Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 969. (Read 4670673 times)

sr. member
Activity: 337
Merit: 250
Thanks for the replies fluffypony.  I suppose that we can conclude that Monero was fairly mined in the beginning and also out to its current state.  I also read a bit more about the "attack" that happened in September which sounds like it wasn't much of an attack or compromise really.  All in all, I would say that Monero is very robust.  On with the Grand Experiment...
donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
[...] and added lots of whiz-bang features to build the price up whilst we built up our stash.

We would have had a flashy GUI within a month!  Tongue

Nice recap overall, thank you.


HTML5 responsive gooey!
donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
Also to add, here's a log chart for all time:



You can see the onboarding of speculative miners and the improvements in hashing efficiency up till 2014-05-20, after which all changes were largely inconsequential. At that point 826k XMR had been mined, so we're talking about dga and others competing with our public improvements to the hash function that everyone used for a piece of 4.49% of the initial emission. It was a bit of an arms race, although the miners that were just pulling the changes that were committed to the repo were not at much of a disadvantage (in fact they were probably at an advantage, as they were able to expend more energy spinning up AWS instances since they weren't trying to optimise code:-P )
legendary
Activity: 1512
Merit: 1012
Still wild and free
[...] and added lots of whiz-bang features to build the price up whilst we built up our stash.

We would have had a flashy GUI within a month!  Tongue

Nice recap overall, thank you.
donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.

Thanks for the answers so far.  Its important to try to understand the distribution of monero, especially in the early part of its life-cycle.  If the distribution seems skewed to relatively few people, then the chance for profits may not be that great.  Again, thanks for the replies.

The "glitch" in the obfuscated miner was fixed extremely fast (by NoodleDoodle, one of the core team members), a lot faster than most people remember. At the time it was a pretty big deal.

Specifically, the change was commited May 7th, so ~19 days from launch = 2.58% of initial emission mined up to that point (we have infinite tail emission, but still use the 18.4 million initial emission as a reference point). This was roughly a 2.5x speed improvement over the original (sorry smooth, I was misremembering yesterday). There was an additional speed bump, once AES-NI support was added on May 18th, and that was an additional ~5x speed improvement, so by the time the first month had passed we'd improved the miner efficiency by more than 12x and made those changes publicly available.

A good exercise is to look at a logarithmic hashrate chart for the period:



You can see the initial spike as speculative miners start CPU mining, and then a continual ramp-up, with spikes on May 4th-8th and again on May 19th-20th, but neither of those spikes are orders of magnitude greater than the initial spike.

Remember, too, that at the time the core team that you know and love today didn't know each other. I knew othe a bit (online), but I'd never even had a passing pm with any of the others. Plus the community as a whole, largely spearheaded by those who would become the core team, were in the process of taking it over after things with thankful_for_today were...not working out;) So collusion on any level would have been unlikely, and if we did collude with the intent to scam you can bet we would have run with an improved miner for a lot longer than a couple of days. We would have mined for many months with only small improvements to the hashing function, and added lots of whiz-bang features to build the price up whilst we built up our stash.
hero member
Activity: 637
Merit: 500
... It seems that the software was so inefficient, that it is possible that it may have been done by design.  And it is also possible that a more efficient software may have been used by insiders along side the less efficient software. ...

AFAIK it was release with the same BCN miner code which was obviously maliciously crippled. Although the XMR phase for this was very small compared to the massive (manufactured) BCN blockchain.

There is no good in the cryptocurrency world. There are better and worse coins. XMR distribution is (presumably*) better than BCN.

* : Nobody can demonstrate this although I would personally bet it's true.
sr. member
Activity: 337
Merit: 250
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.

I think the only "glitch" has been the initial release of crippled mining software. It is assumed that the scammers were mining from the beginning with an optimized miner. I think this was fixed within the first couple of months. There is a blog post by David Anderson that described this problem.

FYI: http://da-data.blogspot.fr/2014/08/minting-money-with-monero-and-cpu.html


So let me make sure I understand this correctly:  At the start of the Monero life-cycle, the Monero mining software was also released.  This mining software was not very efficient (to put it simply) and was used for a few months.  It seems that the software was so inefficient, that it is possible that it may have been done by design.  And it is also possible that a more efficient software may have been used by insiders along side the less efficient software. Other people looked at the code, and concluded that they could optimize it greatly. And they did (after a few months since initial release).  Do I have this correct?  I am just trying to get a good grasp of what is going on before I invest too much time and money into it.  BTW, I am not knocking Monero, or anybody involved in the project at all.  I appreciate everybody's interest and hard work on Monero.  But I do have to do my due diligience. :-)
member
Activity: 94
Merit: 10
A friend just created a short video for cryptonic youtube channel "Unboxing physical Monero coins". https://www.youtube.com/watch?v=iw7bXXna0vE
sr. member
Activity: 337
Merit: 250
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.

Thanks for the answers so far.  Its important to try to understand the distribution of monero, especially in the early part of its life-cycle.  If the distribution seems skewed to relatively few people, then the chance for profits may not be that great.  Again, thanks for the replies.
hero member
Activity: 637
Merit: 500
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.

I think the only "glitch" has been the initial release of crippled mining software. It is assumed that the scammers were mining from the beginning with an optimized miner. I think this was fixed within the first couple of months. There is a blog post by David Anderson that described this problem.

FYI: http://da-data.blogspot.fr/2014/08/minting-money-with-monero-and-cpu.html
pa
hero member
Activity: 528
Merit: 501
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.

I think the only "glitch" has been the initial release of crippled mining software. It is assumed that the scammers were mining from the beginning with an optimized miner. I think this was fixed within the first couple of months. There is a blog post by David Anderson that described this problem.
sr. member
Activity: 337
Merit: 250
Does anybody know if there have been any "glitches" in the past year re: Monero, that would have allowed insiders to obtain XMR "off the books" as it were?  Thank you for any answers.  Wasn't able to get an answer yet in #Monero on #freenode.  I know that there was some incident in August/September 2014, but not sure on the details.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
G2M
sr. member
Activity: 280
Merit: 250
Activity: 616
I know, right, huh, eh?

Here we are using a secure, private, untraceable cryptocurrency that uses cryptography.

What are we thinking?

We should instead just blindly put our faith and money in the trust of a single dishonest individual. Because motivation.

And our decentralized system should definitely be hierarchical in nature and rely on designated nodes 100% for supposed obfuscation of our transactions.

Maybe one day Monero will get to where Deeznutscoin is at. Tongue




Better yet, we could even create these nodes based on the power law of distribution, so there might be 1000's of them, but only 50 actual owners!

It's genius!
legendary
Activity: 912
Merit: 1000


           ,                  /\.__      _.-\
          /~\,      __       /~    \   ./    \
        ,/  /_\   _/  \    ,/~,_.~'"\ /_\_  /'\
       / \ /CR \ / YP\/\  /~TO  G RA VP  H\/Y \
     /~C'R"Y""PTOG R A PH\/Y C"RYP T" O\GR"AP" HY\
    /C RYPTO G"R\AP"Y CR/YPTO  G"RAPH Y " C"RYP"TO\


Mountains!
That made my day.
hero member
Activity: 644
Merit: 502
I know, right, huh, eh?

Here we are using a secure, private, untraceable cryptocurrency that uses cryptography.

What are we thinking?

We should instead just blindly put our faith and money in the trust of a single dishonest individual. Because motivation.

And our decentralized system should definitely be hierarchical in nature and rely on designated nodes 100% for supposed obfuscation of our transactions.

Maybe one day Monero will get to where Deeznutscoin is at. Tongue

donator
Activity: 1274
Merit: 1060
GetMonero.org / MyMonero.com
From this we can also determine that it is possible to enumerate all the view keys, but as the key space is 2256 it's not possible unless you have more processing power than all the energy in the universe, and more time than the universe has existed.

