Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - barwizi

Pages: 1 ... 19 20 21 22 23 24 25 [26] 27 28 29 30 31 32 33 ... 51
376
Alternative approach instructions are missing google sparse hash map install.

Primary approach is not clear at all on what I should be doing. 

The instructions are not platform independent.

I had to modify the source to compile parser on OS X and after I did get it to compile I got the following error:
Code: [Select]
./parser allBallances --detailed >allptsbalances.txt
warning: "allBallances": unknown command name


Modifications made

Try ./parser allBalances --detailed >allptsbalances.txt

i made a typo.


377
Very Protoshares very AngelShares. Much Bitshares Much Money.

378
ive gone ahead with secp256r1 32, the library is now in the src folder, it has these functions of interest

int ecc_make_key(
    uint8_t p_publicKey[ECC_BYTES+1],
    uint8_t p_privateKey[ECC_BYTES]
);

that creates a public/private key pair

int ecdsa_sign(
    const uint8_t p_privateKey[ECC_BYTES],
    const uint8_t p_hash[ECC_BYTES],
    uint8_t p_signature[ECC_BYTES*2]
);

Generates an ECDSA signature for a given hash value.

int ecdsa_verify(
    const uint8_t p_publicKey[ECC_BYTES+1],
    const uint8_t p_hash[ECC_BYTES],
    const uint8_t p_signature[ECC_BYTES*2]
);

Verifies an ECDSA signature.

credit goes to kmackay for this.

if anyone has an idea how to replace the nonce as required, just fork this repository https://github.com/Nameshar/Divsshares
and get to it. I'll be trying to figure it out as well but i'd appreciate a hand.

Why secp256r1 instead of secp256k1 as used in Bitcoin? There are concerns that secp256r1 was intentionally weakened by the NSA: https://bitcointalk.org/index.php?topic=151120.0

it is thus far unproven and besides a few fumbles and discussions untested. I'll try look around but when i first trid fiding an exploit there was no information.

379

Here is verification
https://github.com/Nameshar/Divsshares/blob/master/src/main.cpp#L2047

Replace the place it calls CheckProofOfWork with a call to a custom CheckProofOfMasterSignature, which needs to access the master signature on a block

https://github.com/Nameshar/Divsshares/blob/master/src/main.h#L836

^ I recommend we add a new field of the right type rather than changing the nonce's type and setting it there, that lets us touch less code.


Creating a block:
https://github.com/Nameshar/Divsshares/blob/master/src/main.cpp#L3992

In the non-PoS case "mining" is just waiting until a new signature has been approved, we should let it try to mine so it builds up a valid block in the process

The interface for creating a master-signed block might be the longest part of this step. How about an rpc call which asks for the key, which will immediately publish whatever block the client is "mining" at that moment?

thanks

380
Decentralization is a form of Democracy, by owning shares you get a say and benefits.

381
Perhaps have a "license" document and a separate "usage" document, like GPL does, to clarify.

ok, that would be a better idea.

is that true? If I send someone a protoshare, that protoshare is protected under the terms of this license? Can you put a license on what you can use protoshares for? Shouldn't all products (I'm assuming you mean software products) be licensed under this license, but the code is property of whomever wrote/paid for it? If this license is violated, who is the injured party that has legal standing to bring suit? I own protoshares, can I prevent you from prosecuting a violation of this license?

This is community enforced,  read 
Quote
Protoshares and associated "Product"s are collective property of PTS/AGS holders and are provided under the terms of this COPYFARLEFT PUBLIC LICENSE.

what defines a DAC funded by AGS? If I don't actually raise AGS to fund my project, but instead use a derived work that was funded by AGS, does that count? A DAC funded by AGS is one whose development and other such costs is paid for from that fund. As for derived works, Please read the Consensus

unenforceable term: what does "clearly document" mean? the source code? document usage? I'll change the wording but it is integral to telling the difference between the original work and a derivative. To clearly document a poduct means to describe it and it's functions, and in this case state what changes have been made that make this product different from the original.

nearly unenforceable: What is malware? if my code checks in to a master server to check for updates, is that malware? some would consider it. Who defines civil liberties, privacy, etc.? Since those change with jurisdiction, is this a regional-dependent license? malware is malicious software. as for the dependency on jurisdiction, you cant expect the license to include a guide to each countries laws. it's up to the aspiring DAC creators to observe those.

Quote
while good intentions, is this an enforceable statement? A license document really doesn't usually lay out "you may not" terms since they are not really prosecutable or enforceable, you just have to say a licensee was not following the terms of the license - no need to say they were following the terms of the "you may not" terms of the license. And if someone gets PTS/AGS holders in trouble, this won't protect you at all.
read Indemnify the collective and Original Developers (where applicable) and that the copy complies with this license document.

The situation is unique and so are the requirements meant to be satisfied by the document. Most likely as the industry progresses you may actually see a new class of license being adopted to protect peoples investments. Because if i was to follow your general thoughts based on your comments, i'd create a license that does nothing to protect the investors of PTS and AGS actually basically a free for all license. This is a business and deserves the right to protect itself.


Quote
everything must be laid out in terms, not "not terms" - "You are granted a license to use and distribute products as limited by law."
  thanks for the tip.

Quote
make this a term, combine with: You may modify, distribute, and use the “Product” in binary and source forms for non-commercial use. You may modify, distribute, and use the “Product” in binary and source forms for commercial use if you honour the Social Consensus.

lol, sure you don't want editing rights?

Quote
Also, be careful with this software license. It is considered "non-free" and is almost definitely incompatible with GPL. Linking with any GPL libraries would be a license violation of GPL.

This is an attempt at copyfarleft, not at all with GPL. I perused the code and everything is under the MIT license. There are no conflicts.

382
only one mining machine, lol centralization!!!  :P

ok, i''l see what i can do.

383
using terminal or cmd navigate to the folder with the executable and start it with the -reindex option..

384
Marketplace / Re: 200 PTS - Bounty Rules and Procedures Document
« on: January 15, 2014, 08:31:01 am »
I find rules for software bounties way too much restrictive, so I can propose addition of the Bounty Poster to decide if following some of steps is really necessary to declare real goal achieved (for example, github submission and platform specific testing).

For example, a top level dev may implement very good algo, but creating all the infrastructure for it (git repo, step by step instructions, etc), as well as teaming with others to fulfil that may easily become boring. He may decide just to dump source tree/workspace archive to dropbox and continue with other tasks, so placing software to github can be accomplished by anyone else.

I personally think that software development (as software design and coding) can be easily separated from open source infrastructure support, so I suggest to think how to prevent converting developers to managers by these rules.

Another issue is a bounty split. Let us imagine situation of developing some software optimizations or solution for complicated cryptography protocol problem. There are people who can come with clear explanation of the concept/idea/optimization approach, but will refuse to code that and will even refuse to apply for bounty, and proposed system with record of work may completely mitigate initial concept contribution while focusing on coding/implementation details, leaving "opportunity opener" out of the process. So there shall be a statement/guideline for bounty poster to specifically take care of such situations.

yvg1900

P.S. This is my personal opinion only, given as a response for personal request for comment from barwizi and to support his efforts in putting these things together.

thanks!!! if this particular bounty poster agree then i'll make the suggested changes.

385
Marketplace / Re: 200 PTS - Bounty Rules and Procedures Document
« on: January 15, 2014, 08:28:45 am »
Just read the document, nothing much to add really and I think it's clear for both the organizing and bounty hunter parties.

Thank you

386
Quote
If entity A subscribes to IP and is willing to honour the consensus they may use the code for profit. If entity B subscribes to IP but refuses the consensus and attempts to use the code commercially then they are in violation of the license. Entity A cannot use the derivation made by B as it is already in violation. all this must be made explicitly clear.

How do you determine whether someone "subscribes to IP"?

I don't need to determine anything. I simply state the restrictions. A company that  supports copyRight is easily spotted by the supporting documentation and it's products. I do not see a copyLeft company having copyRight documentation or products.

387
Quote
The actual code is Invictus, by third party we mean to say that they are bot being financed or supported via AGS.

Dan, can we get some clarification on this point?

Quote
your licensing and restrictions you chose to not to separate commons and non-commons use of the product ergo you left out the key parts where we restrict those who subscribe to IP and wish to use the product without honouring the SCSL

I understand the philosophical argument here about believing and not believing in IP; however, in reality, this is almost impossible to enforce.  How do you know what I believe and don't believe? Even then, what if my belief changes? At the end of the day, a DAC that doesn't honor the SCSL doesn't get the license to use and modify the code.  At that point, you have a community of PTS and AGS holders that can be very vocal about DACs that steal the code and don't honor the consensus.

I understand the philosophical argument here about believing and not believing in IP; however, in reality, this is almost impossible to enforce.

Emphasis is placed on the two-way nature of the Consensus in that it is a community driven and community enforced.

Consider it a BY-SA-NC on use without honouring the consensus.

Please read the spec carefully, and the ensuing arguments from the beginning of the thread. This is a delicate situation in which we are trying to protect our investments while allowing public use. The purpose is to encourage people to bring ideas and resources to the community and work with us, not to just grab and use the code without honouring those who are making it happen. 

 
Quote
How do you know what I believe and don't believe? Even then, what if my belief changes? At the end of the day, a DAC that doesn't honor the SCSL doesn't get the license to use and modify the code.


If entity A subscribes to IP and is willing to honour the consensus they may use the code for profit. If entity B subscribes to IP but refuses the consensus and attempts to use the code commercially then they are in violation of the license. Entity A cannot use the derivation made by B as it is already in violation. all this must be made explicitly clear.

As for changing your mind, the Termination section deals with that.

388

Third party DAC's wouldn't be using any code from Invictus and therefore wouldn't be bound by the license.  DAC's that do use their development kit are indirectly funded by AGS and should honor the consensus.

The actual code is Invictus, by third party we mean to say that they are bot being financed or supported via AGS.

your licensing and restrictions you chose to not to separate commons and non-commons use of the product ergo you left out the key parts where we restrict those who subscribe to IP and wish to use the product without honouring the SCSL.

Seems you stripped out the important parts. I think it would be best if we worked off my document, jumping between the two will just take up time. you already have rights to comment and modify.

389
General Discussion / Re: Is it like you don't care about PTS?
« on: January 14, 2014, 01:25:58 pm »
lol, desperation.

Pages: 1 ... 19 20 21 22 23 24 25 [26] 27 28 29 30 31 32 33 ... 51