• Forum has been upgraded, all links, images, etc are as they were. Please see Official Announcements for more information

Which Masternode model should we implement?

LOL, all this worry about DDOSing 2000+ Masternodes when 90% of the hash gets funnelled through 3 pool servers?

An attacker is not going to waste time disrupting DS and IX services when they can render the entire currency unusable and rewrite the blockchain at will with 3 orders of magnitude less effort.

Blockchain security should be shifted to Masternodes, using the same n-of-m approach that makes DS and IX so secure. And then, when IP obfuscation/i2p/whatever is implemented, you have a practically unbreakable system with no weak links.

What if the goal of an attacker is to reveal who you are rather than bring the network down? I think the goal of being anonymous is one while protecting the network is another goal.
 
LOL, all this worry about DDOSing 2000+ Masternodes when 90% of the hash gets funnelled through 3 pool servers?

An attacker is not going to waste time disrupting DS and IX services when they can render the entire currency unusable and rewrite the blockchain at will with 3 orders of magnitude less effort.

Blockchain security should be shifted to Masternodes, using the same n-of-m approach that makes DS and IX so secure. And then, when IP obfuscation/i2p/whatever is implemented, you have a practically unbreakable system with no weak links.

Good luck ddosing 3 pools which owners are rich as fuck and totally able to aford $1000/month anti-ddos services compared to masternode operators who are not willing to pay more than 10$/month on hosting because its not cost-effective.

There are good services which offer Anti-ddos for up to 500 Gbit/s and more. Now these 3 pools use 3 different anti-ddos with each 500 Gbit/s. You need 1500 Gbit/s to down these pools. Where dafuq will u get 1500 Gbit/s? It will be more expensive than riding EUR1000/night hookers everyday.

On paper you sound correct, in reality you're wrong.
 
LOL, all this worry about DDOSing 2000+ Masternodes when 90% of the hash gets funnelled through 3 pool servers?

An attacker is not going to waste time disrupting DS and IX services when they can render the entire currency unusable and rewrite the blockchain at will with 3 orders of magnitude less effort.

Blockchain security should be shifted to Masternodes, using the same n-of-m approach that makes DS and IX so secure. And then, when IP obfuscation/i2p/whatever is implemented, you have a practically unbreakable system with no weak links.

What if the goal of an attacker is to reveal who you are rather than bring the network down? I think the goal of being anonymous is one while protecting the network is another goal.
 
Here is my logic:

We want to use an anonymous coin to protect our privacy. That does not mean we are criminals. Criminals want to be anonymous too. So,

we =/= criminals
drk users = we + criminals

So, in the long run, we still should plan for protecting the MNs.
 
Here is my logic:

We want to use an anonymous coin to protect our privacy. That does not mean we are criminals. Criminals want to be anonymous too. So,

we =/= criminals
drk users = we + criminals

So, in the long run, we still should plan for protecting the MNs.

I do not see it like that at all !!
I am public with my name and everything and would have obviously not done that
thinking like
we =/= criminals

DRK is an open source project
the Dev Team is not responsible for any action taken by the coins
MN's are just supporting the tech and network
nothing else !

you are watching way too many hollywood movies i think
I am paranoid enought , but this is just way over the top !
 
I am wondering what will happen if we have the following setup with our current darkcoin software:

( other drk clients and drk MNs on clearnet )==internet==( drk client 1 )==intranet==( drk MN 1 )==internet==( other drk clients and drk MN on darknet )

What will happen when drk client 1 sees a drk MN 1 on the intranet?
 
I do not see it like that at all !!
I am public with my name and everything and would have obviously not done that
thinking like
we =/= criminals

DRK is an open source project
the Dev Team is not responsible for any action taken by the coins
MN's are just supporting the tech and network
nothing else !

you are watching way too many hollywood movies i think
I am paranoid enought , but this is just way over the top !
I meant
we ≠ criminals
if I have caused any confusion.
 
Good luck ddosing 3 pools which owners are rich as fuck and totally able to aford $1000/month anti-ddos services compared to masternode operators who are not willing to pay more than 10$/month on hosting because its not cost-effective.

There are good services which offer Anti-ddos for up to 500 Gbit/s and more. Now these 3 pools use 3 different anti-ddos with each 500 Gbit/s. You need 1500 Gbit/s to down these pools. Where dafuq will u get 1500 Gbit/s? It will be more expensive than riding EUR1000/night hookers everyday.

On paper you sound correct, in reality you're wrong.
Two points:

1. I doubt pool owners are as 'rich as fuck' and spending $1000/month on DDOS protection.

2. The killer governments you talk about wouldn't piss about DDOSing them anyway, they'd locate them and physically shut them down. At a cost of peanuts. A phonecall to the service provider would probably do it. "Hi, this is the CIA. Cease provision to blahpool immediately or we will swing on by and FUBAR you."
 
So your cunning plan is to move pools and miners too to a network funded by the US govt.?

What this has to do with anything? If you want to continue bashing Torproject then you should get some credibility by showing vulnerabilities you've personally found. If you cannot then please kindly shut the fuck up (I think I asked you to do this before) and have some respect to coders that are way better than you (Torproject).

Having funding just means Tor coders can work on it everyday as they're rich as fuck and don't need any jobs. It doesn't matter from whom the funding is. You keep forgetting that Tor is open-source.

I think ya lil boy ass is jelly bro.

Darkcoin under Tor can be optional. I think Evan is already doing it according to Github.
 
What this has to do with anything? If you want to continue bashing Torproject then you should get some credibility by showing vulnerabilities you've personally found. If you cannot then please kindly shut the fuck up (I think I asked you to do this before) and have some respect to coders that are way better than you (Torproject).

Having funding just means Tor coders can work on it everyday as they're rich as fuck and don't need any jobs. It doesn't matter from whom the funding is. You keep forgetting that Tor is open-source.

Darkcoin under Tor can be optional. I think Evan is already doing it according to Github.

Agora and Evolution are on the dark web. Mining pools and miners are not. This is what we were talking about. Try to keep up.
 
After reading all 11 pages' discussion, i think i'm still vote for #1. And i want to show my respect that this thread made my day. So many different ideas join together and make many spark here.
IMHO:
- i consider the Darkcoin / Darkcoin network as the future of the crypto-currency.Cypto world is highly technology oriented world, if you stay, you will fail at the end. It's not the replace or something like that. When it happens, it happens.
- Do we really just "Only" have the features like Darksend, InstantX or Masternode in future? If not, these potential services are most likely to build on what? Masternode network?
- A strong, stable and powerful Masternode definitely will become one of our blueprint. And the internet security is just one part of it, maybe that important one. But migrating the whole network to the Tor/I2P is just not OK for me. I think it's just like bypass the problem to solve the problem.
- And i'm very glade we have people like darkstrike420 in the community and i agree with him that it should be take a long time to make final decision.
 
I don't own a botnet. If you want to test how strong Darkcoin is against DDOS, you first should get acceptance of ddos of masternode owners(so its legal to stress test their network) then throw together couple thousand for 1 Gbit/s servers and get DNS amplification code off the internet. Then just input the IP addresses.

FYI: I am not criminal. Why would you assume I run botnets?
I was just kidding. Not sure if Kong was kidding though... :)
 
I have one more general though: dependency!

If Darkcoin depends/relies on external software (be it TOR or I2P or something else) it lives and dies with it. If the maintainers stop maintaining it (maybe they don't want or are not allowed to do it any more. TOR's already forbidden in a couple of countries) Darkcoin will have troubles. The more dependencies, the higher the odds that one breaks.

If we _need_ something like onion-routing we should do it within Darkcoin itself.
 
I have one more general though: dependency!

If Darkcoin depends/relies on external software (be it TOR or I2P or something else) it lives and dies with it. If the maintainers stop maintaining it (maybe they don't want or are not allowed to do it any more. TOR's already forbidden in a couple of countries) Darkcoin will have troubles. The more dependencies, the higher the odds that one breaks.

If we _need_ something like onion-routing we should do it within Darkcoin itself.

Absolutely agree, whatever is decided upon needs to be integrated, without any external dependencies.

Masternode ops all have to use TOR? Not going to happen. Pools and miners all have to use TOR? Not going to happen. Users all have to use TOR? Not going to happen. Merchants and exchanges all have to use TOR? Not going to happen.
 
I have one more general though: dependency!

If Darkcoin depends/relies on external software (be it TOR or I2P or something else) it lives and dies with it. If the maintainers stop maintaining it (maybe they don't want or are not allowed to do it any more. TOR's already forbidden in a couple of countries) Darkcoin will have troubles. The more dependencies, the higher the odds that one breaks.

If we _need_ something like onion-routing we should do it within Darkcoin itself.
What I understand is .. right now it's impossible to put the whole MN network under Tor, so that topic is out of question now. But any network can build their own Tor hidden services, like someone is doing it right now:

https://github.com/darkcoin/darkcoin/commit/040528dc449e58ffadde53767b29538615fbedaa
 
I still vote #1

1.) One node per IP.
-Higher cost to run a node
-Network will support more computing power
-Zero anonymity for masternode operators
-Much faster response time for Masternode tasks
-Support tasks on direct connection to masternode (Greater security for DS and other tasks like that).
-Highly resistant to DDOS (thousands of machines)
-Less centralization
-Supports Masternode Blinding

We can go with #1, but allow users/masternode operators to use Tor if they like. In my opinion, it's a bad idea for us to base our technology off of something already highly scrutinized, it will make the system as a whole much more vulnerable.
 
Back
Top