Because they aren't the same thing - though many people are conflating the two.Quick suggestion.
Why don't you using "anonymize" instead of "denominate"? I think this is less technical and more approchable and intuitive.
I sent 1000 DRK through 9 rounds. My total fee? 0.022 DRK @ $5/DRK = $0.11.And the auto denomination is going into all sorts of random addresses now. No collateral bug here also.
Wonder, how this was done, as I have not even updated my client?
Edit: The transaction fee is tiny but due to frequency will worry some people. They might think it will keep draining funds.
You don't get it, there is no way on a protocol level to differentiate between an autodenomination and a manual one. Not even a little bit. [0]Let's assume a DDOS attack is being launched. The person would need to run many, many wallets and to manually force darksend denom. If wallets are being auto denominated, perhaps fee should be waived.
Edit: To run lots and lots of wallets with auto denom, will take so many Drks that the cost is prohibitive anyway. Plus by definition, the entire mainnet is being auto denominated.
Edit2: It might be possible to insert code to ban wallets that manually denom too many times?
I think the fact that multiple wallets will be used for attack is obvious. IP banning is useless, that is also obvious.You don't get it, there is no way on a protocol level to differentiate between an autodenomination and a manual one. Not even a little bit. [0]
If someone was going to DDOS a masternode they would not be running a single wallet. They would have written a program that connects directly to the darkcoin protocol - and I know that sounds intimidating, but I can assure you, anyone even remotely skilled at computer programming could do it.
This theoretical program then would try and send masternodes bogus transactions - they could emulate as many wallets as they wanted, banning by that wouldn't do anything.
Then ban by IP? Well that is the very point of a Ddos attack - the first D stands for distributed. They would be using a botnet coming from thousands of connections.
So now if a fee is required, each one of the connections in order to not be flat out rejected by the masternode costs 0.001 DRK. Without the fee? It costs them whatever renting the botnet would be. Renting a 10,000 computer botnet for an hour would be a couple dollars. If someone wanted to attack the network, they could do it indefinitely for $100 / day.
[0] If the wallet sent a flag distinguishing itself as an automatic denomination to the masternode - the attack simply would emulate it, making it effectively worthless.
You don't get it, there is no way on a protocol level to differentiate between an autodenomination and a manual one. Not even a little bit. [0]
If someone was going to DDOS a masternode they would not be running a single wallet. They would have written a program that connects directly to the darkcoin protocol - and I know that sounds intimidating, but I can assure you, anyone even remotely skilled at computer programming could do it.
This theoretical program then would try and send masternodes bogus transactions - they could emulate as many wallets as they wanted, banning by that wouldn't do anything.
Then ban by IP? Well that is the very point of a Ddos attack - the first D stands for distributed. They would be using a botnet coming from thousands of connections.
So now if a fee is required, each one of the connections in order to not be flat out rejected by the masternode costs 0.001 DRK. Without the fee? It costs them whatever renting the botnet would be. Renting a 10,000 computer botnet for an hour would be a couple dollars. If someone wanted to attack the network, they could do it indefinitely for $100 / day.
[0] If the wallet sent a flag distinguishing itself as an automatic denomination to the masternode - the attack simply would emulate it, making it effectively worthless.
Ok, now I remember/understand. Thank you.You don't get it, there is no way on a protocol level to differentiate between an autodenomination and a manual one. Not even a little bit. [0]
If someone was going to DDOS a masternode they would not be running a single wallet. They would have written a program that connects directly to the darkcoin protocol - and I know that sounds intimidating, but I can assure you, anyone even remotely skilled at computer programming could do it.
This theoretical program then would try and send masternodes bogus transactions - they could emulate as many wallets as they wanted, banning by that wouldn't do anything.
Then ban by IP? Well that is the very point of a Ddos attack - the first D stands for distributed. They would be using a botnet coming from thousands of connections.
So now if a fee is required, each one of the connections in order to not be flat out rejected by the masternode costs 0.001 DRK. Without the fee? It costs them whatever renting the botnet would be. Renting a 10,000 computer botnet for an hour would be a couple dollars. If someone wanted to attack the network, they could do it indefinitely for $100 / day.
[0] If the wallet sent a flag distinguishing itself as an automatic denomination to the masternode - the attack simply would emulate it, making it effectively worthless.
Ok, now I remember/understand. Thank you.
Trying to denominate 300k tDRK with 9 rounds takes some days xD
****** Please Update To 10.12.11 or 9.12.11 *******
More progress! I'm moving on to testing the voting system, then I think we're ready to launch. Let me know if there's anything else that needs to be addressed with Darksend.
- Darksend Denominate Outputs are now in a random order:
http://test.explorer.darkcoin.fr/tx/072ca56cbf705b87749513a2d2ee02080d506adcf8fe178f6dc2967f0711788e
http://test.explorer.darkcoin.fr/tx/32daa8ca46462e7e99f3532251d68a8c3835a080c937bd83b11db74e47b770ff
- Darksend now uses 3 participants instead of two.
- SplitUpMoney can now make collateral inputs when needed
- Transactions now shows darksend transaction types for easier understanding of what's going on:
View attachment 276
- Fixed a couple more cases where collateral was charged when it shouldn't have happened (let me know if it happens after this version)
- Fixed the money destruction bug, it was caused by "darksend denominate 8000". I missed a reference and the client passed an empty address to SendMoneyToDestination. rcp darksend source: http://pastebin.com/r14piKuq
- Unlocking/Locking wallet fixes (was spamming the logs)
- Unencrypted wallet fixes (was trying to lock every 10 seconds)
- Flare found and fixed an issue with DGW3 for win32
--------------
Stable Binaries
http://www.darkcoin.io/downloads/master-rc4/darkcoin-qt
http://www.darkcoin.io/downloads/master-rc4/darkcoind
RC4 Binaries ( masternodes / auto-denom )
http://www.darkcoin.io/downloads/rc4/darkcoin-qt
http://www.darkcoin.io/downloads/rc4/darkcoind