how cloaky is cloak?
This question is very nice,
i would also like to hear from main developer what does he have to say about other coins for example XMR, ZCASH, ZCOIN, he probably had chances to investigate their source code. I know some things can be achieved in different ways..
Can we say really ENIGMA doesn't has weaknesses, and if has how they can be neutralized? Does wallet have minimal anon connections? i mean under some conditions (under minimal number of connections), we have less protection or, am i wrong? I would like to here more about this and how things works, in depth if possible. What really happening in wallet?
The whitepaper you can download from the site has some information on these things. But it's lacking a lot of technical aspects (full discussions of attack vectors with probabilities etc) IMO when I compare it to others. My hope is that when they're almost ready to release source code and have a code review done, they'll expand on the whitepaper.