- No known solution for scaling for mainstream adoption. For bitcoin based coins there is mini-blockchain.
Incase you haven't noticed, Monero's blockchain is only twice as big as Bitcoin's, and even that will be Cut, as Boolberrie's was. Most people will run Light Clients(Like Bitcoin's Multibit), so they don't even have to download the whole blockchain.
Twice as big, with 1/100th of transactions. And, incase you didn't notice, I said "mainstream adoption".
- CN transactions can be Sybil attacked, so that you'd be mixing mostly with adversary's own generated transactions.
This isn't even true. "You might ask, if it's impossible to determine which outputs are being spent, how can double-spending by prevented? CryptoNote solves this using a special ring signature algorithm (which is a modified version of existing signatures, so this is original cryptography and their security proof should be scrutinized fortunately it is not too complicated) in which the real signing key has a key image associated to it, which must be published alongside the signature. This key image cannot be reversed to get the original key and deanonymize the sender, but if a double-spend is attempted, users will see that the same key image is used twice and reject the second attempt."
Please read up on how Cryptonote Ring Signatures work, thanks.Strange, that you (or anyone else for that matter) didn't say anything when Anonymint made the same claim in XMR thread. Are you suggesting that Anonymint should also "read up on how Cryptonote Ring Signatures work"?
- The planned I2P implementation is susceptible to timing analysis.
LOLLL, only the NSA can do that. You're just copying what Anonymint said, Timing Anaylsis is the Only way to try and circumvent Ring Signatures, and it's only possible by the NSA.
Yes, NSA can do that. So why go through all that trouble creating a new crypto coin from scratch if even then your anonymity won't be NSA proof?