Note though, that he is not creating new cryptography, he is using well established, true and tested existing cryptography.
Mathematicians and cryptographers have often produced new crypto that has later been proven faulty.
Oh absolutely, I'm not suggesting he invent new cryptography. I'm suggesting he provide cryptographically sound mathematical models to show how these "masternodes" are impervious to collusion, Sybil attacks, or an attacker DDoSing the DarkCoin P2P port on enough of them so that they control a sufficient number. This is the sort of thing anyone competent would do BEFORE they start coding.
So, keeping it in line with topic:
Darkcoin Cons:
- lack of peer-reviewed cryptography
- lack of understanding of threat models
- developer is clearly incompetent (see failed RCwhatever releases causing forks)
- whitepaper contains no mathematical proof of the resilience of the anonymity set to attacks
- whitepaper contains a mathematical formula for the block reward curve that is completely unrelated to the actual block reward curve (see
Darkcoins in Circulation - First 128 days, and
Darkcoin Block Reward Emission Curve - First 128 Days), implying either a completely incompetent developer, or a developer that actively and aggressively cheats
1) Kristov Atlas is reviewing the code and design right now.
2) Wrong - this has been discussed in depth for over 6 months, why do you think its 2500 pages. People like anonymint have given the thumbs up even over Monero.
3) Software development to this scale and complexity is not a fool proof science, id like to see you try. At least he is full time and trying until he and the team succeeds.
fernando on the darkcointalk.org forums created a chart outlining the probability of unmasking a Darksend by way of Masternode collusion at depths of both 2 and 8 Masternode hops: