Bitcoin Forum
May 11, 2024, 06:39:32 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 »
  Print  
Author Topic: Zerovert - First Truly & Only Anonymous Coin with Zerocoin | Mandatory Upgrade !  (Read 50926 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
zerovert (OP)
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
November 05, 2014, 04:17:13 AM
 #21

IIRC... Vert used Parallax or Monocle as a testnet for stealth addresses, is this going to be a testbed for future implementation of ZK anon into Vert? if so awesome but I agree.. why not make it a standalone coin...
*edit the "why not make a different coin" is slightly answered above


Zerovert won't integrate with Vert in the future because Vertcoin direction is ASIC resistant, and protecting user's privacy with SX.
Zerovert will become a sidechain coin of Vertcoin in the future, and Zerovert direction is focusing on anonymity.
1715409572
Hero Member
*
Offline Offline

Posts: 1715409572

View Profile Personal Message (Offline)

Ignore
1715409572
Reply with quote  #2

1715409572
Report to moderator
1715409572
Hero Member
*
Offline Offline

Posts: 1715409572

View Profile Personal Message (Offline)

Ignore
1715409572
Reply with quote  #2

1715409572
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715409572
Hero Member
*
Offline Offline

Posts: 1715409572

View Profile Personal Message (Offline)

Ignore
1715409572
Reply with quote  #2

1715409572
Report to moderator
TrangLee
Full Member
***
Offline Offline

Activity: 210
Merit: 100


Living the dream


View Profile
November 05, 2014, 04:21:33 AM
 #22

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Him and longnshort are known SDC trolls. Your coin claims to steal their holy grail. ZK-Snark implementation. Oddy When I bring up this same question they yelled fud and such. I am very sure though that he is referring quite rightly about 2 known ZK-Snark (ZeroCoin/Cash) issues. 1st a major one. How do you deal with the issue of trust? Simply how can you prove you deleted the key and supporting code that creates the coins? If you didn't and or made a copy you can mint as many coins as you damn well please. Huge 800lbs gorilla that. Now for the giant pink elephant in the same room. Blockchain bloat. Snarks bload as much if not worse than rig sigs. If this scaled up to say darkcoin in usage the network will come to a grinding halt. Zk-snarks use ten of thousands more bytes than a normal BTC TX. It's rare I agree with these guys but in this case they are right to ask these very serious questions.

TrangLee
Full Member
***
Offline Offline

Activity: 210
Merit: 100


Living the dream


View Profile
November 05, 2014, 04:24:19 AM
 #23

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own ann (old non mod and new moderated ones) as you are about to get the fud shit storm of a life time you have never imagined.  

00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:24:42 AM
 #24

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Him and longnshort are known SDC trolls. Your coin claims to steal their holy grail. ZK-Snark implementation. Oddy When I bring up this same question they yelled fud and such. I am very sure though that he is referring quite rightly about 2 known ZK-Snark (ZeroCoin/Cash) issues. 1st a major one. How do you deal with the issue of trust? Simply how can you prove you deleted the key and supporting code that creates the coins? If you didn't and or made a copy you can mint as many coins as you damn well please. Huge 800lbs gorilla that. Now for the giant pink elephant in the same room. Blockchain bloat. Snarks bload as much if not worse than rig sigs. If this scaled up to say darkcoin in usage the network will come to a grinding halt. Zk-snarks use ten of thousands more bytes than a normal BTC TX. It's rare I agree with these guys but in this case they are right to ask these very serious questions.

I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.
00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:26:08 AM
 #25

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own ann (old non mod and new moderated ones) as you are about to get the fud shit storm of a life time you have never imagined.  

hypocritcal how? IT doesn;t use a zerocoin implementation. This has been stated numerous times. The reason it doesn't use Zerocoin implementation is because of the issues you mentioned in your post.
zerovert (OP)
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
November 05, 2014, 04:27:21 AM
 #26

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge
LongAndShort
Legendary
*
Offline Offline

Activity: 1078
Merit: 1050


View Profile
November 05, 2014, 04:28:30 AM
 #27

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own as you are about to get the fud hit storm of a life time you have never imagined. 

Buzz off kid, adults are talking again. Go research what you are implying its ridiculous! You are clearly quoting people who haven't the slightest clue what they're talking about. I can see that clearly because you haven't the fientest clue on how to string it all together properly! Give up trying you look stupid..Yet again!
tx42
Hero Member
*****
Offline Offline

Activity: 742
Merit: 500



View Profile
November 05, 2014, 04:30:11 AM
 #28


A quick trip to wikipedia shows that the zero cash protocol is better for bloat.

Why not claim you are using zero cash?

█    █     ██    ███     ███    ████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████     ███     ███    ██     █    █
..EARN FREE BREAKOUT COINS SIG CAMPAIGN LIVE !!
█    █     ██    ███     ███    ████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████     ███     ███    ██     █    █
00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:30:41 AM
 #29

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Thanks for the response.  Good luck with the launch.

Oh are you launching tomorrow with ZK enabled Tx's or is this something coming in the future?

TrangLee
Full Member
***
Offline Offline

Activity: 210
Merit: 100


Living the dream


View Profile
November 05, 2014, 04:30:58 AM
 #30



I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.

Nope only you and your SDC buddies that troll anything even remotely being a threat to SDC. You where at groud zero leaking chat rolls to start the Blocknet smear campaign proven to be planned by the huge bagholding SDC whales like Boh / pookielax31, TrollsRyoce / coolstoryteller and longnshort. Those are the guys and their shills I call out and will continue to do so every time I see you all fudding and trolling other coins and projects. It's easy to see just look at post histories on those guys.

 

00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:33:36 AM
 #31



I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.

Nope only you and your SDC buddies that troll anything even remotely being a threat to SDC. You where at groud zero leaking chat rolls to start the Blocknet smear campaign proven to be planned by the huge bagholding SDC whales like Boh / pookielax31, TrollsRyoce / coolstoryteller and longnshort. Those are the guys and their shills I call out and will continue to do so every time I see you all fudding and trolling other coins and projects. It's easy to see just look at post histories on those guys.

 

no smear campaign has been proven, that is merely conjecture. But please continue on.

And can you clarify that you are in fact attacking me with your claims?
zerovert (OP)
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
November 05, 2014, 04:34:08 AM
 #32


A quick trip to wikipedia shows that the zero cash protocol is better for bloat.

Why not claim you are using zero cash?


We implemented Zerocoin[1] not Zerocash[2].

[1] http://zerocoin.org/media/pdf/ZerocoinOakland.pdf
[2] http://zerocash-project.org/media/pdf/zerocash-oakland2014.pdf


how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Thanks for the response.  Good luck with the launch.

Oh are you launching tomorrow with ZK enabled Tx's or is this something coming in the future?



We will launch with ZK enabled Tx's.
EmilioMann
Legendary
*
Offline Offline

Activity: 2184
Merit: 1028


#mitandopelomundo


View Profile
November 05, 2014, 04:35:03 AM
 #33

how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

not waste time giving explanations to these trolls and fudsters from shadowcoin, they will destroy your reputation, steal your ideas and try to launch before.
00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:35:09 AM
 #34


A quick trip to wikipedia shows that the zero cash protocol is better for bloat.

Why not claim you are using zero cash?


We implemented Zerocoin[1] not Zerocash[2].

[1] http://zerocoin.org/media/pdf/ZerocoinOakland.pdf
[2] http://zerocash-project.org/media/pdf/zerocash-oakland2014.pdf


how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Thanks for the response.  Good luck with the launch.

Oh are you launching tomorrow with ZK enabled Tx's or is this something coming in the future?



We will launch with ZK enabled Tx's.

look forward to it, if it really is true then i'll pick some up. Good luck.
TrangLee
Full Member
***
Offline Offline

Activity: 210
Merit: 100


Living the dream


View Profile
November 05, 2014, 04:36:23 AM
 #35



We will launch with ZK enabled Tx's.

Congrats on being the worlds 1st coin to do it. I will buy big into this coin. It will be epic if in fact it works as stated!

00Smurf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


View Profile
November 05, 2014, 04:37:16 AM
 #36



We will launch with ZK enabled Tx's.

Congrats on being the worlds 1st coin to do it. I will buy big into this coin. It will be epic if in fact it works as stated!

nothing is the worlds first till proven.
bangomatic
Legendary
*
Offline Offline

Activity: 1246
Merit: 1000

ARK Team likes to ban and delete posts in reddit.


View Profile
November 05, 2014, 04:42:18 AM
 #37

Cant wait til this hits the exchanges! Im getting in early...
EmilioMann
Legendary
*
Offline Offline

Activity: 2184
Merit: 1028


#mitandopelomundo


View Profile
November 05, 2014, 04:45:21 AM
Last edit: November 05, 2014, 05:30:09 AM by EmilioMann
 #38



We will launch with ZK enabled Tx's.

Congrats on being the worlds 1st coin to do it. I will buy big into this coin. It will be epic if in fact it works as stated!

nothing is the worlds first till proven.

^^ envy feelings

why LandShortDick shut up?
zerovert (OP)
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
November 05, 2014, 04:51:31 AM
 #39



We will launch with ZK enabled Tx's.

Congrats on being the worlds 1st coin to do it. I will buy big into this coin. It will be epic if in fact it works as stated!

Thank you, and for helping us against the trolls.
TrangLee
Full Member
***
Offline Offline

Activity: 210
Merit: 100


Living the dream


View Profile
November 05, 2014, 05:02:51 AM
 #40



We will launch with ZK enabled Tx's.

Congrats on being the worlds 1st coin to do it. I will buy big into this coin. It will be epic if in fact it works as stated!

Thank you, and for helping us against the trolls.

My pleasure. I like you backgrounds that you posted and you talk intelligently enough to be believed. If this works like you say I will be your loyalist supporter and I know many others like Bagomatic and EmilioMann will as well. They like myself have heard the cry of Zerocoin/cash zk-snarks etc for a very long time. Smiley

Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!