Author

Topic: 🧅 [ONION] Privacy Coin with Real Use Cases 🧅 DeepOnion 2.2.2 Released ⚡ - page 1410. (Read 298340 times)

newbie
Activity: 63
Merit: 0
Are you having doubts about PoS and PoW ?

Here is a good explanation of PoS and PoW algorithm and DeepOnion hybrid Technology  -> https://goo.gl/vNAHDH

Thank you for sharing it! It is very useful and informative!  Smiley
member
Activity: 168
Merit: 11
Are you having doubts about PoS and PoW ?

Here is a good explanation of PoS and PoW algorithm and DeepOnion hybrid Technology  -> https://goo.gl/vNAHDH
member
Activity: 110
Merit: 10
Few mins ago, On the live stream, suppoman told that DeepOnion is good Smiley

thanks to @Whoknows for the interesting question for this stream, it had a lot upvotes Smiley

https://www.youtube.com/watch?v=-62JOnpJutI

Well done @whoknows.

Most undervalued privacy coin with an amazing community I think was his words
member
Activity: 490
Merit: 14
@geppetto and @gwapogi won 2x rewards.

Be active guys, be like @geppetto and @gwapogi Cool Grin

Yeah they do great work! I am always excited to see what those guys will do next. Good work guys!! Smiley Well deserved!
member
Activity: 266
Merit: 19
It’s really amazing to follow this project. Really good to see 100% private and anonym.
Oh...wait till it becomes 149% Private and anonymous Wink
newbie
Activity: 81
Merit: 0
It’s really amazing to follow this project. Really good to see 100% private and anonym.
member
Activity: 182
Merit: 15
Sunday rewards distribution completed
https://deeponion.org/report.php?date=2018-03-04

thank you for all the work
keep up!

Received it, thanks!! Smiley Congrats to the winners! Smiley
Amazing !!! congrats to all winners , they all deserve it !

Congratulations to all. Another generous week for the awesome supporter of DeepOnion. 8 months of giving and the project is still a baby. The community and features just get better each and everyday.
newbie
Activity: 64
Merit: 0
Hi. Is there a problem with the Onion Explorer from here: http://explorer.deeponion.org ?
I see that the recent transactions do not show up.

Only this one works well: https://prohashing.com/explorer/Deeponion/
hero member
Activity: 1792
Merit: 513
<3 DeepOnion
Few mins ago, On the live stream, suppoman told that DeepOnion is good Smiley

thanks to @Whoknows for the interesting question for this stream, it had a lot upvotes Smiley

https://www.youtube.com/watch?v=-62JOnpJutI
full member
Activity: 326
Merit: 104
Santa Coin
Are we still planning to hire a public hero in Q1?
I think it would be better to do this once the airdrops are truly over.

That would mean a conscious deviation from the roadmap. Which also has to be communicated proactively

We were working on that but you need to understand that some weeks ago all Crypto tanked almost 500b... Also people were saying that Crypto will disappear..
We have a roadmap but also can be reasonable that some minor things can change due to a market/news influence.. I'm not saying that this don't gonna happen on Q1 but please be tolerant  Grin

Don't worry, I am tolerant. There may be others though who are not. They will look at the roadmap in Q2, ask why there is no update and spread FUD (DO cannot deliver). I think that this can be avoided - if we foresee that there is not going to be a PH in Q1 - with early communication.

People who are here and support are not the issue

Because they don't read our Forum, simple like that. We are making announcements every week about our developments and how close we are to the release. Also we send a Newsletter every week...

DeepOnion cannot deliver? We are to create one of the best privacy coins in less than one year without ICO.
What I believe Benezim is trying to say is that deviation from the roadmap is already with the community, granted it is discussed prior. But outsiders are going to take one quick glance and keep yelling scam. While I don't really care what fudders do, you must admit this wlll put outside investors on hesitation. We would like bigger investors after the airdrops, the last thing we need is a fresh scam campaign at the end of it.
full member
Activity: 630
Merit: 116
member
Activity: 266
Merit: 19
Why ONION is more better than DASH, MONERO, PIVX, VERGES Huh

Because it's all in one.
Some of coin have 1-2 features, while DeepOnion will have all of them.
member
Activity: 139
Merit: 19
MARCHE OU CREVE / WALK OR DIE
Why ONION is more better than DASH, MONERO, PIVX, VERGES Huh
full member
Activity: 372
Merit: 108
We are currently testing Deep Protocol (Stealth Address) and I want to share this information for the people who doesn't know how it works.

Stealth addresses take care of the receiver's privacy.


In cryptocurrency, the ability to spend a certain amount of coins is the same as the knowledge of the private key to the public key associated with the coins.


So (simplifying a bit), in Bitcoin if there is 1 bitcoin associated to the public key P and if Bob knows the corresponding private key x such that P = xG, then he can spend the Bitcoin by submitting a message (transaction) to the network signed with x.


There is one privacy issue, though: if Bob keeps using the same P to receive bitcoins, then any observer will be able to see all payments were made to the same entity that controls P (Bob). This is the problem that stealth addresses solve.


In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:


Bob creates two pairs of private and public keys. Let's denote them by (a,A) and (b,B), where by definition A = aG and B = bG. Bob makes the pair of public keys (A,B) available to the network; this will be his stealth address.


Alice wishes to send 1 bitcoin to Bob; that is, she wants to assign 1 bitcoin to a public key P such that Bob knows x and P = xG. She will construct such P using Bob's stealth address by using a hashing function H, choosing a random big number r, and setting P = H(rA)G + B. Then Alice sends the bitcoin to P, the transaction is broadcast along with R = rG (but not r, which can't be recovered from R).


Now how does Bob get the money? Well he has to keep listening on the network for all new transactions in the hopes that they are for him. When he sees Alice's transaction, he performs x := H(aR)+b and realizes that:


xG = (H(aR)+b)G = H(aR)G+bG = H(arG)G+B = H(raG)G+B = H(rA)G+B = P,


that is, Bob can reconstruct x such that P = xG and is therefore the owner of the bitcoin! Notice that neither Alice nor any observer has the ability to derive x (because they don't know a and b), and that besides Alice and Bob no one knows that (x,P) was generated from Bob's stealth address (because they don't know r).


Note that, as mentioned, this protects Bob privacy, but it is still visible to the network that Alice, the entity that used to control that bitcoin, made a transaction. In order to obfuscate that action, Monero implements the use of Ring Signatures, which will allow Alice to, instead of directly signing the transaction, produce a proof that her, or several other people, did send a coin to Bob. The math behind Ring Signatures is not as simple as in Stealth Addresses, but it is still very approachable.

So, in a nutshell:

Stealth addresses take care of recipient's privacy.

Ring Signatures take care of sender's privacy.


So.. ar u hodling? or are you some of those weak hands?





DqKpsiHCGoBip2WrEAWoTjtgeBT84f58xo​

My brain get's scrambled for the firs time Smiley
All I know is that, this is an exciting update!
Keep it up team!
member
Activity: 266
Merit: 19
This is how I see DeepOnion.

Download and Verify:
https://deeponion.org/community/attachments/deepvault87-jpg.128458/

Verified by DeepVault: DY5RDY4j6ogMjncNobW9yt5c2xEm8svP8T
                  ALWAYS
hero member
Activity: 1792
Merit: 513
<3 DeepOnion
@geppetto and @gwapogi won 2x rewards.

Be active guys, be like @geppetto and @gwapogi Cool Grin
jr. member
Activity: 350
Merit: 6
Sunday rewards distribution completed
https://deeponion.org/report.php?date=2018-03-04

thank you for all the work
keep up!

Received it, thanks!! Smiley Congrats to the winners! Smiley
Amazing !!! congrats to all winners , they all deserve it !
full member
Activity: 952
Merit: 137
We are currently testing Deep Protocol (Stealth Address) and I want to share this information for the people who doesn't know how it works.

Stealth addresses take care of the receiver's privacy.


In cryptocurrency, the ability to spend a certain amount of coins is the same as the knowledge of the private key to the public key associated with the coins.


So (simplifying a bit), in Bitcoin if there is 1 bitcoin associated to the public key P and if Bob knows the corresponding private key x such that P = xG, then he can spend the Bitcoin by submitting a message (transaction) to the network signed with x.


There is one privacy issue, though: if Bob keeps using the same P to receive bitcoins, then any observer will be able to see all payments were made to the same entity that controls P (Bob). This is the problem that stealth addresses solve.


In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:


Bob creates two pairs of private and public keys. Let's denote them by (a,A) and (b,B), where by definition A = aG and B = bG. Bob makes the pair of public keys (A,B) available to the network; this will be his stealth address.


Alice wishes to send 1 bitcoin to Bob; that is, she wants to assign 1 bitcoin to a public key P such that Bob knows x and P = xG. She will construct such P using Bob's stealth address by using a hashing function H, choosing a random big number r, and setting P = H(rA)G + B. Then Alice sends the bitcoin to P, the transaction is broadcast along with R = rG (but not r, which can't be recovered from R).


Now how does Bob get the money? Well he has to keep listening on the network for all new transactions in the hopes that they are for him. When he sees Alice's transaction, he performs x := H(aR)+b and realizes that:


xG = (H(aR)+b)G = H(aR)G+bG = H(arG)G+B = H(raG)G+B = H(rA)G+B = P,


that is, Bob can reconstruct x such that P = xG and is therefore the owner of the bitcoin! Notice that neither Alice nor any observer has the ability to derive x (because they don't know a and b), and that besides Alice and Bob no one knows that (x,P) was generated from Bob's stealth address (because they don't know r).


Note that, as mentioned, this protects Bob privacy, but it is still visible to the network that Alice, the entity that used to control that bitcoin, made a transaction. In order to obfuscate that action, Monero implements the use of Ring Signatures, which will allow Alice to, instead of directly signing the transaction, produce a proof that her, or several other people, did send a coin to Bob. The math behind Ring Signatures is not as simple as in Stealth Addresses, but it is still very approachable.

So, in a nutshell:

Stealth addresses take care of recipient's privacy.

Ring Signatures take care of sender's privacy.


So.. ar u hodling? or are you some of those weak hands?





DqKpsiHCGoBip2WrEAWoTjtgeBT84f58xo​

very nice explanation of stealth addresses by Vaas!


To verify, please download the Image from here: https://deeponion.org/community/attachments/stealth-jpg.136094/

Verified by DeepVault: DiPLr87p1SEkkhzQTfaSXfmGLSh7jQGCCm
sr. member
Activity: 1456
Merit: 386
DeepOnion Your Utility Coin with Ultimate Privacy
Jump to: