typos
This commit is contained in:
parent
0eefc8fd48
commit
0e4da6d133
@ -95,7 +95,7 @@ cryptographic mathematics, but by the fact that our blockchain, unlike
|
|||||||
the others, is organized around client wallets chatting privately with
|
the others, is organized around client wallets chatting privately with
|
||||||
other client wallets. Every other blockchain has necessary cryptographic
|
other client wallets. Every other blockchain has necessary cryptographic
|
||||||
mathematics to do the equivalent, usually more powerfull and general
|
mathematics to do the equivalent, usually more powerfull and general
|
||||||
than anything on the rhocoin blockchain, and Monaro has immensely
|
than anything on the rhocoin blockchain, and Monero has immensely
|
||||||
superior cryptographic capabilities, but somehow, they don’t, the
|
superior cryptographic capabilities, but somehow, they don’t, the
|
||||||
difference being that rhocoin is designed to avoid uses of the internet
|
difference being that rhocoin is designed to avoid uses of the internet
|
||||||
that render a blockchain vulnerable to regulation, rather than to use
|
that render a blockchain vulnerable to regulation, rather than to use
|
||||||
|
@ -395,7 +395,7 @@ give the reliable broadcast channel any substantial information about the
|
|||||||
amount of the transaction, and who the parties to the transaction are, but the
|
amount of the transaction, and who the parties to the transaction are, but the
|
||||||
node of the channel sees IP addresses, and this could frequently be used to
|
node of the channel sees IP addresses, and this could frequently be used to
|
||||||
reconstruct a pretty good guess about who is transacting with whom and why.
|
reconstruct a pretty good guess about who is transacting with whom and why.
|
||||||
As we see with Monaro, a partial information leak can be put together with
|
As we see with Monero, a partial information leak can be put together with
|
||||||
lots of other sources of information to reconstruct a very large information
|
lots of other sources of information to reconstruct a very large information
|
||||||
leak.
|
leak.
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ text-align:center;">May Scale of monetary hardness </td>
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td class="center"><b>3</b></td>
|
<td class="center"><b>3</b></td>
|
||||||
<td>Major crypto currencies, such as Bitcoin and Monaro</td>
|
<td>Major crypto currencies, such as Bitcoin and Monero</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td class="center"><b>4</b></td>
|
<td class="center"><b>4</b></td>
|
||||||
|
@ -8,7 +8,7 @@ We need blockchain crypto currency supporting pseudonymous reputations and end t
|
|||||||
|
|
||||||
We also need one whose consensus protocol is more resistant to government leverage. Ethereum is alarmingly vulnerable to pressure from our enemies.
|
We also need one whose consensus protocol is more resistant to government leverage. Ethereum is alarmingly vulnerable to pressure from our enemies.
|
||||||
|
|
||||||
The trouble with all existing blockchain based currencies is that the metadata relating to the transaction is transmitted by some other, ad hoc, mechanism, usually highly insecure, and this metadata necessarily links transaction outputs to identities, albeit in Monaro it only links a single transaction output, rather than a network of transactions.
|
The trouble with all existing blockchain based currencies is that the metadata relating to the transaction is transmitted by some other, ad hoc, mechanism, usually highly insecure, and this metadata necessarily links transaction outputs to identities, albeit in Monero it only links a single transaction output, rather than a network of transactions.
|
||||||
|
|
||||||
Thus we need a pseudonymous, not an anonymous, crypto currency.
|
Thus we need a pseudonymous, not an anonymous, crypto currency.
|
||||||
|
|
||||||
|
@ -4,11 +4,11 @@ title: Crypto currency
|
|||||||
|
|
||||||
This discussion is obsoleted and outdated by the latest advances in recursive snarks.
|
This discussion is obsoleted and outdated by the latest advances in recursive snarks.
|
||||||
|
|
||||||
The objective is to implement the blockchain in a way that scales to one hundred thousand transactions per second, so that it can replace the dollar, while being less centralized than bitcoin currently is, though not as decentralized as purists would like, and preserving privacy better than bitcoin now does, though not as well as Monaro does. It is a bitcoin with minor fixes to privacy and centralization, major fixes to client host trust, and major fixes to scaling.
|
The objective is to implement the blockchain in a way that scales to one hundred thousand transactions per second, so that it can replace the dollar, while being less centralized than bitcoin currently is, though not as decentralized as purists would like, and preserving privacy better than bitcoin now does, though not as well as Monero does. It is a bitcoin with minor fixes to privacy and centralization, major fixes to client host trust, and major fixes to scaling.
|
||||||
|
|
||||||
The problem of bitcoin clients getting scammed by bitcoin peers will be fixed through Merkle-patricia, which is a a well known and already widely deployed fix – though people keep getting scammed due to lack of a planned bitcoin client-host architecture. Bitcoin was never designed to be client host, but it just tends to happen, usually in a way that quite unnecessarily violates privacy, client control, and client safety.
|
The problem of bitcoin clients getting scammed by bitcoin peers will be fixed through Merkle-patricia, which is a a well known and already widely deployed fix – though people keep getting scammed due to lack of a planned bitcoin client-host architecture. Bitcoin was never designed to be client host, but it just tends to happen, usually in a way that quite unnecessarily violates privacy, client control, and client safety.
|
||||||
|
|
||||||
Monaro’s brilliant and ingenious cryptography makes scaling harder, and all mining based blockchains tend to the same centralization problem as afflicts bitcoin. Getting decisions quickly about a big pile of data necessarily involves a fair bit of centralization, but the Paxos proof of share protocol means the center can move at the speed of light in fiber, and from time to time, will do so, sometimes to locations unknown and not easy to find. We cannot avoid having a center, but we can make the center ephemeral, and we can make it so that not everyone, or even all peers, know the network address of the processes holding the secrets that signed the most recent block.
|
Monero’s brilliant and ingenious cryptography makes scaling harder, and all mining based blockchains tend to the same centralization problem as afflicts bitcoin. Getting decisions quickly about a big pile of data necessarily involves a fair bit of centralization, but the Paxos proof of share protocol means the center can move at the speed of light in fiber, and from time to time, will do so, sometimes to locations unknown and not easy to find. We cannot avoid having a center, but we can make the center ephemeral, and we can make it so that not everyone, or even all peers, know the network address of the processes holding the secrets that signed the most recent block.
|
||||||
|
|
||||||
Scaling accomplished by a client host hierarchy, where each host has many clients, and each host is a blockchain peer.
|
Scaling accomplished by a client host hierarchy, where each host has many clients, and each host is a blockchain peer.
|
||||||
|
|
||||||
|
@ -930,7 +930,7 @@ cannot be integrated into the buyer's bookkeeping.
|
|||||||
The complexity and difficulty is because that we are using one rather
|
The complexity and difficulty is because that we are using one rather
|
||||||
insecure channel for the metadata about the transaction, and a different
|
insecure channel for the metadata about the transaction, and a different
|
||||||
channel for the transaction. (This is also a gaping and gigantic security
|
channel for the transaction. (This is also a gaping and gigantic security
|
||||||
hole, even if you are using Monaro.) For a truly usable crypto currency
|
hole, even if you are using Monero.) For a truly usable crypto currency
|
||||||
payment mechanism, transactions and metadata have to go through the
|
payment mechanism, transactions and metadata have to go through the
|
||||||
same channel, which means human to human communication through
|
same channel, which means human to human communication through
|
||||||
wallets - means that you need to be able to send human to human
|
wallets - means that you need to be able to send human to human
|
||||||
@ -1105,6 +1105,15 @@ people will start Sovcorps. So to get a foot in the door, we have to cherry pick
|
|||||||
and snipe little areas where the big network is failing, and once we have a foot
|
and snipe little areas where the big network is failing, and once we have a foot
|
||||||
in the door, then we can get rolling.
|
in the door, then we can get rolling.
|
||||||
|
|
||||||
|
### elevator pitch:
|
||||||
|
|
||||||
|
Grab a privacy niche where Monero cannot operate, because of its inherent
|
||||||
|
lack of smart contracts and social networking capability, due to the nature of its
|
||||||
|
privacy technology.
|
||||||
|
Then take over Monero's niche by being a better Monero.
|
||||||
|
Then take over Bitcoin and Nostr's niche by being a better Bitcoin and a better Nostr,
|
||||||
|
because recursive snarks can do lots of things, such as smart contracts, better than they can.
|
||||||
|
|
||||||
### failure of previous altcoins to succeed in this strategy
|
### failure of previous altcoins to succeed in this strategy
|
||||||
|
|
||||||
During the last decade, numberless altcoins have attempted to compete with
|
During the last decade, numberless altcoins have attempted to compete with
|
||||||
|
@ -55,10 +55,10 @@ time to flee bitcoin.](http://reaction.la/security/bitcoin_vulnerable_to_currenc
|
|||||||
Blockchain analysis is a big problem, though scaling is rapidly becoming a
|
Blockchain analysis is a big problem, though scaling is rapidly becoming a
|
||||||
bigger problem.
|
bigger problem.
|
||||||
|
|
||||||
Monaro and other privacy currencies solve the privacy problem by padding
|
Monero and other privacy currencies solve the privacy problem by padding
|
||||||
the blockchain with chaff, to defeat blockchain analysis, but this
|
the blockchain with chaff, to defeat blockchain analysis, but this
|
||||||
greatly worsens the scaling problem. If Bitcoin comes under the blood
|
greatly worsens the scaling problem. If Bitcoin comes under the blood
|
||||||
diamonds attack, Monaro will be the next big crypto currency, but Monaro
|
diamonds attack, Monero will be the next big crypto currency, but Monero
|
||||||
has an even worse scaling problem than Bitcoin.
|
has an even worse scaling problem than Bitcoin.
|
||||||
|
|
||||||
The solution to privacy is not to put more data on the blockchain, but less -
|
The solution to privacy is not to put more data on the blockchain, but less -
|
||||||
@ -221,7 +221,7 @@ Privacy, security, efficiency, and scalability are mutually opposed if if one at
|
|||||||
|
|
||||||
The most efficient way is obviously a single central authority deciding everything, which is not very private nor secure, and has big problems with scalability.
|
The most efficient way is obviously a single central authority deciding everything, which is not very private nor secure, and has big problems with scalability.
|
||||||
|
|
||||||
If a transaction is to be processed by many people, one achieves privacy, as with Monaro, by cryptographically padding it with a lot of misinformation, which is contrary to efficiency and scalability.
|
If a transaction is to be processed by many people, one achieves privacy, as with Monero, by cryptographically padding it with a lot of misinformation, which is contrary to efficiency and scalability.
|
||||||
|
|
||||||
The efficient and scalable way to do privacy is not to share the
|
The efficient and scalable way to do privacy is not to share the
|
||||||
information at all. Rather we should arrange matters so that
|
information at all. Rather we should arrange matters so that
|
||||||
|
@ -313,7 +313,7 @@ The above lines will append `-A` a rule to the end of the`POSTROUTING` chain of
|
|||||||
|
|
||||||
Like your home router, it means your client system behind the nat has no open ports.
|
Like your home router, it means your client system behind the nat has no open ports.
|
||||||
|
|
||||||
If you want to open some ports, for example the bitcoin port 8333 so that you can run bitcoin core and the monaro ports.
|
If you want to open some ports, for example the bitcoin port 8333 so that you can run bitcoin core and the Monero ports.
|
||||||
|
|
||||||
```terminal_image
|
```terminal_image
|
||||||
NAT table rules
|
NAT table rules
|
||||||
|
@ -32,7 +32,7 @@ and ignores everything the government seized.</p><p>
|
|||||||
|
|
||||||
The primary design principle of our wallet is to bypass the DNS and ICANN, so
|
The primary design principle of our wallet is to bypass the DNS and ICANN, so
|
||||||
that people can arrange transactions securely. The big security hole in
|
that people can arrange transactions securely. The big security hole in
|
||||||
Bitcoin is not the one that Monaro fixes, but that you generally arrange
|
Bitcoin is not the one that Monero fixes, but that you generally arrange
|
||||||
transactions on the totally insecure internet. The spies care about the
|
transactions on the totally insecure internet. The spies care about the
|
||||||
metadata more than they care about the data. We need to internalize and secure
|
metadata more than they care about the data. We need to internalize and secure
|
||||||
the metadata.</p><p>
|
the metadata.</p><p>
|
||||||
|
Loading…
Reference in New Issue
Block a user