Pages:
Author

Topic: [PRE-ANN] RecoveryCoin - ECDSA-based cryptocurrency with fair mining (Read 3052 times)

newbie
Activity: 14
Merit: 0
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.



Thank you for your interest in the internals of our technology. Right now, we are talking about generating an address:

1. Private keys are 32 byte, randomly generated by a secure random class, same as bitcoin.
2. The ECDSA curve used here is sepc256k1.
3. The 64 byte point is the curve's generator multiplied n times (where n=private key). Then you have 32 bytes for the X coordinate and 32 for the Y.
4. These 64 bytes are split into 4 chunks of 16 bytes, where each position is added up modulo 256, resulting in 16 bytes.
5. Network bytes are used to identify the network (testnet/mainnet/other) and to validate the address (instead of checksum). The network bytes are also added up modulo 256.
6. If all 16 bytes are below 100, then it's a valid address. This does not reduce entropy of the private key generator, it's not even related to that. If you check it, it makes it difficult to generate the address therefore making it difficult to brute-force attack it.

Hope that helps.
mvl
newbie
Activity: 32
Merit: 0
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
Well it is not up to you to decide if we have all the information we need. That is up to your target audience.

But, let's go into a technical discussion, if that is what you want. I take this passage from your "whitepaper", which I would not really call a whitepaper, because it leaves out most of the details, and fails to connect the dots of information that are in it.

Quote
Addresses

Every account address is represented with 32 digits, and is created the following way:

1. A random private key is chosen
2. A point on the curve is calculated into a 64 byte array
3. The byte array is collapsed into a 16 byte array
4. A constant 16 byte array called “Network Bytes” is also added
5. If all bytes in the address are below 100, the address is valid and can be represented with digits only (32 digits for 16 bytes)

It takes some time to generate the address, yet it saves space on the chain and adds proof of work. While generating the address, the client may hit or recover one of the targets.
ad 1. What does the randomly generated private key look like? What are it's specifications?
ad 1. What does random mean in this case? What type/class of random generator are you using? Is it seeded, and if so: how?
ad 2. "A point on the curve is calculated into a 64 byte array". Many questions:
ad 2. What curve? what does a "point on the curve" mean? What point? what curve? What do you mean by "chosen" ? How does that work? Are there criteria to "choose" a point ?
ad 2. If you have 64 bytes, you have 64 bytes. An array is a representation of those bytes. What does that mean? How many elements are in your array? Is it associative or zero base indexed? How many bytes are used for the indices and how many bytes are for the data? The fact that the 64 bytes are an array implies that they are ordered. Why the ordering and how is the ordering preserved? Why the array representation? Sounds like bullshit to me but please prove me wrong.
ad 3. What do you mean by "collapsing a 64 byte array into a 16 byte array" ? Do you realise that if you reduce 64 bytes to 16 bytes, you are reducing entropy, thereby throwing away information? Lowering entropy is rarely a good idea in cryptographic systems. Please explain why this is a good idea in this case. Oh, and explain the "collapsing" algorithm.
ad 4. Why use 16 bytes for a constant? A constant is a constant. You are not using the 16 bytes entropy. Again: why is this a good idea? It does not add entropy nor information.
ad 4. What is the "Network Bytes" constant being used for? What is the purpose?
ad 5. Again lowering the entropy, by not using all bytes below '100' (assuming 100 in 10-base). Looks like you are throwing away all the advantages of high entropy in cryptographic systems, thereby making your system weaker with every step.

Please answer those questions, because they are a big big concern.


For the non-technical people: the "whitepaper" may seem to use some impressive words, but if you have a technical/cryptographical/software development background, it raises more questions than it answers. In fact, a number of sentences in the whitepaper are technical nonsense, and others are fundamentally wrong.
legendary
Activity: 1059
Merit: 1000
how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes


wow, then I become rich!  Grin
legendary
Activity: 3122
Merit: 1102
Leading Crypto Sports Betting & Casino Platform
The idea is great and the concept even Greater! people should give this a shot if nothing else to advance their personal aptitude!
i am totally unsure if this will go far or not as i may not be the right person to ask !
But the idea could spin in many different ways and could be a gold mine if the devs keep a solid ground and are with serious intentions to developing this even further!
ATTA BOY!
member
Activity: 98
Merit: 10
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.

Did you really just use a comma before an and..... ?

Very Professional Cheesy
newbie
Activity: 14
Merit: 0
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.

You have all the information you need on the website, whitepaper and code. If you post any specific technical question, and it seems serious to us, you'll be answered.
member
Activity: 98
Merit: 10
how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes

After the dev uses your private keys that you send to him so he can create REC coins from them for you.....  Roll Eyes Cheesy
legendary
Activity: 1667
Merit: 1008
Stoned & Stranged
how to mining?  Huh

You don't mine it you just have to send you bitcoins to the address given by the OP and you will be rich soon  Roll Eyes
legendary
Activity: 1059
Merit: 1000
how to mining?  Huh
newbie
Activity: 14
Merit: 0

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  Grin - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  Wink

A good heart with too many smilies
sr. member
Activity: 779
Merit: 255
You're being childish. Why don't you just explain the beauty of your concept instead of getting all fiery wild about how I understood your statement about receiving REC. That's how I understood it. All you have to do is explain it so no one else will misinterpret it the way I did.
hero member
Activity: 798
Merit: 500
This seems very nice and really helpful for all people who are stuck with the attacks that are not true. and I'm still waiting for it. Grin Grin
member
Activity: 98
Merit: 10

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  Grin - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  Wink

Who asked for anyone's private keys? Do you people know how to read or you are just trolling around threads?

So called "Devs" or "Developers" who use the word Troll are pretty much giving themselves away as a scammer, wouldn't you use a more technical term if you were Legitimate ? Cheesy What kind of genuine start up company would treat its consumers like shit and expect them to stay part of it and have faith in you..... yeah 0 thats right, fucking dumbass ! Cheesy
newbie
Activity: 14
Merit: 0

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  Grin - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  Wink

Who asked for anyone's private keys? Do you people know how to read or you are just trolling around threads?
sr. member
Activity: 779
Merit: 255

7. The private keys are just used to demonstrate the PoW address


Private keys shouldn't just be given away casually. Asking for private keys raises red flags so thank heavens for people on the forum that can discern when something appears scammy.

There are people on this forum who - out of their good heart  Grin - make it their purpose to expose scams/scammers, so while they do their investigation and point out some questionable portions of the announcement, it would be best to show proof that the one being accused isn't a fraud  Wink
member
Activity: 98
Merit: 10
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.

You have another thing coming bitalchemists Grin or should I say Triswardhani, loljosh, mintodev, templar77, Carlos RT Ferguson, nite69, Thewolfofcrypto Wink

You ain't fooling anyone Cheesy

Unless you have proof to what you're saying, you should hurry up and get the hell out of this thread.

Yeah keep dreaming sonny Jim, I have proof your an asshole Cheesy


8. You lack intelligence


Plus the fact that your English grammar when typing is very much the same if not word for word as all your other alts... fuck dude and you even said this...


3. This is not the best proverb you could come up with

Hope that answers...

Look how you ended it and you are having a sook about nouns, adjectives & proverbs Roll Eyes

Want to rub me again ? I don't grant you wishes though Wink Grin
mvl
newbie
Activity: 32
Merit: 0
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!


1. Satoshi nakamoto was anon dev
He did not beg for gifts or investments.
Quote
2. You can have anon escrow and still be legit
You don't have Escrow. There is a BTC address and the rest is a matter of trust. That is not Escrow.
Quote
3. This is not the best proverb you could come up with
4. Everything has a starting point
5. What exactly is the code lacking in your opinion?
6. Have you ever heard about mono
Yes, but the thing is you are asking for funds based on just promises
Quote
7. The private keys are just used to demonstrate the PoW address
Bullshit. In your OP you tell people that they get REC coins in some sort of "parallel" address using the private keys of the Bitcoin addresses they used for sending. Literally. It is in the OP. Your own words.

Quote
8. You lack intelligence
Usually, people get personal only when they don't have real arguments, because real arguments are much stronger. Your personal attack is therefore a sign of weakness, and another indication that this project cannot be trusted.
newbie
Activity: 14
Merit: 0
youre write
in launch coin and create coin is expected in September 2017.
but this now month january youre open ico selling, collect bitcoin investor and without escrow because coin still not ready

All smartass traders, including you are welcome to get off this thread at once.

You have another thing coming bitalchemists Grin or should I say Triswardhani, loljosh, mintodev, templar77, Carlos RT Ferguson, nite69, Thewolfofcrypto Wink

You ain't fooling anyone Cheesy

Unless you have proof to what you're saying, you should hurry up and get the hell out of this thread.
newbie
Activity: 14
Merit: 0
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!


1. Satoshi nakamoto was anon dev
2. You can have anon escrow and still be legit
3. This is not the best proverb you could come up with
4. Everything has a starting point
5. What exactly is the code lacking in your opinion?
6. Have you ever heard about mono?
7. The private keys are just used to demonstrate the PoW address
8. You lack intelligence

Hope that answers...
mvl
newbie
Activity: 32
Merit: 0
BE CAREFUL PEOPLE, THERE ARE A LOT OF RED FLAGS HERE:

  • Anon dev
  • No Escrow
Promises things that are to good to be true: it walks and talks like a duck.
  • Github user is new and anon as well
  • Source code on Github is just C# and lacks a LOT
  • Source code on Github is C#, but OP mentions OSX and Linux as targets as well
  • This is dead wrong:
    Quote
    Deposit any amount in BTC to 19vVPuzXPBUiNdnr6KZwYP9rAtdtWkDjqi until 2017/03/01
    Get x150 to your parallel REC address
    (using the same private key of the BTC address you've sent from; funds will be hardcoded into the genesis block).
    Launch is expected in September 2017.
    Private keys are private keys. They should never be available for anyone but you. The person who has your private keys, controls your Bitcoin. So if the dev states that he uses your private keys to create REC coins in a "parallel" address, that alone should be enough to abandon this coin/project.

Keep your private keys safe. Make sure nobody gets your private keys. If someone is after your private keys, he is after your bitcoin!
Pages:
Jump to: