Where exactly is the "spyware" aspect of DASH located?
It's an open source project, so please, if possible, name of file and line of code...
Here is what I wrote:
I claim that Dash is spyware because the anonymity is trusted to masternodes which are an obvious target for the NSA or anyone who can profit on breaking anonymity (e.g. those who want to blackmail you or whatever).
I don't need to dig in the source. It is a conceptual truth in terms of the way the anonymity has been described (at least the last time I paid attention).
Evan mentioned he was going to improve it for Evolution, but even if he shifts to onion routing across masternodes, that won't entirely absolve the attacks on anonymity from colluding masternodes (although it can improve the statistics on the masternode coverage needed for breaking anonymity). Ditto any mixnet he employs, including if he prefers to implement CoinShuffle.
Instead if he implements Cryptonote then he won't have RingCT's features. If implements RingCT, then he is copying Monero's recent research. Also I doubt he is capable of understanding the RingCT white paper and implementing it. He will probably have to work by copying source code or hiring some expert crypto assistance.
In any case, that won't correct the other flaws in InstantX and mass-scale transactions that are his other big selling points of Evolution. And none of that will correct the fact that masternodes reduces Dash to an inferior proof-of-stake security/politics model.
I will correct the comparison chart to indicate the anonymity may be improving for Evolution.