Pages:
Author

Topic: ✅ ✅ [ANN] CryptoTask - 1st Fully Scalable Decentralized Freelancing Market ✅ ✅ - page 56. (Read 47841 times)

full member
Activity: 238
Merit: 100
I understood. Anyway, I do not think so. 20,000 dollars is the teacher's annual salary, but if a person works with powerful design platforms, then this can be his monthly salary

Yes, but for this money a specialist for a month will provide the final product to the customer, which will be collected, quality, ready for operation!

I agree, it costs such money. But the sense of the bounty program is also in the fact that in the presence of small tasks for promotion and SMM do everything possible to encourage their reviewers
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
I understood. Anyway, I do not think so. 20,000 dollars is the teacher's annual salary, but if a person works with powerful design platforms, then this can be his monthly salary

Yes, but for this money a specialist for a month will provide the final product to the customer, which will be collected, quality, ready for operation!
full member
Activity: 644
Merit: 103
I understood. Anyway, I do not think so. 20,000 dollars is the teacher's annual salary, but if a person works with powerful design platforms, then this can be his monthly salary

In the case of the crypto currency, the market is developing a little differently. In this project there is such a moment as a guaranteed growth of the crypto currency at certain stages
newbie
Activity: 9
Merit: 0
In what countries do you plan to develop this platform?
full member
Activity: 238
Merit: 100
I understood. Anyway, I do not think so. 20,000 dollars is the teacher's annual salary, but if a person works with powerful design platforms, then this can be his monthly salary
full member
Activity: 644
Merit: 103
Developers spend only 0.4% of funds to Bounty Campaign
Do not you think that this is too little? Considering that 50 percent of the funds are laid for development.

That's 20,000 dollars. For this amount, one hundred freelancers could be hired, but since not all of them are interested in earning a crypto currency, it does not have a sense...
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
Developers spend only 0.4% of funds to Bounty Campaign
Do not you think that this is too little? Considering that 50 percent of the funds are laid for development.

this percentage is taken from the entire volume of the fund, that is, 0.4 to 5 million dollars. Count yourself, it's not a little. For the company's bounty, the sum would be 2 times smaller
full member
Activity: 238
Merit: 100
Developers spend only 0.4% of funds to Bounty Campaign
Do not you think that this is too little? Considering that 50 percent of the funds are laid for development.
full member
Activity: 644
Merit: 103
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system

The power of dedicated servers will not allow organizing an extensive ddos attack on the project server. You're wrong, the project is well protected

Since all formulas are publicly available, this will give more opportunities for hackers to get to the source code of the system and delete the database as it was with the Etherium

The developers did not put all the formulas on the network that the system uses, it's obvious. It may even be that the system uses very different formulas, and these are published for diverting the eyes

I will remain in my opinion that if the burglars control a significant part of the processing power of the network, they will be able to take control of the system because of the shortcomings in the protection

This means that even if the attacker controls 50% of the mining power, the combined attack chance
does not increase more than twice compared to the pure stake attack. - thats what the developers answer to u!
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system

The power of dedicated servers will not allow organizing an extensive ddos attack on the project server. You're wrong, the project is well protected

Since all formulas are publicly available, this will give more opportunities for hackers to get to the source code of the system and delete the database as it was with the Etherium

The developers did not put all the formulas on the network that the system uses, it's obvious. It may even be that the system uses very different formulas, and these are published for diverting the eyes

I will remain in my opinion that if the burglars control a significant part of the processing power of the network, they will be able to take control of the system because of the shortcomings in the protection
full member
Activity: 644
Merit: 103
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system

The power of dedicated servers will not allow organizing an extensive ddos attack on the project server. You're wrong, the project is well protected

Since all formulas are publicly available, this will give more opportunities for hackers to get to the source code of the system and delete the database as it was with the Etherium

The developers did not put all the formulas on the network that the system uses, it's obvious. It may even be that the system uses very different formulas, and these are published for diverting the eyes
full member
Activity: 644
Merit: 103
developers think that:

80% of currency will be sold in crowdsale
 
20% will be deferred for founders and associates

From what resourses they are find that numbers?

Take this as a prognosis for a football match. The currency is a flexible thing. It is able to adjust to the situation and has the property of being leveled after some time interval
full member
Activity: 238
Merit: 100
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system

The power of dedicated servers will not allow organizing an extensive ddos attack on the project server. You're wrong, the project is well protected

Since all formulas are publicly available, this will give more opportunities for hackers to get to the source code of the system and delete the database as it was with the Etherium
full member
Activity: 644
Merit: 103
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system

The power of dedicated servers will not allow organizing an extensive ddos attack on the project server. You're wrong, the project is well protected
full member
Activity: 238
Merit: 100
developers think that:

80% of currency will be sold in crowdsale
 
20% will be deferred for founders and associates

From what resourses they are find that numbers?
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
This will not give one hundred percent guaranteed protection against hacking by dedicated servers. In my opinion, it is better to work on the protection of the system
full member
Activity: 644
Merit: 103
Mathematical cryptographic formulas are not a bad solution, but it does not save 100% of attacks on the system, including if ddos comes from a cell with a predominant percentage of processing power - cryptography will not save

Now let us consider an attack where the attacker controls a significant percentage of mining power (
p A
) as well, and can thus decide whether to broadcast a mined block.
quote from the whitepaper. Developers team is not silly, it is envisaged
sr. member
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
Mathematical cryptographic formulas are not a bad solution, but it does not save 100% of attacks on the system, including if ddos comes from a cell with a predominant percentage of processing power - cryptography will not save
full member
Activity: 644
Merit: 103
I especially like the algorithm for protecting against potential attacks. A very unusual approach in our time to solve the problem of information security

And what is so special about it? I thought now all the systems on the block-chain use this algorithm? Is it all about mathematics?

Yes, the fact of the matter is that the mathematical formulas that are used to encrypt information on this resource are unique
Pages:
Jump to: