Pages:
Author

Topic: Smooth VS VNL - page 2. (Read 7364 times)

sr. member
Activity: 252
Merit: 251
September 22, 2015, 10:21:11 AM

Good to see that I'm not alone calling out this MONERO mob for their criminal activities.
You seem to be another sockpuppet of that gang.

nope

Smooth committed like 8 changes on GitHub, all one liners.
Thats about it concerning being a "dev".
i dont care and that has nothing to do with this thread
The code in question is the only block you could fing, eh? Its just one piece of about 500.000 lines rewritten.
iCEBREAKER posted more... but it is not important how much it is
And how you come to the conclusion its been auto reformatted?
it looks like. if he really rewrote it himself he would use other variable names and another order.

Have you ever written a single line of code doing something you haven't copied and pasted in your life?
yes
Monero on the opposite is copied and pasted completely, only the coin parameters where changed.
no
this thread is not about monero.
sr. member
Activity: 350
Merit: 250
September 22, 2015, 10:18:43 AM
I just hope smooth keeps pissing off these shitcoin scammers on his spare time, world is in dire need of people like him.
hero member
Activity: 2170
Merit: 640
Undeads.com - P2E Runner Game
September 22, 2015, 10:16:15 AM

What argument do you need to fact that in 2 sentences you made 2 mistakes with dev name.
Yet you have something important to say about his work.



again i dont say anything about his work.

i just want him to honor the license as its is obvious he copied parts of his product (which btw is not bad - anyone does that - even big companies and closed source products)

btw thanks for bumping this thread to raise awareness of his behavior...

Good to see that I'm not alone calling out this MONERO mob for their criminal activities.
You seem to be another sockpuppet of that gang.
Smooth committed like 8 changes on GitHub, all one liners.
Thats about it concerning being a "dev".

The code in question is the only block you could fing, eh? Its just one piece of about 500.000 lines rewritten.
And how you come to the conclusion its been auto reformatted?
Have you ever written a single line of code doing something you haven't copied and pasted in your life?

Monero on the opposite is copied and pasted completely, only the coin parameters where changed.
sr. member
Activity: 252
Merit: 251
September 22, 2015, 10:06:44 AM

What argument do you need to fact that in 2 sentences you made 2 mistakes with dev name.
Yet you have something important to say about his work.



again i dont say anything about his work.

i just want him to honor the license as its is obvious he copied parts of his product (which btw is not bad - anyone does that - even big companies and closed source products)

btw thanks for bumping this thread to raise awareness of his behavior...
hero member
Activity: 829
Merit: 1000
September 22, 2015, 10:04:24 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

ROFL to your coding skills.
It seems that you guys from XMR can only copy/paste because when you need to write something on your own you cant even write the dev name correctly.
2 mistakes in 2 sentences.
LOL


ROFL... no arguments left  Roll Eyes

What argument do you need to fact that in 2 sentences you made 2 mistakes with dev name.
Yet you have something important to say about his work.

edit
if you cant type name right, use you skills with dev name... or dont

newbie
Activity: 30
Merit: 0
September 22, 2015, 10:00:04 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

ROFL to your coding skills.
It seems that you guys from XMR can only copy/paste because when you need to write something on your own you cant even write the dev name correctly.
2 mistakes in 2 sentences.
LOL


Syntax error!
sr. member
Activity: 252
Merit: 251
September 22, 2015, 09:59:21 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

ROFL to your coding skills.
It seems that you guys from XMR can only copy/paste because when you need to write something on your own you cant even write the dev name correctly.
2 mistakes in 2 sentences.
LOL


ROFL... no arguments left  Roll Eyes
hero member
Activity: 829
Merit: 1000
September 22, 2015, 09:54:31 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

ROFL to your coding skills.
It seems that you guys from XMR can only copy/paste because when you need to write something on your own you cant even write the dev name correctly.
2 mistakes in 2 sentences.
LOL
sr. member
Activity: 252
Merit: 251
September 22, 2015, 09:52:42 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

Auto-refactor?

You obviously never looked at what the man is capable of in terms of coding, go look it up.

i didnt say anything about his coding skills...
but any good coder uses auto refactoring tools this days (otherwise he would waste too much time: and i wouldnt call someone who wastes time a good coder)

And how do you call people who can't code a gui for a crypto-currency?

focused on important stuff and not a get rich quick scheme..
but if you want to discuss monero: please open a new thread.

this thread is about stealing code

yes it is stealing: some people demand payment for their code others just want to see their name on products using some of their work (thats the spirit of OSS licenses)
legendary
Activity: 1498
Merit: 1001
180 BPM
September 22, 2015, 09:49:31 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

Auto-refactor?

You obviously never looked at what the man is capable of in terms of coding, go look it up.

i didnt say anything about his coding skills...
but any good coder uses auto refactoring tools this days (otherwise he would waste too much time: and i wouldnt call someone who wastes time a good coder)

And how do you call people who can't code a gui for a crypto-currency?
sr. member
Activity: 252
Merit: 251
September 22, 2015, 09:47:29 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

Auto-refactor?

You obviously never looked at what the man is capable of in terms of coding, go look it up.

i didnt say anything about his coding skills...
but any good coder uses auto refactoring tools this days (otherwise he would waste too much time: and i wouldnt call someone who wastes time a good coder)
legendary
Activity: 1498
Merit: 1001
180 BPM
September 22, 2015, 09:45:51 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)

Auto-refactor?

You obviously never looked at what the man is capable of in terms of coding, go look it up.
sr. member
Activity: 252
Merit: 251
September 22, 2015, 09:42:11 AM
It seems that all those guys from XMR have excellent copy/paste skills almost identical to their famous dev smooth... or maybe they are all just smooth alter ego accounts.

nothing wrong with copy-paste as long as you honor the original license
sr. member
Activity: 252
Merit: 251
September 22, 2015, 09:41:27 AM
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.

even if john-conor would be satoshi he would need to place that license as others have contributed code to bitcoin too.
but its unlikely as john-conner obviosly prefers another code-style than bitcoin (thats why he auto-refactored that whole thing)
hero member
Activity: 829
Merit: 1000
September 22, 2015, 09:40:06 AM
It seems that all those guys from XMR have excellent copy/paste skills almost identical to their famous dev smooth... or maybe they are all just smooth alter ego accounts.
hero member
Activity: 829
Merit: 1000
September 22, 2015, 09:33:04 AM
Everything here was already over discussed in several threads already

OMG, it's the hand-waving 'old news is old' defense!

Are you Hillary Fucking Clinton's understudy or what?

The fact VanillaScam's main dev is a proven code thief is still extremely relevant.  The importance of that revelation does not expire or diminish in some kind of media half-life equation.

What traumshiff said is all this is over discussed on more than few threads and not one shit what you, smooth and your alter ego accounts said hasn't been proven. Even gmaxwell was only fishing with his 'quiet words of warning' and that was after john-connor warned him and other BTC devs about problem and proposed solution... so, go prove that john-connor stole the code and don't take only 50 lines of code, check all the code on github. Check it and prove it. You know what percentage of code must be the same not similar that you can claim something is stolen. VNL code is different. If you think otherwise PROVE IT or GTFO together with your vicious XMR don't know how to code frends.

https://en.wikipedia.org/wiki/Substantial_similarity
Quote
In U.S. copyright law, substantial similarity is the standard used to determine whether a defendant has infringed the reproduction right of a copyright. The standard arises out of the recognition that the exclusive right to make copies of a work would be meaningless if infringement was limited to making only exact and complete reproductions of a work.
...
Courts have relied on several factors to aid in a striking similarity analysis. Among these are:

1. Uniqueness, intricacy, or complexity of the similar sections.
2. If the plaintiff's work contains an unexpected or idiosyncratic element that is repeated in the alleged infringing work.
3. The appearance of the same errors or mistakes in both works.
4. Fictitious entries placed by the plaintiff that appear in the defendant's work. For example, fake names or places are often inserted in factual works like maps or directories to serve as    proof of copying in a later infringement case since their appearance in a defendant's work cannot be explained away by innocent causes.
5. Obvious or crude attempts to give the appearance of dissimilarity.

I think the bolded entry is particularly relevant in this case, based on the copied errors pointed out by rnicoll earlier in the thread.

As for how much needs to be copied in order for it to amount to copyright infringement, that seems a bit more complex:
http://www.scottandscottllp.com/main/software_ip_legal_considerations.aspx
Quote
Substantial similarity between competing software works is the third element of the copyright infringement claim. In assessing whether a computer program has been infringed, the Fifth Circuit has adopted the “abstraction-filtration” method proposed by the Tenth Circuit in Gates Rubber Company v. Bando Chemical Industries.
...
The goal of the analysis should be to determine whether any copied elements constitute “matter that is significant in the plaintiff's program.” This is a qualitative, rather than quantitative analysis, the outcome of which will depend heavily on the unique facts of each case.

It can certainly be far less than 50% to qualify as copyright infringement.
http://www.alankorn.com/article-copyright-infringe.html
Quote
One of the more famous U.S music infringement cases involved ex-Beatle George Harrison, who was found by a jury to have “unconsciously” copied the Shirelle’s composition “He’s So Fine” in his 1971 hit “My Sweet Lord.” Although George Harrison’s hit was found to be strikingly similar to the Shirelle’s song, it is even possible to infringe another song if only just a few notes are “borrowed.” Because the most memorable part of a song may be quite brief, infringement of a musical composition may be found even where only a small portion of a song was copied.

Still no one proved anything. Go check code and prove that code is stolen.
I didnt find any post from rnicoll in the thread so I can say that you are trying to imply that some alleged post should prove something.
You only proved that you have fine copy paste skills from articles on wikipedia.
Regarding links I'll make my contribution with one question folowed by the link. What was base for the bitcoin code?
https://en.wikipedia.org/wiki/Hashcash
And to all that john-connor could be Adam Back, or even Satoshi Nakamoto so again, prove it, bring it to court or STFU.
hero member
Activity: 613
Merit: 501
September 22, 2015, 08:31:54 AM
These few lines of code which they are claiming are stolen - this is a common knowledge for every dev who has any idea about programming cryptocurrencies. There is no point in rewriting it. You don't have to be a genius to make those methods, for god's sake. It will always look similar.
legendary
Activity: 1498
Merit: 1001
180 BPM
September 22, 2015, 08:29:26 AM
You guys are taking the from scratch thing way too literally. When you make mashed potatoes from scratch, do you grow the potatoes and churn the butter yourself, too?

John spent 9 months rewriting peercoin from scratch. He did not start with a fork. He started with an empty project. So he had peercoin code up on one side, and his own project's code on the other side and he went through and rewrote each section of peercoin in his own project. This is why some of the code looks like it's been run through a reformatter. This was him rewriting it, improving on the parts that needed improvement and keeping some parts structurally similar to maintain backwards compatibility and to give other cryptocurrencies the opportunity to integrate his updated code (see coinpp - https://github.com/john-connor/coinpp). Bitch about the copyright thing as much as you want - John feels that the bitcoin code itself is stolen and any any legal action is completely unenforceable due to SN's anonymity, so why bother? John's code free and available for anyone to use, so who cares about a meaningless legal shout out at the top? He has always freely admitted that VNL was a full rewrite of peercoin.

John has put in honest, full-time hard work over at least the past 18 months on VNL and the technology surpasses existing coins. Nobody has been able to poke holes in Zerotime or any of his work, so they cling to this nonsense. Not a huge Obama fan, but this is like the crypto-version of the situation with his birth certificate. Even when it be came clear that he was going to become president, political groups still just would not let go of their stupid notion that Obama wasn't a US citizen. Obama still became president.

In case they are too lazy to open the link:

"CoinPP is a C++11 cryptographic currency library. This library is backwards compatible with Peercoin or any Peercoin derived cryptographic-currency."

John actually made it possible here, to any peercoin derived crypto, to upgrade their codebase. He even stated on the official forums that he will give personal help to any developer wanting to do it.
hero member
Activity: 606
Merit: 500
September 22, 2015, 08:28:04 AM
Everything here was already over discussed in several threads already

OMG, it's the hand-waving 'old news is old' defense!

Are you Hillary Fucking Clinton's understudy or what?

The fact VanillaScam's main dev is a proven code thief is still extremely relevant.  The importance of that revelation does not expire or diminish in some kind of media half-life equation.

What traumshiff said is all this is over discussed on more than few threads and not one shit what you, smooth and your alter ego accounts said hasn't been proven. Even gmaxwell was only fishing with his 'quiet words of warning' and that was after john-connor warned him and other BTC devs about problem and proposed solution... so, go prove that john-connor stole the code and don't take only 50 lines of code, check all the code on github. Check it and prove it. You know what percentage of code must be the same not similar that you can claim something is stolen. VNL code is different. If you think otherwise PROVE IT or GTFO together with your vicious XMR don't know how to code frends.

https://en.wikipedia.org/wiki/Substantial_similarity
Quote
In U.S. copyright law, substantial similarity is the standard used to determine whether a defendant has infringed the reproduction right of a copyright. The standard arises out of the recognition that the exclusive right to make copies of a work would be meaningless if infringement was limited to making only exact and complete reproductions of a work.
...
Courts have relied on several factors to aid in a striking similarity analysis. Among these are:

1. Uniqueness, intricacy, or complexity of the similar sections.
2. If the plaintiff's work contains an unexpected or idiosyncratic element that is repeated in the alleged infringing work.
3. The appearance of the same errors or mistakes in both works.
4. Fictitious entries placed by the plaintiff that appear in the defendant's work. For example, fake names or places are often inserted in factual works like maps or directories to serve as    proof of copying in a later infringement case since their appearance in a defendant's work cannot be explained away by innocent causes.
5. Obvious or crude attempts to give the appearance of dissimilarity.

I think the bolded entry is particularly relevant in this case, based on the copied errors pointed out by rnicoll earlier in the thread.

As for how much needs to be copied in order for it to amount to copyright infringement, that seems a bit more complex:
http://www.scottandscottllp.com/main/software_ip_legal_considerations.aspx
Quote
Substantial similarity between competing software works is the third element of the copyright infringement claim. In assessing whether a computer program has been infringed, the Fifth Circuit has adopted the “abstraction-filtration” method proposed by the Tenth Circuit in Gates Rubber Company v. Bando Chemical Industries.
...
The goal of the analysis should be to determine whether any copied elements constitute “matter that is significant in the plaintiff's program.” This is a qualitative, rather than quantitative analysis, the outcome of which will depend heavily on the unique facts of each case.

It can certainly be far less than 50% to qualify as copyright infringement.
http://www.alankorn.com/article-copyright-infringe.html
Quote
One of the more famous U.S music infringement cases involved ex-Beatle George Harrison, who was found by a jury to have “unconsciously” copied the Shirelle’s composition “He’s So Fine” in his 1971 hit “My Sweet Lord.” Although George Harrison’s hit was found to be strikingly similar to the Shirelle’s song, it is even possible to infringe another song if only just a few notes are “borrowed.” Because the most memorable part of a song may be quite brief, infringement of a musical composition may be found even where only a small portion of a song was copied.

So, why doesn't anybody from xmr look through the whole code on github, to verify if it can be named as 'stolen', rather than the standard xmr troll games..This is just a tiny part of the tens of thousands lines of code in there.. VNL is superior to xmr, those few lines of code you guys keep reposting isn't changing that..

Here's an easier solution: john-connor adds the correct copyright attribution to his code.
hero member
Activity: 566
Merit: 500
September 22, 2015, 08:22:37 AM
Everything here was already over discussed in several threads already

OMG, it's the hand-waving 'old news is old' defense!

Are you Hillary Fucking Clinton's understudy or what?

The fact VanillaScam's main dev is a proven code thief is still extremely relevant.  The importance of that revelation does not expire or diminish in some kind of media half-life equation.

What traumshiff said is all this is over discussed on more than few threads and not one shit what you, smooth and your alter ego accounts said hasn't been proven. Even gmaxwell was only fishing with his 'quiet words of warning' and that was after john-connor warned him and other BTC devs about problem and proposed solution... so, go prove that john-connor stole the code and don't take only 50 lines of code, check all the code on github. Check it and prove it. You know what percentage of code must be the same not similar that you can claim something is stolen. VNL code is different. If you think otherwise PROVE IT or GTFO together with your vicious XMR don't know how to code frends.

https://en.wikipedia.org/wiki/Substantial_similarity
Quote
In U.S. copyright law, substantial similarity is the standard used to determine whether a defendant has infringed the reproduction right of a copyright. The standard arises out of the recognition that the exclusive right to make copies of a work would be meaningless if infringement was limited to making only exact and complete reproductions of a work.
...
Courts have relied on several factors to aid in a striking similarity analysis. Among these are:

1. Uniqueness, intricacy, or complexity of the similar sections.
2. If the plaintiff's work contains an unexpected or idiosyncratic element that is repeated in the alleged infringing work.
3. The appearance of the same errors or mistakes in both works.
4. Fictitious entries placed by the plaintiff that appear in the defendant's work. For example, fake names or places are often inserted in factual works like maps or directories to serve as    proof of copying in a later infringement case since their appearance in a defendant's work cannot be explained away by innocent causes.
5. Obvious or crude attempts to give the appearance of dissimilarity.

I think the bolded entry is particularly relevant in this case, based on the copied errors pointed out by rnicoll earlier in the thread.

As for how much needs to be copied in order for it to amount to copyright infringement, that seems a bit more complex:
http://www.scottandscottllp.com/main/software_ip_legal_considerations.aspx
Quote
Substantial similarity between competing software works is the third element of the copyright infringement claim. In assessing whether a computer program has been infringed, the Fifth Circuit has adopted the “abstraction-filtration” method proposed by the Tenth Circuit in Gates Rubber Company v. Bando Chemical Industries.
...
The goal of the analysis should be to determine whether any copied elements constitute “matter that is significant in the plaintiff's program.” This is a qualitative, rather than quantitative analysis, the outcome of which will depend heavily on the unique facts of each case.

It can certainly be far less than 50% to qualify as copyright infringement.
http://www.alankorn.com/article-copyright-infringe.html
Quote
One of the more famous U.S music infringement cases involved ex-Beatle George Harrison, who was found by a jury to have “unconsciously” copied the Shirelle’s composition “He’s So Fine” in his 1971 hit “My Sweet Lord.” Although George Harrison’s hit was found to be strikingly similar to the Shirelle’s song, it is even possible to infringe another song if only just a few notes are “borrowed.” Because the most memorable part of a song may be quite brief, infringement of a musical composition may be found even where only a small portion of a song was copied.

So, why doesn't anybody from xmr look through the whole code on github, to verify if it can be named as 'stolen', rather than the standard xmr troll games..This is just a tiny part of the tens of thousands lines of code in there.. VNL is superior to xmr, those few lines of code you guys keep reposting isn't changing that..
Pages:
Jump to: