Sorry, but you are incorrect. It is using the exact same techniques of one time ring signatures (intractability) and stealth addresses (unlinkability). The code may be brand new but the cryptography techniques and math behind the one time ring signatures are the same (which include the zero knowledge proof) and were invented by cryptonote.
I could go and rewrite the code to do this stuff yet again (in fact I have done so for my own experimental purposes) but I wouldn't claim it to be anything other than a reimplementation of cryptonote. Someone else on the Monero project did it in python, and called it mininero.
If anyone is claiming otherwise they are either confused or trying to scam you (I don't suggest the latter necessarily, just pointing out the possibilities).
I mention it only in response to others who do so, particularly when the statements are incorrect. Example:
Now you are doing it. Why?
There is no advertisement, I'm just having a semi-technical discussion, and people seem to frequently ask about SDC compared to other coins, so those other coins come up. DRK has come up as well, and I'm certainly not advertising for that.
Thanks smooth for coming to discuss the tech. Unfortunately Ryno has been unavailable for comment (since he's celebing xmas/sleeping/whatever) BUT I am hopeful he'll be making an appearance today.
Regarding this line of yours: "If anyone is claiming otherwise [of ssv2 being like cryptonote] they are either confused or trying to scam you (I don't suggest the latter necessarily, just pointing out the possibilities)".
there is no way dasourec is trying to scam anybody. he is sound and in the Team iirc. we can discount that. I suppose confusion is a possibility (although unlikely since he's a smart cookie), but so is you not being in possession of all the facts.
I look forward to hearing from the Team and Ryno in particular regarding shadowsend's similarity (or not) to cryptonote, and more info regarding the inner workings of SSv2.
There's lots of people still scratching their heads about what exactly has been achieved (I know I am). Certainly nobody has studied the code in any great detail and the paper is terse, so some further education would be most helpful.
Thanks.