Pages:
Author

Topic: [ANN] DERO: DAG + Cryptonote + Bulletproofs + SSL + POW + Smart Contracts - page 24. (Read 123199 times)

newbie
Activity: 33
Merit: 0
I just made a pretty simple point in response to you, and then tried to explain it to b9ron, when he took issue with it.

And I never even came close to saying I only trust code I wrote myself, not sure where you pulled that from.

I inferred you don't trust code you didn't write from this comment:

...
And the only way to change that, is to verify all the code (which as I have also pointed out, does not even suffice entirely, as you are still trusting that the code you see is what was actually running).

You say you don't trust entirely the code that has been leaked/revealed is the same as what is currently running and since the only way to be truly sure of that - without having to trust anyone else - is to have written the code yourself.

I never said that -- nowhere have I suggested that the leaked code is not what is currently running on the network. It does not even make sense to suggest so, given that my point was first made before the leak had even occurred.

You wrote that you had been pushing for source release "for the version of Atlantis which has been out for ~1 month", and I responded by saying it would be a problem if the commit history going back to the last public derosuite commit were not included, and that even if it was, it would still be problematic, given that git is not immutable. Please read again the hypothetical I gave using monero, to better understand my point; we are not concerned here with any code prior to dero's going closed-source, nor with the code in the leak, but rather the fact that there is no way to know what has been running on the network in the interim.

newbie
Activity: 200
Merit: 0
Hi,

If possible, use ssd and fast connection

Hello,
i have downloaded Dero atlantis. and input file Database (~6GB) to folder mainnet. but when i run derod-linux-amd64, it is syncing very slow
https://i.imgur.com/DmFuzC5.png

after ~2 hour, it synced ~100k block.  Huh
jr. member
Activity: 111
Merit: 1
Dero Atlantis is intended to work with SSD.

You can still launch it with the --badgerdb flag on a HDD, but you have to sync it from the first block.
full member
Activity: 420
Merit: 184
I just made a pretty simple point in response to you, and then tried to explain it to b9ron, when he took issue with it.

And I never even came close to saying I only trust code I wrote myself, not sure where you pulled that from.

I inferred you don't trust code you didn't write from this comment:

...
And the only way to change that, is to verify all the code (which as I have also pointed out, does not even suffice entirely, as you are still trusting that the code you see is what was actually running).

You say you don't trust entirely the code that has been leaked/revealed is the same as what is currently running and since the only way to be truly sure of that - without having to trust anyone else - is to have written the code yourself.

full member
Activity: 602
Merit: 134
Hello,
i have downloaded Dero atlantis. and input file Database (~6GB) to folder mainnet. but when i run derod-linux-amd64, it is syncing very slow


after ~2 hour, it synced ~100k block.  Huh
newbie
Activity: 237
Merit: 0

Transparent Dero  pool with 24/7 support

Features:

- Mining to exchange

- Workers

- Adjustable instant payout levels

- Email and telegram notifications

- SSL

jr. member
Activity: 111
Merit: 1
No even if you have all the code with all history of commits, if Monero servers are compromised with binary with a tiny backdoor or an tiny exploit hidden in it, it will be hard to find out unless devs reveal their binary were compromised.

Because even you'll have a fork of project even with the same arch, you could compile and still get a binary code different from official binary.

The only way to check if your binary isn't compromised is to review the code and compile yourself. Until this time you have to trust official binary with the official checksum provided.

Once again you don't trust the binary provided fine, come back further.

You should not be in this conversation as you have no clue what your talking about and in reality you are embarrassing yourself.

There is no fucking such thing as a tiny exploit, Either the code is sound or it is not, Period.
It is Boolean, true or false.

There are 10 types of people in this world, those who understand binary and those who don't
kek, I wonder who is embarrassing himself right now.

They have been tiny exploit hidden in Linux Kernel code in plain view to tons of reviewers and they didn't see it, why ? Because one character was misplaced and worked after compilation, thanks to C.

That character misplaced was identified further like an Elevation Privilege Exploit.

It's like in C if you forget parenthesis in some Macro you gonna fuck the calculus logic :
Code:
#define SQUARE_A(x) x*x
#define SQUARE_B(x) (x)*(x)

Replace x by 2+3, SQUARE_A will fail, not SQUARE_B.

Now try to take a simple project in Go and compile it on different architecture and computer with and without cross compiler, and check the result. Even if you have 1:1 code you will never get the 1:1 binary code.

There was never better place than 127.0.0.1 Grin



legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
No even if you have all the code with all history of commits, if Monero servers are compromised with binary with a tiny backdoor or an tiny exploit hidden in it, it will be hard to find out unless devs reveal their binary were compromised.

