Yep, thats the point of the discussion about it. Making sure the transactions are all valid. Supplying all at the start is about solving different issues and reducing the effect of any bad actors and reducing the attack surface.
That’s essentially what we are doing. Ie, the “genesis DBC” would be minted with all possible coins, then (re-)distributed through farming. However auditing is still necessary for any party to be able to prove to themself that mintnodes have not cheated and inflated the money supply.
ie, say the entire money supply is 100. If section elders were ever to collude and create another 100 (or even .00001) out of thin air, network participants need to be able to detect that.
How does that work? Or if not the details, does this solve the problem of a few sections controlling the very large initial supply?
The initial mint is still in the air AFAIK. To mint 100% of coins and distribute to all holders, or some other mechanism is still a discussion to have. It will be a long thread that one
Using a multi-section spend route is good, but then having a single section create route would IMO be retrograde. So we do need some heads on that one.
We’ll need to have age randomization amongst the decoys so that the true input does not stand out as being more deeply embedded in the graph (older). I believe Monero has done research in this area we can look at.
Very interesting.
For anyone else curious, Monero stats show the blockchain size (since 2014-04-18) is about 64 GB, and contains about 19M txs, so about 3.5 KB per tx.
some one in a chat claims that monero is easy to find out who did the transaction:
https://arxiv.org/pdf/1704.04299/ there’s some good papers about this in which researchers were able to break all, or almost all of the ring signatures at various points in time, this paper is particularly good and goes into a lot of detail. when it was written, they could trivially identify 64% of transactions (because they didn’t use ring signatures), and for the rest they could completely identify more than 80%.
this paper is out of date obviously, but it gives some really good explanations on the weaknesses of the system. there’s been many new projects breaking the ring signatures used in Monero, it’s been sort of a punching bag for people doing cryptanalysis for a while. the main issue is that the core concept of using ring signatures like this is just weak, and will always continue to be so.
q: if not finding out transaction senders
they absolutely can and I can tell you there’s very good tools for just completely breaking these cryptocurrencies, but demanding that I do it on request for you in a public channel is asking the wrong question
this company is doing the tools to break monero ring cts https://www.chainalysis.com/
Thank you for the heavy work team MaidSafe! I add the translations in the first post
Privacy. Security. Freedom