• Forum has been upgraded, all links, images, etc are as they were. Please see Official Announcements for more information

Search results

  1. V

    Secure environment

    As I understand, here you demonstrate how to break connection between sender and receiver in the network logs. This is what Darkoin is about. However, Dark Wallet does not work in vacuum. The anonymizing network makes sense only as long as you use secure, anonymous environment. If NSA can watch...
  2. V

    Open source binaries?

    You say that Dash is totally trustable because it is provided in the form of publically-reviewable open source form. Yet, I see that all dash guidelines recommend downloading binary installers and you can substitute the sources with anything after compilation. In which way the binaries are open...
Back
Top