Monero is broken OMG found a flaw !! Grin

Oh god, there's just so much cryptography and blockchains, I mean how can you even expect to run a secure, auditable cryptocurrency with both cryptography and blockchains?



           ,                  /\.__      _.-\
          /~\,      __       /~    \   ./    \
        ,/  /_\   _/  \    ,/~,_.~'"\ /_\_  /'\
       / \ /CR \ / YP\/\  /~TO  G RA VP  H\/Y \
     /~C'R"Y""PTOG R A PH\/Y C"RYP T" O\GR"AP" HY\
    /C RYPTO G"R\AP"Y CR/YPTO  G"RAPH Y " C"RYP"TO\


Mountains!
G2M
sr. member
Activity: 280
Merit: 250
Activity: 616
From this we can also determine that it is possible to enumerate all the view keys, but as the key space is 2256 it's not possible unless you have more processing power than all the energy in the universe, and more time than the universe has existed.

Monero is broken OMG found a flaw !! Grin

Oh god, there's just so much cryptography and blockchains, I mean how can you even expect to run a secure, auditable cryptocurrency with both cryptography and blockchains?
legendary
Activity: 1512
Merit: 1012
Still wild and free
Also just in case anyone misses the easter egg in MoneroPulse:


[ ric->~ ]$ dig @d.ns.se NS checkpoints.moneropulse.se

; <<>> DiG 9.10.0-P2 <<>> @d.ns.se NS checkpoints.moneropulse.se
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27487
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 3
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;checkpoints.moneropulse.se.   IN   NS

;; AUTHORITY SECTION:
moneropulse.se.      86400   IN   NS   is-it-true.moneropulse.se.
moneropulse.se.      86400   IN   NS   timewarp-again.moneropulse.se.

;; ADDITIONAL SECTION:
is-it-true.moneropulse.se. 86400 IN   A   216.69.185.52
timewarp-again.moneropulse.se. 86400 IN   A   208.109.255.52

;; Query time: 226 msec
;; SERVER: 81.228.8.16#53(81.228.8.16)
;; WHEN: Mon Apr 20 16:14:18 SAST 2015
;; MSG SIZE  rcvd: 141


well now its not an easter egg anymore Smiley

NOOB ALERT: If you don't know what moneropulse is, its some sort of checkpoint feature that seems to have been added in response to the block 20-something something attack.
https://bitcointalk.org/index.php?topic=583449.msg9109547;topicseen#msg9109547

I didn't know what it was till I googled it. Hooray google.

I think it was more precisely developed "against" the BCX alledged exploits. Thus the "timewarp-again.moneropulse.se." Cheesy
legendary
Activity: 1260
Merit: 1008
Also just in case anyone misses the easter egg in MoneroPulse:


[ ric->~ ]$ dig @d.ns.se NS checkpoints.moneropulse.se

; <<>> DiG 9.10.0-P2 <<>> @d.ns.se NS checkpoints.moneropulse.se
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27487
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 3
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;checkpoints.moneropulse.se.   IN   NS

;; AUTHORITY SECTION:
moneropulse.se.      86400   IN   NS   is-it-true.moneropulse.se.
moneropulse.se.      86400   IN   NS   timewarp-again.moneropulse.se.

;; ADDITIONAL SECTION:
is-it-true.moneropulse.se. 86400 IN   A   216.69.185.52
timewarp-again.moneropulse.se. 86400 IN   A   208.109.255.52

;; Query time: 226 msec
;; SERVER: 81.228.8.16#53(81.228.8.16)
;; WHEN: Mon Apr 20 16:14:18 SAST 2015
;; MSG SIZE  rcvd: 141


well now its not an easter egg anymore Smiley

NOOB ALERT: If you don't know what moneropulse is, its some sort of checkpoint feature that seems to have been added in response to the block 20-something something attack.
https://bitcointalk.org/index.php?topic=583449.msg9109547;topicseen#msg9109547

I didn't know what it was till I googled it. Hooray google.
Jump to: