If you want an example of how Turing complete works, load up a peer to peer sharing program and download a bunch of .MOV files and run them. I GUARANTEE that you will get a virus. That's because Quicktime movie files are Turing complete. This is why mkv, mpeg, mpg and avi, while not impervious, are much much safer to download. If you want to invest, mine, and run contracts at the risk of losing everything then go ahead. We will never know for sure how secure Ether is going to be until post release, so asking for money without proof of security is another red flag.
I too would like to know this. Turing complete is dangerous and highly insecure.
You are calling every turing complete programming language out there dangerous and highly insecure. You do not seem to know what you are talking about.
No I am not, I am talking within the context of a currency backed by people's hard earned money. Do not put words in my mouth. Hackers are already willing to inject malicious software into non monetary applications, I can only imagine what they would come up with if they found an application that is Turing complete, is used to handle millions of dollars, and thanks to the anonymity of crypto, have no chance of being caught. You are diffusing a valid question with irrelevant and illogical retorts. I'd like a short summary of the methods used to prevent people from doing this. What systems are in place to increase security for the end user?
So far as I can tell the security is based on the blockchain and the POW that will be used in roughly the same way bitcoin does this. The big difference is that ethereum scripts are more powerful. I dont see a reason why this introduces new security considerations, but it is certainly a valid point to consider. And still I say this based on my understanding of the model of ethereum and not on the implementation.