Search results

  1. D

    Which Masternode model should we implement?

    Sure. No DDOS protection with amplification support is more of a central point of failure. Only reason Black markets are successful is because of Tor. Darkcoin will get huge trust if it uses Tor. This is a matter of Evan doing as less work as possible. Sure he can code Tor alternative but...
  2. D

    Which Masternode model should we implement?

    Correct. If masternodes go under Tor then wallets will need Tor installed too. There are services such as tor2web but those are only for websites and it sucks lol. If asking users to install Tor is such a problem then Darkcoin can simply host a Tor proxy and announce its Ip address and port...
  3. D

    Which Masternode model should we implement?

    If my math sucks so bad.. Ok. Now since you're this awesome hacker who doesn't talk out of his ass then go on, please find a Tor vulnerability capable of full deanonymization(hidden services, not out-proxy). If you do this, not only you will get paid but also you will help make Tor better. You...
  4. D

    Which Masternode model should we implement?

    Read my edits, then continue talk shit if you can. You can ask every masternode operator to pay 200$+/month for DDOS protection and bandwidth costs.
  5. D

    Which Masternode model should we implement?

    Using Tor as an out-proxy is completely different than using Tor for hidden service. First difference is that when using as an out-proxy then the exit-node sees the traffic in plaintext. FYI: You can ask Tor explicitly to use your Exit-node(s) so traffic confirmation attacks become impossible...
  6. D

    Which Masternode model should we implement?

    Sure. NSA is not actually funding Tor. USA government is not the same as NSA. Also, Tor is open-source, if you can find a backdoor from the hundreds of researchers who have reviewed tor source then you must be some kind of godlike hacker. If you can't find a backdoor then please kindly shut the...
  7. D

    Which Masternode model should we implement?

    Not exactly sure why a cryptocurrency should support P2P file-storage. Doesn't BitTorrent Sync do that? Your files are encrypted and accessible only through the private key(????). Alternatively, use DropBox and just simply encrypt your files with TrueCrypt(or whatever is the new alternative)...
  8. D

    Which Masternode model should we implement?

    0.347222222222222 MB/min. thats 347 KB/min. thats 5.7 kb/s You won't see even slight difference in terms of speed when running under Tor. With such numbers, there is only gain. Even if it was 50 KB/s(5 GB/day) it would still be only gain. We start worry when its constantly 500 KB/s up/down...
  9. D

    Which Masternode model should we implement?

    Wait for Evan to implement masternodes under Tor(or I2P). You will see that performance is not compromised at all (unless Masternodes use 100Mbit/s up/down constantly, then you will see huge difference) but knowing that packets are just a few bytes in size then you won't see any difference at...
  10. D

    Which Masternode model should we implement?

    The part how masternode connects to other masternodes yes. The other part is exactly how people setup IRC servers(or drug markets) under Tor to be accessible only through hidden service.
  11. D

    Which Masternode model should we implement?

    Actually not that much work. Basically what he needs to do is write a SOCKS5 Client that will connect to tor, provide the destination(onion address in case of Tor):port etc and then exchange traffic as he normally would. On Masternode machine, he(including every masternode operator) adds the...
  12. D

    Which Masternode model should we implement?

    I know its not ur goal. But my gutt tells me you're in some kind of mafia. Like for real, anonymous money? I am holding my DRK because I know that I will be rich one day but.. What ur doing is just.. There is no words to explain how brave you are.
  13. D

    Which Masternode model should we implement?

    In theory, yes its the same story about Bitcoin. If USA was capable of ddosing North Korea why shouldn't it be possible to ddos something so small(compared to a country) like Bitcoin. Would they want to do it? I don't think so. However, your creation is the biggest harm to any government, any...
  14. D

    Which Masternode model should we implement?

    Depends on how you do it. If you're a hacker then you can compromise massive amount of linux servers, install udp flood /w dns amplification and kill the network with ~100 compromised servers at 0$/year. Security is so poor thesedays that anyone running Metasploit/sqlmap and Tor can compromise...
  15. D

    Which Masternode model should we implement?

    If you like to be at home without internet when under DDOS then be my guest and host your masternode at home.
  16. D

    Which Masternode model should we implement?

    Evan is right. Bitmessage is not anonymous but just encrypted. All participants have their IP addresses visible but the intended receiver is impossible to find out because everyone downloads messages and the correct receiver can only decrypt it with public key cryptography. Bitmessage will...
  17. D

    Which Masternode model should we implement?

    This sounds really good on paper. But scraping all masternode IP takes 1 second. It takes just as long to paste them in your botnet C&C. Starting ddos also takes 1 sec. Draining all masternode bandwidth(if not unlimited) would take a couple hours with medium size botnet. On compromised servers...
  18. D

    Which Masternode model should we implement?

    Increasing latency? Bro 50ms is a fucking HUGE DEAL. Masternodes are connected 24/7 together(if its not, then they should be if using hidden services). Only the initial connection would take ~1-2 sec. When they're connected together then data will be exchanged almost instantly. You really...
  19. D

    Which Masternode model should we implement?

    Currently, Masternode network does not support nor I2P nor Tor. We are not talking about using Tor or I2P out-proxy but rather using hidden services(like the narcotic shops). If this was implemented, all masternodes would be required to install Tor or I2P and setup a hidden service(which is...
  20. D

    Which Masternode model should we implement?

    If its running under I2P hidden service then it will show up "random_Shit_here_very_long.b32.i2p" or in Tor case "random_shit_here.onion". Cannot be resolved to IP Address but can be connected to through i2p/tor.
Back
Top