Author

Topic: [ANN][DASH] Dash (dash.org) | First Self-Funding Self-Governing Crypto Currency - page 6412. (Read 9723858 times)

hero member
Activity: 518
Merit: 521
I was forced to change my tone because Evan cleverly used collateral payments to break anonymity in terms of giving the identity to the random Masternode, but anonymity is regained probabilistically as we already explained upthread.

So if something works, I can't be an engineer if I say it doesn't work.

My summary stated caveats and issues notwithstanding.

I hope slyA will allow me one slight transgression. I want to be on the record as stating I had already designed a similar algorithm that gains anonymity probabilistically (which is why I was immediately familiar with LimLim's points), so Evan came up with something very similar independently. But mine has some unique differences. But mine isn't applicable to the random Masternode concept, so I am not going to share it because it couldn't be used without drastically changing Darksend. So far I don't see anything I can extract from it to make Darksend better, although I feel our discussions helped clarify for both Evan and myself so I hope we both appreciate the exchanges. Now I reiterate, AnonyMint will not be announcing anything with this. So please don't get negative on me.

Evan when did you conceive of yours? Mine was written down in November 2013.
hero member
Activity: 546
Merit: 500
01100100 01100001 01110011 01101000
Some people are comparing scrypt coins to Darkcoin in term of turnover when the profit (turnover - costs e.g. the electrical bill) is the key element.
hero member
Activity: 532
Merit: 500
The summary thus far of my analysis of Darksend is that Evan has put into place adequate mechanisms to disincentivize theft of the collateral payments and to disincentivize Sybil attacking the inputs to a Darksend with legitimate Darksends.

The weaknesses (w.r.t. to anonymity) are that Masternodes can be purchased and if the adversary has too many of them, they can reduce your probability of anonymity unless you send your funds through dozens of Darksends between each receipt or spend transaction. If the adversary controlled 90% of the Masternodes, it would nearly impossible to be anonymous more than say 99% of the time, i.e. 1 in 100 of your spends would lose anonymity. Evan argues that attaining a lot of Masternodes is too expensive. Well probably so for the common criminal, but I am not convinced that is so for the NSA.

1 in 100 may not sound bad, but remember that loss of anonymity tends to domino cascade (for the holistic reasons I pointed out in my reply to LimLims on this page). And that is for the person who is extremely diligent to do dozens of Darksends between each spend. Most users are not so perfectionist. So for them anonymity could drop significantly if the adversary has such huge resources.

The other weakness is that it is not yet mandatory to use an IP mixer such as Tor with Darksend, and if not all of the participants to the Darksend are obfuscating their IP, then the anonymity probability declines. Note that even if Darksend makes Tor mandatory, Tor is not the best we can do for an IP mixer. It is unknown how effective Tor is. Some might estimate 80 - 95%. Others might pull 50% out of their arse. I really don't know, but I don't trust Tor entirely. This combined with say 20% of the Masternodes compromised (and a little bit of normal human error on your part such as forgetting to send dozens of Darksends for each coin your receive) can also make it unrealistic to repeatedly sustain very military grade strength of anonymity. (But who said you wanted military grade assurance? Some do, some may not require it)

Darksend has anonymity. Darkcoin is an anonymity coin. The strength of the anonymity depends on the resources and resolve of the adversary versus the Darkcoin user.

I am still trying to think of suggestions to improve it.


In recent posts you seem to have changed the tone of your suggestions and I think that's great. You may be a paranoid tinfoil hat wearing nsa fearing lunatic, but you definitely add to the discussion. I don't claim to know enough about cryptocurrencies to know if you're helping or not but it looks like you are so thanks.
full member
Activity: 154
Merit: 100
The crypto in Zerocash is really neat (quadratic span programs, et al). But both Zerocash and Zerocoin are not immune if ever the NSA (or any one) has a quantum computer because they use bilinear pairings and double discrete logarithm trapdoors respectively which are factorable with Shor's algorithm. We would need instead Zero Knowledge employing a McEliece or Niederreiter binary Goppa codes style trapdoor instead, which so far remain theoretically immune to complexity reduction with a quantum algorithm.

Remember this. It is impossible to do Zero Knowledge Proof without a trap door. Thus a one-way hash (like SHA256) can't be used to do ZKP. Zerocash uses hashes but these are not the trapdoor.

I could explain this and Fiat-Shamir's transform to the average reader here, but I don't have time. And I think they don't really need to know.

Our upgraded model now offers balanced strategic programming. At base level, this just comes down to regenerated transitional matrix approaches.

It's time that we became uber-efficient with our four-dimensional strategic processing.

Come on Only geeks stuck in the 90s still go for millennial administrative hardware.

Is it still April fools where you are?  Grin

(readers mine was not technobabble, really  Embarrassed)

I know your wasnt, It just sounded funny to me. I'm a computer geek but that was more than I know about. Tongue At least Evan understood....
legendary
Activity: 1456
Merit: 1000
Not too technobabbly for most of us.

But the NSA, GCHQ, Satoshi and a few of the devs would be able to keep up. That's all that matters.

full member
Activity: 322
Merit: 105
The crypto in Zerocash is really neat (quadratic span programs, et al). But both Zerocash and Zerocoin are not immune if ever the NSA (or any one) has a quantum computer because they use bilinear pairings and double discrete logarithm trapdoors respectively which are factorable with Shor's algorithm. We would need instead Zero Knowledge employing a McEliece or Niederreiter binary Goppa codes style trapdoor instead, which so far remain theoretically immune to complexity reduction with a quantum algorithm.

Remember this. It is impossible to do Zero Knowledge Proof without a trap door. Thus a one-way hash (like SHA256) can't be used to do ZKP. Zerocash uses hashes but these are not the trapdoor.

I could explain this and Fiat-Shamir's transform to the average reader here, but I don't have time. And I think they don't really need to know.

...uhh, yes.  Well, I liek boobies.  So I got that goin' for me.
hero member
Activity: 518
Merit: 521
The crypto in Zerocash is really neat (quadratic span programs, et al). But both Zerocash and Zerocoin are not immune if ever the NSA (or any one) has a quantum computer because they use bilinear pairings and double discrete logarithm trapdoors respectively which are factorable with Shor's algorithm. We would need instead Zero Knowledge employing a McEliece or Niederreiter binary Goppa codes style trapdoor instead, which so far remain theoretically immune to complexity reduction with a quantum algorithm.

Remember this. It is impossible to do Zero Knowledge Proof without a trap door. Thus a one-way hash (like SHA256) can't be used to do ZKP. Zerocash uses hashes but these are not the trapdoor.

I could explain this and Fiat-Shamir's transform to the average reader here, but I don't have time. And I think they don't really need to know.

Our upgraded model now offers balanced strategic programming. At base level, this just comes down to regenerated transitional matrix approaches.

It's time that we became uber-efficient with our four-dimensional strategic processing.

Come on Only geeks stuck in the 90s still go for millennial administrative hardware.

Is it still April fools where you are?  Grin

(readers mine was not technobabble, really  Embarrassed)
full member
Activity: 154
Merit: 100
The crypto in Zerocash is really neat (quadratic span programs, et al). But both Zerocash and Zerocoin are not immune if ever the NSA (or any one) has a quantum computer because they use bilinear pairings and double discrete logarithm trapdoors respectively which are factorable with Shor's algorithm. We would need instead Zero Knowledge employing a McEliece or Niederreiter binary Goppa codes style trapdoor instead, which so far remain theoretically immune to complexity reduction with a quantum algorithm.

Remember this. It is impossible to do Zero Knowledge Proof without a trap door. Thus a one-way hash (like SHA256) can't be used to do ZKP. Zerocash uses hashes but these are not the trapdoor.

I could explain this and Fiat-Shamir's transform to the average reader here, but I don't have time. And I think they don't really need to know.

Our upgraded model now offers balanced strategic programming. At base level, this just comes down to regenerated transitional matrix approaches.

It's time that we became uber-efficient with our four-dimensional strategic processing.

Come on Only geeks stuck in the 90s still go for millennial administrative hardware.
full member
Activity: 280
Merit: 100
The Future Of Work
I am a little confused at this point. I don't know what I missed. Could somebody give me a raw explanation? Because, I see:
- an interesting coin concept (it came with a unique anti-ASIC hashing algo, new diff retarget algo, and here is the DarkSend beta, etc)
- an active developer
- an active bitcointalk forum community (several hundreds of pages / months)
- DRK trading pairs on several big exchanges

I don't know, I'm mining because I'm lazy and I don't know what else to mine.  But I'm stupid, not everyone can be stupid like me?  LOL, so who knows?

Also, maybe your settings are not quite right?  Lowering the intensity sometimes increases actual hash rate, you  might want to try that?
hero member
Activity: 518
Merit: 521
Definitely make the cost vs. level of anonymity calculation. Wise.
full member
Activity: 280
Merit: 100
The Future Of Work
...cut...
It doesn't need to be NSA-proof from day one (don't even know if that's even possible with their resources) but a plan with gradual introduction of further layers and features could work. But since we've not reached final deployment, it's good that ideas are thrown around so that it can be the best it can get in the core functionality without having to rewrite the main code to something different. ...cut...

Two of the biggest problems Darkcoin faces right now are:

1.  We need to get a working DarkSend completed.
2.  The more layers we stack on DarkSend, the bulkier the blockchain.

Finally, it is impossible to make it 100% anonymous.  What you do is increase the improbability that anything can be traced basically due to the cost involved.

Besides, DarkSend doesn't have to be "Completed" it can evolve, with people being able to use it as it does evolve.  In fact, that's probably the healthiest way for the development of the coin to go.  Trying to make things so complex, with such a reduction in rewards (0.000001% more anonymity) invites bugs that will be super hard to detect.  Lets build on a great foundation.  I think it's the wisest approach.
hero member
Activity: 518
Merit: 521
The crypto in Zerocash is really neat (quadratic span programs, et al). But both Zerocash and Zerocoin are not immune if ever the NSA (or any one) has a quantum computer because they use bilinear pairings and double discrete logarithm trapdoors respectively which are factorable with Shor's algorithm. We would need instead Zero Knowledge employing a McEliece or Niederreiter binary Goppa codes style trapdoor instead, which so far remain theoretically immune to complexity reduction with a quantum algorithm.

Remember this. It is impossible to do Zero Knowledge Proof without a trap door. Thus a one-way hash (like SHA256) can't be used to do ZKP. Zerocash uses hashes but these are not the trapdoor.

I could explain this and Fiat-Shamir's transform to the average reader here, but I don't have time. And I think they don't really need to know.
hero member
Activity: 518
Merit: 521
The summary thus far of my analysis of Darksend is that Evan has put into place adequate mechanisms to disincentivize theft of the collateral payments and to disincentivize Sybil attacking the inputs to a Darksend with legitimate Darksends.

The weaknesses (w.r.t. to anonymity) are that Masternodes can be purchased and if the adversary has too many of them, they can reduce your probability of anonymity unless you send your funds through dozens of Darksends between each receipt or spend transaction. If the adversary controlled 90% of the Masternodes, it would nearly impossible to be anonymous more than say 99% of the time, i.e. 1 in 100 of your spends would lose anonymity. Evan argues that attaining a lot of Masternodes is too expensive. Well probably so for the common criminal, but I am not convinced that is so for the NSA.

1 in 100 may not sound bad, but remember that loss of anonymity tends to domino cascade (for the holistic reasons I pointed out in my reply to LimLims on this page). And that is for the person who is extremely diligent to do dozens of Darksends between each spend. Most users are not so perfectionist. So for them anonymity could drop significantly.

The other weakness is that it is not yet mandatory to use an IP mixer such as Tor with Darksend, and if not all of the participants to the Darksend are obfuscating their IP, then the anonymity probability declines. Note that even if Darksend makes Tor mandatory, Tor is not the best we can do for an IP mixer. It is unknown how effective Tor is. Some might estimate 80 - 95%. Others might pull 50% out of their arse. I really don't know, but I don't trust Tor entirely. This combined with say 20% of the Masternodes compromised (and a little bit of normal human error on your part such as forgetting to send dozens of Darksends for each coin your receive) can also make it unrealistic to repeatedly sustain very military grade strength of anonymity. (But who said you wanted military grade assurance? Some do, some may not require it)

Darksend has anonymity. Darkcoin is an anonymity coin. The strength of the anonymity depends on the resources and resolve of the adversary versus the Darkcoin user.

I am still trying to think of suggestions to improve it.

I think the current state of things will be great for a V1 release, however what about the following strategy for V2:

Step 1: Users submit their inputs to master node, with collateral
Step 2: Users submit outputs and blind signature
Step 3: If missing an output, the master node will ask for users to send inputs/outputs. The missing user in step 2 will be charged collateral, then step 1 begins again without the bad actor.

To attack this, you must be in control of the master node and would have to pay the collateral to de-anonymize.

edit: nm, the master node could just lie and deanonymize everything it sees

Also don't forget the Masternode can't correlate a blinded output if the collateral doesn't accompany the blinded output. That one keeps getting me too, which is why I wrote it down in a post as follows so I wouldn't forget:

In case readers don't understand why the collateral payments can't be associated only with the inputs and not the outputs, it is because the outputs are blind signed. So if output signing fails, then there is no way for inputs to prove they signed the outputs in order to isolate the adversary(ies) who didn't.

So this is why output signing has to be correlated to inputs. This is what breaks the anonymity in terms of allowing Sybil attacks on master nodes (see my calculation example upthread).

Then apparently we also have the problem that collateral payments can be stolen by Sybil attacking master nodes (and miners/pools if the payments go to them), but still waiting to finish that discussion.
legendary
Activity: 1176
Merit: 1036
Dash Developer
So what's the next step for darkcoin in terms of development/acceptance ?

As for development, I'm working on the next beta version. In a couple more versions we're going to need to do some large scale testing to find bugs. It should start getting pretty stable here soon.
sr. member
Activity: 313
Merit: 250
So what's the next step for darkcoin in terms of development/acceptance ?
legendary
Activity: 1176
Merit: 1036
Dash Developer
The summary thus far of my analysis of Darksend is that Evan has put into place adequate mechanisms to disincentivize theft of the collateral payments and to disincentivize Sybil attacking the inputs to a Darksend with legitimate Darksends.

The weaknesses (w.r.t. to anonymity) are that Masternodes can be purchased and if the adversary has too many of them, they can reduce your probability of anonymity unless you send your funds through dozens of Darksends between each receipt or spend transaction. If the adversary controlled 90% of the Masternodes, it would nearly impossible to be anonymous more than say 99% of the time, i.e. 1 in 100 of your spends would lose anonymity. Evan argues that attaining a lot of Masternodes is too expensive. Well probably so for the common criminal, but I am not convinced that is so for the NSA.

1 in 100 may not sound bad, but remember that loss of anonymity tends to domino cascade (for the holistic reasons I pointed out in my reply to LimLims on this page). And that is for the person who is extremely diligent to do dozens of Darksends between each spend. Most users are not so perfectionist. So for them anonymity could drop significantly.

The other weakness is that it is not yet mandatory to use an IP mixer such as Tor with Darksend, and if not all of the participants to the Darksend are obfuscating their IP, then the anonymity probability declines. Note that even if Darksend makes Tor mandatory, Tor is not the best we can do for an IP mixer. It is unknown how effective Tor is. Some might estimate 80 - 95%. Others might pull 50% out of their arse. I really don't know, but I don't trust Tor entirely. This combined with say 20% of the Masternodes compromised (and a little bit of normal human error on your part such as forgetting to send dozens of Darksends for each coin your receive) can also make it unrealistic to repeatedly sustain very military grade strength of anonymity. (But who said you wanted military grade assurance? Some do, some may not require it)

Darksend has anonymity. Darkcoin is an anonymity coin. The strength of the anonymity depends on the resources and resolve of the adversary versus the Darkcoin user.

I am still trying to think of suggestions to improve it.

I think the current state of things will be great for a V1 release, however what about the following strategy for V2:

Step 1: Users submit their inputs to master node, with collateral
Step 2: Users submit outputs and blind signature
Step 3: If missing an output, the master node will ask for users to send inputs/outputs. The missing user in step 2 will be charged collateral, then step 1 begins again without the bad actor.

To attack this, you must be in control of the master node and would have to pay the collateral to de-anonymize.

edit: nm, the master node could just lie and deanonymize everything it sees
hero member
Activity: 518
Merit: 521
I edited my summary of the anonymity situation in Darkcoin. Please re-read.
hero member
Activity: 1302
Merit: 502
snip

I want to commend your efforts and demeanour in the recent discussion, it has been very informative and insightful. A few weeks ago I went through a lot of your post history (100+ posts) over the course of a few nights and was delighted, until I got to the IQ based insults, which seemed to go on ad nauseum at some points.

When you aren't crassly attacking obvious losers and boasting about your intelligence, I very much enjoy your posts. It's apparent to any technically inclined reader that you are very intelligent and very experienced.

Thanks again for taking the recent time to state your case, it has made me twice as excited about the future of this coin! I look forward to reading more quality posts by you.
legendary
Activity: 1456
Merit: 1000
Thanks. That is very helpful.
hero member
Activity: 518
Merit: 521
I hope readers find my posts helpful?

ZeroCash is going public in a few months time ~20 May. Regardless of whether they have anything tangible or just a published paper,

I don't think they will have beta-test level code then.

This is about not being drowned out and then being considered a clone.

No way Darkcoin can be considered a clone, as Zerocash completely hides the payer, payee, and the amount of transactions. The block chain is a complete fog. Zerocoin doesn't do this.

Zerocash will have some positive spin. They will talk about e-cash and anonymity.

They will make the point I just wrote above.

What they won't talk about are the problems with the project.

The main weakness of Zerocash is it adds an additional 3 minutes between check out and completion of payment. (Add that on top of Bitcoin's 10 - 60 minutes, or Litecoins 2.5 - 15 minutes). Zerocoin doesn't have this problem.

The main weakness of Zerocash and Zerocoin are they depend on new crypto which hasn't been subjected to years of cryptanalysis, and if you put it on the block chain, then it is later cracked, the entire coin is potentially F.U.B.A.R..

Whereas Darksends are offchain! Even if you crack the crypto of Darksend (which uses very old well vetted crypto), the block chain remains uncracked!

The other weakness of Zerocash and Zerocoin is they depend on a trusted party to create the master parameters. If anyone retains that information (even if they snooped it using the NSA's air gap detection mechanisms), they in the case of Zerocash they can create unlimited coins and nobody will even know it! In other words, the coin supply becomes unknowable!! I am not exaggerating!!

Another counter point may be that each Zerocash transaction takes 9ms to verify (500ms for Zerocoin). Thus they can only put 111 transactions in a block per second per core of the CPU on the miner. Visa does 2,000 - 4,000 transactions per second, so for Zerocash to scale to global transactions needs 40 CPU cores per miner (e.g. 10 iCore i7 CPUs), not including denial-of-service transaction spam. Transaction spam could be really bad if they don't have a transaction fee or other means to control it. Any way, 40 CPU cores is not really a big problem if mining will be done only in pools.

But crypto-currencies are hoping to enable microtransactions, thus the transactions per second would explode by orders-of-magnitude.

Thus appears to me Zerocash is incompatible with microtransactions unless mining becomes very centralized among a few powerful pools.

Centralization of mining is a severe problem with Bitcoin having onetwo or three pool with 51% of the hash power now.
Jump to: