Post
Topic
Board Announcements (Altcoins)
Re: [ANN][DRK] Darkcoin | First Anonymous Coin | Inventor of X11, DGW, Darksend and InstantX
by
oblox
on 27/02/2015, 20:43:25 UTC
LETS ASSUME A WORST CASE SCENARIO

50% of MN's are run by "bad actors" or have backdoors (thru VSP provider consent)

Question:Why did TOR get compromised??
Answer: NSA style traffic analysis

Just like TOR ur crypto (such as it is i.e. antiquated) is prob sound. But how do you combat NSA style traffic analysis for MN's?

Ignore me if you want…
but this is another important question complements of yous truly.

Answers on a postcard  Cool

I'll bite. Assuming there were 50% rogue nodes, each round would be an independent event, in this case 50/50 that a compromised node is selected processing the transaction. To be able to prove with reasonable doubt, you would need to have your rogue nodes selected every round, or 50%^# of rounds for probability. At 4 rounds, you're looking at a 6.25% chance of having your rogue nodes selected every round, at 8 rounds, 0.39%, at 16 rounds, .0015%. That's just as the system stands right now--with masternode blinding which is currently in development, no single node would have all the inputs so your probabilities essentially go to 0.

Good try.