Author

Topic: [ANN][DASH] Dash (dash.org) | First Self-Funding Self-Governing Crypto Currency - page 6420. (Read 9723858 times)

member
Activity: 64
Merit: 10
When people asked him about what he was working on, he would now say "his coin is the best of X and Y"

I was waiting for this foul mouth retard to arrive.

Actually what I said is that I promised never to release nor endorse any altcoin.

So slyA has proven he is a liar. Now you can trust him.

Who can make the community clean up
We hate to everything we do
We should stick together
Believe me
legendary
Activity: 1176
Merit: 1036
Dash Developer

I don't know if Darkcoin is designed to allow you to send over Tor.

Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.

There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor
Code:
darkcoind --help

Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor.

The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page.

Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend.

Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin.

Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore.

Would you feel Darkcoin is threatened if another altcoin has true cpu-only and very strong anonymity?

Any way I am happy to read below you are thinking about how to improve the anonymity. Your prior reply had me worried that you actually wanted to make it weaker on purpose.  Now I see you are open to improving it.


Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. (http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document)

That is 2012 document. Many think NSA has control over most or many of the nodes on Tor. Remember these servers cost a lot of money and who is providing that for free and getting nothing in return?

Warning FAQ: Tor doesn't protect you from a global adversary:
https://tails.boum.org/doc/about/warning/index.en.html#index7h1

http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping

I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?

Agreed it is. I think I had figured that out before when I mentioned it in the CoinJoin thread and dismissed it. I apparently forgot that since.

I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.

I think most users wouldn't mind expending 5 minutes computing time before they send a mix transaction.

I have another idea as well. On failure only, every input into the mix could reveal which collateral payment they sent in the output stage, so you can isolate the input that was the adversary. Then you blacklist that input. The inputs anonymity is destroyed because no mix transaction was completed. But how can you blacklist system wide? How can you trust that node didn't lie just so it could blacklist someone's coins?

Of course I want something that is as secure as possible. But there are lots of trade offs that need to be made to ensure that most users needs are covered while keeping usability at it's maximum.

Using a PoW like that was one of my first ideas to protecting against a Sybil attack

Quote from: eduffield
So what is the cost?

There must be a cost to using this anonymous network, otherwise like you say there will be issues with millions of accounts popping up. I’m not dead set on which solution(s) to implement, but here’s a couple ideas:

Burnt Identities

Higher difficulty shares to the current block would be mined and then stored in the blockchain permanently. Multiple of these would be used for each transaction and would be “burnt” when misused, causing the attacker to have to mine them again.  

The problem with PoW type solutions is the NSA and other powerful entities would have cheap access to large amounts of processing power. Plus, making a user do that hinders the usability of the product.

I like collateral transactions because it accomplishes the same thing and they can be increases to a point where attacking the network becomes way too expensive to do efficiently. Plus, if someone was attacking the network we could ban their collateral inputs by tracing the payments back to the source and isolating them individually.  
legendary
Activity: 1456
Merit: 1000
DarkSend should embrace the community....Those who wish to attack go straight in for the kill, cold.

DarkSend needs to have some economic disincentives.  Fees for participation, penalties for misbehaving, minimum values for election.

Why not choose random nodes that have shown community engagement? Length of service, etc. Allowed to make small transactions when new, then slowly build-up to larger transactions - Almost like a PoS, or posting on bitcointalk - in terms of reputation establishment?
hero member
Activity: 518
Merit: 521
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.

In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything.

IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market.

Btw, enjoying the brainstorming between Evan & Anonymint.

Anoncoin already has IP obfuscation.
hero member
Activity: 518
Merit: 521
An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."

Would you accept that 20% of your coins are not anonymous?

If you are trying to hide from an oppressive totalitarian regime where death or jail time waits you if you are discovered, then you want something 1 in million, not 20%.

20% is analogous to pulling the trigger on a 5 round revolver with one bullet pointed at your head, i.e. Russian Roulette.

Try redoing your calculation with 1%, 0.1%, 0.01%, etc.
legendary
Activity: 1708
Merit: 1049
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.

