Search results

  1. GermanRed+

    Which Masternode model should we implement?

    I completely agree that we do not need something completely re-implemented. There are APIs from I2P/d so I believe writing a darkcoin MN/client that connect directly to I2P/d and IPv4/6 simultaneously is possible. The darkcoin users do not really need to know anything about I2P. We should...
  2. GermanRed+

    Which Masternode model should we implement?

    I think we do not have a lot of resources to have both Tor and I2P because we need to consider the maintenance. So, it will be good to have a testing phase of both. For instance, first round on Tor and second round on I2P with the same number of participants. Need to take the smaller number of...
  3. GermanRed+

    Which Masternode model should we implement?

    I agree that they may be biased on which is better. However, the differences in design choice can be simple facts. For example, centralized control may prove a point for those against Tor for NSA-like reason. Another example is 'Floodfill peers ("directory servers") are varying and untrusted...
  4. GermanRed+

    Which Masternode model should we implement?

    This one is old too but it explains why NameCoin was integrated into I2P in an experiment: https://bitcointalk.org/index.php?topic=60879.0 So, if we have darkcoin listening on both IPv4/6 and I2P (resolved by NameCoin), the blockchain won't fork on these different networks. Right? EDIT: On a...
  5. GermanRed+

    Which Masternode model should we implement?

    Haven't read it yet but that article is kind of old. Both Tor and I2P have changed quite a bit from 2 yrs ago. I just want to highlight the differences that may be important to us: Centralized control vs Fully distributed, Optimized for hidden services, Bandwidth overhead of being a full peer...
  6. GermanRed+

    Which Masternode model should we implement?

    Just more reading that may interest guys/gals here: https://github.com/pentarh/NameCoin-I2P-Resolver/blob/master/README
  7. GermanRed+

    Which Masternode model should we implement?

    I think everyone in the discussion of Tor/I2P should read this if he/she hasn't done yet: https://geti2p.net/en/comparison/tor EDIT: Perhaps, darkcoin developers can work with I2Pd developers. I thought they were interested in having their own cryptocurrency. They may be interested in working...
  8. GermanRed+

    Which Masternode model should we implement?

    I think it is more than that. It has the onion routing part besides being p2p. EDIT: Can we just add the onion routing part to darkcoin? I mean having our own onion routing by making use of the codes in Tor or i2p (if Tor's funding is a worry). Then, we can have some early version that works on...
  9. GermanRed+

    Which Masternode model should we implement?

    This may be a dumb question. Do we need to change anything in the source code to run darkcoin on Tor? Isn't there an option that lets you choose IPv4, IPv6 or Tor network? I thought people were running darkcoin with Tor (outproxy?). I remembered there was a howto page on setting up darkcoin with...
  10. GermanRed+

    Which Masternode model should we implement?

    I meant we ≠ criminals if I have caused any confusion.
  11. GermanRed+

    Which Masternode model should we implement?

    I am wondering what will happen if we have the following setup with our current darkcoin software: ( other drk clients and drk MNs on clearnet )==internet==( drk client 1 )==intranet==( drk MN 1 )==internet==( other drk clients and drk MN on darknet ) What will happen when drk client 1 sees a...
  12. GermanRed+

    Which Masternode model should we implement?

    Here is my logic: We want to use an anonymous coin to protect our privacy. That does not mean we are criminals. Criminals want to be anonymous too. So, we =/= criminals drk users = we + criminals So, in the long run, we still should plan for protecting the MNs.
  13. GermanRed+

    Which Masternode model should we implement?

    What if the goal of an attacker is to reveal who you are rather than bring the network down? I think the goal of being anonymous is one while protecting the network is another goal.
  14. GermanRed+

    Which Masternode model should we implement?

    What if the goal of an attacker is to reveal who you are rather than bring the network down? I think the goal of being anonymous is one while protecting the network is another goal.
  15. GermanRed+

    Which Masternode model should we implement?

    Are there some MNs going through Tor out-proxy right now? Or, do we have to run darkcoin as hidden service?
  16. GermanRed+

    Which Masternode model should we implement?

    Just a question for you guys: We have been emphasizing the one IP per node but we see only 1977 unique IPs for 2237 active MNs. So, how can we say that it is one IP per node? And, we can see that each MN is paid after roughly every 2237 blocks. So, someone is running multiple nodes on one IP...
  17. GermanRed+

    Which Masternode model should we implement?

    We don't need to fund the attack. The MN operators just need to piss off the "Anonymous" group.
  18. GermanRed+

    Which Masternode model should we implement?

    But, who knows what other vulnerabilities a masternode may have? EDIT: To me, I still think it is better if darkcoin will run automatically on Tor/I2P network (or its own implement) without even installing anything. That's why I wonder if I2Pd can provide some library and API to the programmer...
  19. GermanRed+

    Which Masternode model should we implement?

    It may be more useful to discuss whether we should take the approach of Tor or I2P(d) for the darkcoin network. Whether we should implement it ourselves or use Tor/I2P is another question that can be discussed later.
  20. GermanRed+

    Which Masternode model should we implement?

    I read the Tor setup documentation some time ago and I thought it was not that simple. There are other means to get you on Tor if the setup is not done right. I think SR is a proof of that statement.
Back
Top