Post
Topic
Board Altcoin Discussion
Re: Anonymity, Security and Privacy: Anonymous Cryptocurrency Enhancement Comparsion
by
SafeCoins
on 02/01/2018, 03:27:30 UTC
Super,

just one thing, Cloak doesnt have Masternodes. ENIGMA is like a new way to do anon transactions.

The same way Spectrcoin has OBFS4, CloakCoin has since last day, ENIGMA, which is a new feature on the anon crypto world. Its now being audited by a security IT company.

also in the matrix "Enhacement", should be "OpenSource - Code Released"

Thank you very much TSVHoff, we're getting there!

A couple clarifications to the best of my knowledge:

OBFS4 is not something created by Spectrecoin, rather it is a TOR network creation:  https://godoc.org/git.torproject.org/pluggable-transports/obfs4.git/transports/obfs4

    It is a TOR obfusciation protocol, part of TOR's pluggable transports, and is likely a desireable integration for any TOR-focused coin.
  
    Spectrecoin just appears to be the first to integrate with it.   I suspect others will follow, and no attempt was made to highlight "special XSPEC tech".


Masternodes:   These are not necessarily evil.   They have well known strengths and weaknesses.
               A proper implementation of masternodes will leverage the strengths and mitigate for their weaknesses.   It must be done well or not at all, IMHO.


Back to Enigma:   I will admit, I am not overly familiar, but after a quick read of the whitepaper I get as quoted below.  Which, to me, sounds very similar to masternodes.   If I am mistaken, by all means I would love to be corrected.  The categorization is not meant to slander nor pump Cloakcoin, it is just an attempt to describe what it does.   Which I am very happy to improve upon (while keeping the comparison chart as simple as possible).

P.S...I have changed the "enhancement" to show that open source code has been released, thank you!  Someone needs to tell google lol.

thank you

https://www.cloakcoin.com/resources/CloakCoin_ENIGMA_Whitepaper_v1.0.pdf
    
Quote
Enigma Cloaking Requests
When a user wishes to send a Cloaked Enigma transaction, they elect a series of Enigma nodes
(with a high enough Enigma balance) and request their assistance in cloaking. A Enigma node
can choose to assist in cloaking and send an acceptance response to the requester to indicate
this. If a Enigma node declines to participate in cloaking or does not respond in a timely manner,
an alternate Enigma node is elected and contacted. DDoS (distributed denial of service)
protection will blacklist any misbehaving nodes for the remainder of the session. A node is
deemed to be misbehaving if it repeatedly refuses to sign a Enigma transaction or refuses to
relay Enigma messages. Enigma cloaking nodes use an Elliptic Curve Diffie Hellman key
exchange (ECDH) to derive a shared secret with the Enigma initiating node, which is used to
generate a shared secret key for symmetric RSA-256 data encryption between a cloaking node
and the sender node.