Pages:
Author

Topic: XMR vs DRK - page 50. (Read 69755 times)

legendary
Activity: 2968
Merit: 1198
March 26, 2015, 06:56:50 AM
If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.


quite possibly, which renders obsolete all the argument in here about global TLA/governemnt conspiracies to compromise the MN network.

So, DASH is fit-for-purpose as an enhanced Bitcoin clone with decent privacy features, instant transactions and other cool stuff in the pipleine

Again, if you are talking about today, sure do what you want and for low-resource to medium-adversaries you are fine, probably even with Bitcoin alone.

But,

There is a huge middle ground here. Like for example, your neighbor or business competitor pays a competent private investigator. Currently that means they probably are going to get into a lot of your information that you normally think of as private. Any system like this that becomes popular will spawn a cottage industry of compromising it if there are weak spots.

Even the concept of "private investigator" is quite broad. There is the guy you hire to find out if your wife is cheating and the guy a major multinational corporation hires who is former FBI or NSA (director/AD level even) or whatever, and who has a blackberry full of contacts to show for it, plus everything in between.


OK so we've moved down a few rungs from a global Government / TLA conspiracy.

Now the argument is that a sophisticated 'private investigator' or 'multinational corporation' or some facet of a 'cottage industry' is going to compromise the MN network....how are they going to do that exactly?

Among other methods that are unknown and unknowable, an industry will develop to own the masternodes or pay masternode owners for their data and sell it or use, just as an industry has developed to collect, sell, trade, and use web tracking data

It's all nice and cute how people run their own masternodes on raspberry pi's today, but over time, assuming a relevant level of success, that will certainly all shift to a commercial model, and those commercial operators will maximize profit by collecting and selling data, the same way the web industry does.

We don't know in advance what that industry will look like just like no one in 1995 no one could have created this graphic showing (part of) the structure of the web tracking industry:

member
Activity: 112
Merit: 10
March 26, 2015, 06:49:20 AM
If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.


quite possibly, which renders obsolete all the argument in here about global TLA/governemnt conspiracies to compromise the MN network.

So, DASH is fit-for-purpose as an enhanced Bitcoin clone with decent privacy features, instant transactions and other cool stuff in the pipleine

Again, if you are talking about today, sure do what you want and for low-resource to medium-adversaries you are fine, probably even with Bitcoin alone.

But,

There is a huge middle ground here. Like for example, your neighbor or business competitor pays a competent private investigator. Currently that means they probably are going to get into a lot of your information that you normally think of as private. Any system like this that becomes popular will spawn a cottage industry of compromising it if there are weak spots.

Even the concept of "private investigator" is quite broad. There is the guy you hire to find out if your wife is cheating and the guy a major multinational corporation hires who is former FBI or NSA (director/AD level even) or whatever, and who has a blackberry full of contacts to show for it, plus everything in between.


OK so we've moved down a few rungs from a global Government / TLA conspiracy.

Now the argument is that a sophisticated 'private investigator' or 'multinational corporation' or some facet of a 'cottage industry' is going to compromise the MN network....how are they going to do that exactly?

legendary
Activity: 2968
Merit: 1198
March 26, 2015, 06:45:29 AM
If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.


quite possibly, which renders obsolete all the argument in here about global TLA/governemnt conspiracies to compromise the MN network.

So, DASH is fit-for-purpose as an enhanced Bitcoin clone with decent privacy features, instant transactions and other cool stuff in the pipleine

Again, if you are talking about today, sure do what you want and for low-resource to medium-adversaries you are fine, probably even with Bitcoin alone.

But,

There is a huge middle ground here. Like for example, your neighbor or business competitor pays a competent private investigator. Currently that means they probably are going to get into a lot of your information that you normally think of as private. Any system like this that becomes popular will spawn a cottage industry of compromising it if there are weak spots.

Even the concept of "private investigator" is quite broad. There is the guy you hire to find out if your wife is cheating and the guy a major multinational corporation hires who is former FBI or NSA (director/AD level even) or whatever, and who has a blackberry full of contacts to show for it, plus everything in between.
member
Activity: 112
Merit: 10
March 26, 2015, 06:40:57 AM
If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.


quite possibly, which renders obsolete all the argument in here about global TLA/governemnt conspiracies to compromise the MN network.

So, DASH is fit-for-purpose as an enhanced Bitcoin clone with decent privacy features, instant transactions and other cool stuff in the pipleine
member
Activity: 112
Merit: 10
March 26, 2015, 06:37:51 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

How do you know they can't glean enough data just from domestic servers? Can you specify which masternodes to use when you transact?

masternodes are selected randomly - there is no way to predict where the transactions will take place, and with masternode blinding the masternodes themselves can't see which other masternodes are participating.

member
Activity: 112
Merit: 10
March 26, 2015, 06:36:19 AM
Quote

Maybe not directly. But the hosting companies my be compromised (you know google was/is right?), or there may be third party channels, like the NSA has a cooperation deal with Armenia which has a deal with Bulgaria. Or the NSA trades some intel on Uyghurs to the Chinese government in exchange for cooperation with something in a data center in China the Chinese government doesn't much like anyway. The possibilities are endless.


sure, but there are lots of hosting companies in play, plus plenty of people not using hosting companies.....masternodes are running on raspberry pi for instance.

regardless, to compromise the MN network in the way you describe would require a massive international conspiracy between all governments where masternodes are hosted...sounds ridiculous to me.





legendary
Activity: 2968
Merit: 1198
March 26, 2015, 06:34:57 AM
If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.

Agree on that point. Maybe the DRK advocates who are claiming otherwise can take some good advice from two people on opposite sides of the coin battle and stay safe on this one. If you are trying to hide something from the NSA (or their allies) the answer to the question of "XMR vs DRK" is neither.
hero member
Activity: 794
Merit: 1000
Monero (XMR) - secure, private, untraceable
March 26, 2015, 06:32:53 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?
Talking about Bulgaria - they definitely could and in Bulgaria about 75% of the ISP providers will silently and gladly cooperate. They don't even need to do that - they could get to the terminal where all those are centralized and skip the ISP providers and mobile operators. Again the Bulgarian government will most probably gladly cooperate. Hey, they don't even need to do that - there is a FinSpy server in Bulgaria: https://bivol.bg/en/finspy-bulgaria-mtitc-english.html
hero member
Activity: 795
Merit: 514
March 26, 2015, 06:30:57 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

How do you know they can't glean enough data just from domestic servers? Can you specify which masternodes to use while mixing?
member
Activity: 112
Merit: 10
March 26, 2015, 06:29:07 AM
I would urge DRK people not to get involved in the debate here.  The idea is to try to legitamise XMR as a contender to DRK by giving the pumpers on Poloniex text they can link to to show how 'xmr is the next dash!!! when XMR takes over LTC...!'.  Any argument you make will just get drowned out by one of the 5 Monero devs trolling here and you will never get a straight answer as they just repeat the same accusations whatever you say and avoid backing anything up.


I dunno, I think the debate has been quite reasonable and I'm enjoying it.

Nothing the XMR guys have said so far convinces me that DRK is not fit-for-purpose, so I'm keeping my masternodes for now and watching the market with interest.
legendary
Activity: 2968
Merit: 1198
March 26, 2015, 06:27:32 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?

Maybe not directly. But the hosting companies my be compromised (you know google was/is right?), or there may be third party channels, like the NSA has a cooperation deal with Armenia which has a deal with Bulgaria. Or the NSA trades some intel on Uyghurs to the Chinese government in exchange for cooperation with something in a data center in China the Chinese government doesn't much like anyway. The possibilities are endless.


hero member
Activity: 821
Merit: 1000
March 26, 2015, 06:26:57 AM
They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

Can you explain what is the data that they would snoop after hacking into a masternode?

Pretty much anything in/out of that VPS ... so IPs connecting on the drkcoin p2p network, DS transactions, ssh logins, grab the wallet.dat file and pull all the address this MN has used for DS transactions etc etc etc ... now if you have access to lots of MN with this data you could start to slowly piece things together.
sr. member
Activity: 392
Merit: 255
March 26, 2015, 06:23:50 AM
I would urge DRK people not to get involved in the debate here.  The idea is to try to legitamise XMR as a contender to DRK by giving the pumpers on Poloniex text they can link to to show how 'xmr is the next dash!!! when XMR takes over LTC...!'.  Any argument you make will just get drowned out by one of the 5 Monero devs trolling here and you will never get a straight answer as they just repeat the same accusations whatever you say and avoid backing anything up.

check the market situation and how no one on big exchange like Bittrex or BTER will touch XMR and hence why the big exchanges never added it even after 1 year...no Poloniex pumping and XMR market cap will go < $100k like all the other cryptonote hack jobs...

member
Activity: 112
Merit: 10
March 26, 2015, 06:21:25 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

so you think the NSA can persuade hosting companies in Netherlands, China, Khazekstan, Bulgaria, Russia etc to give up access rights / data?

you think the russian agencies can persuade US & canadian agencies to give up theirs?

see my point?
member
Activity: 112
Merit: 10
March 26, 2015, 06:20:02 AM

I don't think people are realising what the real target is in terms of "compromise" here.

In Dash, you can't compromise a node just because you have access to a machine thats running it. It's the collateral address on the blockchain that needs to be compromised - otherwise the 'real' owner simply has to open their wallet, move the collateral and thats that attack neutralised forever. Moreover, masternodes are as decentralised as regular wallets - in fact they "are" regular wallets.

The only difference between the Dash network and a regular network is that the wallet daemon is dual mode - i.e. it has this "enhanced mode" that allows it to provide extended services to the rest of the network. But it's not a fixed target - it's a moving target because anyone can launch one anytime, point it at an appropriate collateral address and run that daemon in extended service (masternode) mode.

As far as "corrupting the network" goes, for an attacker with unlimited funds,  it's probably more optimal to just buy up gazilions of hashpower and perform a regular 51% on the blockchain rather than trying to take control of the masternode network. 2 reasons for that:

[1] - if they get "control" of a majority of masternodes, so what ? All they can do is provide a service ot the network

[2] - hashpower is unlimited - they can acquire hashpower in direct proportion to their budget. Acquiring a lot of masternodes is far harder because you need to get control of a majority of the money supply first


tok, the argument they are making is that if you surreptitiously control enough MNs you can spy on what the nodes are doing and trace DS transactions.....it's nothing to do with controlling the money supply, just plain old hacking / compromising servers.
legendary
Activity: 2968
Merit: 1198
March 26, 2015, 06:17:13 AM
If you're trying to protect your privacy from your neighbor, sure. Darksend is probably sufficient. However, If you're concerned about illegal activity or government level adversaries, no anon tech is ready for that (yet).

TLDR: "good enough" is never good enough when it comes to three-letter agencies. It's gotta be air tight.

I almost agree, except that I would also include illegal activities to the list of Darksend (and XMR) being sufficient to. Obviously I don't know, but I doubt your local police or even state police or IRS can just go to NSA and ask them to help out with their case concerning some drug dealer or tax evasion. Much less your neighbor, employer, or your insurance company.

There's no way to know what the hell is going on. We get tiny glimpses is all, often inaccurate or incomplete, possibly misleading information that was deliberately leaked for reasons that are hard to fathom. The iceberg principle applies, strongly.

http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/05/the-nsa-is-giving-your-phone-records-to-the-dea-and-the-dea-is-covering-it-up/
hero member
Activity: 966
Merit: 1003
March 26, 2015, 06:13:05 AM
If you're trying to protect your privacy from your neighbor, sure. Darksend is probably sufficient. However, If you're concerned about illegal activity or government level adversaries, no anon tech is ready for that (yet).

TLDR: "good enough" is never good enough when it comes to three-letter agencies. It's gotta be air tight.

I almost agree, except that I would also include illegal activities to the list of Darksend (and XMR) being sufficient to. Obviously I don't know, but I doubt your local police or even state police or IRS can just go to NSA and ask them to help out with their case concerning some drug dealer or tax evasion. Much less your neighbor, employer, or your insurance company.

If I wanted to do something safe from the NSA I don't even know where to begin. Wouldn't even want to touch a computer while doing it that's for sure.
hero member
Activity: 966
Merit: 1003
March 26, 2015, 06:11:27 AM
They can snoop on your data all day long and you will never know about it... the downside of virtualisation!

Can you explain what is the data that they would snoop after hacking into a masternode?
hero member
Activity: 795
Merit: 514
March 26, 2015, 06:10:03 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

It's absurd because you don't know how many MNs they need to compromise. You're assuming it's a lot, but it depends on what information they're trying to get and how much. Who says they need to unmask the entire network, when they can just pick off a few people here and there to send a message? The only identity they need to reveal is yours. Are you ready to take that risk?

Look, I'm not trying to troll you. I'm trying to say that a government agency with unlimited resources to bribe, seize, extort, or hack can achieve some very "unlikely" things... and if it did happen you wouldn't necessarily know about it. There wouldn't be an anouncement telling everyone that masternodes have been compromised.

In this regard I'm not implying Monero (or any other coin) is safe. XMR has some very elegant anon tech, but I still don't trust it against such an adversary. Maybe in the future with much higher mandatory mixins and i2p I'd feel more comfortable.

TLDR: No crypto is suitable for dark market trade yet. Not zerocash, not monero, and definitely not darkcoin. Don't bet your life on any such tech at this point.
hero member
Activity: 821
Merit: 1000
March 26, 2015, 06:08:45 AM

Last year the Monero network was hit by one of the most sophisticated attacks ever seen in crypto (at least according to TacoTime). The idea that an NSA-level adversary could not silently compromise masternodes or defeat darksend through statistical analysis is just absurd.


Well let's hear why it's absurd, given they need to compromise 2,000+ nodes across 30+ international borders? Again I'm not being disingenuous, I'd like to know...

30+ borders? that is taking it out of context.
Who needs to compromise borders when you can just issue notices to hosting companies? have you ever worked with agencies? I have and they have must easier ways to get access to data from hosting providers than the average joe knows.

They can snoop on your data all day long and you will never know about it... the downside of virtualisation!
Pages:
Jump to: