Pages:
Author

Topic: ion discussion - page 3. (Read 9675 times)

sr. member
Activity: 420
Merit: 262
September 11, 2015, 10:06:04 AM
#63
Yes seriously I don't have time to waste here on talk. We need action.

You all carry on, I am leaving the thread open. I'll delete anything that gets obnoxious.

Yeah of course I know what action is required to embarrass the fuck out of young punks.
hero member
Activity: 980
Merit: 1001
September 11, 2015, 04:01:26 AM
#62
Is there any ETA on when whitepaper or even just a general explanation of how you're archieving all those wonderfull things ?
I know you want to be very secretive about this and you prob have good reasons but at some point you're gonna have to tell people what's going on in order for them to trust your project.
legendary
Activity: 1484
Merit: 1002
Strange, yet attractive.
September 11, 2015, 12:18:37 AM
#61
@ion.cash: If I may, here's a nice advice for you. If you don't like someone's behavior, you can build up a story as you see fit in order not to get frustrated (ie: your girlfriend dumps you - you explain it as "you had incompatible personalities"; NOT as "she found someone better"). In any case, since our time here is limited, don't waste your time into meaningful debates and oppressive thoughts.

I usually try to let my actions speak for me. From what I can tell, you're a "DO-er" not just a "Talker". Get your project going and I'm sure whoever has issues with your personality, brains potential, or scientific capabilities, they will get their answer in time...

PS:
Just to make things a bit funnier, here's a nice logo for you. It's my wife's favorite chocolate. Smiley


newbie
Activity: 28
Merit: 0
September 11, 2015, 12:04:48 AM
#60
Basically it was this young punk who was disrupting everything:

I)  A common complaint of DPoS is that it can't be decentralized because it has the word "delegated" in the title...

Just like when I delegate the transfer of my internet packets to my ISP and all the router hops along the way, thus my participation in the internet is no longer decentralized.  Roll Eyes

That is the fabulous logic of Smoothie which he tried to ram down our throat 5 or more times.

As I tried to explain to that young punk several times, if the routers are fungible, replaceable, and can't be monopolized, then the packets find their way to the destination, without need to trust or centralize. Delegation should not be conflated with centralization, nor trust. We told him this 5 or more times, yet he still insisted.

And he claims to be a software developer. I wouldn't let him any where near my code.

By my own profession (software developer)
legendary
Activity: 1498
Merit: 1000
September 10, 2015, 07:02:44 AM
#59
Don't worry, this is all good if this is about to succeed - it will strengthen the project.
Of course you are only human and you should try to manage your interactions because everything has it's price.
newbie
Activity: 28
Merit: 0
September 10, 2015, 06:59:52 AM
#58
Can you reveal distribution plans? You mentioned billions of coins or more, will it be like larger block and than halving after some time or something nethash/diff related?

What I appreciate is the interest that has been shown, as it helped to confirm to me that the crypto market is not dead despite the price being down (and I think headed lower before bottoming). Because this has enabled me to gain more confidence that I am not wasting my time coding.

And I have already been contacted by an experienced crypto Java developer, so that meets my goals along with getting feedback on the name.

Other than those welcome successes, I feel shame for the discordant attention this thread has drawn (both shame for myself and for the other parties where we can't have mutual respect) and I want to delete everything and close this thread. I am trying to restrain myself, so I will just lock the thread now and go about deleting my recent posts in the other threads because I feel I have nothing to gain from parading myself around like a clown in a circus.

As for the distribution, I think it doesn't help at all to go into details like that so prematurely. It can surely just lead to more things for people to gossip or attack about and I think it is better that when we are ready to distribute we just do it. The market will tell us if we done our job correctly and if the markets feels we have made the honest and most network effects building choices w.r.t. to distribution.

I think I started this thread because I was excited to share my excitement and find some others to work with. I guess I was originally thinking it would be a community spirit where I would check in every few days and update published code and get some positive feedback loop going with the community. When I played team sports it wasn't politics, but about who could do the best job at each position. We competed to make each other better. We learned to have mutual respect. But I remember that was a difficult adjustment process. At the start, all the guys had some kind of attitude adjustment we had to go through in order to truly appreciate each other and work together as one. I just don't think a community here can work like that. It would need to be more a cult and zombie or speculative pump mass mania effect.

Now I rather feel like hiding under a rock and showing up one day da bomb. Wasting too much time on very draining communication. I think its better to communicate through non-interactive channels, e.g. white paper, website, and wiki.

These attacks can be squelched if for observers and peers their system function is verifiable truth, they can prove a trusted reputation, or they can expend or risk sufficient resources which exceed the gain from cheating.



Already asked this, but it didn't get a response, so here it goes again. How are you solving the problem (on zero confirmation transactions) which is bolded in the quote?

It isn't so simple to explain and would basically tell you major aspects of my design and I already said I am not going to reveal that at this early stage. So I think I just need to disappear for a while. I already got the feedback I needed. Thanks and I apologize for nothing being able to give the complete information now.
legendary
Activity: 1498
Merit: 1001
180 BPM
September 10, 2015, 06:22:50 AM
#57

These attacks can be squelched if for observers and peers their system function is verifiable truth, they can prove a trusted reputation, or they can expend or risk sufficient resources which exceed the gain from cheating.



Already asked this, but it didn't get a response, so here it goes again. How are you solving the problem (on zero confirmation transactions) which is bolded in the quote?
full member
Activity: 126
Merit: 100
September 10, 2015, 05:19:17 AM
#56
Can you reveal distribution plans? You mentioned billions of coins or more, will it be like larger block and than halving after some time or something nethash/diff related?
legendary
Activity: 3444
Merit: 1061
September 10, 2015, 04:11:35 AM
#55
i like this guy, he's an artist  Cool... make an obra meastra

i'd rather boost anonymint's ego than attact it (some people become better in what they do if their ego is boosted - i think he is one them)

we will know the results anyway when Ion is released. and i prefer to be on the positive side.
legendary
Activity: 1050
Merit: 1016
September 10, 2015, 04:02:01 AM
#54
People regularly confuse Java with JavaShit, and claim the security of Java is rubbish because JavaShits is.  In fact the 2 are VERY different languages, and the only common ground between them is some syntax similarities (but then Java and C++ share a lot of that), and the damn name.

Any and all languages are insecure if the skills of the developer are not up to par.

In fact a very large portion of the worlds banking applications are written in Java, on the front and back end....so go figure.

Please elaborate for us semi-non-specialists.  Are you talking about Mono or what?

I am sure Oracle.Sun.Java's crypto primitives work very well (until they don't, because 'Oops ZeroDay LOL').

For non-performance critical applications in FinTech, Java has a lot of benefits.

Generally its performance for regular operations isn't that far behind C, memory management is much easier and there is no risk of overflows, development turn around is generally faster, it can be securely sand-boxed (if you know what your doing) and it is of course multi-platform in the most general sense.

A lot of the top tier financial institutions spend great effort to ensure that the libraries are clean and bug free....its hardcore.  They generally run custom library repositories that are based on the standard Java, but with improvements where required (the crypto and math libs for example are way ahead of what is in the standard package).  A lot of these improvements are fed back to Oracle/Sun and so make it into subsequent releases.

The guys that work on this stuff are the best of the best, some of which are paid $1000+ per day, which is a small price to pay for the exposure received if something should screw up.  If Java was inherently insecure, it wouldn't be used for anything.

I think some of the misconception comes from the fact that the infrastructure topology is dated, but the software that runs within is very solid.  There are exceptions I'm sure, but what I've seen working in this field in the past, its very clinical.
newbie
Activity: 28
Merit: 0
September 10, 2015, 03:36:42 AM
#53
I am sure Oracle.Sun.Java's crypto primitives work very well (until they don't, because 'Oops ZeroDay LOL').

I am not using Java's bloatware crypto libraries! I am writing all my stuff from scratch to make sure it is correct, concise, elegant, clean, and kick ass. You don't realize you are talking to a prolific programmer.

And I already ported Ed25519 from Java to Scala (I2P code).
full member
Activity: 210
Merit: 100
September 10, 2015, 01:30:36 AM
#52
legendary
Activity: 1181
Merit: 1002
September 10, 2015, 01:14:05 AM
#51
kinda like "ion"

added the topic to my watchlist
newbie
Activity: 28
Merit: 0
September 10, 2015, 01:00:38 AM
#50
Oh so now Smoothie has filed a bogus trust claim on my username to try to get revenge. (Click the "Trust" next to my username to the left)

It won't help him escape from the reality of this day.

When a person frames their argument with Freudian words such as "immaturity" and "not humble", they speak about themselves. They attempt to project their passive aggressive psychological illness on others.

It is rather sick to observe. (pun intended)

Edit: appears this behavior of abusing the Trust ratings is being sanctioned by the mods as they deleted my positive rating with counter argument from my long standing username TPTB_need_war.  Perhaps Smoothie has been the one sanctioned to do a demolition job on my coin by the powers-that-be that favor Bitcoin and own this forum. This was expected and it won't help them.

My long explanation.
newbie
Activity: 28
Merit: 0
September 10, 2015, 12:52:20 AM
#49
You have to trust that the person/node will do the task otherwise there is no point in delegating in the first place.

You continue to ignore information which has already been stated. I have emphasized upthread that the nodes are fungible, replaceable, and unable to monopolize their function. A node that continuously doesn't do its function will simply have removed itself from the network giving way to the other nodes which are doing their function.

I think you ought to just wait until I publish the entire white paper, so the whole thing can make sense to you.

Yup waiting  Roll Eyes

Perhaps you should publish all of the available information (without revealing your entire system) to the OP as opposed to cherry picking what you want to disclose and then doing a dance as people's questions come into this thread.

One thing I despise is a moving target in a discussion.

Please make everyone's reading and understanding a little easier by presenting the information at the beginning of this thread instead of as you see fit.

Again you ramp up the pressure even more trying to blame me for you inability to be able to read. You can't even read a dictionary:

You have to trust that the person/node will do the task otherwise there is no point in delegating in the first place. Please see my quoted definition of the word DELEGATED.

You continue to ignore information...

I don't know why you incapable of reading a dictionary properly.

del·e·gate
noun
ˈdeləɡət/
1.
a person sent or authorized to represent others, in particular an elected representative sent to a conference.
newbie
Activity: 28
Merit: 0
September 10, 2015, 12:39:19 AM
#48
I missed your excerpt.

Perhaps you should repost that "generous" portion in the OP so everyone doesn't have to DIG for it and play this moving target game with you.

Perhaps you will learn RTFM.

Reading 2 pages of a thread is too much for a prima donna, that is no excuse for you to blame me for not putting the entire thread in the opening post.

I can see we are going to have significant problems with political trouble makers, who have nothing better to do but be lazy and disruptive— apparently intentionally so.
newbie
Activity: 28
Merit: 0
September 09, 2015, 11:16:07 PM
#47
For constant time crypto code, you'd ideally want to go low level. Also for performance critical sections. Use the correct tool for the job. For high level semantic code that doesn't have those those other low level requirements, use a high level language.

You wouldn't dig trenches with spoons. Use a backhoe when you don't need to carve out small areas around sensitive pipes.
legendary
Activity: 1050
Merit: 1016
September 09, 2015, 11:02:19 PM
#46
More damned facts to correct big egos with big mouths...

Anyone who trust their coins to (very) high level languages like Java (and and its hopeless VM model) deserves to lose all their money.

Anyone who trusts your FUD deserves to lose all their money when you conflate the secure JVM with the flaky Java libraries and flaky Java security model especially the grotesque web browser sand box model:

https://books.google.com.ph/books?id=YMQqZoc6L3EC&pg=PA67&lpg=PA67&ots=82VUnh-Gfy#v=onepage&q&f=false

https://threatpost.com/javas-losing-security-legacy/102176/

http://www.infoworld.com/article/2610267/security/patching-has-failed--so-it-s-time-for-java-to-go.html

One doesn't have to use the flaky aspects of Java when using the JVM. For example, the BitcoinJ Android bug was due to an error in the random number generator Android Java library. It had nothing to do with the JVM (virtual machine).

This sort of error proves that at best you are a very junior level programmer, or probably not even a programmer.

Also, you apparently don't understand programming enough to understand that many errors originate from the lack of semantic clarity and high level semantic invariants static type checking that isn't done in low level languages such as assembly, C, and C++. And C++ is one of the most complex, grotesque languages ever with perhaps only Perl and Brainfuck making it look good. And take this from someone who wrote a million user application in C++ and another one in C. I estimate you don't even know what sort of improvements in correctness pure functional programming can provide.

Get off my lawn kid!

Yeah this annoys me greatly!

People regularly confuse Java with JavaShit, and claim the security of Java is rubbish because JavaShits is.  In fact the 2 are VERY different languages, and the only common ground between them is some syntax similarities (but then Java and C++ share a lot of that), and the damn name.

Any and all languages are insecure if the skills of the developer are not up to par.

In fact a very large portion of the worlds banking applications are written in Java, on the front and back end....so go figure.
legendary
Activity: 2940
Merit: 1865
September 09, 2015, 10:53:16 PM
#45
...

ion

Medium-sized ego OROBTC asks (begs) to K.I.S.S.!  Simplicity (relative) is the key to mass-adoption.
newbie
Activity: 28
Merit: 0
September 09, 2015, 09:52:18 PM
#44
I continue to tease with damned facts...


My white paper will be the first to show the above are false assumptions.

I am telling you I am going to shock the world.

I don't do small things. I rock the Titanic.

Call this hype without details. Fine. But I can't let you write fallacious statements without pointing them out.
Pages:
Jump to: