. You never know what kind of (nefarious?) motives he has.

And I don't expect anyone to take anything I say for granted. People can always check things for themselves if they want. The only question is if they want to invest enough time and mental energy into this.

"Prove me wrong or my words must be gospel" does not hold in the context of computer security. The assumption in computer security is that systems are not secure unless proven otherwise. If somebody cannot rigorously prove that his security method (anonymity method) is really secure (anonymous), then you MUST assume that it is not secure (anonymous).

"Being secure" means "resistant to all known (or feasible) attacks".




I think the basic point trying to be put across to you is "give it some time". you want answers now while things are being done to provide those answers. Your motivation is suspect simply because you are constantly asking the same question and only seemingly in accordance with market price. asking questions is nothing that should be considered nefarious, but it is on record that you have asked this question... several times. Maybe wait for an answer, and if you don't receive one after the next statement from the dev, then ask it again. But repeating the same thing ad nauseam is, and should be considered, trolling. You've asked it, now kindly wait.

p.s. "I don't expect anyone to take anything I say for granted", I don't think this phrase means what you think it means.

This is precisely my point, and to add a quote from the previous poster to back this up

Quote
You cannot expect objectivity from some random internet person. You never know what kind of (nefarious?) motives he has.

You are asking us to believe that you posting the same thing over and over again doesn't matter
You are also the "random internet person", and we don't know what "kind of motives he has"

By your own admission though, even if Stephen Hawking himself sent you a synthesized voice message letting you know ANY and ALL crypto anon systems was secure, you wouldn't believe him.
You don't know him personally, you only know of him, but you don't know if he is trustworthy.
Pages: « 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 [77] 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 ... 161 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!