You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I came across your randomity engine and I have 2 questions.
You state the following in your corresponding whitepaper:
The problem here is after all the mixed hashing the creator of such smart contract will identify what the outcomes of certain blocks are and hence may use this to their advantage. Therefore, no entity will use such a facility as it is imperative and necessary to provide a degree of freedom and customisations to the random number end users.
Can you elaborate on what you mean by this? Particularly the latter sentence; why will no entity use this in a bad way / game this system in this way?
Have you done any formal verification / related demonstrations of how this is scheme is resistant to various attacks like front-running, etc.?
Thanks for your time!
The text was updated successfully, but these errors were encountered:
Curious why the contracts are closed source, in my opinion, this makes the engine look malicious. For example, how can anyone be sure that its not random, and you don't have the only knowledge of breaking it.
Hello,
I came across your randomity engine and I have 2 questions.
Can you elaborate on what you mean by this? Particularly the latter sentence; why will no entity use this in a bad way / game this system in this way?
Thanks for your time!
The text was updated successfully, but these errors were encountered: