atcsecure



Offline



Activity: 756

Merit: 500







Hero MemberActivity: 756Merit: 500 Re: [ANN] [KEY] KeyCoin - X13 - Fair Launch - Bittrex/Cryptsy - 7/27 KeyOS Soon July 29, 2014, 10:42:14 PM

Last edit: July 29, 2014, 10:57:18 PM by atcsecure #1621





I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at



The KEY code:



KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.



Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.



The KEY team and invite for review:



At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.

I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.



They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.



Peer Review:



In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.

The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.

Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.

The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.





As my time very limited, I will leave it up to the Key Dev's to handle any questions



Sincerely,



Dan Metcalf







Dear KeyCoin Community,I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at http://www.linkedin.com/pub/dan-metcalf/12/1a8/b82 The KEY code:KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.The KEY team and invite for review:At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.Peer Review:In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.As my time very limited, I will leave it up to the Key Dev's to handle any questionsSincerely,Dan Metcalf Join the revolution - XC - Decentralized Trustless Multi-Node Private Transactions

keycoin



Offline



Activity: 140

Merit: 100







Full MemberActivity: 140Merit: 100 Re: [ANN] [KEY] KeyCoin - X13 - Fair Lnch - 3 Lg. Exchanges - Anon Peer Review+ July 29, 2014, 10:44:53 PM

Last edit: July 29, 2014, 10:59:52 PM by keycoin #1622 Quote from: atcsecure on July 29, 2014, 10:42:14 PM





I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at



The KEY code:



KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.



Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.



The KEY team and invite for review:



At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.

I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.



They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.



Peer Review:



In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.

The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.

Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.

The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.





As my time very limited, I will leave it up to the Key Dev's to handle any questions



Sincerely,



Dan Metcalf









Dear KeyCoin Community,I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at http://www.linkedin.com/pub/dan-metcalf/12/1a8/b82 The KEY code:KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.The KEY team and invite for review:At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.Peer Review:In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.As my time very limited, I will leave it up to the Key Dev's to handle any questionsSincerely,Dan Metcalf

Thank you for your time, Mr. Metcalf.



To the community: We will be posting a better explanation and diagrams of the system shortly. Thank you for your time, Mr. Metcalf.To the community:

patience



Offline



Activity: 19

Merit: 0







NewbieActivity: 19Merit: 0 Re: [ANN] [KEY] KeyCoin - X13 - Fair Lnch - 3 Lg. Exchanges - Anon Peer Review+ July 29, 2014, 10:52:39 PM #1624 Quote from: keycoin on July 29, 2014, 10:44:53 PM Quote from: atcsecure on July 29, 2014, 10:42:14 PM





I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at



The KEY code:



KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. Our code has been well audited by both members of the community and exchange operators.



Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.



The KEY team and invite for review:



At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.

I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.



They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.



Peer Review:



In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.

The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.

Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.

The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.





As my time very limited, I will leave it up to the Key Dev's to handle any questions



Sincerely,



Dan Metcalf









Dear KeyCoin Community,I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at http://www.linkedin.com/pub/dan-metcalf/12/1a8/b82 The KEY code:KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. Our code has been well audited by both members of the community and exchange operators.Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.The KEY team and invite for review:At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.Peer Review:In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.As my time very limited, I will leave it up to the Key Dev's to handle any questionsSincerely,Dan Metcalf

Thank you for your time, Mr. Metcalf.



To the community: We will be posting a better explanation and diagrams of the system shortly.

Thank you for your time, Mr. Metcalf.To the community: Thank you for taking the time to evaluate and share! And thanks devs for earning the recognition!

keycoin



Offline



Activity: 140

Merit: 100







Full MemberActivity: 140Merit: 100 Re: [ANN] [KEY] KeyCoin - X13 - Fair Lnch - 3 Lg. Exchanges - Anon Peer Review+ July 29, 2014, 11:08:22 PM #1627 Quote from: atcsecure on July 29, 2014, 10:42:14 PM





I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at



The KEY code:



KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.



Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.



The KEY team and invite for review:



At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.

I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.



They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.



Peer Review:



In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.

The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.

Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.

The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.





As my time very limited, I will leave it up to the Key Dev's to handle any questions



Sincerely,



Dan Metcalf









Dear KeyCoin Community,I have always been a strong advocate for advancements in technology, dating back throughout my career and I support anything that can have a positive effect on the path to greater freedom and I regard crypto-currency as key part of the solution to a decentralized and free society. You can see my extensive list of accomplishments at http://www.linkedin.com/pub/dan-metcalf/12/1a8/b82 The KEY code:KEY is 100% Proof-of-Stake, with checkpoints, active POS checkpointing server, and a POS Maximum Age of 120 days to prevent long term accumulation attacks. The code has been well audited by both members of the community and exchange operators.Keys anonymous solution is an unique hybrid which leverages on-demand encryption and clustered pools to randomize mixing. To prevent leakage the transaction is passed through the clustered mixing pools twice, thus rendering the transaction untraceable on the blockchain and also prevents even the sender from tracing the transaction on the block chain. While the anonymous system is indeed based on XC, it is a highly modified and unique version.The KEY team and invite for review:At first when the KEY team reached out, my initial response was to say no due to my workload and commitment with XC, but since I am always open to new innovation, I finally decided to accept the request. I was invited to a private channel with an extremely organized and eager development team. There are over 20 guys in here with skill sets ranging from proficiencies in various computing languages, graphic designers, web developers, 2 3D rendering studios, Linux system admins, they even have guys with 3D printers exchanging custom designs for the KEYos and merchandise.I also noted a great deal of cross collaboration, with many prominent developers from the community contributing to the success of the coin and the quality of the code.They have their ears open and they are open to acting on not only my suggestions, but those that emanate from the community itself. Since innovation is what drives cryptocurrency, I decided to accept the opportunity to review the code and the team.Peer Review:In reviewing the code, I did a basic review of the entire code base and a more in-depth analysis of the anonymous related portions.The additional clustering abilities within the protocol itself provide an ideal solution in preventing block analysis, and to take it even 1 step further, the developers have implemented a ring layer on the protocol allowing the transaction to take multiple passs through the cluster, further anonymizing the transaction.Since the entire protocol including the enhancements are encrypted it is impossible to gain any information by sniffing the network.The protocol enhancements have been integrated correctly and based on my own testing perform as expected and havent created any security vulnerabilities.As my time very limited, I will leave it up to the Key Dev's to handle any questionsSincerely,Dan Metcalf

