Pages:
Author

Topic: deleted - page 21. (Read 68076 times)

sr. member
Activity: 420
Merit: 250
March 23, 2015, 09:09:17 AM
Team is working on another technology for faster syncs and more efficient bandwidth usage.

But can't comment without a final working wallet.
sr. member
Activity: 420
Merit: 250
March 22, 2015, 11:38:28 PM
Yes of course, bounty is still there.

Hardforkcoin, old name cause ABF was the primary feature of this.

See original ann.

https://bitcointalksearch.org/topic/annhardforkcoin-720181
sdp
sr. member
Activity: 469
Merit: 281
March 22, 2015, 09:14:05 AM
Is there still a bounty?

 Huh

HFC really stands for huge fast Coin.  Doesn' t it.  Tell us the truth. Wink
sr. member
Activity: 420
Merit: 250
March 22, 2015, 07:53:22 AM
Proxy support for the alpha client coming up...
sr. member
Activity: 420
Merit: 250
sr. member
Activity: 420
Merit: 250
March 22, 2015, 05:19:32 AM
Ok.

A comparatively cleaned ann.

Details moved to website.

Tell me if it has to be shortened more.
sr. member
Activity: 420
Merit: 250
March 21, 2015, 09:29:23 PM
Yeah, I'll move the research work to the website.

Thanks for the advice.
legendary
Activity: 1274
Merit: 1000
March 21, 2015, 07:02:51 PM
be careful doing a giveaway here. you might get locked from the thread.

Could you put a section in OP with coins specs. like all the coins have.

block rewards break down.
time per block
how many pow coin.
is this pos? if so how many pos %

etc


please also try to clean up the OP and formulate your message and the coins purpose a bit better so it will be easy to follow. this looks interesting but its so hard to follow throw that wall of text.


Thanks!

sr. member
Activity: 420
Merit: 250
March 21, 2015, 01:14:21 PM
7dcaee4cb51f3a40154380cbfc5b5d87e3340c638c108d89f74773ce22e52e6d

2000 HUGE paid for downloading wallet.
sr. member
Activity: 420
Merit: 250
March 21, 2015, 03:32:33 AM
9.3.0.0 (beta) with TLS server support; or in simple terms, this wallet is completely backwards compatible with the old protocol. It can take incoming connections from both the old protocol and the new one (compressed, encrypted), but it only makes outgoing connections using the old protocol.
http://www.hardforkcoin.org/BIGcoin-9.3.0.0.zip
https://github.com/hardforkcoin/bIGcoin-9.3.0.0-beta

Alpha (with TLS client support). This is just like the above (9.3) but when making outgoing connections, it's going to use the new protocol (TLS 1.2 encryption + compression).
https://github.com/hardforkcoin/BIGcoin-alpha
http://www.hardforkcoin.org/BIGcoin-alpha.zip

With the alpha version, you'll see the cipher and keybits in getpeerinfo.

-minkeysize switch also exists.

Coming soon; 'dumpcert' command.
sr. member
Activity: 420
Merit: 250
March 20, 2015, 10:51:31 AM

It depends on how many votes have been casted for the winning category.

Suppose, girl 1 wins with 4 votes. So each voter gets 10000/4.

You have to PM the OP with your BIGcoin address and your choice.
hero member
Activity: 728
Merit: 500
sr. member
Activity: 420
Merit: 250
sr. member
Activity: 420
Merit: 250
sr. member
Activity: 420
Merit: 250
March 18, 2015, 10:00:06 PM
Didnt mention about the new switches

-certkeysize: Specify key size of the generated private/public keypair for TLS connections. Defaults to 2048.
-minkeysize: Minimum keysize which is required to connect to an outbound connection. Defaults to 2048.
sr. member
Activity: 420
Merit: 250
March 18, 2015, 12:31:58 PM
TLS (SSL) v1.2 secured connections (better than tor)

Code:
$ openssl s_client -tls1_2 -connect seed.hardforkcoin.org:14351               
CONNECTED(00000003)
depth=0 C = GB, O = BIGcoin, CN = My IP
verify error:num=18:self signed certificate
verify return:1
depth=0 C = GB, O = BIGcoin, CN = My IP
verify return:1
---
Certificate chain
 0 s:/C=GB/O=BIGcoin/CN=My IP
   i:/C=GB/O=BIGcoin/CN=My IP
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=GB/O=BIGcoin/CN=My IP
issuer=/C=GB/O=BIGcoin/CN=My IP
---
No client certificate CA names sent
---
SSL handshake has read 1053 bytes and written 635 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: zlib compression
Expansion: zlib compression
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : AES256-GCM-SHA384
    Session-ID: 672E3DCA1E9E6A762A50C0580C9D7D7F27BAD635918EB33F00330FD0AC21A946
    Session-ID-ctx:
    Master-Key: EDA8C354209510C53F3D0DE7E3B350ABE5626977A25BBE8AA93829F84D37CB6798D528BEC6D2A3D97A5E2FE2BB251E7C
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 96 16 d0 71 8b a6 24 bf-21 f3 d1 06 ad dd 07 39   ...q..$.!......9
    0010 - d5 7b 04 96 7a 8d 99 1a-3c 57 e0 3a bc 5f ca e9   .{..z...    0020 - 59 62 3d 55 90 af 2d 6d-a3 02 4e 7d 6f 0d ee 55   Yb=U..-m..N}o..U
    0030 - 49 1e 1e 1f 04 14 dc cb-12 74 6b 9b bb 9a e5 5e   I........tk....^
    0040 - 13 24 f3 7f 9b 02 5b 0b-b9 84 c8 87 83 7f 42 46   .$....[.......BF
    0050 - 81 28 f2 ed 79 fa d2 44-f3 c7 b6 b5 f1 04 0c 36   .(..y..D.......6
    0060 - eb 88 e8 d5 10 6a 79 28-aa 66 a8 a8 0a 5a e0 a1   .....jy(.f...Z..
    0070 - 76 9f 37 2f 49 dc 26 27-60 41 3d 6e 83 85 f0 62   v.7/I.&'`A=n...b
    0080 - b6 f8 84 a3 16 73 e1 42-8c bd cc 43 1d 48 01 2b   .....s.B...C.H.+
    0090 - 23 43 c4 95 1e 67 0a a0-0c 58 bc b2 4f 6f a5 39   #C...g...X..Oo.9