In a good, user-friendly solution, all that a user should do is just tick a checkbox and be ok, with the client taking care of everything.

IP obfuscation (TOR or something else, I don't know) will have to be integrated next for the same reason as the one I mentioned earlier: It will be a market weakness. Someone else will take DarkSend, integrate IP obfuscation and claim to solve the IP issue that DRK had in order to take the market.

Btw, enjoying the brainstorming between Evan & Anonymint.
legendary
Activity: 1456
Merit: 1000
Quote
I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.

Thats HashCash PoW for email to stop spam. In the Satoshi paper. That was my suggestion.  Hey, you. Stop 51% me with a new fork.
member
Activity: 64
Merit: 10
This new X11 algo is very interesting for me.
I'll spend some time to study on it.

The new algorithm will always attract more people's eyes
Get more attention
Hope that the new algorithm can solve many problems
Give us hope
 Cheesy
hero member
Activity: 518
Merit: 521

I don't know if Darkcoin is designed to allow you to send over Tor.

Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.

There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor
Code:
darkcoind --help

Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor.

The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page.

Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend.

Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin.

Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore.

Would you feel Darkcoin is threatened if another altcoin has true cpu-only and very strong anonymity?

Any way I am happy to read below you are thinking about how to improve the anonymity. Your prior reply had me worried that you actually wanted to make it weaker on purpose.  Now I see you are open to improving it.


Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. (http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document)

That is 2012 document. Many think NSA has control over most or many of the nodes on Tor. Remember these servers cost a lot of money and who is providing that for free and getting nothing in return?

Warning FAQ: Tor doesn't protect you from a global adversary:
https://tails.boum.org/doc/about/warning/index.en.html#index7h1

http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping

I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?

Agreed it is. I think I had figured that out before when I mentioned it in the CoinJoin thread and dismissed it. I apparently forgot that since.

I have a new idea for you. You could force each input to be accompanied by an anonymous proof-of-work that costs considerable computing time. Then move the collateral payment to accompany outputs stage.

I think most users wouldn't mind expending 5 minutes computing time before they send a mix transaction.

I have another idea as well. On failure only, every input into the mix could reveal which collateral payment they sent in the output stage, so you can isolate the input that was the adversary. Then you blacklist that input. The inputs anonymity isn't destroyed because no mix transaction was completed. But how can you blacklist system wide? How can you trust that node didn't lie just so it could blacklist someone's coins?
member
Activity: 105
Merit: 10
Wow 14 Ghash and difficulty at 705, nice!
legendary
Activity: 1358
Merit: 1002


Come and help mine darkcoin, and get a chance of winning the lottery pool.

for the next week im going to do a lottery EVERY day, ill even trow in 200 DRK of my own.

So each day 1 lucky winner will get 50% of fees, AND 28.57 DRK

Pool Pays Witdrawal fee: 0.0


Dedicated pool, we only run Darkcoin mining
DDOS Protected pool, resistant to: fake shares & scrypt ddos

Stable Fast Server, but dont take my word for it, see what others have said in this thread



ALSO


we have our very own dice game http://dice.lotterymining.com
newbie
Activity: 27
Merit: 0
I am running a permanent node. pm'd you eduffield
legendary
Activity: 1358
Merit: 1002
My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.

Both seed nodes were down, I forget to check them. Anyone else want to host a seed node?

- It needs to be configured to 200 connections max
- Must have 9999 open from the outside
- Must be a static IP
- Must be permanently available  

PM me and I'll add them to the source
ill run one on lotterymining
legendary
Activity: 1176
Merit: 1036
Dash Developer
My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.

Both seed nodes were down, I forget to check them. Anyone else want to host a seed node?

- It needs to be configured to 200 connections max
- Must have 9999 open from the outside
- Must be a static IP
- Must be permanently available  

PM me and I'll add them to the source
hero member
Activity: 742
Merit: 501
Tor is not the solution in my opinion. It is not mainstream and may be too much for folks to learn about proxies and routers for non-browser tor usage.
member
Activity: 64
Merit: 10
I think the Dark community should implement new rules for trolls....starting NOW!

If they ask a serious question, then we answer it, if they start the FUD and trolling its immediate ignore, no quote or reply.

I don't want to have to skip through pages of people quoting their stupidly long rants of worthless dribble. Then we continue to fuel their obvious attempts at getting people worked up.

Don't waste your time, a simple ignore will do. Lets just keep this place full of useful information to better the coin/community.



The community should clean up
Let the roles of the community to help us
Support your proposal
Get some action
legendary
Activity: 1456
Merit: 1000
Feds finding ways to get through TOR

http://online.wsj.com/news/articles/SB10001424052702303949704579461641349857358?mod=WSJ_TechWSJD_NeedToKnow

Roll-up, roll-up, roll-up....expect new users of DarkCoin (and DarkDogeCoin too.  Much $$, Much anonymous, So moon)
full member
Activity: 322
Merit: 105
My client is not connecting to any nodes, anyone got a conf file example I could copy?

Had the same problem, it took like an hour + to connect to a node but it's all good now.  I just left it alone.
sr. member
Activity: 1204
Merit: 272
1xbit.com
The way I see privacy-with-potential-exploits working in practice is similar to how bitcoin deals with the possibility of 51% attacks. They are known vulnerabilities, and the risk can be to some extent quantified and mitigated. To many, this means the risk is acceptable, and provides enough trust to bet their money on. For others, it's an unacceptable risk.

With darksend in the proposed implementation, the risk of one's anonymity being broken in a given transaction is a function of the ratio of snoops to non-snoops, and the number of stages of mixing employed. The number of snoops is unknown, but there are two points salient here:

1. We can quantify the required funds in DRK to mount an attack of a given efficacy, and
2. With 51% attacks, the hashing power available to a hypothetical attacker (like a large government or financial group) is similarly unknown, and yet this hasn't killed trust in Bitcoin.

An example of 1. could be, "To mount an attack that would break the anonymity of 20% of DS transactions, assuming that there currently exist 1000 uncompromised full nodes capable of being elected a master node, and assuming 3 levels of pooling, we would require approx 58.5% of the network (i.e. cube root of 20%), i.e. 1410 Sybil nodes, each requiring at least 1000 DRK, to a total of 1.41M DRK."

So if our assumptions are reasonable, we can come up with scenarios that reasonably define the scope of risk.

Of course, true anonymity is infinitely better. If Anonymint has a solution for this, it'd be great if he could expand on "divide and conquer", since the phrase in this context is meaningless to me.
legendary
Activity: 1176
Merit: 1036
Dash Developer

I don't know if Darkcoin is designed to allow you to send over Tor.

Even if it is, Tor will not hide your IP reliably from snooping agencies. Tor is better than nothing, but there are designs which can hide your IP absolutely and reliably. I don't think anyone has implemented such a design yet for the way we need to use it.

There is a Sr. Member who posted couple of functional DRK Tor nodes a few pages back. Any coin using the bitcoin source can Tor
Code:
darkcoind --help

Everyone needs to use it. So it needs to be turned on by default. Because as the participants in your Darksend mix lose anonymity, then you lose anonymity too even if you used Tor.

The only feature of Darkcoin is claimed anonymity now correct? The cpu-only aspect is crossed out on the web page.

Thus shouldn't your anonymity be actually stronger otherwise an altcoin is simply going to do it better than Darksend.

Don't worry about Zerocash, it takes 9ms verification per transaction (Zerocoin is 500msec). That won't scale. Your competition won't come from Zerocash. It will come from another altcoin.

Higher end CPUs still mine nearly as well as the GPUs do. I don't think anything says "CPU only" anymore.

Tor + Multiple rounds of DarkSend should be nearly perfect anonymity. Even the NSA says they have problems breaking through Tor. (http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document)

I was thinking more about Divide and Conquer, I believe it's vulnerable to Sybil attacks. I don't think you can do decentralized DarkSend without collateral, otherwise what would stop 100 nodes from taking up 80% of the spots per DarkSend session and forcing the divide and conquer algorithm to go 20 or 30 levels before filtering them out (EVERY SESSION)?
Jump to: