Pages:
Author

Topic: Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of Monero) - page 26. (Read 132873 times)

legendary
Activity: 2128
Merit: 1073
On a side note: if you copy the word "difficulty" from the Tor whitepaper and paste it into a text editor you'll get the "di_culty" as a result. As far as I understand, "fi" letters combination is badly interpreted by latex compiler and is replaced in PDF by a special character that looks almost the same as these two letters but can't be copied.
The "special character" you are trying to name is called "ligature" http://en.wikipedia.org/wiki/Typographic_ligature .

TeX certainly has the capability to take certain letter strings, e.g. "ffi" and replace them with the traditional-typography ligatures "ffi". The native TeX fonts (Computer Modern) all have ligatures, but the tools that post-process them to other fonts (like Adobe Type 1) for PDF formatting may be missing or mishandling the ligatures.

In my browser and in my text font the single character "ffi" "ffi" ligature displays just fine. So this maybe something to do with your configuration if you can't see the "special characters".
legendary
Activity: 826
Merit: 1002
amarha
Wow.

As an impartial observer let me just say one thing:

You CN/Bytecoin whoever you are posters coming out of the woodwork like this is incredibly transparent.

Just stop. You're doing more harm to yourselves then good.

I own no CryptoNote coins whatsoever at the moment. I've traded some BBR and XMR on short time frames , trying to get in and out in time when they bubble.

Also,

Lukejr, if you're reading this. Do you really think it's possible for Bitcoin to integrate ring signatures? I assumed this was impossible.

Does anyone know if it's possbile to do such a thing? This is exciting news if it's plausable. My current view is that it's probably "possible" but completely unfeasable for a Bitcoin based technology to under go such a change.
legendary
Activity: 2968
Merit: 1198
The only basis there is to believe that actually happened are these new posts with more fake documents falsely (or at best unverifiably, but from a trust point of view, that is identical) dated from 2012, as I showed above.

My belief is that it didn't happen at all, and is just an attempt to use the tired "We got hacked!" defense. It doesn't strike me as the brightest strategy to align yourself (not you in particular) with Mark Karpels, et al.

I also believe (as I have said before -- i.e. before this thread) that the more these scammers try to post new stuff to back up their fabtricated story, the more evidence they create that refutes it. That might not be true for a truly skilled fraudsters, but they are not in say, Bernie Madoff's league. They are just a fairly amateurish coin mill, and their efforts reflect that.

Your version with "just a fairly amateurish coin mill" doesn't match the fact that the someone has created CryptoNote technology, which is totally new. Based on recent releases by Bytecoin (e.g. multisigs) I assume that they initially coded the protocol and are still contributing to its development. Why would amateurish coin mill do so?

Sure it does, because:

1. Brilliant cryptography and okay programming (the BCN code is not brilliant, just okay) do not necessarily correlate with integrity and understanding of other's reactions to your approach to, ahem, "marketing" as pointed out by someone earlier. Autistic spectrum is quite plausible.

2. We don't know who created the original cryptography and/or implementation and, no, I am not impressed by the recent Bytecoin releases. Multisig was already designed in from the start (see white paper), someone just did the fairly straightforward (and incomplete) implementation of it. So I'm not convinced that the managers of the ongoing scamming (more fake papers with bogus signatures, etc.) are necessarily the inventors. I lean against, but I'm not sure.

sr. member
Activity: 373
Merit: 250
The only basis there is to believe that actually happened are these new posts with more fake documents falsely (or at best unverifiably, but from a trust point of view, that is identical) dated from 2012, as I showed above.

My belief is that it didn't happen at all, and is just an attempt to use the tired "We got hacked!" defense. It doesn't strike me as the brightest strategy to align yourself (not you in particular) with Mark Karpels, et al.

I also believe (as I have said before -- i.e. before this thread) that the more these scammers try to post new stuff to back up their fabtricated story, the more evidence they create that refutes it. That might not be true for a truly skilled fraudsters, but they are not in say, Bernie Madoff's league. They are just a fairly amateurish coin mill, and their efforts reflect that.

Your version with "just a fairly amateurish coin mill" doesn't match the fact that the someone has created CryptoNote technology, which is totally new. Based on recent releases by Bytecoin (e.g. multisigs) I assume that they initially coded the protocol and are still contributing to its development. Why would amateurish coin mill do so?
sr. member
Activity: 336
Merit: 251

Actually all original whitepapers were done by Satoshi.

legendary
Activity: 2968
Merit: 1198
dated back December 2012.

Uh, no. Fail.

Try again scammers.



You (well, not you in particular of course) better try again at breaking CryptoNote website to provide false evidence.

The only basis there is to believe that actually happened are these new posts with more fake documents falsely (or at best unverifiably, but from a trust point of view, that is identical) dated from 2012, as I showed above.

My belief is that it didn't happen at all, and is just an attempt to use the tired "We got hacked!" defense. It doesn't strike me as the brightest strategy to align yourself (not you in particular) with Mark Karpels, et al.

I also believe (as I have said before -- i.e. before this thread) that the more these scammers try to post new stuff to back up their fabtricated story, the more evidence they create that refutes it. That might not be true for a truly skilled fraudsters, but they are not in say, Bernie Madoff's league. They are just a fairly amateurish coin mill, and their efforts reflect that.




member
Activity: 87
Merit: 10
dated back December 2012.

Uh, no. Fail.

Try again scammers.



You (well, not you in particular of course) better try again at breaking CryptoNote website to provide false evidence.

That's from the darknet paper though, not the CryptoNote website. The fact that the date is based on the host computer basically means it can't be trusted because someone can easily change their system clock. Since we have no historical record of the darknet site, it's possible someone could have gone back and 'fixed' the dates using a correct version of latex after this thread was posted. If a hacker really did manage to gain access to the Cryptonote site they could have planted much more 'conclusive' false evidence than a messed up whitepaper.
donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
Oh... Ok so the signing time on the darknet paper could easily have been faked too. All you'd need to do is set your system clock.

Seems that way. OP said this:

"Now normally you would use a Timestamp Authority (TSA) to validate your system time. There are enough public, free, RFC 3161 compatible TSAs that this is not a difficult thing."

So failing that you can just change your system time.
sr. member
Activity: 373
Merit: 250
dated back December 2012.

Uh, no. Fail.

Try again scammers.



You (well, not you in particular of course) better try again at breaking CryptoNote website to provide false evidence.
member
Activity: 87
Merit: 10
dated back December 2012.

Uh, no. Fail.

Try again scammers.



Oh... Ok so the signing time on the darknet paper could easily have been faked too. All you'd need to do is set your system clock.
legendary
Activity: 2968
Merit: 1198
hero member
Activity: 826
Merit: 500
I thought about that... And I agree with @Cheesus

Why does this not surprise me? Let me think....hmm. Umm.

Oh yeah, that's right! Because you are both BCN shills?





Registered within 4 minutes of each other. What a coincidence.
legendary
Activity: 2968
Merit: 1198
I thought about that... And I agree with @Cheesus

Why does this not surprise me? Let me think....hmm. Umm.

Oh yeah, that's right! Because you are both BCN shills?




member
Activity: 166
Merit: 15
I've just been rechecking genuine whitepaper v.2 and found another watermark.



This is pretty amusing. Note, I couldn't find this watermark in whitepaper v.1.
sr. member
Activity: 728
Merit: 265
Thanks for your work. You confirmed my suggestions that someone is trying to discredit the CryptoNote technology along with all the CN-based coins.

Just throwing this out there, but if the correct whitepaper was on the Bytecoin domain all along and on the TOR Cryptonote site, how can we trust that CryptoNote.org is genuine? What if they falsified the whitepapers on purpose?

I thought about that... And I agree with @Cheesus

Regarding the website mysteries... my bet is on that CN didn’t make their own website themselves - did you ever see a nice, design-ish site from a hardcore developers of pretty much any technology? I sure as hell didn’t, simply because bearded, covered in sweaters guys don’t do this kind of stuff.

I mean, look at XMR - they got tons of websites and all of them look like shit.

I think CN ordered a website to someone. It’s just doesn’t add up - what’s the point for hardcore developers to spend so much time designing and coding this website. There probably should be the guy who admins website, actually, maybe he is the guy that replaced those files. Would love to ask him a few questions if he exists.

This casts doubt that CN web site was developed by CryptoNote's team itself.  Someone else has attempt to it.
legendary
Activity: 1428
Merit: 1001
getmonero.org
This page kills my computer!
sr. member
Activity: 373
Merit: 250
Thanks for your work. You confirmed my suggestions that someone is trying to discredit the CryptoNote technology along with all the CN-based coins.

Just throwing this out there, but if the correct whitepaper was on the Bytecoin domain all along and on the TOR Cryptonote site, how can we trust that CryptoNote.org is genuine? What if they falsified the whitepapers on purpose?

It also might be the case. Someone replaced the files. It's either themselves, either a traitor inside, or an outsider attacking the website.

All three variants seem bullshit though. I'd like to hear more from CN team first before lynching them.
member
Activity: 87
Merit: 10
Thanks for your work. You confirmed my suggestions that someone is trying to discredit the CryptoNote technology along with all the CN-based coins.

Just throwing this out there, but if the correct whitepaper was on the Bytecoin domain all along and on the TOR Cryptonote site, how can we trust that CryptoNote.org is genuine? What if they falsified the whitepapers on purpose?

The only motivation I can imagine for this would be to discredit CryptoNote/CN coins as Hexah suggested. Maybe I'm not seeing every angle to the situation but it's hard to envision what else a nefarious actor would have to gain from illegitimately controlling the CryptoNote.org domain. Spread dissent from within and the whole community destroys itself.
member
Activity: 87
Merit: 10

TL;DR
It is likely that both CN whitepapers on CryptoNote website are forged. It is likely that the genuine v.2 is on bytecoin.org, while the genuine v.1 is on Tor CryptoNote website (ol346fucnsjru223.onion). It is possible that the whitepapers have been copied line by line with a couple of extra mistakes as in the v.1 case. The references that are inconsistent with the v.1 content are not used in the text and might have been inserted to confuse the potential researchers.



act now, thank you for doing this analysis. Certainly raises some questions regarding the 'forged dates' basis of a large part of this discussion, and suggests that the (original) v.1 may indeed have been created in late 2012.

What I now don't understand is why bother doing a line-by-line copy to 'forge' the whitepapers when you could just download and rehost the original PDFs?  The only conclusion that I can come to is someone trying to discredit the CN team. Does anyone else have any possible theories? What I would really like is for one of the original Cryptonote developers to identify themselves and speak out publicly on this issue.

I don't really want to weigh in on the whole BCN/BBR/DCN/etc conspiracy and I feel that the developers of those coins are free to do whatever they want, provided they're not trying to scam people. I also feel it's best for everyone if we keep this civil and don't attack each other/each other's coin of preference, but as is always the case with discussions on the internet, it's not possible to stop everyone from doing this as people get emotionally invested. Live and let live is my attitude.

Disclosure: I hold (a relatively small) amount of XMR, but I want to see the Cryptonote technology flourish. It's hard to see how anyone could come out on top after a 'scorched earth' situation that this could easily result in.

Edit:

dated back December 2012.

Uh, no. Fail.

Try again scammers.



So yeah seems the 'real' v1 could just as easily have been backdated.

donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
Thanks for your work. You confirmed my suggestions that someone is trying to discredit the CryptoNote technology along with all the CN-based coins.

Just throwing this out there, but if the correct whitepaper was on the Bytecoin domain all along and on the TOR Cryptonote site, how can we trust that CryptoNote.org is genuine? What if they falsified the whitepapers on purpose?
Pages:
Jump to: