Pages:
Author

Topic: [ANN][KMD][dPoW] Komodo - An Open, Composable Smart Chain Platform, Secured by B - page 43. (Read 1192048 times)

sr. member
Activity: 632
Merit: 250


Its your Choice to invest in a project where human trust is needed. I can also put my money on a bank. Instead of investing in blockchain.

With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.

Its not possible for digital money to become global money   if its not 100% trustless.

Why should the mayority choose trusted digital money if there are other better trustless solutions out there.
Sorry bud, but it's already global , there are buyers from Russia, South Korea, India, Indonesia, China , European countries , African countries , etc , more to come. You have to always trust in human bud, even in bitcoin, trust that there will always be human who will deem it valuable.
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust

Prove to me that someone has the key

Its your Choice to invest in a project where human trust is needed. I can also put my money on a bank. Instead of investing in blockchain.

With btc there is no question or discussion if x person have keys to print free btc's. A 51% attack is needed for creating more btc's.

Its not possible for digital money to become global money   if its not 100% trustless.

Why should the mayority choose trusted digital money if there are other better trustless solutions out there.
sr. member
Activity: 383
Merit: 252
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust

Prove to me that someone has the key
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done. Provide me the proof that the keys are destroyed. You cant. Thats why its called a "trusted setup".

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust
newbie
Activity: 56
Merit: 0
Covered KMD some as well as a new independent chain that has a lot of contributions from the KMD devs PIRATE

https://www.youtube.com/watch?v=YCRwXTW95Kc
https://i.imgur.com/dDvkqCGl.jpg
Big up to the team, they are doing a very excellent job. Eventually those hard work will be pay off massively.
sr. member
Activity: 1414
Merit: 487
YouTube.com/VoskCoin
Covered KMD some as well as a new independent chain that has a lot of contributions from the KMD devs PIRATE

https://www.youtube.com/watch?v=YCRwXTW95Kc
sr. member
Activity: 1078
Merit: 310
AKA RJF - Member since '13
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.

Perhaps this will help answer your question:

https://komodoplatform.com/faq/

https://www.youtube.com/watch?v=D6dY-3x3teM

"To create the Zcash parameters, the original Zcash developers had to create a series of keys that, when combined, created a master key that could unlock and lock the parameters. After using the master key to create the parameters, the team destroyed every individual key. The team conducted this endeavor in a public manner. We encourage interested readers to view the Zcash Ceremony explanation on YouTube, and to search for other viewpoints as well."

"To briefly summarize the security measures, the Zcash team used several layers of protection including: multi-party computation, air-gapped compute nodes, hard-copy evidence trails, a uniquely crafted distribution of the Linux operating system, and the physical destruction of each piece of hardware that held an individual key. The resulting layers of defense would be of the highest level of difficulty for an outsider to penetrate. Furthermore, the method of creation and destruction ensured that the internal security of the project was faultless, so long as at least one member of the entire Zcash team was honest.

By our observation, the team performed this endeavor with sufficient competence and due diligence. Furthermore, given the nature of the project, the longstanding reputation of the Zcash developers, and the modus operandi of their lives’ work, we believe they were properly motivated to perform the creation and destruction in a capable and honest manner.

Nevertheless, there are privacy advocates in the cryptocurrency industry who maintain a degree of suspicion over any project that requires an element of human trust. This suspicion extends to the Zcash parameters. These observers continually scrutinize the Zcash project, searching for more and more processes by which the creation ceremony could have failed. Yet, while various theories have been put forth, no actual failure in the Zcash parameters has been discovered.

In adopting the Zcash parameters, we receive frequent questions regarding how they affect the Komodo coin. The answer is that the privacy in the Komodo ecosystem is effectively permanent, regardless of any potential fault by the Zcash team. Furthermore, we can adopt any updates the Zcash team releases to the parameters.

In the unlikely event that someone was able to retain a complete copy of the master key, the only power the holder would have, would be the ability to create new private money in our system. This holder could then trade that for transparent, spendable money. This could negatively impact the Komodo coin, and we would be required to adapt our platform. If a fault in the Zcash parameters were to be discovered, the Komodo team has various contingency methods at our disposal to remove the Zcash parameters and replace them with a new set of parameters."
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/


Show me the proof that the keys are destroyed? I bet you cant.
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/



the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

Is it hard reading?
sr. member
Activity: 1078
Merit: 310
AKA RJF - Member since '13
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.

You still don't get it do you? KMD did not create zk-snarks, read:

https://captainaltcoin.com/zk-snarks-privacy/

https://blockonomi.com/zk-snarks-privacy/

https://komodoplatform.com/privacy-zero-knowledge-proofs/
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

There is no way to know. If they have or have not destroyed the keys properly. There is also no way to see directly if KMD are created out of thin air, this is not vissible because the supply is hidden.
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

Throughout the history of mankind there have been manny scams. From the gold smiths holding peoples gold and slowly changing into banks. Scamming people with factional reserve banking untill now. One of the goals in decentralised blockchain technology is to eliminate human trust.
jr. member
Activity: 462
Merit: 2
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

But KMD didn't generate any keys related to zk-SNARKS. They are using the same parameters as Zcash uses. So if at all there was found to be a compromise in the parameters used by Zcash, then KMD's privacy mechanism is compromised too. But there has been too much discussion about this topic in Zcash related posts and forums and the matter has been put to rest. The only people who bring up the "trusted setup" these days are the ones who invested in other privacy coins.

Komodo is not a purely privacy coin. It is there to use if a user on the platform needs it. What Komodo aims to accomplish and has already accomplished is not for a forum post to say. It is related to Securing Blockchains using BTC's hashpower, Enable interoperability among different Blockchains and provide a powerful Smart contract platform that is aware of other Blockchains among many other things.

Excellent explanation...thank you for making it understandable.
newbie
Activity: 5
Merit: 1
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?

But KMD didn't generate any keys related to zk-SNARKS. They are using the same parameters as Zcash uses. So if at all there was found to be a compromise in the parameters used by Zcash, then KMD's privacy mechanism is compromised too. But there has been too much discussion about this topic in Zcash related posts and forums and the matter has been put to rest. The only people who bring up the "trusted setup" these days are the ones who invested in other privacy coins.

Komodo is not a purely privacy coin. It is there to use if a user on the platform needs it. What Komodo aims to accomplish and has already accomplished is not for a forum post to say. It is related to Securing Blockchains using BTC's hashpower, Enable interoperability among different Blockchains and provide a powerful Smart contract platform that is aware of other Blockchains among many other things.
jr. member
Activity: 462
Merit: 2
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.

so sab is saying kmd used zk-snarks for the privacy mechanism and in order to do that, kmd had to generate private keys at the begining and kmd has those keys and can use the zk-snarks mechanism to basically generate tokens at will - is this correct?
newbie
Activity: 5
Merit: 1
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks

The equihash algorithm is a PoW algorithm and as such doesn't have anything to do with zk-SNARKS. The keys related to zk-SNARKS that KMD uses are the same as Zcash uses. zk-SNARKS are related to only the privacy aspects of KMD and doesn't define the Platform at all. There is dPOW that Einsteinium and Game-Credits projects have adopted to protect from 51% attacks. Then there is the Komodo Custom Consensus Framework that allows for contracts which is currently under development/testing. There are on-chain token generation, on-chain faucet, dice, and Rewards contracts that are already working. So if people can trust the Zcash privacy mechanism, then they can extend the same trust to Komodo's Privacy mechanism as they are exactly the same.
jr. member
Activity: 462
Merit: 2
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.

i get what your saying. the algo eqihash was used by zcash and they did the same thing. they had multiple trusted people that were given part of the keys. are you saying that kmd did not do this?

interested in this.

thanks
newbie
Activity: 45
Merit: 0
KMD is a verry technical coin. But its sad it got one big flaw in its current setup.

The Trusted Setup is a vital part of what makes KMD work. Kmd is a coin to use a implementation of a cryptographic proof called zk-SNARKs (SNARKS for short). These SNARKS are the engine that can quickly and efficiently verify a transaction and add it to the blockchain without revealing any details to the public. The tricky thing about these SNARKS is that (like many algorithms) they need to have a one time setup. And the reason that this setup is called the “Trusted Setup” is because you have to trust that whoever generated those keys destroyed them when they were done.

The Keys give "God powers" with the keys its possible to create free KMD for yourself. Because the SNARKS implementation also hide the supply. No one will notice if the keys are beying misused.
jr. member
Activity: 462
Merit: 2
Some very kind words from @einsteiniumcoin for @KomodoPlatform #dPoW 51% attack protection!
Already multiple other coins exploring these solutions and a new one will be announced soon!
Get $BTC level security today, contact $KMD @KomodoPlatform!


KMD, don't even have a trusted setup. The devs could print free KMD for themself and no one will notice because the supply is hidden. Hahaha


please explain. thanks
newbie
Activity: 45
Merit: 0
Some very kind words from @einsteiniumcoin for @KomodoPlatform #dPoW 51% attack protection!
Already multiple other coins exploring these solutions and a new one will be announced soon!
Get $BTC level security today, contact $KMD @KomodoPlatform!


KMD, don't even have a trusted setup. The devs could print free KMD for themself and no one will notice because the supply is hidden. Hahaha
Pages:
Jump to: