Author

Topic: [ANN][DASH] Dash (dash.org) | First Self-Funding Self-Governing Crypto Currency - page 5493. (Read 9723733 times)

legendary
Activity: 1344
Merit: 1001
This is exactly what happened to Blackcoin and WHitecoin. XC is the new Whitecoin - a complete and utter rip off, a shameful clone to snag the greedy - Look where Whitecoin is now....



XC offers encrypted transactions. And the coming xnodes will be clustered and completely decentralised... no master node type structure.

I collated these points from the XC developer of things to look forward to in the future, to build upon our already solid foundation:

The mixer technology will be multi-path across a cluster of xnodes which runs over the encrypted protocol, so it won't be a central server, it would be similar to a distributed cluster, and the data is encapsulated inside that encrypted tunnel to prevent off-the wire sniffing (or off-the-air* for the mobile platform)...  DRK didn't "invent" supernodes or the concept, and while some of concepts are similar and/or overlap, we are on a different path than DRK and as we refine the platform, it will be clear why our design, implementation and infrastructure is superior as we will have autonomous supernodes using PKI that can scale up and out to become a distributed anonymous application platform

This is why the multi-path paradigm network I built back in 2005 still functions to do this day and scaled up to meet the demands of 2014... think back to 2005, granted we had the internet, but not the mobile technology - and that is a key part of my background is mobility that will be leveraged in the android anonymous POS wallet

(http://eprint.iacr.org/2009/385.pdf
http://arxiv.org/ftp/arxiv/papers/1208/1208.3022.pdf)
(The principles for this concept come from a design that I originally leveraged back in 2005,[multi-path paradigm] the system still runs to do this day handling 50k to 100k users per day )

If your waiting for NSA proof anonymity - well that is the goal of our REV 2 release..

No, mixing is only part of it, XC now contains a completely new transaction protocol layer that is encrypted and will be leveraged as a platform for all sorts of concepts.... and it will leverage multi-path paradigm topology (which again is a custom developed concept based on dual-path paradigm)So mixing is just the first application to run on top of this new protocol........ Don't want this key point to get lost --- mixing is just the first application, the list is long and the potential is huge, and since the foundation has been built and deployed, it is now time to build on that foundation.... with some revolutionary concepts and idea's.....

Also the infrastructure for this will support numerous other applications, such as encrypted messaging, P2P exchange..etc granted we can only develop new features so fast, but we are putting the foundation for a multi-use, multi-purpose platform
full member
Activity: 154
Merit: 100
This is exactly what happened to Blackcoin and WHitecoin. XC is the new Whitecoin - a complete and utter rip off, a shameful clone to snag the greedy - Look where Whitecoin is now....

hero member
Activity: 560
Merit: 500
www.OroCoin.co
It seems this would only be a risk if the very last hashing function were compromised. Even then you would need to know how to generate the correct input to the last hashing function using the other hashing functions. It seems inherently more secure to me.
if hash1(x) has collisions, then so does hash2(hash1(x)) and hash4(hash3(... and so on, until we reach the full hashing stack, which also has collisions. Similarly, if hash2, hash3, etc, or hash11 have collisions, then so does X11(x). Simply put, if there's a collision attack for any hash#(x), then the same attack applies to X11(x).

This is the same baseless declaration with more words. You still failed to make the correlation or demonstrate a causation.

Why would this result in what is essentially a cascade failure? Why would an attack on Math A result in a failure of all other Math B to Math K to be Math anymore?

And on top of it, it's still an if...

I think you're fundamentally wrong. Collision on hash A does not break Hash B.
hero member
Activity: 700
Merit: 500
It seems this would only be a risk if the very last hashing function were compromised. Even then you would need to know how to generate the correct input to the last hashing function using the other hashing functions. It seems inherently more secure to me.
Sadly, no. To understand this, consider the collision problem inherent to all hashing functions.

if hash1(x) has collisions, then so does hash2(hash1(x)) and hash4(hash3(... and so on, until we reach the full hashing stack, which also has collisions. Similarly, if hash2, hash3, etc, or hash11 have collisions, then so does X11(x). Simply put, if there's a collision attack for any hash#(x), then the same attack applies to X11(x).

A much better way to implement multiple hashing functions would be to interleave multiple hashes, not chain them.

Basically, X11 is 11 times more vulnerable to collisions then a single algorithm would be, while offering no real-world benefits at all.
full member
Activity: 196
Merit: 100
wget --max-redirect 0 http://www.x11coin.com
--2014-05-29 00:51:03--  http://www.x11coin.com/
Resolving www.x11coin.com... 192.31.186.3
Connecting to www.x11coin.com|192.31.186.3|:80... connected.
HTTP request sent, awaiting response... 301 Moved Permanently
Location: http://www.darkcoin.io [following]

 Grin Grin Grin
ImI
legendary
Activity: 1946
Merit: 1019
Wow I just saw what a free fall. Is there any bad news that triggered that?

no
legendary
Activity: 1918
Merit: 1001
people psyching themselves out as far as the eye can see.

wake me up when the coin's officially released or if the project's abandoned and i have to sell out before .0019 - DUN with the FUD. time to let evan corral a proper dev team and bring it all home.

completley agree!

I was surprised to see how far DRK dropped this morning, its now $7.49, i cant get how ripple is even above DRK!

I wont be buying anymore until it goes below $3, which its safe to assume it will.
newbie
Activity: 56
Merit: 0
Wow I just saw what a free fall. Is there any bad news that triggered that?
hero member
Activity: 658
Merit: 500


Hmm X11 Coin hey, let me check out their website http://www.x11coin.com  Grin

Redirect to Darkcoin website... nice.
I was like


did you just

and you were like
hero member
Activity: 560
Merit: 500
www.OroCoin.co
2) silence = dev working his ass off. Isnt this what we want?
My sheeple customers don't understand this, either... I'm a one-man operation. I don't have time to stroke hair and calm tempers; I'm actually DOING things... Should I just quit and talk to fearful/stupid people all day?
Oh come off it camosoul, you're sitting at your computer, just like I am, yacking away, ROFL  Cheesy Grin  Whatcha doin?
I do design work on here 12 hours a day and run CnC machines the other 4 hours that I'm awake and not eating or pooping. This is in the background and never gets my full attention.

Taking a break today, as you might note from my change of tone. It's not that I don't care anymore, it's that I can't...
full member
Activity: 135
Merit: 100
hero member
Activity: 504
Merit: 500
eidoo wallet
100btc buy wall on mintpal for DRK.
legendary
Activity: 1456
Merit: 1000
newbie
Activity: 23
Merit: 0
people psyching themselves out as far as the eye can see.

wake me up when the coin's officially released or if the project's abandoned and i have to sell out before .0019 - DUN with the FUD. time to let evan corral a proper dev team and bring it all home.
legendary
Activity: 1232
Merit: 1001


Hmm X11 Coin hey, let me check out their website http://www.x11coin.com  Grin

Redirect to Darkcoin website... nice.
legendary
Activity: 1708
Merit: 1049
The whole damn economy is built on selling dumb shit to dumb people who don't need it [...].
Bang on description of what caused DarkCoin to reach this ridiculous unsupported over-valuation.

Yeah, it offers nothing but "lulz" and "asic resistance" compared to doge or ltc.

Anonymity / Privacy is a huge market and it covers real needs that the transparent market cannot.

full member
Activity: 196
Merit: 100
Hold! Don't buy yet! Too high price... Once it's < $3, buy and nail the sheeps who sold!

Hold! Don't buy yet! Too high price... Once it's < $3, buy and nail the sheeps who sold!

lol.. you so funny!

DRK is not another X11 fake anonymous coin.

That's my point! Obviously your subconscious is the funny one here. 
full member
Activity: 196
Merit: 100


Hmm X11 Coin hey, let me check out their website http://www.x11coin.com  Grin
hero member
Activity: 1302
Merit: 502
DRK coiling hard on the 15-min/hourly. Should see a large directional break one way or the other in the next 30-60 minutes as the pattern continues to its apex.
Looks like a breakout downwards is more likely at this point.
Called it...  DRK heading down to a more reasonable valuation.  I'd say a good bottom target is somewhere around $5 over the next bit.

Masternodes are a faulty and horrible way to implement anonymous transactions.  This coin's ideas are fundamentally flawed.

And again... no source code?  SKETCHY.  Why anyone with half a brain is running this wallet is completely beyond me.

This coin is unique and doesn't have any competitors.
It's unique, in that it uses an absolutely horrible insecure means of anonymous transactions.  (And the dev can't even get masternodes working properly!)

Take a look at Monero - proper ring-signature-based anonymous spends that don't rely on centralized nodes.  And a hashing algorithm that actually makes some sense...  

X11 is a horrible idea from a security perspective - chained hashing with multiple algorithms is seriously insecure.  If a pre-image attack against any one of the 11 algorithms is found, then the entire X11 stack can be pre-imaged.  So basically, with every added algo in this chaining method, the PoW gets LESS secure.  Simply stupid.

You're right that DRK is unique and has no direct competitors - you have to have a pretty poor understanding of cryptography to implement something this bad.

Monero has already been covered here.

I'm interested in your second claim as it seems counter intuitive to me, but you may be a better cryptographer than I. If we know that the second hashing function used produces output O, such that H(I(m)), where m is secret, I is the first hashing function, H is the second hashing function, and the second is compromised, wouldn't you still be fine as there are still 9 fully functioning hashes that follow the faulty one? It seems this would only be a risk if the very last hashing function were compromised. Even then you would need to know how to generate the correct input to the last hashing function using the other hashing functions. It seems inherently more secure to me.
full member
Activity: 196
Merit: 100
Hold! Don't buy yet! Too high price... Once it's < $3, buy and nail the sheeps who sold!
Jump to: