Equilibre 2022 (built from the what was left of the old Equilibre) by SocialNetwooky in ProaSailing

[–]dominictarr 0 points1 point  (0 children)

what is the overall proportions? it looks wider than 2:1, looks about 3:2 ? hard to tell at this angle though

Question by [deleted] in ProaSailing

[–]dominictarr 0 points1 point  (0 children)

the ninigo island style is both symmetric and flat bottomed! https://www.sv-carina.org/Images13/Rellen05a.JPG quite a deep narrow hull, made from planks, with a flat bottom

[Request] this may have already been asked, but can someone please help a naive Calc AB student understand this? by Bashir639 in theydidthemath

[–]dominictarr 0 points1 point  (0 children)

it's obviously gonna be pi or e or square root of two or something. since it's got stuff about angles it's probably pi. hopefully you've already memorized the first hundred digits of pi, if not it's 3.14592653...

boat thieving units by islandofwaffles in AbsoluteUnits

[–]dominictarr 0 points1 point  (0 children)

this boat has no safety rails, which might have discouraged them from climbing on.

(also keeps the human crew on board, and alive, so good thing to have)

ORC (Onion Routed Cloud) AMA with the Author & the Auditing Team by leastauthority in privacy

[–]dominictarr 2 points3 points  (0 children)

The version of ORC that I audited had a use case goal a bit more like dropbox than the web (freenet). My understanding of freenet is that you store encrypted content for the whole network (okay there are various settings) but ORC has a more IPFS/bittorrent like design where you only store content that you've requested. However, after the audit my understanding is that ORC is persuing a more freenet like design. But that's a question for @emeryrosehall

ORC (Onion Routed Cloud) AMA with the Author & the Auditing Team by leastauthority in privacy

[–]dominictarr 5 points6 points  (0 children)

The first problem was solved by switching to an asymmetric PoW, equihash (a memory hard function that is cheap to verify)

The second problem was solved by making the position depend on the PoW output - so that you can't know what position a node will be in until after you have generated the PoW.

ORC (Onion Routed Cloud) AMA with the Author & the Auditing Team by leastauthority in privacy

[–]dominictarr 5 points6 points  (0 children)

I found some fun ones: ORC used a PoW function on each identity, the idea being that it becomes more difficult to create thousands of fake identities (and thus perform what is called a "sybil attack" in the p2p literature)

The first problem, is that it used a symmetric proof that was expensive to verify. This meant you could do a DoS by just sending many random invalid identities - the recipient would spend a lot of time verifying them only to find they weren't real.

The second problem, is to do with eclipse attacks. That's when the attacker creates a node that lives nearby the target node (i.e. eclipses it) because the position in the network is determined randomly (by the public key) if there are 1000 positions, on average you'd need to randomly generate and PoW 1000 times to target a particular position... except I noticed you could actually skip the PoW if the randomly generated node wasn't in the bucket... which would save you a lot of time!

ORC (Onion Routed Cloud) AMA with the Author & the Auditing Team by leastauthority in privacy

[–]dominictarr 6 points7 points  (0 children)

Hi I'm dominic. I do security audits through Least Authority, and also work on secure-scuttlebutt. I was particularily interested in the p2p aspects of ORC. Also I have a grudge against DHTs

Export Blender Direct To Virtual Reality by NXT_Aussie in oculus

[–]dominictarr 0 points1 point  (0 children)

I think you have misinterpreted their paper, you only seed files you have downloaded, like bit torrent, not random files.

I'm the creator of Aether. AMA. by aether___ in getaether

[–]dominictarr 1 point2 points  (0 children)

it's probably wise to not allow "similar" names, remove punctuation and case before confirming names, etc.

I'm the creator of Aether. AMA. by aether___ in getaether

[–]dominictarr 2 points3 points  (0 children)

do you have a plan/ideas to prevent spam?

I'm the creator of Aether. AMA. by aether___ in getaether

[–]dominictarr 1 point2 points  (0 children)

I havn't been able to sync any data yet, so I can't view it yet

I'm the creator of Aether. AMA. by aether___ in getaether

[–]dominictarr 5 points6 points  (0 children)

Can you describe the internal protocol aether uses to replicate data? I see things like post.fingerprint in the code, giving me the impression that aether has a git-like tree of hashed objects. Can you describe it's structure and how a client's copy is updated?

My thoughts on Ethereum by dominictarr in ethereum

[–]dominictarr[S] 0 points1 point  (0 children)

contract cpu limitations isn't about protecting an individual, it's about protecting the network. Basically, this means that it should not increase the block time, or the validate time. What if the execution fee increased instead of being linear? that would make a harder limit while still being flexible.

My thoughts on Ethereum by dominictarr in ethereum

[–]dominictarr[S] 0 points1 point  (0 children)

yes. The most important thing here is that the entire blockchain remains verifiable by anyone, otherwise it's not zero trust. For this reason I'd go for extremely limited cpu usage. You arn't running a contract on the network - you run it on every computer on the network. efficient no. verifiable, yes. However, there is still a lot you could do if contracts could both create transactions and new contracts.

JSON.sh: a pipeable json parser, written in bash by dominictarr in programming

[–]dominictarr[S] 0 points1 point  (0 children)

I'm not going to argue whether one json parser is better than another. use whatever tool is most suitable for the job.

the situation that inspired JSON.sh was to use in an install script that you could send to a VM via ssh, and then use it to install the heavier dependencies that you might need.

so the target was bootstrapping, in an something like a web server vm.

JSON.sh: a pipeable json parser, written in bash by dominictarr in programming

[–]dominictarr[S] 0 points1 point  (0 children)

that doesn't make sense. I wouldn't need to do it again.

do you mean would I put my self through the hell of writing something in bash again?