Post
Topic
Board Altcoin Discussion
Re: [DRK/XDN/XMR/SDC] Comparison between the most known anonymous coins (MUST READ)
by
illodin
on 19/03/2015, 14:42:12 UTC
Firstly, if the cryptography is compromised the least of my worries is remaining anonymous; you would have alot of other things to worry about.
Secondly, there is something called "stealth address" oh and of-course if that cryptography is broken well then sir you have more more to worry about than remaining anonymous.
Thirdly, see 1 and 2 and oh yeah why not send a note to Satoshi about it whilst you was as it about how dumb his idea was of creating a crypto currency.

That is a very common fallacy. Or maybe you just have nothing to hide?

When the cryptography securing on chain anonymity is broken, everything in there will be revealed. New algorithms will be implemented to secure everything else from future attacks like your coins so they can't be stolen, but what has been put into the chain will be there and can't be made anymore secure.

You are missing the point again ... when you cannot find any weaknesses is the design of both CN/Shadow you have to resort to breaking the one thing which fundamentally makes crypto currencies secure.

But if you want to play this game lets play.

For arguments sake lets say ECDSA is broken ... so now for every address that has ever made a transaction we can derive the private key.
So as a average crypto user; I could simple import this private key into my wallet and reindex. Voila! I now have every transaction that address every made. Good luck with your dual network or whatever you call it as simple chain analysis will reveal all!

Now try doing that with a solution that uses ring sigs and stealth address. You have to break a single algo to deanonymize DRK and yet would have to break multiple to have the same effect on CN/Shadow.

^ see how your logic is flawed! just like the masternode design.

Darksend does not reuse addresses.

And that is all you can say? whether it uses or not is irrelevant ... I can de-anonymize 100% of the network for all completed transactions. Every time you make a new transaction because I know the previous history I can also accurate analyze it. That was based on your/drk logic.

Regardless I like the way you answered the one part that suited you.
The point is "You have to break a single algo to deanonymize DRK and yet would have to break multiple to have the same effect on CN/Shadow" and that is ignoring the design flaws such as 92% of your MN reside at 9 different ASNs etc etc etc

I look forward to the day a cryptographer has anything good to say about the DRKs MN design ... IMO never will happen!

I buy Darkcoins from a party that is KYC compliant, and transfer them to my wallet address A. Now the address A can be linked to me.

Next I put them through the Darksend mixing process, and now instead of having coins in address A, I have coins in addresses B1, ..., B10 for example. Then I proceed to spend the money in address B5 by sending it to a public donation address of WikiLeaks.

However, you strongly oppose WikiLeaks and everyone who supports it, and want to know who that B5 is. You import private key of the address B5, and then what?