Post
Topic
Board Announcements (Altcoins)
Re: Slimcoin | First Proof of Burn currency | Test v0.5 release candidates
by
gjhiggins
on 26/05/2017, 10:30:13 UTC
I'm understanding that is a paper wallet generator, and possibly can be used to create keys from a phrase as well

It's not a paper wallet generator, despite the appearance of a QR code graphic ...

A deterministic wallet is a system of deriving keys from a single starting point known as a seed. The seed allows a user to easily back up and restore a wallet without needing any other information and can in some cases allow the creation of public addresses without the knowledge of the private key. - https://en.bitcoin.it/wiki/Deterministic_Wallet

The first feature is your “one ring to bind them all” deal. The magic (seed) phrase “collect house buttery stable” will enable me to recover all of the privkeys generated from this seed (the parent private key or “privkey”) and thereby enable to me to take control of any and all UTXOs associated with those privkeys (which, AIUI, are actually an encoding of the parameters for the selected ECC scheme).

The second feature is important for online sales, allowing a merchant such as myself (they are really cool digital prints) to enable my remote server to create receiving addresses for incoming payments without needing the privkey (which otherwise would be exposed to attack on the server).

Quote
Like most people I'll wait for the one click version.  Wink

Unfortunately (1), that is the one-click solution.

Unfortunately (2), to be effective, one-click solutions require that users already have a reliable mental model that is sufficiently accurate and detailed to adequately inform the choice that they are faced with. Few people would be comfortable with a one-click solution for submitting tax returns that basically translated to: “Here's all my money, take whatever you want”.

Users aren't always in the best position to articulate their interface requirements because they typically don't have access to domain fundamentals such as ...

The levels-of-processing effect, identified by Fergus I. M. Craik and Robert S. Lockhart in 1972, describes memory recall of stimuli as a function of the depth of mental processing. Deeper levels of analysis produce more elaborate, longer-lasting, and stronger memory traces than shallow levels of analysis. Depth of processing falls on a shallow to deep continuum. Shallow processing (e.g., processing based on phonemic and orthographic components) leads to a fragile memory trace that is susceptible to rapid decay. Conversely, deep processing (e.g., semantic processing) results in a more durable memory trace.
- https://en.wikipedia.org/wiki/Levels-of-processing_effect

The above is broadly describable as falling under the remit of “user task analysis” and “user information requirements analysis”- what the task is in terms of cognitive processes and their functioning, what information is known to be required to inform those cognitive process, how that information is best presented to integrate effectively with the cognitive processes, how to account for known effects of perceptual distortions, characteristics and limitations of short-/long-term memory performance and ditto for the limits of attentional performance.

Quote
The ability to selectively process information (attention) and to retain information in
an accessible state (working memory) are critical aspects of our cognitive capacities.
While there has been much work devoted to understanding attention and working
memory, the nature of the relationship between these constructs is not well understood.
Indeed, while neither attention nor working memory represent a uniform set of processes,
theories of their relationship tend to focus on only some aspects. This review of the
literature examines the role of perceptual and central attention in the encoding,
maintenance, and manipulation of information in working memory. While attention and
working memory were found to interact closely during encoding and manipulation, the
evidence suggests a limited role of attention in the maintenance of information.
Additionally, only central attention was found to be necessary for manipulating
information in working memory. This suggests that theories should consider the
multifaceted nature of attention and working memory. The review concludes with a
model describing how attention and working memory interact.
- http://visionlab.harvard.edu/Members/darylfougnie/Daryl_Fougnie_%28Academic%29/Home_files/Fougnie-in%20press-chap%201.pdf

As a cognitive psychologist by discipline, to me this stuff is just basic characteristics of the standard i/o routines known to be reliably present in the typical installation of the “HomSap v1.0” wetware OS and it's just an irrational aberrance of modern life that people are, by and large, comfortably oblivious to the (entirely predictable) limitations of their own particular installation of HomSap 1.0.

Cheers

Graham

The UI for addresses is pretty naff
Q.E.D.