Author

Topic: [ANN][XST] Stealth-Coin.com | Tor | StealthText, World's first anonymous SMS Tx! - page 123. (Read 748429 times)

hero member
Activity: 966
Merit: 1003
just calling out bob's blatant disrespectful tweet.

Yep, that's Bob we know, running from coin to coin bashing them and touting for XST hoping people would buy his bags.
hero member
Activity: 966
Merit: 1003
way to Steal Stealth Addresses From SDC

And where did SDC "steal" the code? It's not like they invented it or anything.
sr. member
Activity: 476
Merit: 250
bahahahahahahah Stealth Coin is a Joke..... way to Steal Stealth Addresses From SDC and change 1 line to pass it of as your own...... Proofs in the Git-Hub guys.... how Pathetic



They didn't steal it's open source. They left the copyright in, so its a legit usage of the code.

It's just funny to see bob calling sdc shit when they are using its code.

Btw thats my twitter in the SS. I'm not trying to start a coin war, just calling out bob's blatant disrespectful tweet.
full member
Activity: 210
Merit: 100
bahahahahahahah Stealth Coin is a Joke..... way to Steal Stealth Addresses From SDC and change 1 line...... Proofs in the Git-Hub guys.... how Pathetic you think this was crazy new coin Tech

member
Activity: 91
Merit: 10
Why again the volume on bittrex is over 150 btc?

can anyone explain what happend or what is (will be) released in the next moments?

Because it's Stealthcoin!!! And now is money making time! Cool
legendary
Activity: 1246
Merit: 1000
ARK Team likes to ban and delete posts in reddit.
legendary
Activity: 1386
Merit: 1000
Why again the volume on bittrex is over 150 btc?

can anyone explain what happend or what is (will be) released in the next moments?
legendary
Activity: 1876
Merit: 1005
HONDO once again and again ,ever and ever again the best in this state of the art technology.
hero member
Activity: 966
Merit: 1003
Can the dev explain how adding 'stealth address' mid block chain provides anonymous transactions?

It won't anonymize transactions earlier in the chain (you can't change history). It will anonymize transactions in the future for those who use stealth addresses.

Even if the entire history of an input is known, as soon as that input is sent to a stealth address, it is effectively sent into a black hole with respect to the identity of the recipient.


I beg to differ, Stealth suffers from the same disadvantage as Shadow did when it released stealth address.

As long as previous inputs are known (which they are since you added stealth mid block chain) it provides very little benefit.

Think about it, if adding stealth mid block chain provided anon then why did Peter Todd not implement it into Bitcoin? Simple it is not the solution.

The solution is having stealth from the genesis block and every client (both receive and sender) using stealth address.

That can't be true, I saw it on twitter that it's ground breaking stuff and best anon feature (or package of features) ever seen in a coin.
hero member
Activity: 966
Merit: 1003
Bob just called highest VOL for XST on MP V.2 launch....y'all bishes know where this coin is going?  Here let me give you a hint..........................

Yes, with no trading fees Bob's p&d group can buy their own coins with impunity. The volume will be through the roof.
hero member
Activity: 821
Merit: 1000
Can the dev explain how adding 'stealth address' mid block chain provides anonymous transactions?

It won't anonymize transactions earlier in the chain (you can't change history). It will anonymize transactions in the future for those who use stealth addresses.

Even if the entire history of an input is known, as soon as that input is sent to a stealth address, it is effectively sent into a black hole with respect to the identity of the recipient.


I beg to differ, Stealth suffers from the same disadvantage as Shadow did when it released stealth address.

As long as previous inputs are known (which they are since you added stealth mid block chain) it provides very little benefit.

Think about it, if adding stealth mid block chain provided anon then why did Peter Todd not implement it into Bitcoin? Simple it is not the solution.

The solution is having stealth from the genesis block and every client (both receive and sender) using stealth address.
member
Activity: 85
Merit: 10
Because privacy is a basic human right.
Can the dev explain how adding 'stealth address' mid block chain provides anonymous transactions?

It won't anonymize transactions earlier in the chain (you can't change history). It will anonymize transactions in the future for those who use stealth addresses.

Even if the entire history of an input is known, as soon as that input is sent to a stealth address, it is effectively sent into a black hole with respect to the identity of the recipient.
hero member
Activity: 821
Merit: 1000
Can the dev explain how adding 'stealth address' mid block chain provides anonymous transactions?
sr. member
Activity: 392
Merit: 250
Hondo's got this on lock down!
sr. member
Activity: 616
Merit: 250
Yeah. I. Ugh. I know some of those words.
member
Activity: 85
Merit: 10
Because privacy is a basic human right.
That is my question exactly. I want to know the relationship, and how Chandran signatures come into play if stealthSend is separate. I hear comparison between StealthCoin and CryptoNote coins, but I believe they use ring signatures on the blockchain. So I confused to how Chandran signatures are used, with stealthsend.

Chandran signatures are a sub-linear ring signature system. The memory requirements scale with the square root of the number of keys in the ring. They significantly reduce the size of the block chain for medium and large-sized rings, of about 25 or more keys.

In crypto-currencies the sender must sign away funds, which accomplishes two tasks. The first is to prove ownership of the funds. The second is to authorize the transaction. The very act of signing a transaction conflicts with anonymity because the signature must be validated with a public key that is included in the transaction, and was the destination address for a previous transaction.

For anonymity, a problem arises: how can the signature be verified without revealing the source of the funds?  One way is to create some ambiguity in the transaction and make a signature that authorizes the transaction without revealing exactly which key was used to authorize it. Because the transaction network is a closed system, ambiguity must be created using elements of that system. These elements amount to the public keys found in the block chain.

A ring signature is one in which a set of these keys is used to sign a transaction in such a way that it is possible to verify that the transaction is authorized but impossible to ascertain exactly which of the keys in the ring had the signing authority.

CryptoNote ring signatures achieve anonymity by making a signature with each key in the ring. But there are two types of signatures in a ring signature. One type is for public keys not authorized to sign the transaction and the other type is for the public key that is authorized to sign the transaction. Outside of the individual who created the signatures, no one knows which signature type was used with which key. It's obvious, then, from where the bloat arises with CryptoNote transactions. A transaction using 100 keys must store those 100 keys and their 100 signatures.

Chandran signatures use the same principle except that Chandran signatures employ signatures of an unknown subset of the ring. Using a subset reduces the amount of storage for the signatures, but creates a new problem in that the identities of the keys sub-ring must be obfuscated. This is achieved by using mathematical proofs to assemble the unknown subset from the full ring. These proofs are called "non-interactive witness-indistinguishable" (NIWI) proofs.  Even though the person validating the transaction can use the proofs to derive a subset of the key ring, this person has no idea what the subset is because the subset has been mathematically scrambled during assembly. However, even though the subset is scrambled, it can still be used to verify the transaction signature and validate the transaction.
newbie
Activity: 3
Merit: 0
Do you understand why XST uses TOR. Tor is basically a mesh network comprised of nodes that host users and servers passing IP packets to other nodes, while obfuscating where they originally came from. That's the main feature, one of the side benefits is that it masks your IP address. That is the main point behinds XST use of the network. Do find your payment first the NSA would have to target you, given that thousands of people use TOR everyday, if you didn't give them a reason to target you. Why would the go through all the trouble to track you if you never gave them a reason to begin with. To track a person takes a shit load of time, and somebody of extraordinary ability. With XST your transaction is already encrypted, so for one even if they had your IP address they wouldn't know what it was or if it was illegal, or where it was going.The chances of you getting into trouble practically nil, unless your doing something else on the network that gives them reason to track you.
 
+1 Thanks for explaining
full member
Activity: 182
Merit: 100
Oh, my bad. I stop.

 Grin  Deep breath and just ignore him...  There will be plenty of FUD, that's how it is when you've got an awesome coin with lots of attention.  Focus on the positive.

I'm relaxed, I gave him the relevant info it that isn't good enough. I not going to bother anymore.
full member
Activity: 182
Merit: 100
Do you understand why XST uses TOR. Tor is basically a mesh network comprised of nodes that host users and servers passing IP packets to other nodes, while obfuscating where they originally came from. That's the main feature, one of the side benefits is that it masks your IP address. That is the main point behinds XST use of the network. Do find your payment first the NSA would have to target you, given that thousands of people use TOR everyday, if you didn't give them a reason to target you. Why would the go through all the trouble to track you if you never gave them a reason to begin with. To track a person takes a shit load of time, and somebody of extraordinary ability. With XST your transaction is already encrypted, so for one even if they had your IP address they wouldn't know what it was or if it was illegal, or where it was going.The chances of you getting into trouble practically nil, unless your doing something else on the network that gives them reason to track you.
hero member
Activity: 784
Merit: 502
Oh, my bad. I stop.

 Grin  Deep breath and just ignore him...  There will be plenty of FUD, that's how it is when you've got an awesome coin with lots of attention.  Focus on the positive.
Jump to: