Post
Topic
Board Announcements (Altcoins)
Re: ⋆⋆⋆ [SDC] ShadowCash | ShadowSend v2 IS ALIVE ! ** MANDATORY WALLET UPGRADE! ⋆⋆⋆
by
smooth
on 27/12/2014, 11:18:47 UTC
Shadow is as much based on CryptoNote as CryptoNote is based on Bitcoin by your analogy. Surely because CryptoNote has a blockchain and uses PoW the CrytoNote developers based their entire technology on Bitcoin? That sounds as absurd as your statement saying Shadow is based on CryptoNote.

You may claim that is absurd, and yet, the cryptonote whitepaper references bitcoin extensively! They recognize that their system takes many ideas from Bitcoin and builds upon them. They likewise give credit in their white paper, and clearly explain what part of their work is new and what is based on bitcoin. In fact the entire first section of the cryptonote white paper explains this. Have you read it?

Can you clearly explain this (i.e. which parts -- specifically -- are original, and which are derivative) with respect to shadowsend? Because the shadowsend whitepaper doesn't.

Quote
just because ShadowSend uses Stealth Addresses + Ring Sigs does not mean it functions like CryptoNote

That is nonsense, because stealth addresses plus ring signatures is exactly the method used by the anonymity functions of cryptonote, and cryptonote was the inventor of using these methods for a distributed cryptocurrency. Why is that so hard to understand?

Quote
Shadow keyimages are reusable whereas in CryptoNote they are one-time if I recall correctly.

False. Quoting from the Shadowsend whitepaper: "The blockchain is searched for the provided keyImage, if one is found the transaction is
considered a double­spend attempt and denied."

This works exactly the same.

Quote
The list is endless of how Shadow differs from CryptoNote.

The list is not endless.

As far as I can tell the list is:

1. Shadow transactions occur on a Bitcoin-style chain (transaction formats, etc.), wheres the cryptonote implementation has its own blockchain and transaction formats.

2. Shadow shares a blockchain with a non-anonymous coin SDC. Operations allow exchanging one for the other.

3. Some relatively minor implementation details of the Shadow anonymity scheme differ, such as the denominations used. Likewise, I read somewhere that Shadow uses a different elliptical curve for its elliptical curve cryptography, though I can't find that in the white paper.

Quote
This is my opinion and not that of the brains behind ShadowSend

Then why are you arguing about something you don't understand?