Delivery-Date: Fri, 13 Nov 2015 07:52:14 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,URIBL_RED autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 314081E0A37;
	Fri, 13 Nov 2015 07:52:13 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9D7D93845F;
	Fri, 13 Nov 2015 12:52:06 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 2D1D937E42
 for <tor-talk@lists.torproject.org>; Fri, 13 Nov 2015 12:52:03 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id yHWUwT6Jzpp2 for <tor-talk@lists.torproject.org>;
 Fri, 13 Nov 2015 12:52:03 +0000 (UTC)
Received: from pam.asoshared.com (pam.asoshared.com [65.99.237.152])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 0ADE1351E1
 for <tor-talk@lists.torproject.org>; Fri, 13 Nov 2015 12:52:03 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 d=bearbonds.org; s=default; h=MIME-Version:Content-Type:In-Reply-To:
 References:Subject:Cc:To:From:Message-ID:Date;
 bh=KWiFkTqER64C0RxFSxBKQ6KrifoP1rtpl6f7HZmcszw=; b=MOj+snU0qffJ3OHuFi38jd/O/a
 2sb2uPh0+/JOW6D735QscDbjvaEG39pPSliybT9ALsrp818uLiBD49zlmoIHaWVyT9IvLfFXeDMaQ
 tz/CC9LYJzZs3z3sRH1dhXaQCLS6znRwvFiLcRlfxzW718LfGwl2cEFAylZkJTj0ofxKZe61mU2+i
 OlscCrACbao+AGUFGhkihpfSRtD8G9gJr8AtXE/eWOsk4QubThxCJxPPGPtT2xJ6iOHzvMSPUarwG
 okWS43HosyyL9HGOdFmFH1WXOMc+FWD/ivsD1XjIuE7ozKGaszjozK4lKbK0BzO+tmJrEHaFBwS10
 KJJIoOxQ==;
Received: from [::1] (port=44452 helo=pam.asoshared.com)
 by pam.asoshared.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.86)
 (envelope-from <allen@bearbonds.org>)
 id 1ZxDpg-00059l-Bm; Fri, 13 Nov 2015 07:52:00 -0500
Received: from 73.163.4.150 ([73.163.4.150]) by pam.asoshared.com (Horde
 Framework) with HTTP; Fri, 13 Nov 2015 07:52:00 -0500
Date: Fri, 13 Nov 2015 07:52:00 -0500
Message-ID: <20151113075200.Horde.ZC3_SmnGspdM4oD4_HfQe9m@pam.asoshared.com>
From: allen@bearbonds.org
To: grarpamp <grarpamp@gmail.com>
References: <20151112205250.Horde.Bi5OF25cfmta1AzSq2n5o_L@pam.asoshared.com>
 <CAD2Ti2_i96DABiyXxCbLKu5dLWUxy1zNZhv7RNwNWe5Qv858YA@mail.gmail.com>
In-Reply-To: <CAD2Ti2_i96DABiyXxCbLKu5dLWUxy1zNZhv7RNwNWe5Qv858YA@mail.gmail.com>
User-Agent: Horde Application Framework 5
Accept-Language: en
MIME-Version: 1.0
Content-Disposition: inline
X-AntiAbuse: This header was added to track abuse,
 please include it with any abuse report
X-AntiAbuse: Primary Hostname - pam.asoshared.com
X-AntiAbuse: Original Domain - lists.torproject.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bearbonds.org
X-Get-Message-Sender-Via: pam.asoshared.com: authenticated_id:
 webadmin@bearbonds.org
X-Authenticated-Sender: pam.asoshared.com: webadmin@bearbonds.org
X-Source: 
X-Source-Args: 
X-Source-Dir: 
Cc: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Bear Bonds - a new cryptocurrency that uses Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="Yes"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

> And details on "directory servers", "witnesses", "trusted party
> transaction servers".

A lot of that is explained in the technical documentation.  Briefly,  
the directory servers function like torrent trackers.  The network  
nodes contact one or more directory servers, register their own onion  
address, and request the onion addresses of 6-20 random peers.  The  
network nodes then contact random peers via their Tor hidden services  
to assemble the mesh network that relays transactions and blocks.  All  
communication with the directory servers is also via Tor so the  
transaction servers themselves don't have to be trusted--they can  
neither compromise a node's privacy, nor target their communications  
in an effort to split or fork the network.

The witnesses assemble the blockchain.  That is explained in the  
whitepaper and the "Blockchain Assembly" document.  The witnesses'  
only role is to timestamp the transactions.  The number of witness is  
limited so the blockchain can be assembled in an orderly manner that  
achieves higher speed and reliability.  All of the nodes on the  
network verify the blockchain, so the witnesses cannot add any  
transaction that violates the transaction rules.  And since all  
communication is via Tor, the witnesses are also not able to  
compromise privacy nor target their communications in an effort to  
split or fork the network.

The transaction servers help wallet applications create and submit  
transactions.  That is explained in the whitepaper, the "Wallet  
Developer's Guide" and the "Transaction API Reference Manual".  Any  
network node can act as a transaction server, so you will eventually  
be able to run your own (when the network node software is done), or  
we plan to provide public transaction servers that anyone can use.   
The distinction between a trusted transaction server and an untrusted  
transaction server is explained in the whitepaper (page 9).  The trust  
in this case is only in regard to privacy.  If the wallet does not  
trust the transaction server to maintain privacy, the wallet can take  
extra steps to prevent its queries to the transaction server from  
being linked to the transaction that the wallet creates and submits to  
the network.

> What is your .onion?
> What networks besides Tor do you have as pluggable
> (or even multihome) options for when Tor is or becomes
> incapacitated or unreachable or users simply prefer other?

We currently do not support any network other than Tor.  Before  
introducing a new network, we would have to carefully consider whether  
it could potentially compromise privacy and security.

Our website does not have an onion address at the moment, although I'm  
sure we'll add one eventually.  The current Bear Bonds test network  
has one onion address for a public transaction server--that address  
can be found in the wallet simulation script.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