    Compression: 1 (zlib compression)
    Start Time: 1426698460
    Timeout   : 7200 (sec)
    Verify return code: 18 (self signed certificate)
---

{
        "addr" : "103.242.119.194:14351",
        "services" : "00000001",
        "lastsend" : 1426698809,
        "lastrecv" : 1426698808,
        "bytessent" : 1223,
        "bytesrecv" : 146,
        "conntime" : 1426698808,
        "version" : 70001,
        "subver" : "/Blake:9.3.0/",
        "inbound" : 0,
        "startingheight" : 565221,
        "banscore" : 0,
        "cipher" : "AES256-GCM-SHA384",
        "CertificateKeySize" : 2048,
        "syncnode" : 1
    }

Connections made by the BIGcoin wallet is encrypted using TLS v1.2; thus your IPS or network administrator or the government has no idea what you're doing making the BIGcoin protocol completely anonymous.

Without this feature blockchain obfuscation (DarkSend, Ringsignature) is completely transparent if the ISP or network administrator  or the government is spying on your activity; actually it's worst, they all know all the addresses you own and what you're doing with your money regardless of the blockchain obfuscation you're using, since this is done at a protocol level.




Tor can be almost completely be blocked using the list of known exit nodes, but doing the same for BIGcoin is not possible (see Randomized listen port) since there is no such list of exit nodes.

Tor is a high latency network. That's the reason why using video/audio conferencing is not popular when using tor. Blockchain technology relies on low latency network for proper operation, otherwise the miners are at a loss following increase in number of orphans, specially when block times are low to support faster transactions and higher network scalability.



Besides it's questionable if Tor's 7000 relays can support Bitcoin's 1 million transactions per day and 6200 full nodes with it's downloading of 23 GB blockchain. It's not know how the Bitcoin network will function with the high latency tor network.

BIGcoin's TLS implementation gives tor-like anonymity with an efficiency more than the native Bitcoin protocol.

See "Network synchronized updates" for migration plans to full TLS 1.2 secured networks.

Randomized listen port
Current status: pending

BIGcoin's default port has been changed to 443, the default SSL port for HTTP traffic; in case it's not able to bind to this port, it's going to choose a random port.

This along with protocol encryption makes blocking or detecting BIGcoin protocol next to impossible.

Transaction broadcast uncertainty.

BIGcoin protocol is undergoing heavy development and this TLS feature is not complete. This technology is currently pending.

Protocol compression

BIGcoin uses Zlib compression to improve on latency and reduce data usage, making the networks much more scalable and capable of handling more transactions per second. In our tests, our syncs were 22% faster. Expect more savings in a transaction heavy block chain with large blocks.

Because of lowered latency, expect less orphans especially when the block size grows to larger amounts.
sr. member
Activity: 420
Merit: 250
March 18, 2015, 12:00:04 PM
How protocol migration is done
Suppose BIGcoin team wants to implement protocol changes; using ABF this can be consistently done without a single fork or refused connection.
Assuming wallet C as the current wallet version running the old protocol. Wallet Z is the version fully implementing the protocol and completely incompatible with C; i.e. it neither of C or Z accepts each other's connections. X and Y are intermediate versions of the wallet released between versions C and Z. X accept connection from both the new and old protocols (it's compatible), but does not connect using the new protocol. Y is just like X but connects using the new protocol.

sr. member
Activity: 420
Merit: 250
March 17, 2015, 12:33:46 PM
Sorry for the delays.

Writing content for the new features. Will update top post as soon as it's made.

This is the 9.3 wallet.

http://www.hardforkcoin.org/BIGcoin-9.3.0.0.zip
https://github.com/hardforkcoin/bIGcoin-9.3.0.0-beta

This also listens as a TLS v1.2 server. Try connecting to the wallet running on your local system with --

$ openssl s_client -tls1_2 -connect 127.0.0.1:14351

Certificates are generated dynamically on startup.

This wallet works in 'dual mode', it detects if the incoming connection is TLS or unencrypted BIGcoin protocol and acts accordingly.
hero member
Activity: 690
Merit: 500
March 16, 2015, 02:07:23 PM
The network diff has raised quite a bit.

What's it like these days?

Code:
{
"blocks" : 560063,
"currentblocksize" : 1000,
"currentblocktx" : 0,
"difficulty" : 102.18202416,
"errors" : "",
"generate" : false,
"genproclimit" : -1,
"hashespersec" : 0,
"networkhashps" : 11643010307,
"pooledtx" : 0,
"testnet" : false
}
sr. member
Activity: 420
Merit: 250
March 16, 2015, 12:15:00 PM
Ok, the GIT repository is 9.2 again.

9.3 has been fixed. To be released soon.

9.4 will be released only as source.
Pages:
Jump to: