New onion routing protocol based on Blockchain tech

Lokinet. Seems pretty cool and utilises some crypto tech to economically protect the network. Here's an animationexplaining things much better than i could. What do you guys think?

👍︎ 15
💬︎
📅︎ Jun 10 2020
🚨︎ report
LokiNet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol github.com/loki-project/l…
👍︎ 20
📰︎ r/TOR
💬︎
👤︎ u/eleitl
📅︎ Mar 28 2019
🚨︎ report
LokiNet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol github.com/loki-project/l…
👍︎ 16
📰︎ r/i2p
💬︎
👤︎ u/eleitl
📅︎ Mar 28 2019
🚨︎ report
LokiNet is the reference implementation of LLARP (low latency anonymous routing protocol), a layer 3 onion routing protocol github.com/loki-project/l…
👍︎ 10
💬︎
👤︎ u/eleitl
📅︎ Mar 28 2019
🚨︎ report
Research: Maximizing privacy of the interledger protocol (ILP) via Tor-like onion routing circuits deepdotweb.com/2019/03/18…
👍︎ 6
💬︎
📅︎ Mar 19 2019
🚨︎ report
The #Bitcoin #Lightning Spec Part 5/8: Onion Routing Protocol medium.com/@rusty_lightni…
👍︎ 52
📰︎ r/Bitcoin
💬︎
📅︎ Dec 12 2016
🚨︎ report
The #Bitcoin #Lightning Spec Part 5/8: Onion Routing Protocol medium.com/@rusty_lightni…
👍︎ 2
📰︎ r/BitcoinAll
💬︎
📅︎ Dec 12 2016
🚨︎ report
Introducing the Hammer Protocol - Onion Routing for Web Services magixilluminate.com/2015/…
👍︎ 5
💬︎
👤︎ u/HellfireHD
📅︎ Mar 29 2015
🚨︎ report
Uplexa, next full privacy hype!

uPlexa is quickly becoming a cutting edge, privacy based cryptocurrency and summing it up in a few words is not possible. Its roots are in the cryptonote algorithm to coincide with the communities strong “privacy as a right” belief system. The blockchain was designed to function with(or mine) the billions of IoT devices available on earth. This is to ensure high levels of participation and extremely high levels of future decentralization. Not only has it developed the first real working IoT based algorithm and android miner, but a host of other IoT focused miners as well. Officially there are miners for arm7/8 microarchitectures, along with other various CPU driven devices and all types of GPU cards. Also note, the uPlexa algorithm intends ASIC resistance and is also balanced to force competitiveness between CPU and GPU performance.

The current small but solid community is growing with members daily. There is a great ratio of these members not only speculating but also adding value and support to the ecosystem. Their input is valued and vital to the success of this protocol. Although uPlexa is only two years old, the chain has had a constant uptime with minimal bugs and problems thus far. This is due to development always looking ahead, solving problems before they are problematic, vigorous bug testing before deployment and constant observation. This ethic keeps the developers ready for any challenges that come with uPlexa's inevitable growth.

Currently uPlexa is in the process of a PoW/PoU hybrid testnet that will maintain IoT mining as the focus, and additionally bring scalability to the network. This upgrade is called "Steadfast Storm" and it will also enable an exciting new development by contributors called "PlexaNet", a layer two onion routing protocol that acts as the worlds first high-speed and decentralized VPN, with hidden services. The dVPN is powered by Utility Nodes. Utility nodes act as exit nodes, routing all private connections between peers, and are rewarded dividends (portion of block rewards) for powering the PlexaNet network. A subset of the contributors are also working on various other platforms and applications such as an eCommerce platform to rival lead competitors in the ecommerce industry, and more official miners for various IoT devices. Uplexa's vision for the future is vast and always expanding thanks to the strong ethics and convictions of the contributors and the general community.

Welcome to the exciting ecosystem of uPl

... keep reading on reddit ➡

👍︎ 13
💬︎
👤︎ u/scholly45
📅︎ Jan 08
🚨︎ report
Weekly Dev Update 12/10/2020

Hey Y’all,

The dev update is a little later this week due to the craziness of the Loki Salty Saga hardfork. All bases were loaded with Salty Saga this week, obviously this involved lots of work on Loki core and the Loki wallets to make sure everything was working for the hardfork. The hardfork has also made a new and improved Session onion requests protocol possible, which the Session team is now focused on implementing. Meanwhile, the Lokinet team worked on ensuring the Windows GUI is properly functioning and assessing the stability of the network as the hardfork occurred.

Loki Core

Loki Wallets

  • Sweep/send all will now send all funds, incl. those in sub addresses [https://github.com/loki-project/loki-electron-gui-wallet/pull/220](https://github.com/loki-project/loki-elect
... keep reading on reddit ➡

👍︎ 6
💬︎
👤︎ u/Keejef
📅︎ Oct 16 2020
🚨︎ report
Mr. Robot 1x01 - Ron's Coffee [WW]

NOTE: I did my best, but I think I need some help. At times it was difficult for me to find tactics that fit the objective, especially when he begins sympathising with Ron and when he talks about his dad. I'm not sure I understand why he would open up about these things to Ron. It doesn't really seem like something that benefits him. The only reasonable motivations I can think of is either some sort of emotional release (Feeling bad about what he's doing so he compensates for it by sympathising with him or that he likes talking about his dad with someone else) or that he's attempting to defuse Ron's hostility. Hope this little box of text wasn't too confusing.

OBJECTIVE: Make Ron repent for his actions

Ron: May I help you with something?

Elliot: You’re Ron.

Ron: Do I know you?

TACTIC #1 - “No, but I know you"

Elliot: But your real name is Rohit Mehta, you changed it to Ron when you bought your first Ron’s Coffee shop 6 years ago.

Ron: So? Anyone can find that information with a quick Google search.

TACTIC #2 - “I even know your unpublished plans for expansion. Believe me now?"

Elliot: Now you’ve got seventeen of them with eight more coming next quarter.

Ron: What do you want from me?

TACTIC #3 - “Let me tell you"

Elliot: I liked coming here because your WIFI was fast. I mean you’re one of the few spots that has a fiber connection with gigabit speed. It’s good.

Ron: Well I’m glad you like it, but I got plenty of work to catch up on, so if you don’t mind.

TACTIC #4 - “I think you wanna listen to me”

Elliot: So good it scratched that part of my mind.

Ron: What part?

TACTIC #5 - “I’m on to you"

Elliot: The part that doesn’t allow for good to exist without condition.

Ron: I don’t understand?

TACTIC #6 - “I was digging for your secret”

Elliot: So I started intercepting all the traffic on your network, that’s when I noticed something strange.

Ron: What?

TACTIC #7 - “I saw what you where doing, you deserve what’s coming to you”

Elliot: That’s when I decided to hack you.

Ron: Hack me?

TACTIC #8 - “There’s no use in denying what I already know"

Elliot: I know you run a website called “Plato’s Boys”

Ron: Excuse me?

TACTIC #9 - “Tell me I’m wrong”

Elliot: You’re using Tor networking to keep the servers anonymous. You made it really hard for anyone to see it, but I saw it.

Ron: I don’t know what you’re talking about.

TACTIC #10 - “It w

... keep reading on reddit ➡

👍︎ 21
💬︎
👤︎ u/Jonathan-9
📅︎ May 10 2020
🚨︎ report
Not all alt-coins are scams (I hope)

#What is this post about?

Bitcoin brought to light the power of cryptocurrency and blockchain technology. I wanted to share some other projects to show the world that blockchain technology is a viable solution to real world problems. I had a look into some of the projects that are disrupting industries like advertising, communication, energy, finance, gambling, video games, privacy, and social media - here’s what I found:

#Advertising

Personal data is gathered and sold to third parties, but the money never makes it to the user whose data has generated the value for the company using it.

BAT is a product of Firefox co-founder Brendan Eich, raising over $20million in less than a minute during the ICO craze of 2017. BAT is a feature of the Brave browser, enabling users to be rewarded in $BAT for their attention. As of March 2020, Brave has amassed an impressive 4 million daily active users.

DAD, short for Decentralized Advertising, is making advertising data more transparent without infringing on users’ privacy. DAD uses the Lightning Network to facilitate high frequency microtransactions.

#Communication

Edward Snowden (among others) revealed the extent of surveillance technology collecting civilian communication data and expressed the need for a safe, secure and surveillance free method for individuals and businesses to communicate over the internet.

Status is an Ethereum based encrypted messaging app, web3 browser and $ETH/$SNT wallet. Status was one of the most funded ICOs in 2017 and have achieved +10k downloads on Android phones. Recently, Status upgraded their communication protocol to allow 10x more users, however this only raised their limit to 10k simultaneous users.

The Orchid network is an incentivized bandwidth proxying protocol for a decentralized VPN that allows users to buy bandwidth from a global pool of service providers using $OXT.

#Privacy

With the shift away from physical cash and the move towards online payments, user privacy is at risk. Digitalization often means more surveillance, privacy is more important than ever.

With Monero you can spend safely, knowing that others cannot see your balances or track your transaction activity - by default. Using a combination of ring sig

... keep reading on reddit ➡

👍︎ 11
💬︎
📅︎ Apr 24 2020
🚨︎ report
Revealed in pilot opening scene

Sam revealed to us the essence of the show in the pilot's opening scene. In the opening scene, Elliot explains that he hacked Ron from Ron's coffee.

"You're using TOR networking to make the server's anonymous..." "The onion routing protocol isn't as anonymous as you think it is." "Whoever is in control of the exit nodes, is also in control of traffic, which makes me the one in control."

Onion routing uses layers, typically 3, where the anonymity is due to segmented and protected identities. Being in CONTROL (common theme) of the EXIT node (another common theme) makes him the one in control. Sadly, suicide is the only sense of control Elliot could ever feel over his own life.

What would motivate Elliot to hack Ron from Ron's Coffee? It has to be more complicated than the idea of him being a vigilante hero. Even batman, the quintessential antihero, fights to heal himself. I suspect Elliot was molested, or witnessed molestation. There are many clues to support this that I can elaborate in another post.

👍︎ 107
📰︎ r/MrRobot
💬︎
📅︎ Oct 25 2019
🚨︎ report
Hi Fasaks will you help my writing career?

I want to become a writer that can write wide variety of topics, not repeating one theme again once I am done with that. I have a small history of publishing(a bit embarrassed to disclose as I myself felt earlier work needed lot polishing). One niche I want to claim for myself is stories/themes based purely on science and technology, especially in Indian context. I think I need reviewers for my work. I recently penned down around chapter and a half of a story in English. I am thinking of translating it into Telugu and write it completely in Telugu itself. Anyway, here is the theme of the story and I'll write the rest in మాత్రు భాష.

ఇది spy ధిల్లర్ అనుకోవచ్చు. ఇందులో హీరో భారత దేశ ప్రభుత్వం, పాత్రలు తమ తల విధులను పూర్తి చేసుకుపోతారు.

ప్రధాన పాత్రధారులు:‌ ఇవి చిన్న పిచ్హుక డ్రోనులు. వీటిల్లో రక రకాల తెగలు ఉంటాయి, వాటి వాటి ప్రయోజనత్వం వల్ల మరియి వాటి కెపాసిటీ బట్టి. అన్ని పిచ్చుకలు వాటి కాళ్ళు సాకెట్టులో పెట్టి వాటిని charge చేసుకోగలవు. ముక్కుతో wire ఇంసులేషన్ లను తెగగొట్టి కూడా charge చేసుకోగలవు - ఇదే పద్దతితో అవసరమైతే కృత్రిమంగా short circut కూడా చేయగలవు. వాటి దిజైను ఎలా ఉంటాయంటే, ఆరు పిచ్హుకలు కలిసి పెద్ద పక్షిలా తయారవగలవు, ఓ పన్నెండు పిచ్చుకలు కలిసి ఒక గద్ద సైజులో తయారవగలవు. అలా తయారైన "పెద్ద" పక్షి చిన్న పిచ్హుకలను పట్టుకొని వెళ్ళగలవు; రక్షించటానికి అవసరం పడుతుంది. అవసరమైతే ముక్కుతో ఒక సూదితో మత్తు పధార్ధాన్ని inject చేయగలవు. ప్రధానంగా లాహోరు నగరం లో ఇవి "జీవించటానికి" తయారు చేయబడినవి. కాని వేరే చొటికి కూడా బస్సుల పై ఎక్కి, కారుల్లో దాక్కొని వెళతాయి. ఇవి పక్షుల మహా గుంపులో ఇలాగ సరిహద్దు దాటి వెళతాయి. ఈ విషయాన్ని ప్రముఖ పత్రిక డాన్ లో ఫొటొ పెట్టి ప్రచురిస్తారు. అందరూ ఏవో migratory birds వస్తున్నాయని సంబరపడిపోతారు. చివరికి ఇలాగే గుంపుగా వాపసు వస్తాయి.

ఘూడాచారులు: కొంత మంది మన భారత దేశ ఘూడాచారులు కూడా ఉంటారు. వారికి వీటి గురించి (డ్రోను పిచ్చుకల గురించి) తెలియదు, కాని కంట్రోల్ రూం నుండి వారికి సహాయ పడటానికి ఈ పిచ్హుకలు ఉపయోదిస్తారు. కంట్రోల్ రూం రా, మిలిటరీ ఇంటెలిజెంసు, పి.య్ం.ఒ వాళ్ళు చాలా పగడ్బందీ గా నడుపుతారు. ఎవ్వరికీ పూర్తి ఆపరేషన్ ప్లాన్ తెలీదు. ఎక్కడైనా బయట పడితే డామేజి కొద్దిగా ఉంటుంది.

ఐ.యెస్.ఐ: మన పిచ్చుకలు వీళ్ళని వెంటపడుతాయి. వాళ్ళ ఆఫీసుల్లోకి, ఇళ్ళల్లొకి చొరబడి నిఘా వేస్తాయి. ఒకరిద్దరిని కిడ్నాపు చేయటానికి కూడా సహాయ పడతాయి. ఒక సారి పొరపాటున ఒక పిచ్చుక charge అయుపోయి ఓ ఐ.యెస్.ఐ ఆఫీసరు కంటపడుతుంది. అతను దాన్ని పట్ట్టుకొని వాళ్ళ టెక్నికల్ team కు తీసుకెళతాడు. ఈ ఆక్సమిక పరిణామాన్ని, మరో అదునుగా తీసుకొని మన కంట్రూలు టీం వాళ్ళు ఐ.యెస్.ఐ వాళ్ళని ఉపయోగించి ఐ.యెస్.ఐ మీదే ఓ కొత్త ఆపరేషన్ తయా

... keep reading on reddit ➡

👍︎ 31
📰︎ r/Ni_Bondha
💬︎
📅︎ Feb 21 2020
🚨︎ report
whoami(1543 words)

chapter_0_onion_routing

Nadia let herself sink.

Inside she was met by Ruby. The table had four chairs now. It used to be three. When she’d asked, Ruby couldn’t tell her why there was a new chair. Maybe there was no reason for it.

As the gatekeeper, Ruby was the architect of the inner realm. Maybe she just couldn’t control every detail. How much control can a person really have?

Nadia looked at the haze that was Ruby.

“I’ll propose Tor to Gulotta.” This was already discussed and decided upon, Nadia was only reaffirming.

“There’s nothing to worry about. If you need me, I’ll take the wheel.”

In handling Gulotta, they’d been left alone. The boss was pooling the rest of his resources towards the big job. Me, myself and I. Normally she didn’t have to talk much to the clients. At the best of times she could be anonymous.

“I hope that I won’t.” Any promotion was paved with these situations. Sometimes it was good to let a vulnerability go exposed, to allow the software to adapt. It wouldn’t be chmod777, totally exposing the vulnerability to the outside. She is my contingency.

Gyp Gulotta, it seemed to her, was trying to cut himself from his Sicilian roots. He dressed in a light blue. A darker shade might remind you of a mafia character. It worked well enough. “I was hoping to see the boss.” Gulotta glanced down at his watch, like every second here was a cosmic waste of his time. He was the managing director for Divinita Ireland.

“Sorry sir, the rest of the team is busy. Have you heard of that data breach? Everyone’s working on patching it.”

Gulotta’s eyes went wide. “That was one of your clients?”

Nadia swallowed. How’d I make it sound like that? “No . . . We’re hired to patch the breach. If they had been our clients, it would have never happened.”

“Truly?” Gulotta stared into her eyes, searching.

“We’re professionals, like yourself. A data breach like that only happens when you leave cybersecurity in the hands of outdated antivirus.”

Gulotta crossed his legs. “I’m not here for anti-virus. I can find that at home in ten minutes.”

“Nobody is. If cybersecurity was as simple as that, I wouldn’t have my job.” “Your job . . .” Gulotta frowned. “You’re a, what is it called, engineer? I thought I was talking to management.”

“Mr. Jameson thought it would be better for an engineer to talk to you. We’re overlapping in our duties . . .” Nadia paused. This feels like déjà vu . . . Why?

Gulotta took another glance at his watch. “I need to be

... keep reading on reddit ➡

👍︎ 6
💬︎
📅︎ Jun 16 2020
🚨︎ report
We have been social engineered from the beginning

Tl;dr - The Elliot we see in the scene at Ron’s Coffee Shop is the HIM alt.

--------------------------------------------------------------------------------------

After Elliot first starts talking to us, we see him in Ron’s Coffee shop, getting ready to set up Rahit. From the first, there were some very potent and subtle messages in this scene that just didn’t sit right with me.

  1. Who better to set up as a Bad Person than someone who is exploiting children? Rahit immediately becomes the bad guy in the scene. The one who all of us can easily say “Fuck yeah, take him DOWN!”. It is easy to justify any sort of action against someone who is fucking pedophile, amiright? (I will only add a passing reference to the fact that some of the earliest Anon trolls/activities on 4chan was trolling and scaring the shit out of pedophiles.) I would think that most of us can meet on a common ground about pedophiles - they deserve whatever they get. When Elliot says “I decided to hack you” we were like - Hell yeah! Get that childhood killer Elliot!
  2. Elliot explains about using Tor networking to keep the servers anonymous. He is explaining the setup for to address our fears or worries about being anonymous. It is playing to our fear of being exploited, even if we aren’t ‘bad’. It is what we all fear - we will be compromised by someone. We will have our identity stolen, be phished, and have our lives ripped out from under us by some “anonymous” person. I
  3. The “onion routing protocol, it’s not as anonymous as you think it is” plays to our fears that we aren’t as anonymous as we think on the web. We can be hacked at any time. In fact, the scene scarily puts us in Ron’s place, even if we aren’t child predators. What happens to Ron could happen to us.
  4. Elliot talks about Exit Nodes. He says “Whoever’s in control of the exit nodes is also in control of the traffic, which makes me...the one in control.” This becomes important later, since we almost never see Elliot go through a door that is marked “Exit” in the rest of the series. Sure, after he gets done with Ron, he walks through the door but we never see an Exit sign where we would expect it.

There are some oddities that are apparent right away that make the scene a bit puzzling.

  • When Rohit gets fierce with Elliot during the “Are you blackmailing me?” line, there is a genuine look of fear or surprise on Elliot’s face. I am not sure why he would be surprised when he is threatening a man w
... keep reading on reddit ➡

👍︎ 12
📰︎ r/MrRobot
💬︎
👤︎ u/aanjheni
📅︎ Oct 16 2019
🚨︎ report
The Loopix Anonymity System: A New Potential DSN for Particl?

See original post on the Particl forum: https://particl.community/t/the-loopix-anonymity-system-a-new-potential-dsn-for-particl/181

---

Has anyone heard of the Loopix Anonymity System? I saw Kewde post about it in the Open Development Channel on Discord and have decided to expand a bit on it.

What’s Loopix?

As posted in a BleepingComputer article:

>Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security.
Both Loopix and Tor are based on the concept of mix networks and are meant to provide a way to send anonymous messages through a complex network.
The way Tor achieves this is through its circuit-based onion routing protocol. On the other hand, Loopix uses a classic message-based architecture combined with Poisson mixing — adding random time delays to each message. The end result is an anonymity network that is very secure but also fixes the main disadvantage of classic message-based architectures, which is high-latency.
As the UCL team points out in their research paper, the Loopix system has a “message latency is on the order of seconds – which is relatively low for a mix-system.”

They do, however, specify that it isn’t really intended to be used the same way Tor is.

>“Loopix is designed as a system for anonymous communication and it’s properties allow it too be used both for high-latency communication applications, like e-mails, and for low-latency communication applications, i.e., instant messaging,” Ania Piotrowska told Bleeping Computer via email, “it is not designed to be used as Tor for web browsing.”
Currently, the Loopix system is still in its infancy, and more research is needed. Nonetheless, researchers say Loopix is resistant to Sybil attacks 1, currently one of Tor’s biggest problems.

Sounds to me that it would make a pretty good DSN 1! Looks more scalable than [SMSG 1](https://kewde.gitbooks.io/pro

... keep reading on reddit ➡

👍︎ 4
📰︎ r/Particl
💬︎
📅︎ Sep 13 2018
🚨︎ report
[uncensored-r/Bitcoin] I have some question about Lightning.

The following post by KiFastCallEntry is being replicated because some comments within the post(but not the post itself) have been silently removed.

The original post can be found(in censored form) at this link:

np.reddit.com/r/ Bitcoin/comments/7ovmyj

The original post's content was as follows:


> 1.More and more ISPs are deploying Carrier Grade NAT(CGN), since the IPv4 address space is already exausted. Meanwhile, IPv6 doesn't seem to be widely deployed. > > As we all know, a NATed IP address cannot accept incoming connections,which is harmful to any P2P application, including LN. > > Sadly, I'm currently posting under a CGN IP address... > > 2.Ordinary people like me may feel difficult to keep a node up 24x7, but, AFAIK, LN requires any nodes on the "routing path" to be online, otherwise payment may fail, or fund may be "locked" for some time. > > 3.Some big blockers threathend that LN won't be decentralized, since people will be strongly incentivized to open channel with "large scale LN node operator", thus, the govt may force them to give up accepting anonymous channels, or forbid them to use onion routing protocol on LN. > > I hope I'm not spreading something like FUD...I'll be appreciative to anyone who could resolve my confusions.

👍︎ 2
💬︎
📅︎ Jan 08 2018
🚨︎ report
How does Tor use application proxy (SOCKS)?

I couldn't find the relevant documentation for this on the Tor and was hoping for some clarification here. I understand the process of how Tor works, but I'm looking for information on the client side. Using this picture: http://3.bp.blogspot.com/-ZukDOz2LMFo/UD7gcNsMg9I/AAAAAAAAGnQ/piHDOLBCRqQ/s1600/OnionRouting.png

This picture is for onion routing in general, as I could not find a Tor specific version.

  1. Is the Tor process the same as this? User makes web request > SOCKS > Tor/Onionproxy...
  2. Why is the SOCKS necessary, couldn't the user make a request directly to the Onion Proxy?
  3. What stage from the picture is the onion routing protocol done (e.g. exchanging keys, encryption...). Perhaps the onion proxy stage?
👍︎ 3
📰︎ r/TOR
💬︎
📅︎ Apr 06 2017
🚨︎ report
[Table] IAmA: I'm the CEO of an online underground black market, AMA

Verified? (This bot cannot verify AMAs just yet)

Date: 2013-06-08

Link to submission (Has self-text)

Questions Answers
Aren't you worried about bringing more attention to your site by doing something like an AMA rather then just relying on word of mouth? By doing something like this don't you run the risk of law enforcement agencies paying more attention to the fact that you exist? We want to bring attention to the site and bring our vendors more buyers. Law enforcement is going to be aware of us (and probably already is) regardless of the way we choose to put our product out there.
What made you decide to go into the business of running such a site? Just the money? Or other reasons? It was the appeal of providing a service that we believe in and a business decision. Prohibition is a backwards process.
We have taken technical measures to prevent and offset these risks if they arise. As for our identities being revealed, if a competitor is able to do it then law enforcement would be able to do it. That would be of a larger concern to us. We take many measures to protect our identity.
There are many legal items for sale as well, but the bulk of our items are drug related. We have no preference over what gets sold (assuming it does not break our restricted items rules).
We are indeed. We're looking for a web marketer/SEO willing to be paid in Bitcoin.
Im curious as somewhat of amateur SEO marketer, how does one market a Tor Site? Surely it can't be done in regular ways such as adwords, keyword optimization, etc, etc. It is true that we can't use regular methods however we are after a person who can make YouTube how-to videos, create forum posts in various communities to increase the exposure to our site.
I've done some marketing and SEO, so just drop me a PM if you still need somebody. Thanks for your interest plerer, please PM us with your experience.

[So how many inboxes have you gotten from people asking for jobs? If you a

... keep reading on reddit ➡

👍︎ 14
📰︎ r/tabled
💬︎
📅︎ Jun 08 2013
🚨︎ report
Supported Network Protocols

Does Onion Routing support non HTTP protocols - such as the Real Time Streaming Protocol (RTSP) or Secure Reliable Transport (SRT)?

👍︎ 4
📰︎ r/onions
💬︎
📅︎ Mar 26
🚨︎ report
I am in my early 30s, make $75k a year ($120k joint), live in the South, work as a Development Director, and hate capitalism but love a little luxury!

Edited to remove the tables because when I obsessively checked this post on my phone I couldn't read them?? Also I tried to, but was prevented from, editing the title. I know it looks sanctimonious but that's just one small part of my personality I swear. D:

❤️ Section 1: Assets and Debt

Total Net Worth: $30,875 - all equity.

Retirement Balance: $0 for me; $20,500 for my husband in the state pension program for teachers. (My partner, L, has been paying into the state teachers' pension system for 5 years. For most of my 20s, I either worked at very low-paying jobs, or supported myself and others on a teacher’s salary, so no retirement for me. My current job does not have a retirement program, but one of my goals for this year is to either start a Roth IRA or get a new job with a 401k match… or maybe both?)

Savings Account Balance: $23,733 We’re moving this summer to a city closer to our families, and are saving all we can for a down payment on a dreamy spot. After we move, some amount of what’s left over will go into a retirement fund, and the rest will stay in this HYSA as our emergency fund. For us, three months of expenses, including childcare, is about $18,000.

Checking Account Balance: $455

Credit Card Debt: n/a, pay off each month

Student Loan Debt: $80,000 for L’s undergrad and MAT. $18,000 for my undergrad and (unfinished) MAT. (My undergrad degrees were mostly covered by the Pell Grant, scholarships, and a $10,000 529 from my parents. L was a nontraditional student - didn’t start undergrad until he was 24 - so none of his was covered. Most of my debt is for a MAT program I dropped out of after one year. I was trying to find any way out of teaching at the time (it is demanding, all-consuming, and carceral at once) and thought a PhD would be my only route. When I got my current job I promptly left the program and any dreams of a PhD behind.)

Equity: $83,875 (This number is from an online equity calculator, and is for our house in a very popular neighborhood in a very popular city. Our outstanding debt on the house is $295,000. We put our whole savings down in 2019, which was $9,000 at the time.)

