I just don't want that people attacked EXE.I think they are also hard work.EXE dev did not said that they are first.Just i and another people said 'First Electrum with Stealth addresses'
As I saw from here, it was commited 6 days ago.
http://cryptocoinchronicle.com/2014/06/execoin-innovates-plus-giveaway/Stealth library in Python is ready, integration of stealth addresses generation into mnemonic system used in Electrum has been completed in full, weve done sending/receiving part in the wallet as well. Currently we are working on modifying Electrum server to support fetch_stealth method. Within 1 week or so a fully functional beta version will be available in the mainnet.
Our network has been upgraded already to the extent sufficient for relaying stealth transactions. Relevant updates to the source code have been committed on June 23, pool operators are encouraged to upgrade their execoind daemons in order to speed up stealth transactions in the network. We already submitted a dozen of stealth transactions to the blockchain, here is one of them (use one of the block explorers with txid given below):
Stealth address: ExkdTFkYbBh4evi5zQnmxg2JFmE3Pc6xDYMKsHeaQizfYooL1Ac9V2YvtDu4mKfAAcdDouw1ac8JkeN vsaYV6mfhsfywzHGzcugtzc
TXid: 0499732cacc82d80ef5ea06565e4d3464b54a4135b9130667dcf35766077fe97
Ephemkey: 03327b0e2f1c0378f39a6ba4c2a42e9cdac951bc137353a5e74e08b6b9c6eeee6e
Scan secret: 79a29d3c9c35ad81ce5ce5dea1386dd721357369b8fc3ba465efe5842bad1b49
Spend secret: 51a757426c6f440033c79391166375a6d0699a736f8e6bfc548781fc5d422eed
We are giving the secrets, related to stealth address, to our readers, there is 5000 EXE reward to anybody who will manage to redeem it.
In fact, being given with the secrets, its a fairly simple task, so, before trying, make sure that the reward is still there!
What did you said?Did you said 'From address:EgCMLc4gYtR4UJK5GnnsJyc9XgP6TFBbZ4' and 'To address:ESyia1VPbThowJc6vyL278M5X1Cz4G7zHA'?