Post
Topic
Board Announcements (Altcoins)
Re: [ANN][DRK] DarkCoin | First Anonymous Coin | First X11 | First DGW | ASIC Resistant
by
AnonyMint
on 01/04/2014, 15:00:25 UTC
Design B: Users provide inputs, outputs and collateral at once. In this case the master node knows who is sending money to who, but later it can tell who didn’t sign.

I’ve chosen to use design B (users will add inputs and outputs at the same time) because it’s the only design that can’t be attacked in the way you’re saying.

Okay he has confirmed that you are not anonymous to the master node, as I wrote upthread would be the case if he associates the collateral transaction with both input and output stages of the CoinJoin.

eduffield I would like to say that is not acceptable because for the same reason I don't want to use mixer or laundry website, I can't know if the master node is an NSA honeypot.

I would like to suggest you think about my divide-and-conquer idea as another electable option for users.

If there is failed stage, then divide the inputs into two groups. Then ask for outputs again. Divide and conquer as necessary, then the join will complete.

Not ideal, but at least you don't break anonymity and require trust of the master node.

Best of luck with it.

+1

definitiv an nice idea to use a "divide-and-conquer"-algorithm on signing !

the master node is still elected randomly, so no node will be default master everytime

yes, but if you could do it better, than do it better, even if the current solution seems trustfull and enough (because of randomly chosen nodes), but something like the divide-and-conquer approach will help it to make it even better in my eyes.

ofc there are problems, too - which needs a solution. like - if you divide-and-conquer, at some points the darksend transaction wouldn't be as obfuscating as it could be, because only a fragment of users would be in that darksend transaction. (right?)

but i believe thats a good idea, which could help us.

Problem with trusting a random node is Sybil attacks. Unless the cost of creating a node is significant, the adversary can flood with nodes.

Also a market could develop for buying the information from nodes.

Trusting a node is not anonymity. It is a form of privacy.

Can you have perfect trust with perfect anonymity? Or are they dynamic dualities
I'm having trouble conceiving how trust might work with perfect anonymity and vice versa

Let's differentiate between anonymity and privacy.

Anonymity means that no one can know some aspect of your identity, e.g. you might decide to reveal the name of your company but never who runs that company.

Privacy means only some people know some aspect of your identity, e.g. the merchants you buy from may know your account number but otherwise not public unless revealed by one of those merchants.

Anonymity is a more secure form of privacy because there is no trust involved, because no one knows what you have not revealed to anyone.

So I can choose to trust a merchant who reveals its name and stakes its reputation on that name, without needing to know who owns that merchant. The key here is that prior bad outcomes don't follow the owner to new ventures. So history of performance of a merchant becomes paramount.

If I don't want to trust a merchant to deliver the goods, the merchant and I can agree on a 3rd party escrow agent with multisig on payment (both I and escrow agent must sign for payment to be transferred to merchant). Again no need for the escrow agent to reveal his/her true name rather the historical reputation of a pseudonym will suffice.

Ditto on contracts, arbitration agents can be chosen on contract signing.

In short, our personal identity can be orthogonal to our business performance identity.

This allows us to fail and start over again. It is very forgiving. And it keeps the government, conniving attorneys, and the Kangeroo court system out of our business.

The master nodes would be required to have a single input greater than 1000DRK (or something like that). So if there's 5000 capable nodes it would cost 5000*1000DRK to see 50% of the messages. It would be impossible to buy enough darkcoin off of the exchanges to pull off such an attack on a large amount of users.

So if you can pull off getting 5% of the transactions, the clear ones should become worthless because there's no trail to follow.

The black budget of the NSA is at least $40 billion as documented by Edward Snowden recently, but Catherine Austin Fitts and others document the $2.3 trillion that went missing from the Pentagon budget that Defense Secretary Donald Rumsfeld admitted on TV the day before 9/11. The documents were destroyed in the Pentagon missileairplane attack.

Obtaining a lot of DRK will be the first and ongoing priority of the national security agencies, as it is their job to crack any encrypted data transfers on the internet.

By concentrating master nodes among the wealthy, you've created the perfect motivation for the wealthy to be friends with the government. The government gives them favors, they give the government data.

This is why privacy is not good enough. Only anonymity will suffice.

Sorry I don't like being a pain, but false claims of anonymity is going to hurt a lot of people in the end. The best is to fix it. Of course divide-and-conquer is not as efficient or elegant as your collateral payment. But the collateral payment breaks anonymity. What is the point of building something which can be easily broken by the NSA.