You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: .github/ISSUE_TEMPLATE.md
+7-9
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,8 @@
1
1
<!--- Remove text and sections that do not apply -->
2
2
3
-
This issue tracker is only for technical issues related to zcashd.
3
+
This issue tracker is only for technical issues related to komodod
4
4
5
-
General Zcash questions and/or support requests and are best directed to the [Zcash Forums](https://forum.z.cash) or [Community Rocket.Chat](https://chat.zcashcommunity.com).
6
-
7
-
For reporting security vulnerabilities or for sensitive discussions with our security team, please contact [[email protected]](mailto:[email protected]). You can use the [GPG key](https://z.cash/gpg-pubkeys/security.asc) (fingerprint: `AF85 0445 546C 18B7 86F9 2C62 88FB 8B86 D8B5 A68C`) to send an encrypted message. The key and fingerprint are duplicated on our [Public Keys page](https://z.cash/support/pubkeys.html).
5
+
General Komodo questions and/or support requests and are best directed to [Discord](https://komodoplatform.com/discord)
8
6
9
7
### Describe the issue
10
8
Please provide a general summary of the issue you're experiencing
@@ -21,8 +19,8 @@ Tell us what should happen
21
19
### Actual behaviour + errors
22
20
Tell us what happens instead including any noticable error output (any messages displayed on-screen when e.g. a crash occurred)
23
21
24
-
### The version of Zcash you were using:
25
-
Run `zcashd --version` to find out
22
+
### The version of Komodo you were using:
23
+
Run `komodod --version` to find out
26
24
27
25
### Machine specs:
28
26
- OS name + version:
@@ -34,9 +32,9 @@ Run `zcashd --version` to find out
34
32
- Compiler version (gcc -version):
35
33
36
34
### Any extra information that might be useful in the debugging process.
37
-
This includes the relevant contents of `~/.zcash/debug.log`. You can paste raw text, attach the file directly in the issue or link to the text via a pastebin type site.
35
+
This includes the relevant contents of `~/.komodo/debug.log`. You can paste raw text, attach the file directly in the issue or link to the text via a pastebin type site.
38
36
Please also include any non-standard things you did during compilation (extra flags, dependency version changes etc.) if applicable.
39
37
40
-
### Do you have a backup of `~/.zcash` directory and/or take a VM snapshot?
41
-
- Backing up / making a copy of the `~/.zcash` directory might help make the problem reproducible. Please redact appropriately.
38
+
### Do you have a backup of `~/.komodo` directory and/or take a VM snapshot?
39
+
- Backing up / making a copy of the `~/.komodo` directory might help make the problem reproducible. Please redact appropriately.
42
40
- Taking a VM snapshot is really helpful for interactively testing fixes
- Delayed Proof of Work (dPoW) - Additional security layer and Komodos own consensus algorithm.
32
+
- zk-SNARKs - Komodo Platform's privacy technology for shielded transactions
33
+
- Tokens/Assets Technology - create "colored coins" on the Komodo Platform and use them as a layer for securites
34
+
- Reward API - Komodo CC technology for securities
35
+
- CC - Crypto Conditions to realize "smart contract" logic on top of the Komodo Platform
31
36
- Jumblr - Decentralized tumbler for KMD and other cryptocurrencies
32
-
- Assetchains - Easy way to fork Komodo coin
37
+
- Assetchains - Create your own Blockchain that inherits all Komodo Platform functionalities and blockchain interoperability
33
38
- Pegged Assets - Chains that maintain a peg to fiat currencies
34
39
- Peerchains - Scalability solution where sibling chains form a network of blockchains
35
40
- More in depth covered [here](https://docs.google.com/document/d/1AbhWrtagu4vYdkl-vsWz-HSNyNvK-W-ZasHCqe7CZy0)
@@ -40,14 +45,14 @@ The wallet downloads and stores the block chain or asset chain of the coin you s
40
45
- Max Supply: 200 million KMD.
41
46
- Block Time: 1M 2s
42
47
- Block Reward: 3KMD
43
-
- Mining Algorithm: Equihash
48
+
- Mining Algorithm: Equihash
44
49
45
50
## About this Project
46
-
Komodo is based on Zcash and has been by our innovative consensus algorithm called dPoW which utilizes Bitcoin's hashrate to store Komodo blockchain information into the Bitcoin blockchain. Other new and native Komodo features are the privacy technology called JUMBLR or our assetchain capabilities (one click plug and play blockchain solutions). More details are available under https://komodoplatform.com/.
51
+
Komodo is based on Zcash and has been extended by our innovative consensus algorithm called dPoW which utilizes Bitcoin's hashrate to store Komodo blockchain information into the Bitcoin blockchain. Other new and native Komodo features are the privacy technology called JUMBLR, our assetchain capabilities (one click plug and play blockchain solutions) and a set of financial decentralization and interoperability technologies. More details are available under https://komodoplatform.com/ and https://blog.komodoplatform.com.
47
52
48
53
## Getting started
49
-
Dependencies
50
-
------------
54
+
55
+
### Dependencies
51
56
52
57
```shell
53
58
#The following packages are needed:
@@ -76,15 +81,17 @@ Building for Windows:
76
81
```
77
82
VerusCoin
78
83
------
79
-
We develop on dev and some other branches and produce releases of of the master branch, using pull requests to manage what goes into master.
84
+
We develop on dev and some other branches and produce releases of of the master branch, using pull requests to manage what goes into master. The dev branch is considered the bleeding edge codebase, and may even be oncompatible from time to time, while the master-branch is considered tested (unit tests, runtime tests, functionality). At no point of time do the Komodo Platform developers or Verus Developers take any responsbility for any damage out of the usage of this software.
80
85
86
+
Verus builds for all operating systems out of the same codebase. Follow the OS specific instructions from below.
81
87
88
+
#### Linux
82
89
```shell
83
90
git clone https://github.com/VerusCoin/VerusCoin
84
91
cd VerusCoin
85
92
#you might want to: git checkout <branch>; git pull
86
93
./zcutil/fetch-params.sh
87
-
# -j8 uses 8 threads - replace 8 with number of threads you want to use
94
+
# -j8 = using 8 threads for the compilation - replace 8 with number of threads you want to use
88
95
./zcutil/build.sh -j8
89
96
#This can take some time.
90
97
```
@@ -111,11 +118,8 @@ The remaining text is from the komodo source we forked when creating VerusCoin/V
111
118
**To change modes:**
112
119
113
120
a) backup all privkeys (launch komodod with `-exportdir=<path>` and `dumpwallet`)
114
-
115
121
b) start a totally new sync including `wallet.dat`, launch with same `exportdir`
116
-
117
122
c) stop it before it gets too far and import all the privkeys from a) using `komodo-cli importwallet filename`
komodod now has `jumblr_deposit` and `jumblr_secret` RPC calls.
133
-
134
-
Jumblr works like described previously where all the nodes with jumblr active synchronize their tx activity during the same block to maximize the mixing effect. However, unlike all other mixers/tumblers, you never give up control of your coins to anybody else. JUMBLR uses a one to many allocation of funds, ie. one deposit address and many secret addresses. You can always run multiple komodod daemons to get multiple active deposit addresses.
135
-
136
-
JUMBLR implements t -> z, z -> z and z -> t transactions to maximize privacy of the destination t (transparent) address. So while it is transparent, its first activity is funds coming from an untracable z address.
137
-
138
-
Which of the three stages is done is randomly selected at each turn. Also when there is more than one possible transaction at the selected stage, a random one is selected. This randomization prevents analyzing incoming z ->t transactions by its size to correlate it to the originating address.
139
-
140
-
`jumblr_deposit <depositaddr>` designates the deposit address as the jumblr deposit address for that session. You can select an address that already has funds in it and it will immediately start jumblr process. If there are no funds, it will wait until you send funds to it.
141
-
142
-
There are three sizes of a jumblr transaction: 10 KMD, 100 KMD and 1000 KMD. There is also a fixed interval of blocks where all jumblr nodes are active. Currently it is set to be 10, but this is subject to change. Only during every 10*10 blocks are the largest 1000 KMD transactions processed, so this concentrates all the large transactions every N*N blocks.
143
136
144
-
`jumblr_secret <secretaddress>` notifies JUMBLR where to send the final z -> t transactions. In order to allow larger accounts to obtain privacy, up to 777 secret addresses are supported. Whenever a z -> t stage is activated, a random secret address from the list of the then active secret addresses is selected.
137
+
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
145
138
146
-
#### Practical Advice:
147
-
Obtaining privacy used to be very difficult. JUMBLR makes it as simple as issuing two command line calls. Higher level layers can be added to help manage the addresses, ie. linking them at the passphrase level. Such matters are left to each implementation.
139
+
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
148
140
149
-
Once obtained, it is very easy to lose all the privacy. With a single errant transaction that combines some previously used address and the secretaddress, well, the secretaddress is no longer so private.
150
-
151
-
The advice is to setup a totally separate node!
152
-
153
-
This might seem a bit drastic, but if you want to maintain privacy, it is best to make it look like all the transactions are coming from a different node. The easiest way for most people to do this is to actually have a different node.
154
-
155
-
It can be a dedicated laptop (recommended) or a VPS (for smaller amounts) with a totally fresh komodod wallet. Generate an address on this wallet and use that as the jumblr_secret address on your main node. As the JUMBLR operates funds will teleport into your secret node's address. If you are careful and never use the same IP address for both your nodes, you will be able to maintain very good privacy.
156
-
157
-
Of course, don't send emails that link the two accounts together! Dont use secret address funds for home delivery purchases! Etc. There are many ways to lose the privacy, just think about what linkages can be dont at the IP and blockchain level and that should be a useful preparation.
158
-
159
-
What if you have 100,000 KMD and you dont want others to know you are such a whale?
160
-
Instead of generating 1 secret address, generate 100 and make a script file with:
161
-
```shell
162
-
./komodo-cli jumblr_secret <addr0>
163
-
./komodo-cli jumblr_secret <addr1>
164
-
...
165
-
./komodo-cli jumblr_secret <addr99>
166
-
```
167
-
And make sure to delete all traces of this when the JUMBLR is finished. You will end up with 100 addresses that have an average of 1000 KMD each. So as long as you are careful and dont do a 10,000 KMD transaction (that will link 10 of your secret addresses together), you can appear as 100 different people each with 1000 KMD.
141
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
0 commit comments