❤️ Section 2: Income

Monthly Take Home: My base pay is $65,000, and L’s is $45,000. I worked a side gig last year that totaled about $10k in additional compensation; all of it went to savings so we don't budget for it. My take home is $4096/month for my full time job, and my current

... keep reading on reddit ➡

👍︎ 141
💬︎
📅︎ Feb 05
🚨︎ report
I'm developing a decentralized private network, and I want your help [Onionr AMA]

I want to share with r/privacy my project I've been working on the past few years.

It is called Onionr. My goal is to make an anonymous network and platform for webpages, mailing, microblogging, document sharing and so on via modular parts. Since this is a general subreddit I won’t go too deeply into technical design or reasoning here except when asked.

Please understand that I've been working mostly on my own for free and my project is experimental and in alpha

I have several pre-included plugins accessible via a web UI, including mail, a textboard, and static site viewing, however Onionr is not intended for clearnet browsing. You can see slightly outdated screenshots on the README

The long term vision is an anonymous platform for free expression, communication and commerce for both desktop and mobile.

Onionr is a combination of features, routing methods, and design decisions that in my opinion are suitable for a true cypherpunk. It is most similar to Briar. The core component is a simple message serialization system which can be transported in any order, everything else is just logic on top of that.

I want to maximize anonymity on this platform, so this means there are trade-offs on scalability and speed. To maximize the anonymity set, the basic routing mode sends all messages to all peers via a gossip-like protocol, which are stored for a maximum of 30 days if they are not recalculated. For when you need larger amounts of data or lower latency, I have implemented a system to establish ephemeral onion connections to a peer, which expire when the connection is closed. This prevents DDoS of onion services (when only those with an approved key can access) and helps with up-time correlation attacks.

It is transport-agnostic meaning it works even without Internet, as it can work over LAN using multicast or even via sneakernet where objects (messages, sites) can be exported to files. In the last ~36 hours these were the only functioning transports as Tor was being DoS’d, taking down all v3 .onions

I have made it quite difficult to discover the identity of both publishers and consumers of content. This is because on top of the broadcast-like routing, all internet-facing nodes operate behind Tor (i2p support planned). Even if statistical analysis points to a particular .onion having created messages, there is plausible deniability due to the fact the messages could have come from anywh

... keep reading on reddit ➡

👍︎ 64
📰︎ r/privacy
💬︎
👤︎ u/beardog108
📅︎ Jan 11
🚨︎ report
When will Lightning have reusable address?

It would be very useful

👍︎ 6
📰︎ r/Bitcoin
💬︎
📅︎ Sep 29 2020
🚨︎ report
Is the Network+ getting harder than the CCNA?

Personally, I don't know if it's because of how deep it goes into concept or theory, but studying for it just feels like peeling an onion with a thousand layers. There is so much to know in terms of ports, protocols, antenna theory, troubleshooting, routing, etc. My professor that taught us a course for the Network+ explained that CompTia is just making all of their exams a lot harder all of a sudden while Cisco got a little too cozy. I've had a coworker also mention that the network+ is actually getting to be harder than the CCNA. My question for those that have done both, do you think the most recent Network+ deserves as much respect as the recent CCNA?

👍︎ 5
💬︎
📅︎ Dec 21 2020
🚨︎ report
Groestlcoin 7th Anniversary Release

Groestlcoin 7th Anniversary Release

The past year of Groestlcoin must be the strangest year for the world in the existence of the coin so far. Covid-19 has and continues to dominate the headlines. Our hearts go out to everyone that has been affected by the virus, directly or indirectly.

This year has also seen a meteoric rise in Bitcoin and the total cryptocurrency market cap whilst the global economy almost grind to a halt in many industries. Many countries have implemented expensive policies to try to negate a recession, leading to a significant rise in new money being printed. On the brighter side, the development of Groestlcoin has been largely unaffected by the pandemic and we have a further 9 (12, including testnet) development updates to bring you today.

We will start with the brand new releases and then move on to the updates to existing applications which we are committed to keeping updated for security and functionality updates.

[ALL NEW] GRS (Wallet) Released — Testnet Version also available

GRS is a fast, easy, sexy Android mobile wallet. Sticking to our core philosophy we neither hold nor have access to users’ Groestlcoins. GRS is a real standalone server-less Groestlcoin client. Using SPV mode, GRS connects directly to the Groestlcoin network with the fast performance you need on a mobile device.

GRS is designed to protect you from malware, browser security holes and physical theft. With AES hardware encryption, app sandboxing and verified boot, GRS represents a significant security advance over web and desktop wallets.

Usually greater security inherently comes at the cost of the user experience, but GRS maintains a simple design principle to ensure a fantastic user experience with a simple and secure backup phrase, so your funds are never lost. Please store your secret phrase somewhere safe!

Features:

  • Simplified payment verification for fast mobile performance.

  • No server to get hacked or have downtime.

  • A single backup phrase that works forever.

  • Private keys never leave your device.

  • Import password-protected paper wallets.

  • Payment protocol payee identity certification.

  • Installation on rooted devices is strongly discouraged. > GRS is available in the Google Play Store, here: [https://play.google.com/store/apps/details?id=org.groestlcoin.groestlwallet](https://play.google.com/store/apps/details?id=org.groestlcoin.groestlw

... keep reading on reddit ➡

👍︎ 5
💬︎
📅︎ Mar 22
🚨︎ report
The S.T.A.L.K.E.R-ish innawoods Challenge

The S.T.A.L.K.E.R-ish innawoods Challenge

You are now a stalker, and must explore the Zone!
Find an abandoned structure and camp in or near it. Take some photos and post them when regaling r/innawoods with your adventures.
SWIM robbed this and then drastically altered it. It was originally created by a bunch of anons and some tripfags on /k/. SWIM wanted to make some parts more difficult while making others easier. SWIM couldn’t have done this without those anons and tripfags on /k/.

DISCLAIMER FROM SWIM*

I’d like to say do what you want, but I worry. I’m not responsible for your choices. IMO this is an RP adventure challenge type thing meant for “chaotic good” adults to draw inspiration for adventures and share their adventures with likeminded people. Obviously trespassing is illegal, even more so with a firearm. That sentence probably contradicts this whole thing, I know. Regardless, I suggest you follow the laws in your area and follow every safety protocol you can think of. Safety is number one priority. If you can’t carry a firearm legally, use an airsoft gun, use a gun shaped stick. I don’t care. But if you’re old enough to go out and do this shit, you’re old enough to take responsibility for your own actions. Always take a phone. Let people know what you’re doing. Don’t break the law. Don’t hurt yourself or anybody else. Be respectful to the places you go. Leave no trace. Leave no trash. Clean if you can.

DISCLAIMER FROM SWIM*

Everything is optional

.

SWIM suggest’s taking a pen and a pad to mark down the options you want for your challenge and the points it’ll potentially earn you.
The number followed by r is just points because SWIM thinks it looks cool. Can’t spend r on anything, they’re bragging points, SWIM guesses.
Choose a difficulty level, if you want, and/or a faction, or a scenario. Pick all three if so inclined. Faction-specific and scenario-specific rules override default rules, in that order. F>S>D
Maximum pack weight (including pack, ammo, food, tools, and other supplies)(excluding firearms and worn items) is 14kg (30.8lbs) unless otherwise specified, -1r each .5kg (1.1lb) overweight.
Artifacts​ are items left in abandoned structures or areas. These could be anything from an old doll to a coin. Not just any piece of scrap metal or trash counts; they must be unique and collected at least 3m (10ft) apart from each other. They should have been worth somethi

... keep reading on reddit ➡

👍︎ 9
📰︎ r/innawoods
💬︎
📅︎ Jan 19
🚨︎ report
Lore about all the characters! (Some are my own theories)

So i didn't see a full compilation of character backstories anywhere on the sub, maybe I just wasn't looking hard enough, but ill try to fit as much as I know into this post! This includes lore from voicelines, player cards, and things that I heard elsewhere on reddit and YouTube.

WARNING this post is probably long enough to be removed for being too long

So first of all, Valorant is set in a post-apocalyptic-ish near-future (possibly in the year 2053) Earth. A phenomenon known as The First Light is the afforementioned "apocalypse". We don't know for sure what it was, but it had some impact on the planet, and caused a little something called Radianite to pop up around the world. We know Radianite to be an in game currency used for upgrading skins, but its also the thing youre digging up when you detonate spikes, and its what gives our Agents their superpowers!

2 important organisations were made in response to this event - the Valorant Protocol, and Kingdom. Valorant are the sort of 'good guys' and control the use of Radianite and stuff like that, and are kinda like a military or police, but cooler. Kingdom, on the other hand, is a large controller of Radianite, too. We see their signature K all over maps and some agent skins, as well as on the Spike, which suggests that they want to mine Radianite, and Valorant is stopping them.

Anyway, now onto the Agents!

Breach is, as the game says, a bionic Swede. He has bionic arms, but we don't know whether he lost his arms in an accident or if he deliberately had them removed because you never know when built-in concussion grenades and flashes will come in handy. We also know that he is a heist artist, or a heister, or maybe just a hired gun. I think he's a heist artist tho. If you listen to his voicelines you'll notice that he sounds very much like one - "Lets get this job done" "The faster we do this, the faster we get paid" "We treat this like any other job - no more, no less". But the most definite evidence of this is his contracts tier 9 player card "Big Payday". Its a picture of a vault door breached, if you will, with a glowing green object om a pedestal.

Brimstone is someone you would expect to be the tutorial character in any game. Hes a war veteran, so he's pretty old, and he's American and clearly has some contacts in the army, from whom he gets access to orbital lasers and sky smokes. Which also suggests he had a high ranking in the military, most likely a sergeant, confirmed further by his leade

... keep reading on reddit ➡

👍︎ 183
📰︎ r/VALORANT
💬︎
📅︎ Jul 16 2020
🚨︎ report
Someone cares to explain what the LN whitepaper says in the section about payment routing?
👍︎ 138
📰︎ r/btc
💬︎
📅︎ Feb 26 2018
🚨︎ report
[The Scuu Paradox] - Chapter 62

At the Beginning

Previously on The Scuu Paradox…


  The smell of burnt chemicals mixed with the ringing in my ears. A new set of vibrations shook the corridor—explosions, though not caused by Spicer. These were outside the ship.

  Incandescent, Radiance. I pushed myself up. Outside status.

  Teams have reached the corridor, Radiance answered. They’ll be with you in a hundred and fifty seconds.

  My eyes were stinging from the smoke. Quickly, I pushed myself to my feet, determining my location based on my last memories. It would be awhile before I could see anything around me. My mind-links to Kridib and Spicer, though, were still active.

  The explosion followed by the external attack had caused the flight colonel to lose his footing. Dropping one of his pistols, he quickly pressed himself to the side of the corridor, bracing himself for further missile contact.

  I ran the odds. In my current condition, I had a thirty-seven percent chance of success if I went for the weapon, fifty-four if I forced myself to run back to Watcher… provided there were no other hidden charges. All my instincts and experiences urged me to take the fight to him, as I had done many times on the front. This time, I decided to ignore them.

  Where’s Lux? I asked Radiance.

  Marker coordinates filled my vision. Seventy-two BICEFI operatives had spread out in teams of four throughout the length of the path. Knowing Lux, she had probably joined one of the teams incognito. Without any name information, there was no telling which one.

  I’m at the section that exploded, I told Rad. Tell the teams there might trap charges. Spicer’s armed.

  Don’t worry, grandma. She sent a virtual snort. I’ve seen his file. Keep yourself in one piece and—

  All communications were severed. Someone had used the rods to impose a comm blackout and, with that, taken the greatest advantage I had in the fight.

  Here goes. I rushed to the bend of the corridor.

  Fear was the first thing I had sensed in Spicer’s thoughts: fear of losing the ship, multiple deaths, and the moment of his implant operation. He had gone voluntarily as a promise he had made to his parents as a child before they passed away—to becom

... keep reading on reddit ➡

👍︎ 61
📰︎ r/HFY
💬︎
📅︎ Sep 06 2020
🚨︎ report
Staying Safe Online - A Post for my ENG2201 class

The Internet has become such an important part of modern life that our refrigerators and washing machines are capable of using it. This ubiquity, along with our rapid adoption of IoT devices like smart phones and smart appliances, has granted governments and corporations an unprecedented level of access to our personal data. This data includes everything we post on social media, every website we visit, every movie or TV show we stream. Your mobile provider is logging every text, gif, and email you send. There is a popular rhetoric going around which posits that if you’re not doing anything wrong, you have nothing to fear from surveillance, and, considering this idea’s ubiquity, it seems a majority of users abide by it. Regardless of anyone’s opinion, we as Human Beings have a right to privacy, and corporations are not the only people who can use the Internet to access your data. There exist in the world people who use the Internet with malicious intent. These intentions may include stealing credit card numbers or personally identifying information, both of which can be used to empty a victim’s bank accounts or commit insurance or any number of other kinds of fraud. The theoretical bad guy may also want to encrypt a victim’s hard drive, rendering their data inaccessible until the victim pays a ransom for the key to decrypt it. As college students, it is inevitable that we will need to use the Internet for school, for research, class registration, taking tests, etc. This is why it is imperative that we take steps to protect ourselves online. Below is a list of steps one can take to mitigate the risk of being exposed online to those who would cause harm. (Links to vendor and ECU sites listed at end of post)DISCLAIMER: this post in no way advocates using any of the methods listed, nor any other privacy tools, for any activities in opposition with state, county, or federal laws and regulations or in opposition with university rules and policies. Be smart.

· Use a VPN (Virtual Private Network): this is an easy step that anyone can take to drastically increase their online privacy. In this context, a VPN is software that can be used to prevent others, including your ISP, from seeing what websites you visit and anything you might post on those sites, by encrypting your web traffic and routing it through their secure networks. I, personally, use the BitDefender VPN that comes bundled with BitDefender’s antivirus software. I highly recommend it. Once i

... keep reading on reddit ➡

👍︎ 11
📰︎ r/ECU
💬︎
👤︎ u/beshWett
📅︎ Jun 23 2020
🚨︎ report
Groestlcoin June 2020 Release Notes!

Groestlcoin June 2020 Release

As 2020 continues to unravel with people worried about their health, livelihoods, jobs and general way of life, one thing at least can remain constant - Groestlcoin's release schedule. We at the core Groestlcoin team really hope everyone is doing well and coping with what 2020 is throwing at us all. For anything to change in this world, major and seemingly dramatic change and chaos unfortunately needs to first ensue but rest assured everyone will come out of 2020 much stronger people! The Groestlcoin team have been working on a vast amount of new technology during these uncertain periods which we would like to share with you today.

Groestlcoin Core 19.1

The full list of changes in Groestlcoin Core 19.1 are too long to list here so we won't bore those who do not want to see every slight change here. For that, please go to https://github.com/Groestlcoin/groestlcoin/blob/2.19.1/doc/release-notes/release-notes-2.19.1.md. Instead we will list a general list of changes here. We recommend upgrading to this version if you are running a full node yourself.

  • New User Documentation
  • New and updated RPCs
  • New Settings Implemented and other settings updated
  • GUI Changes
  • RPC and configuration options removed or deprecated
  • P2P improvements
  • Various low-level changes

How to Upgrade?

Windows

If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.

OSX

If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications. Users running macOS Catalina need to "right-click" and then choose "Open" to open the Groestlcoin Core .dmg.

Downloads

Download the Windows Installer (64 bit) here: https://github.com/Groestlcoin/groestlcoin/releases/download/v2.19.1/groestlcoin-2.19.1-win64-setup-unsigned.exe

Download the Windows binaries (64 bit) here: https://github.com/Groestlcoin/groestlcoin/releases/download/v2.19.1/groestlcoin-2.19.1-win64.zip

Download the OSX Installer here: https://github.com/Groestlcoin/groestlcoin/releases/download/v2.19.1/groestlcoin-2.19.1-osx-unsigned.dmg

Download the OSX binaries here: https://github.com/Groestlcoin/groestlcoin/releases/download/v

... keep reading on reddit ➡

👍︎ 9
💬︎
📅︎ Jun 22 2020
🚨︎ report
Passed Security+ with 812!

(Original past was deleted???)

Feels good to be Security+ certified! 😎

I’m pushing hard to break into the cybersecurity industry as a Cybersecurity Analyst, so I took Security+ to fulfill DoD 8570.01. Ultimately, my goal is to become a pentester in the next 2-3 years.

This was a challenging exam because of the wide spread of topics across domains, but if you use the resources below, you’ll pass too!

Experience:

I have a B.S. in Information Technology, so I have some experience with networking, ports/protocols, backups, Active Directory, programming, databases, encryption, hashing, routing/switching, firewalls, antivirus, malware, virtualization, etc.

I’ve worked in IT support, web support, software support, and software implementation over the past 5 years.

I have a home lab built out in VMWare with a few VMs running Kali Linux, Security Onion, Windows OS, Linux OS. I’ve been self training with Kali and Security Onion tools for a couple month a now, but I’m about to take some intensive courses on them.

I’ve started competing in the National Cyber League (NCL) to gain additional experience.

Resources:

Darril Gibson’s GCGA book + premium access Prof. Messer’s YouTube videos + practice exams Jason Dion’s Security+ Udemy Course
Jason Dion’s Security+ practice exams
Exam Compass

Practice Exam Scores:

Jason Dion’s practice tests...

70s first round; 90s second round

Professor Messer’s practice tests...

80s first round; 90s second round

Darril Gibson’s practice tests...

Consistent 90s

I studied roughly 5 hours a day for two months.

Now that I have Security+ out of the way, I’m studying for CySA+ then onward to OSCP!

👍︎ 18
📰︎ r/CompTIA
💬︎
📅︎ Feb 09 2020
🚨︎ report
Is there a difference between accessing tor over LTE than WiFi with regards to anonymity . Unless I’m missing something there surely must be as it’s no longer your IP address but your sim provider that will deanonymize you
👍︎ 23
📰︎ r/TOR
💬︎
👤︎ u/geezerhump
📅︎ Aug 18 2019
🚨︎ report
OBLIGATORY FILLER MATERIAL – Breaking Bad, Part 5

Continuing

I’m sitting in the dark, fuming, wondering what the hell that was all about.

I still have my drink and cigar and I’m employing them in their proper offices. This is right before I light the newspaper on fire for a bit of light.

Sr. Majordomo appears out of the gloom with a lit 7-stick candelabra.

“Sorry, Suh”, He says in the hoity-toity British butler accent, “Bit of a bother. Seems the electrical substation down the road exploded again. No worries. Happens all the time. We’ll be fine once the emergency generator kicks in.”

And, as if by magic, all the lights come on again.

“Why, thank you, Jeeves”, I say as he nods and departs.

Now…where was I? Ah…fuck. UREE’s down 2⅝’s.

The next morning, down at breakfast…

“Weeeell. Good morning, bright eyes! How we feeling this fine day?” I ask Sanjay as he slopes into the Raj’s breakfast nook.

He looks at me through what appears to be two baseballs composed of very lean bacon.

“…fine…how are you?” he asks.

“Me? I’m in fine fettle. I’ve never felt fettler. I’m still breathing, I have all my appendages, such as it is, and still a spotless record.” I reply cheerily.

“How? How…can you? How…do you?” he asks, wearily.

“Years of intensive practice, m’lad.”, I smile, “Here’s something hot, wet, and black. Drink up, it’s going to be a busy day, Bucko.”

“erf.”

Sanjay is appreciative for the Greenland coffee. Somehow he’s developed a taste for the stuff.

I ask the attending butler for my specialty breakfast: a grilled bagelwich breakfast panini.

That’s a smashed, over-hard cooked egg, stinky French foot cheese, sliced ham, red onion, Siriaca mayo, sliced red capsicum, hot Giardiniera, and neon-green pickle relish on grilled, buttered garlic bagel.

Yum.

Sanjay looks at me through crimson-tinted eyes over his steaming soupçon.

“You’re not human.” He sighs, shaking his head.

“Nope. Never claimed to be. I’m an EtOH-fueled carbon-based lifeform. Take me to your larder!” I guffaw.

Sanjay groans into his morning mug.

Sanjay feels better after he slurps down some coffee and has his morning repast of gnarly looking gruel, Masala oats he tells me. A bit of tatte idli with coconut chutney. A couple of slices of bacon, akki rotti and chutney, some more coffee and he’s looking almost human again.

I grab the morning edition and head to the reading room.

“Call our driver, Sanj, if you would. Give me ten minutes and we’ll roll. First day of school and all that.”

Sanjay gives me t

... keep reading on reddit ➡

👍︎ 100
📰︎ r/Rocknocker
💬︎
👤︎ u/Rocknocker
📅︎ May 13 2020
🚨︎ report
Lightning Network improvement proposal: A way to send btc without asking the recipient for an invoice

This is just a concept; an idea I got while taking a shower. Unfortunately, I don't have the technical/coding skills to implement this. What led to my idea was whatsat - an app which enables users to chat using the LN itself.

Motivation

It`s easy to send btc on-chain to someone. You just need their address and nothing more. You can send to it as many times as you want. This hurts privacy, but makes everything really easy for the sender. A charity can simply put their Bitcoin address on their website for example and anyone could donate to them. It`s not the same for Lightning. Since a different invoice is required for every single payment, a youtuber would not be able to accept donations over the LN easily, just on-chain. The goal of this proposal is to make it possible to do both.

The Concept

Since any message can be routed and sent through the LN we could also make a request and ask our recipient`s node to generate an invoice for an amount chosen by us and then send it to us, just like those text messages. Then we can decode this invoice and if everyone is OK (the amount is correct) we can attempt to pay it. All of this can happen under the hood. The UI/UX doesn't even need to change much. Instead of pasting an invoice in the "send" field of a wallet, we just paste a node's public key.

DoS Protection

Allowing anyone to make our node generate invoices is a bad idea. They could send a million requests and crash it. To prevent denial-of-service attacks, we should implement the following measures:

  1. Auto-Generated invoices should be with short expiration times. 10 minutes for example.
  2. A maximum of X invoices can be generated for a given node at a time. Let`s say X = 10. Once a node has requested 10 invoices it can request another one only when a) at least one of the previous 10 invoices has been paid or b) at least one of the previous invoices has expired.
  3. Nodes which have requested Y invoices, but haven't paid any of them could be banned from requesting new invoices for a day. If this behaviour continues the node could be permanently banned and any channels opened with it could be closed. Maybe an option to manually override this ban would be nice to have. A good value for Y might be 30.
  4. Nodes which have no channels open should not be allowed to request invoices. This prevents an attacker from spinning up 1000 nodes and reque
... keep reading on reddit ➡

👍︎ 43
📰︎ r/Bitcoin
💬︎
👤︎ u/Kalin101
📅︎ Nov 04 2019
🚨︎ report
Weekly Dev Update 21/09/2020

Hey Y’all,

This week we finished up some very cool Session features, which will hopefully resolve a number of issues with unreliable push notifications. On the Lokinet side, we did some cross-project work which allows for the human-readable .loki names introduced in the Salty Saga hardfork. Speaking of the hardfork, the Loki Core team forked the public testnet a few days ago, so you can now test Pulse and other goodies. Check it out here https://loki.network/2020/09/19/salty-saga-testnet-testing-guide/

Loki Core

----------------------------

Lokinet

You can catch Jeff, the lead developer of LLARP, live streaming as he codes at

... keep reading on reddit ➡

👍︎ 6
💬︎
👤︎ u/Keejef
📅︎ Sep 21 2020
🚨︎ report
I compiled everything I know about the agents (some are theories)

So i didn't see a full compilation of character backstories anywhere on the sub, maybe I just wasn't looking hard enough, but ill try to fit as much as I know into this post! This includes lore from voicelines, player cards, and things that I heard elsewhere on reddit and YouTube.

WARNING this post is probably long enough to be removed for being too long

So first of all, Valorant is set in a post-apocalyptic-ish near-future (possibly in the year 2053) Earth. A phenomenon known as The First Light is the afforementioned "apocalypse". We don't know for sure what it was, but it had some impact on the planet, and caused a little something called Radianite to pop up around the world. We know Radianite to be an in game currency used for upgrading skins, but its also the thing youre digging up when you detonate spikes, and its what gives our Agents their superpowers!

2 important organisations were made in response to this event - the Valorant Protocol, and Kingdom. Valorant controls the use of Radianite and stuff like that, and are kinda like a military or police, but cooler. Kingdom, on the other hand, is a large controller of Radianite, too. We see their signature K all over maps and some agent skins, as well as on the Spike, which suggests that they want to mine Radianite, and Valorant is stopping them.

Anyway, now onto the Agents!

Breach is, as the game says, a bionic Swede. He has bionic arms, but we don't know whether he lost his arms in an accident or if he deliberately had them removed because you never know when built-in concussion grenades and flashes will come in handy. We also know that he is a heist artist, or a heister, or maybe just a hired gun. I think he's a heist artist tho. If you listen to his voicelines you'll notice that he sounds very much like one - "Lets get this job done" "The faster we do this, the faster we get paid" "We treat this like any other job - no more, no less". But the most definite evidence of this is his contracts tier 9 player card "Big Payday". Its a picture of a vault door breached, if you will, with a glowing green object om a pedestal.

Brimstone is someone you would expect to be the tutorial character in any game. Hes a war veteran, so he's pretty old, and he's American and clearly has some contacts in the army, from whom he gets access to orbital lasers and sky smokes. Which also suggests he had a high ranking in the military, most likely a sergeant, confirmed further by his leadership qualities and codename Sa

... keep reading on reddit ➡

👍︎ 52
💬︎
📅︎ Jul 16 2020
🚨︎ report
Weekly Dev Update 27/07/2020

Hey Y’all,

This week we worked on enabling full onion routing for the Session open group server and file server (taking over from proxy requests). We also did a system-wide review of push notifications and finished some improvements to closed groups on iOS and Desktop. The Lokinet team continued working on exit nodes, focusing on authentication and required DNS records. The Loki Core team continued to work on Pulse which is in its beginning its final stages before it gets applied to the testnet and also finished replacing some parts of the epee library.

Loki Core

----------------------------

Lokinet

If you’re on our Discord you can catch Jeff, the lead developer of LLARP, live streaming as he codes at https://www.twitch.tv/uguu25519. He typically streams on Tuesday mornings, 9am - 12pm Eastern (US) time.

What went on last week with Lokinet: We finished off the Lokinet peer testing code (subject to final review) and continued to work on exit node authentication, for which we plan to make available a simple Python script showing how someone could build a custom authentication system. We’re also working on refining the scripts for activating exit mode in the Lokinet client. Finally we started work on implementing DNS SRV records for SNApps and service nodes: these are records used by various internet protocols that let you look up the hostname and port offering a service from a domain name, without needing your users to worry about a subdomain or port number.

Lokinet PR Activity:

... keep reading on reddit ➡

👍︎ 7
💬︎
👤︎ u/Keejef
📅︎ Jul 27 2020
🚨︎ report
Why is it that the deep/dark web require a special browser like tor? What's stopping me from using chrome?
👍︎ 2
💬︎
📅︎ Jan 12 2020
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.