Because even you'll have a fork of project even with the same arch, you could compile and still get a binary code different from official binary.

The only way to check if your binary isn't compromised is to review the code and compile yourself. Until this time you have to trust official binary with the official checksum provided.

Once again you don't trust the binary provided fine, come back further.

You should not be in this conversation as you have no clue what your talking about and in reality you are embarrassing yourself.

There is no fucking such thing as a tiny exploit, Either the code is sound or it is not, Period.
It is Boolean, true or false.

There are 10 types of people in this world, those who understand binary and those who don't
full member
Activity: 336
Merit: 100
DERO this coin can be held for a long time. The technical content is still very high. However, the overall market of the encrypted money market is rather sluggish. Investors need to be patient and wait.
newbie
Activity: 33
Merit: 0
The way I read this is that even given the source code you still wouldn't trust that the binaries it produced are the same as the existing compiled binaries* so I am forced to conclude that nothing will satisfy you.

* - because apparently the golang compiler does not create bit-identical output when run on different machines despite bit-identical sources.

That would be about the size of it, though I already wrote as much in my initial reply to you on this topic. It should be a fairly uncontroversial concept (not sure why b9ron felt the need to push back), though not perhaps an obvious one, so I mentioned it in order to help readers better understand exactly where they are putting their trust.

It's not a controversial concept, I just wonder what is the point of arguing about all the ways the source code could be compromised when, by your own admission, you don't trust any code you didn't write yourself? It's a bit of an ontological conundrum, really.

I just made a pretty simple point in response to you, and then tried to explain it to b9ron, when he took issue with it.

And I never even came close to saying I only trust code I wrote myself, not sure where you pulled that from.
newbie
Activity: 45
Merit: 0


There is absolutely no evidence that Dero is a "scam". It would be a truly bizarre kind of scam if there were.

Agatha Christie ??

Dero is the best detective movie 2018 ...
I like to watch it
newbie
Activity: 15
Merit: 0
This is all ludicrous (if you don't like Dero, don't buy it; let people make their own decisions and take responsibility for them; and stop repeating tired FUD tropes!), and I don't know why I'm feeding the trolls, but...

Do you need the source code of your bank before you can have expectations of how it works?

Ok comparing Dero to federal licensed and insured banks is bordering on stupidity.

This misses the point. The point is that you don't need their source code in order to trust the system (decentralized or not). The thing you need is the protocol. Almost all of what you need to write your own node software is public (and with the recent leak, you could easily figure out the rest). CryptoNote guarantees that no unmined coins were created, or double-spent, and so if you can validate the blockchain, then you can be confident that none of this bizarre FUD holds water.

There is absolutely no evidence that Dero is a "scam". It would be a truly bizarre kind of scam if there were.
full member
Activity: 420
Merit: 184
The way I read this is that even given the source code you still wouldn't trust that the binaries it produced are the same as the existing compiled binaries* so I am forced to conclude that nothing will satisfy you.


* - because apparently the golang compiler does not create bit-identical output when run on different machines despite bit-identical sources.

That would be about the size of it, though I already wrote as much in my initial reply to you on this topic. It should be a fairly uncontroversial concept (not sure why b9ron felt the need to push back), though not perhaps an obvious one, so I mentioned it in order to help readers better understand exactly where they are putting their trust.

It's not a controversial concept, I just wonder what is the point of arguing about all the ways the source code could be compromised when, by your own admission, you don't trust any code you didn't write yourself? It's a bit of an ontological conundrum, really.

full member
Activity: 675
Merit: 100
Still waiting on team info.  It's never going to happen.
full member
Activity: 675
Merit: 100
Do you need the source code of your bank before you can have expectations of how it works?

Ok comparing Dero to federal licensed and insured banks is bordering on stupidity.
sr. member
Activity: 840
Merit: 251

Scam devs are sometimes even too dumb to pull off a scam. And believe it or not but some of them would even scam for a couple of dollars.
In this regard, of course everyone has a different appetite. Ranging from a couple of dollars to several million are now trading scammers. But many people do not want to learn to recognize scams, all want to just have a lot of money without doing anything.

Scamming several millions is risky as you need to do a lot of things that might leave a trail. Scamming for a few thousand dollars and do that again and again probably is "safe".
newbie
Activity: 33
Merit: 0
...Because the only functional difference between dero and this hypothetical is that the unknown entity is captain, so it comes down 100% to your trust in him, not in the code, not in the blockchain, not in anything else.

And the only way to change that, is to verify all the code (which as I have also pointed out, does not even suffice entirely, as you are still trusting that the code you see is what was actually running).

The way I read this is that even given the source code you still wouldn't trust that the binaries it produced are the same as the existing compiled binaries* so I am forced to conclude that nothing will satisfy you.


* - because apparently the golang compiler does not create bit-identical output when run on different machines despite bit-identical sources.

That would be about the size of it, though I already wrote as much in my initial reply to you on this topic. It should be a fairly uncontroversial concept (not sure why b9ron felt the need to push back), though not perhaps an obvious one, so I mentioned it in order to help readers better understand exactly where they are putting their trust.
full member
Activity: 420
Merit: 184
...Because the only functional difference between dero and this hypothetical is that the unknown entity is captain, so it comes down 100% to your trust in him, not in the code, not in the blockchain, not in anything else.

And the only way to change that, is to verify all the code (which as I have also pointed out, does not even suffice entirely, as you are still trusting that the code you see is what was actually running).

The way I read this is that even given the source code you still wouldn't trust that the binaries it produced are the same as the existing compiled binaries* so I am forced to conclude that nothing will satisfy you.


* - because apparently the golang compiler does not create bit-identical output when run on different machines despite bit-identical sources.
jr. member
Activity: 111
Merit: 1
No even if you have all the code with all history of commits, if Monero servers are compromised with binary with a tiny backdoor or an tiny exploit hidden in it, it will be hard to find out unless devs reveal their binary were compromised.

Because even you'll have a fork of project even with the same arch, you could compile and still get a binary code different from official binary.

The only way to check if your binary isn't compromised is to review the code and compile yourself. Until this time you have to trust official binary with the official checksum provided.

Once again you don't trust the binary provided fine, come back further.
newbie
Activity: 33
Merit: 0
hey Serena  Huh Huh Huh
its very obvious , oh wait guess youll tell us its not .

SURE  Wink

I think your tinfoil hat needs adjustment.


At least your commits speak for themselves. 

Mr Expert Blockchain Grin

That's just a cute way of yet again avoiding the point; can it be long now before your argument becomes accusing me of being mojo and/or serena? If you didn't mean to refute me, you should not have responded. But you did, and through your responses we have so far learned:

a) You have indicated that it is fine for the community to only have the ability to make pull requests, but not have any actual control over the project.
b) You have characterized dero as unfinished alpha stage software, and intimated that people should not use it like a bank, until "some years when everything will be stable with 0 risks and truly Open Source."
c) You demonstrate by point (b) that you do not understand that the blockchain is an immutable record, and that what happens with it now bears on whether people should trust it years from now.
d) You demonstrate by point (c) that you do not understand my initial point, which regarded the importance of being able to verify the code that was running on the network between the time the source was closed, and now.

This is what is meant when I say you have no understanding of blockchain; this, though it obviously escapes you, is what others can see by your words. And that rather than either agree or refute, you should instead point to a repo where I have forked a few projects, as though it says anything, rather than address the points themselves, says volumes.

The irony is that where I have not actually argued here against using or getting involved with dero, you yourself have inadvertently and voluntarily provided a few decent reasons why a person might do well to avoid it.

What are you talking about apple and orange once again ?

Yeah thanks, I know what's a Blockchain, is just a Data Structure a f*cking hashed linked list using hash instead of pointer... oh by the way, Dero isn't anymore a Blockchain but a DAG of hashed blocks.
My point was the code will be completely accessible in the future when the product will be ready not now in the early stage and if you can't deal with it, come back further.

The complete history of commit won't be publicly available until Dero Core Devs reveals their identity, that means it could probably never happen.

Once again bank doesn't trust any Blockchain Tech until they can control it or rewrite it from scratch.

Let's try this another way. Imagine that everyone who ran a monero node downloaded it in binary form from a specific server, and that you woke up tomorrow to news reports that this server had been found to have been compromised for the past two months -- the binaries had been replaced, and had been built by an unknown entity, using unknown code. The monero devs then recompiled from the current public sources, and all nodes updated to new binaries.

Should this affect people's trust in monero? Or should they say, oh well see the blockchain is a hashed linked list, and the source is public for the version now running, so everything is just fine, like you are doing for dero? Because the only functional difference between dero and this hypothetical is that the unknown entity is captain, so it comes down 100% to your trust in him, not in the code, not in the blockchain, not in anything else.

And the only way to change that, is to verify all the code (which as I have also pointed out, does not even suffice entirely, as you are still trusting that the code you see is what was actually running).
Pages:
Jump to: