This is what our brother @digipl has had to contend with on the www.burbuja.info forum.
As you will see, while their concerns are valid, it quickly degenerates to uninformed berating.
I have translated posts of those on the forum/thread who presented the greatest levels of contempt for the project and it’s founder. I included others like our friend digipl to provide proper context. I have retained most of the format and emoji’s to give a better sense of the the underlying sentiment of the participants.
I look forward to the day we can shut this all down.
History repeats itself. The small minded naysayers heckle and moan then fall on their face when the “impossible” emerges. The beauty is that SAFE will be the facilitator of open minds. The very thing its father isn’t given the benefit of by these onlookers. Take a gander. Tell me what you see…
A link to the discussion:
The following are excerpts with minor adjustments to the translations for accuracy. My Spanish isn’t the best but I applied what I know.
—In proper sequence—
digipl:
I mean. you are unable to read or understand, the two papers I have pointed you to and now you come here to pontificate on the network. And yes, there is a patent, assigned to a foundation, and everything is now as GPL3 or it is free if your software is also free. If what you want is make money from the work of others, you will have to pay the foundation. A thing anyone would know had they bothered to minimally research. Another example of your absolute ignorance. And here what smells really bad is that the two largest bitcoin speculators of the forum giving me a pain in the ass about something they do not understand and do not believe. Have you come to tell us that this is a Ponzi scheme? Or that has no foundation? Or you need to find new suckers for the wheel turn? pathetic …
Sr.Mojón
(burbuja member):
Here a good thread on Reddit with clear, direct and concise questions about MaidSafe and see the usual responses of Irvine "… will soon a paper with simulated attacks … … Sybil attacks will be controlled by chains consensus … " Behold the perlite for those who want to enjoy: MaidSafe is creating a new decentralized Internet - Ask Us Anything! : Futuristparty
This response is the one that can best show what kind of guy this is:
—Quoting David —
There is some attacks on system start and there is a paper That is promised this week on Carried out by Strathclyde attacks uni. If you watch you will see These docs as well That. The Dev wiki Explains a lot of the Implementation Which will help Home · maidsafe-archive / MaidSafe Wiki · GitHub Sybil attacks though, Perhaps the largest threat are handled by consensus chains (take birthday paradox and make it unavailable to target a day, then a link Those days deterministically based on message types and network location) There is no way to condense it all down though. We did have some community folks over to spend two weeks on attack vectors as well as research projects Several. So there is a ton of info on how we get around these. In fact there is a repo simulations on our github account you can see some of this. I think the WWRF paper will be a great start.
—End Quote—
There you have two paragraphs that say nothing, do not clarify anything and leaves it all to future papers, simulations with conditions that then will not correspond with reality (like the software that has been released now), etc.
The author of the thread then goes directly after:
Are you using an existing Kademlia Implementation? Are you making any attempt at reduction in kademlia routing latency? (If not, average latency is lg (n) * mean_internode_latency) This would open Also you to latency-inducing attacks by adding large numbers of (honest, non-detecting) With high latencies nodes. (This raises n and mean_latency)
To which Irvine returns to hook up the blanket to his head and leave the ring with a splendid:
Yes and no I typed up here an explanation to show what we did and Kademlia With Could not get it good enough. . We still use the concepts of K buckets but managed With reliable UDP connections (RT always connected nodes) Resilience - Autonomous network | SystemDocs will expain it a bit better (I hope). The docs are very much WIP right now. We have too many and are trying to centralize These here
Don’t you just love him? The answer of the seller of Hair Growth formula: “(Yes and no longer be explained later (I hope)”.
Literally.
And for the record that this is all a year ago, when people were already getting impatient by the state of development of the project.
After that he spontaneously takes over the discussion ( I imagine that seeing how ridiculous Irvine he looked) and gives some more coherent responses and recognize the stagnation of development in precisely those trouble spots:
Heres an answer from my own research ( not employee so i may be wrong). Space scaling, Maidsafe claim That They Will Be able to use deduplication to reduce the storage space required by an Estimated 70%. (Seems too optimistic in my opinion) They are starting off by using four copies of each piece of data (k = 4) , Although there is the Possibility for experimentation With This value. Inevitably, some small percentage of data will be lost With an unmaintained and sporadic Such network. Caching is supposedly maintained by nodes When retrieving data. Nodes measure the reliability of other nodes by monitoring Their actions and bits of data to
Requesting They Have Been check stored correctly. ( How this is done in practice is unclear ) As far as I know, Maidsafe has not update mechanism, new data is uploaded and old data is deleted. Maidsafe Essentially use Kademlia but With added on structures to help Deal with single Sybil attacks and unresponsive nodes. Maidsafe is vulnerable to large scale attacks Sybil Which Could cause network instability, DoS and economic disruption if the system is used overlaid coin, this is a critical problem Which can not be solved Easily. Nodes monitor each other to deal with defective nodes . Network messages are digitally signed but not encrypted, only data is encrypted and the key for decryption is retained by the end user (in the form of a password and security token) Maidsafe is not anonymous. At Least not in Its current form. It still use IP routing using UDP. Metadata collection is definitely possible, but there are ways around this : such as Requesting Which files you do not own and can not decrypt just to confuse onlookers. All files can be Requested They will all be but HENCE encrypted and useless.
Yes, the code will have changed after a year, there will be more developers, etc, but there have Irvine’s responses in police court long after the money from the IPO has been taken. Nobody explains anything until you jump spontaneously into the ring and throw some clarity. Well, a year later , here we are, trying to solve the same doubts thet existed then. EDIT: Here are more questions that users asked in the same thread and responses, this time, Nick Lambert, one of the leading developers of the “project”. Read:
—Reddit —
Username: ItsAConspiracy - 1 year ago
_From what I’ve seen, SAFE claims to solve the double spending problem without sending all transactions to all nodes, Which would be a huge breakthrough. _
_But there does not seem to be a clear paper Describing how it does this , just sorta vague discussion threads with fragmented descriptions of a lot of complicated stuff that’s still being worked out. ? When will there be a paper _
Can you describe Basically how it works here?
Username: NickLambert - 1 year ago
Hi, yes check out the following paper and if you go to section 3 of the appendix it Explains the transfer process. There is quite a lot of Past discussions in our forum. In essense, safecoin can only exist Within the SAFE network and is atomic, what I mean by this is That the transfer of ownership happens in one operation. I hope this info Helps!
Username: ItsAConspiracy - 1 year ago
_Hmm, I’m finding That unconvincing. _
_Suppose the 2.II request to TransactionManager fails, after debiting A’s wallet? Suppose TM’s notification to B’s Maid Manager group fails? Or B’s 4 - i acknowledgment fails? _
How exactly are these services Assigned to nodes, in a way That Prevents them being taken over by attackers? The exact algorithms are not described. (Sr.Majon: Good God, he just discovered the bullshit )
(Already Looked through the forums, HENCE my comment above.)
Username: NickLambert - 1 year ago
We Have started work on Within our System documentation better Docs. These are a work in progress , pretty early stage, so please excuse grammatical errors and typos. We Have started to document and analyze attacks and the autonomous network section observe Who the transaction services are Assigned to nodes.
The algorithms are still being worked on (Sr.Majon: We have them , but nooot todaaay, tomoroooow) and it is faster for us to code them and get . the network up and running than it is for us to document them first We will go back and do This Once the network is Launched though. (Sr.Majon: As you all say, do not be impatient )
Username: ItsAConspiracy - 1 year ago
Honestly it does not seem like the kind of problem That can be solved correctly by Quickly hacking out some code. (Sr.Majon: Stop lying and beating around the bush, **** ya) It’s the kind of problem that’s solved by careful analysis and proofs, before coding even Begins. (Sr.Majon: to which I would add in English “lifelong whore of God”)
Username: NickLambert - 1 year ago
Hopefully 8 years qualifies as careful consideration (Sr.Majon: we took eight years with this, so do not come here to ask us for papers or tests, or anything, man of God) How about you jump onto our dev mailing list and our forum ( SAFE Network Forum ) These are the types of things That are Discussed there and it sounds like we might benefit from your Involvement. (Sr.Majon: Get out of here immediately, that we are seeing many people and we do not ride the shtick)