argentinx
Member
Offline
Activity: 109
Merit: 10
|
|
September 24, 2014, 07:44:39 PM |
|
are not English I'm using google translator easier the translation if I divide phrases
|
|
|
|
gwada971
Jr. Member
Offline
Activity: 32
Merit: 10
|
|
September 24, 2014, 08:09:57 PM |
|
Wish that's all of these will be behind soon, and monero dev could work on the final GUI and the DB !! (eat my RAM
|
|
|
|
PestoQuinty
Member
Offline
Activity: 106
Merit: 10
|
|
September 24, 2014, 08:10:27 PM |
|
Wish that's all of these will be behind soon, and monero dev could work on the final GUI and the DB !! (eat my RAM Yes, please!
|
|
|
|
TheFascistMind
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 24, 2014, 08:30:54 PM |
|
http://bullbearanalytics.com/2014/09/23/whats-going-monero/The above web page has an error in their summary of events: the (not yet verified by simulation) attack I proposed for unmasking the anonymity of some (not all) of the rings would not require the attacker to own any of the inputs to the rings. It is not yet known how effective my algorithm is, i.e. what % of the rings would be unmasked and whether the computation would even be feasible on known levels of computing power. If the attacker Sybil attacks the inputs, then the effectiveness probably increases and the potential mitigation probably weakens. But we don't know any thing for sure and we haven't quantified it. All we have now is I showed some pseudocode for how it might be possible and it is impossible from looking at the algorithm to determine if it will be very effective or not. We can hope once we have a simulation it will provide some insight into the quantification of the effectiveness of a Sybil attack on the anonymity.
|
|
|
|
nioc
Legendary
Offline
Activity: 1624
Merit: 1008
|
|
September 24, 2014, 08:48:52 PM |
|
Wish that's all of these will be behind soon, and monero dev could work on the final GUI and the DB !! (eat my RAM Yes, please! I have windows 8, pentium chip, 4GB RAM. I am currently running a full node, mining, (not with wallet), with both threads = 100% cpu, on bct forum on chrome, watching video on IE, while playing poker on the intertubes. Yes the DB will be finished soon® If you would like to donate to the dev fund any amount would be appreciated.
|
|
|
|
5w00p
|
|
September 24, 2014, 09:44:32 PM |
|
This, it's fucking impossible to read. x, why don't you stop being a solipsistic english-speaking prick and get over it? argentinx told you why he does it and he is trying to contribute. What are you contributing, besides your crybaby tears?
|
|
|
|
DCRnerd
Newbie
Offline
Activity: 10
Merit: 0
|
|
September 24, 2014, 09:57:10 PM |
|
http://bullbearanalytics.com/2014/09/23/whats-going-monero/The above web page has an error in their summary of events: the (not yet verified by simulation) attack I proposed for unmasking the anonymity of some (not all) of the rings would not require the attacker to own any of the inputs to the rings. It is not yet known how effective my algorithm is, i.e. what % of the rings would be unmasked and whether the computation would even be feasible on known levels of computing power. If the attacker Sybil attacks the inputs, then the effectiveness probably increases and the potential mitigation probably weakens. But we don't know any thing for sure and we haven't quantified it. All we have now is I showed some pseudocode for how it might be possible and it is impossible from looking at the algorithm to determine if it will be very effective or not. We can hope once we have a simulation it will provide some insight into the quantification of the effectiveness of a Sybil attack on the anonymity. Co-author of the linked post here. Thanks for pointing that out, I'll make an edit to reflect the info you provided here.
|
|
|
|
NewLiberty
Legendary
Offline
Activity: 1204
Merit: 1002
Gresham's Lawyer
|
|
September 24, 2014, 09:58:27 PM |
|
are not English I'm using google translator easier the translation if I divide phrases
Potete tradurre le frasi avanti e indietro con google un paio di volte fino a che non viene fuori proprio nella traduzione per la lingua?
|
|
|
|
NewLiberty
Legendary
Offline
Activity: 1204
Merit: 1002
Gresham's Lawyer
|
|
September 24, 2014, 10:09:54 PM |
|
http://bullbearanalytics.com/2014/09/23/whats-going-monero/The above web page has an error in their summary of events: the (not yet verified by simulation) attack I proposed for unmasking the anonymity of some (not all) of the rings would not require the attacker to own any of the inputs to the rings. It is not yet known how effective my algorithm is, i.e. what % of the rings would be unmasked and whether the computation would even be feasible on known levels of computing power. If the attacker Sybil attacks the inputs, then the effectiveness probably increases and the potential mitigation probably weakens. But we don't know any thing for sure and we haven't quantified it. All we have now is I showed some pseudocode for how it might be possible and it is impossible from looking at the algorithm to determine if it will be very effective or not. We can hope once we have a simulation it will provide some insight into the quantification of the effectiveness of a Sybil attack on the anonymity. Co-author of the linked post here. Thanks for pointing that out, I'll make an edit to reflect the info you provided here. If you are editing, you might consider replacing ' levity' with ' gravity' in your "THE THREAT" section? I think it may have been what you meant.
|
|
|
|
DCRnerd
Newbie
Offline
Activity: 10
Merit: 0
|
|
September 24, 2014, 10:31:03 PM |
|
http://bullbearanalytics.com/2014/09/23/whats-going-monero/The above web page has an error in their summary of events: the (not yet verified by simulation) attack I proposed for unmasking the anonymity of some (not all) of the rings would not require the attacker to own any of the inputs to the rings. It is not yet known how effective my algorithm is, i.e. what % of the rings would be unmasked and whether the computation would even be feasible on known levels of computing power. If the attacker Sybil attacks the inputs, then the effectiveness probably increases and the potential mitigation probably weakens. But we don't know any thing for sure and we haven't quantified it. All we have now is I showed some pseudocode for how it might be possible and it is impossible from looking at the algorithm to determine if it will be very effective or not. We can hope once we have a simulation it will provide some insight into the quantification of the effectiveness of a Sybil attack on the anonymity. Co-author of the linked post here. Thanks for pointing that out, I'll make an edit to reflect the info you provided here. If you are editing, you might consider replacing ' levity' with ' gravity' in your "THE THREAT" section? I think it may have been what you meant. I certainly did sir. Post updated. Much appreciated.
|
|
|
|
dNote
|
|
September 24, 2014, 11:03:08 PM |
|
idiotism
|
|
|
|
RedZeppelin
Member
Offline
Activity: 70
Merit: 10
|
|
September 24, 2014, 11:24:48 PM |
|
We need a BitcoinEXpressCoin like a Curecoin panel where we can lend our hashrates to his experiments. A couple of 1000 users and all shitcoins would be dead
|
|
|
|
manselr
Legendary
Offline
Activity: 868
Merit: 1006
|
|
September 24, 2014, 11:32:08 PM |
|
Can a non biased used drop some cliffs for me? Should I sell? Im just a peasant with 30 XMR. I think this coin is LEGIT, had a partnership with i2p, it was great.. but this BCX attack thing is getting on my mother fucking nerves now.
|
|
|
|
matrix961
|
|
September 24, 2014, 11:44:05 PM |
|
Can a non biased used drop some cliffs for me? Should I sell? Im just a peasant with 30 XMR. I think this coin is LEGIT, had a partnership with i2p, it was great.. but this BCX attack thing is getting on my mother fucking nerves now.
I'm holding my stash based on the following. - devs quick to react and investigate issue instead of just ignoring it. - other resources pulled together to help (cz, anonymint, jl777). - communicated to exchanges as a precautionary measure. - community coming together to show support. Even if bcx is just talking its important to have devs that are willing to at least take a look and that's what they have been doing a great job of.
|
|
|
|
JorgeStolfi
|
|
September 25, 2014, 12:28:39 AM |
|
are not English I'm using google translator easier the translation if I divide phrases
Potete tradurre le frasi avanti e indietro con google un paio di volte fino a che non viene fuori proprio nella traduzione per la lingua? Once I tried using that method to post a question in Chinese on the Chinese language sub-forum. I don't know what came out, but judging from the replies it must have been something quite funny.
|
Academic interest in bitcoin only. Not owner, not trader, very skeptical of its longterm success.
|
|
|
vuduchyld
|
|
September 25, 2014, 12:30:55 AM |
|
Can a non biased used drop some cliffs for me? Should I sell? Im just a peasant with 30 XMR. I think this coin is LEGIT, had a partnership with i2p, it was great.. but this BCX attack thing is getting on my mother fucking nerves now.
I'm holding my stash based on the following. - devs quick to react and investigate issue instead of just ignoring it. - other resources pulled together to help (cz, anonymint, jl777). - communicated to exchanges as a precautionary measure. - community coming together to show support. Even if bcx is just talking its important to have devs that are willing to at least take a look and that's what they have been doing a great job of. + eleventy bazillion
|
|
|
|
smooth
Legendary
Offline
Activity: 2968
Merit: 1198
|
|
September 25, 2014, 01:14:52 AM |
|
Can a non biased used drop some cliffs for me? Should I sell? Im just a peasant with 30 XMR. I think this coin is LEGIT, had a partnership with i2p, it was great.. but this BCX attack thing is getting on my mother fucking nerves now.
http://bullbearanalytics.com/2014/09/23/whats-going-monero/
|
|
|
|
zerocashdev
|
|
September 25, 2014, 02:28:54 AM |
|
Thanks for sharing. It was a good read and seems pretty unbiased.
|
|
|
|
aminorex
Legendary
Offline
Activity: 1596
Merit: 1030
Sine secretum non libertas
|
|
September 25, 2014, 02:51:48 AM |
|
Can a non biased used drop some cliffs for me? Should I sell? Im just a peasant with 30 XMR. I think this coin is LEGIT, had a partnership with i2p, it was great.. but this BCX attack thing is getting on my mother fucking nerves now.
Get used to it. All crypto will always be under threat. You can enjoy the comfort of knowing that the team managing the process has some quite respectable skill at doing so, thus differentiating it from the various one-man shows. XMR is way ahead of where bitcoin was at this age, in every reasonable metric of merit that I have considered - and I have considered many. Selling would be foolish in my opinion. I could do without anonymint's "if P=NP then there are many vulnerabilities" posts. He's pretty accurate and insightful, but he completely misleads most readers, and quite recklessly. Arguing math in a troll thread is asinine. I doubt that he's done more good than harm at this point. All the posturing and threats and chest thumping are just pathetic. I have been there and done that, and I hope I've grown past it. Not much I can do to wean these wet-nappied wailers, though. Pearls would just be trodden anyhow.
|
Give a man a fish and he eats for a day. Give a man a Poisson distribution and he eats at random times independent of one another, at a constant known rate.
|
|
|
Viper1
|
|
September 25, 2014, 02:53:44 AM |
|
Does any one know how long it would take for a TW attack to start to manifest itself?
|
BTC: 1F8yJqgjeFyX1SX6KJmqYtHiHXJA89ENNT LTC: LYAEPQeDDM7Y4jbUH2AwhBmkzThAGecNBV DOGE: DSUsCCdt98PcNgUkFHLDFdQXmPrQBEqXu9
|
|
|
|