Ethereum Secrets

4 stars based on 53 reviews

The Wowhead Client is a little application we use to keep our database up to date, and to provide you with some nifty extra functionality on the website! You can also use it to keep track of your completed quests, recipes, mounts, companion pets, and titles! This site makes extensive use of JavaScript. Please enable JavaScript in your browser. Comments Comment by sebekrogue Repeatable reputation quest, grants rep with the Consortium at level In my opinion, if your goal is to simply grind Consortium rep, farming Zaxxis Insignias is still much more effective.

Times may vary for different people, but it took me a long time of pretty steady killing to get 1 key for an ID tag. Comment by Valkries I have killed a good 80 Ethereum mobs Day of patch and first part of the quest I got the key off the 2nd mob. I have yet to get one since.

I came back about 10 mins later and did finally get a key. Drop rate is pretty low. Comment by Hote This seems to be a quest thats meant to be done as you do all the other quests in this area as the drop rate is, for me, significantly smaller than the last quest. If you are just starting out in this area, make an effort to turn the salvaged key in right away so you can grab this quest and soften the blow of this grind.

As a side note, since wowhead doesn't mention it, the precursor to this quest is http: He's a level 71 mob and is the same npc type as the flesheaters, but I was unable to nova him in place.

Low HP, so easily droppable. Just to see, I did this quest again, got the key on the 10th mob or so, and got Porfus the Gem Gorger, a giant basilisk model. Same level 71, and just like the Fiend model, he wasn't kitable via frost spells, but had low enough HP to burn down easily.

In both cases, the mob I freed dropped a green as well as the ID tag. Uncertain if it's random which mob you get upon opening a cage, I tried the one closest to the entrance on the ones nearest to Ameer, and after that, tried the one behind it to the left. Comment by kdanger I received sporeggar rep for freeing a sporeggar from one of the ethereum prisons.

Comment by trancerau http: Comment by Trouler I got my first key on my third kill. Ever since I got this quest however, I haven't seen a key in 60 kills. Wow, this really sucks.

I gave up after about 80 kills. Noticed a Horde Druid opening a prison, so I killed him and stole the mob from him. Hurray for my Ethereum Prisoner I. Comment by xmetacognitionx I didn't have much trouble farming these things.

Comment by jcranger25 What mobs should I kill to get the ID tags, i've been killing all but no tags. Comment by jcranger25 thats odd there 2 jcranger It was my first kill on that mob, so i have no clue about the drop-percentage. Comment by NuSkooler I can confirm that the keys can definitely drop off any of the Ethernuim mobs. I flew around a bit looking for a Jailor and found none -- I then farmed up 5 keys in under 30 minutes just killing the random mobs. So far, two blues and 3 greens.

Comment by alcy Actually, get the keys for the prisons think it was the Gladiator who dropped it and you get the tag from the prison instantly. Comment by Warhawke The area sw of area 52 has the best drop rate so far and ne of the ethereum there drops the key.

Comment by Xrenias guys. Comment by Zanoan Yeah, a rather frustrating quest. Killed about 75 Ethereums so far, mostly Nullifiers and Avengers - no jailor, and no key.

Comment by Ranas Quest is bugged for me, i can't loot the I. Comment by Thildir These keys also dropps from the Zaxxis humanoids south of Arena I went there to farm the other rep item and got a key from first Mob O. I killed him 2 minutes ago.

Comment by Knowxwhere I don't know what you guys are talking about. This is easy peasy. The keys drop off the various mobs around the camp, and then you open the ethereum prisons the big purpley ball things, there are a bunch at 54,40 and a big scary pops out.

Kill him and he drops the ID tags. Comment by skeleton17 I killed a Jailor at Comment by gman After killing around 20 random mobs, got it from Warden Icoshock. Comment by moviemania Do NOT move the tag from your keyring to your inventor bag. It WILL vanish on you. For whatever reason I dragged and dropped it in my bag. I went to look for it in my bag and it was no where to be found! LEAVE the tag in the keyring. Comment by CyberGrim The Zaxxis mobs south of Area 52 are a good place to farm for this while farming for the Zaxxis Insignia and Netherweave, if you're not bothered about a slightly lower drop rate but getting more farmable stuff overall, I would definatley suggest these mobs.

Comment by Gilean Just confirming icedoom the jailor does spawn at Comment by omoikane This is definitely a nice way to farm Consortium rep: Use the keys to open the prisons for rep a pop or whatever else that comes out. Considering that at exalted you can get the key that allows you to summon the mana-tomb boss without consuming it, it's probably a good idea to stick to this part of the rep grind until you're close to exalted.

Also, looking at the loot lists of the mobs you free, a lot of them have a chance at dropping shadow resist gear, which is critical for heroic mana-tomb It's nice to do the unlocking cage part of the quest not just by yourself especially with all those potential BOP blue loot that drops.

Comment by mpoy70 Got the key from an Ethereum jailor at 63, Comment by Ardrius is it me or i cant find any friggin jailors? Comment by smanjo The followup is repeatable, Ethereum Prisoner I.

I got a key in every run so far. Actually, there are like 12 of them in every Arc run only. Comment by swotam I agree with the suggestion to kill Zaxis guys while you are farming for keys. I spent 30 minutes killing mobs around Manaforge Ultris and got nothing except a couple of BOP greens, no keys.

I then went and spent 40 minutes farming Zaxis mobs, got 40 badges and 2 keys so that's rep for 40 minutes work vs zero rep for 30 minutes work. Basically, you can farm the Zaxis and average 10 badges per 10 min, so that would be 60 per hour worth rep.

Plus, you might get keys to drop as a bonus. Finally, no basilisks to deal with. Open the Prison, kill the mob that spawns and u have ur key. Comment by Spithas i have yet to see a Jailor in all the times i looked for him, i just gave up and started killing Avenger's and Nullifiers, they seem to have a higher drop rate than the ones inside the camp, they are all around the isle, got my first key on the 10th Nullifier.

Comment by Darkainon I have been working on this quest for two days now. I have gotten the key twice. I have opened two prisons. The first prison I opened the freed a sprorregard. The second time freed a keeper of time.

Neither time have I gotten an I. Does anyone have any advice? Comment by PurePwnage Haha took me 2 kills to get one key, damn lucky. Comment by LoKHor If you are grinding Consortium rep, just grind Zaxxis Insignias at the Heap, and then open a prison with every key that one of those ethereals drops.

Comment by Cerres I have freed 2 prisonners at 54,46, both were mobs and both dropped an ID. Comment by geordiesi I would like to group alot of relevant information about this Quest.

The keys drop from most if not all the ethereum mobs around Manaforge Ultris and from the Zaxxis mobs near Manaforge B'naar. The jailors it would seem are on the same respawn as the other mobs so keep killing, I have had 3 jailors spawn immediately one after the other by killing the other mobs but can fly around looking for hours without a jailor if I havn't been killing the other mobs.

Simply pick an area and farm it, the time it takes you to kill mobs and respawn time, will soon dictate the size of the area to farm. When you open a prison orb you have the chance of freeing a friendly or a hostile mob.

The friendly mob will grant you relevant rep, so far I have had rep granted for as a human The Consortium, Cenarian Expedition, Sha'tar, Lower City and Keepers Of Time all and Sporegarr or something but it was less than the others. You will not get a prison I. Tag with these friendly mobs. If you free a hostile mob you will have to fight it. Tag which you hand in to Commander Ameer and get rep with The Consortium, or as non human. Comment by Tiffytan Simply killed Ethereum Nexus- Stalker at entrance to area with the prisons pink bubbles.

A prison key dropped I opened the middle prison and out came Porfus the Gem Gorger. I killed him and he dropped a tag. Tag Its pretty easy, but Ethereum Jailor and the mob from the prison is pretty hard to kill, so your need good dps or another char.

Bitcash bitcoin chart

  • Phpbtce arbitrage bot madalphabet

    Bitcoin qt exe 100% cpu usage windows update

  • Bitrex ethereum phasespear

    Bitcoin cash chart euro

Leerverkauf bitcoin litecoin

  • Casascius bitcoin analyzer technology

    Bitcoin mining suspended for 18 months in upstate new york

  • Crypto robot 365 review scam cryptorobot 365 clone exposed with evidencebinary scam alerts

    Dogecoin mining pool stats

  • L histoire du bitcoin charts

    Blackett review blockchain api

Buy e liquids online coupons

12 comments Bitcoins next breakout may have nothing to do with stock prices rising

Marliave bitcoin charts

Announcing World Trade Francs: The Official Ethereum Stablecoin 01st April, Ethereum scalability research and development subsidy programs 02nd January, All of these technologies remedy key deficiencies of the blockchain design with respect to centralized servers: However, there is one piece of the puzzle that all approaches so far have not yet managed to crack: Bitcoin brings to its users a rather unique set of tradeoffs with respect to financial privacy.

Although Bitcoin does a substantially better job than any system that came before it at protecting the physical identities behind each of its accounts — better than fiat and banking infrastructure because it requires no identity registration, and better than cash because it can be combined with Tor to completely hide physical location, the presence of the Bitcoin blockchain means that the actual transactions made by the accounts are more public than ever — neither the US government, nor China, nor the thirteen year old hacker down the street even need so much as a warrant in order to determine exactly which account sent how much BTC to which destination at what particular time.

In general, these two forces pull Bitcoin in opposite directions, and it is not entirely clear which one dominates. With Ethereum, the situation is similar in theory, but in practice it is rather different. Bitcoin is a blockchain intended for currency, and currency is inherently a very fungible thing.

There exist techniques like merge avoidance which allow users to essentially pretend to be separate accounts, with their wallet managing the separation in the background. Hence, Ethereum, as it stands today, will in many cases inherit the transparency side of blockchain technology much more so than the privacy side although those interested in using Ethereum for currency can certainly build higher-privacy cash protocols inside of subcurrencies.

Even if we solve scalability and blockchain data assets, will the lack of privacy inherent to blockchains mean that we simply have to go back to trusting centralized servers? Or can we come up with a protocol that offers the best of both worlds: What is this protocol? To skip the fun technical details and go straight to applications, click here. Secret computation networks rely on two fundamental primitives to store information in a decentralized way.

The first is secret sharing. Secret sharing essentially allows data to be stored in a decentralized way across N parties such that any K parties can work together to reconstruct the data, but K-1 parties cannot recover any information at all.

N and K can be set to any values desired; all it takes is a few simple parameter tweaks in the algorithm. The simplest way to mathematically describe secret sharing is as follows. We know that two points make a line:.

To implement 3-of-N secret sharing, we just make a parabola instead, and give people points on the parabola:. Parabolas have the property that any three points on a parabola can be used to reconstruct the parabola and no one or two points suffice , so essentially the same process applies.

And, more generally, to implement K-of-N secret sharing, we use a degree K-1 polynomial in the same way. There is a set of algorithms for recovering the polynomial from a sufficient set of points in all such cases; they are described in more details in our earlier article on erasure coding.

This is how the secret sharing DAO will store data. Instead of every participating node in the consensus storing a copy of the full system state, every participating node in the consensus will store a set of shares of the state — points on polynomials, one point on a different polynomial for each variable that makes up part of the state.

Now, how does the secret sharing DAO do computation? For this, we use a set of algorithms called secure multiparty computation SMPC. The basic principle behind SMPC is that there exist ways to take data which is split among N parties using secret sharing, perform computations on it in a decentralized way, and end up with the result secret-shared between the parties, all without ever reconstituting any of the data on a single device.

SMPC with addition is easy. Thus, we have a rule: Multiplication by a known constant value works the same way: Multiplication of two secret shared values, unfortunately, is much more involved. First, suppose that there exist values a and b , secret shared among parties P[1] … P[n] , where a[i] represents the ith share of a and same for b[i] and b. We start off like this:. The answer is, surprisingly, yes, but with a serious problem: Hence, if we do multiplication more than once, the polynomial would become too big for the group of N to store.

To avoid this problem, we perform a sort of rebasing protocol where we convert the shares of the larger polynomial into shares of a polynomial of the original degree. The way it works is as follows. Thus, P[j] now has c[i][j] for all i. Given this, P[j] calculates c[j] , and so everyone has secret shares of c , on a polynomial with the same degree as a and b.

To do this, we used a clever trick of secret sharing: This allows us to move from a higher-degree polynomial to a lower degree polynomial but avoid revealing the values in the middle — instead, the middle step involved both layers being applied at the same time.

With addition and multiplication over 0 and 1, we have the ability to run arbitrary circuits inside of the SMPC mechanism. Hence, we can run whatever programs we want, although with one key limitation: There are two ways around this problem. Second, as we will see, if we implement if statements inside the EVM, and run the EVM inside SMPC, then we can resolve the problem, leaking only the information of how many steps the EVM took before computation exited and if we really care, we can reduce the information leakage further, eg.

The secret-sharing based protocol described above is only one way to do relatively simply SMPC; there are other approaches, and to achieve security there is also a need to add a verifiable secret sharing layer on top, but that is beyond the scope of this article — the above description is simply meant to show how a minimal implementation is possible.

Now that we have a rough idea of how SMPC works, how would we use it to build a decentralized currency engine? Now, since the blockchain is not transparent, we might expect the need for two kinds of transactions that users can send into the SMPC: We define the two types of requests as follows:.

Essentially, the database is stored as a set of 3-tuples representing accounts, where each 3-tuple stores the owning pubkey, nonce and balance. To send a request, a node constructs the transaction, splits it off into secret shares, generates a random request ID and attaches the ID and a small amount of proof of work to each share.

The proof of work is there because some anti-spam mechanism is necessary, and because account balances are private there is no way if the sending account has enough funds to pay a transaction fee. The nodes then independently verify the shares of the signature against the share of the public key supplied in the transaction there are signature algorithms that allow you to do this kind of per-share verification; Schnorr signatures are one major category.

If a given node sees an invalid share due to proof of work or the signature , it rejects it; otherwise, it accepts it. Transactions that are accepted are not processed immediately, much like in a blockchain architecture; at first, they are kept in a memory pool. At the end of every 12 seconds, we use some consensus algorithm — it could be something simple, like a random node from the N deciding as a dictator, or an advanced neo-BFT algorithm like that used by Pebble — to agree on which set of request IDs to process and in which order for simplicity, simple alphabetical order will probably suffice.

So what does this formula do? It consists of three stages. First, we extract the owner pubkey of the account that the request is trying to get the balance of. Because the computation is done inside of an SMPC, and so no node actually knows what database index to access, we do this by simply taking all the database indices, multiplying the irrelevant ones by zero and taking the sum.

Finally, we use the same database getting primitive to get the balance, and multiply the balance by the validity to get the result ie. First, we compute the validity predicate, consisting of checking that 1 the public key of the targeted account is correct, 2 the nonce is correct, and 3 the account has enough funds to send. Note that all of these can be parallelized. This is once again trivial using boolean logic gates, but even if we use a finite field for efficiency there do exist some clever tricks for performing the check using nothing but additions and multiplications.

In all of the above we saw two fundamental limitations in efficiency in the SMPC architecture. First, reading and writing to a database has an O n cost as you pretty much have to read and write every cell. Doing anything less would mean exposing to individual nodes which subset of the database a read or write was from, opening up the possibility of statistical memory leaks.

Second, every multiplication requires a network message, so the fundamental bottleneck here is not computation or memory but latency. Because of this, we can already see that secret sharing networks are unfortunately not God protocols; they can do business logic just fine, but they will never be able to do anything more complicated — even crypto verifications, with the exception of a select few crypto verifications specifically tailored to the platform, are in many cases too expensive.

Now, the next problem is, how do we go from this simple toy currency to a generic EVM processor? Well, let us examine the code for the virtual machine inside a single transaction environment. A simplified version of the function looks roughly as follows:.

Hence, we can simply store these as records, and for every computational step run a function similar to the following:. Essentially, we compute the result of every single opcode in parallel, and then pick the correct one to update the state. The alive variable starts off at 1, and if the alive variable at any point switches to zero, then all operations from that point simply do nothing. This seems horrendously inefficient, and it is, but remember: Everything above can be parallelized.

In fact, the astute reader may even notice that the entire process of running every opcode in parallel has only O n complexity in the number of opcodes particularly if you pre-grab the top few items of the stack into specified variables for input as well as output, which we did not do for brevity , so it is not even the most computationally intensive part if there are more accounts or storage slots than opcodes, which seems likely, the database updates are.

In an EVM with many participants, the database will likely be the largest overhead. To mitigate this problem, there are likely clever information leakage tradeoffs that can be made. For example, we already know that most of the time code is read from sequential database indices. Hence, one approach might be to store the code as a sequence of large numbers, each large number encoding many opcodes, and then use bit decomposition protocols to read off individual opcodes from a number once we load it.

There are also likely many ways to make the virtual machine fundamentally much more efficient; the above is meant, once again, as a proof of concept to show how a secret sharing DAO is fundamentally possible, not anything close to an optimal implementation. Additionally, we can look into architectures similar to the ones used in scalability 2.

However, blockchain protocols need to theoretically last forever, and so stagnant economic sets do not work; rather, we need to select the consensus participants using some mechanism like proof of stake.

To do this, an example protocol would work as follows:. All of the above handles decentralization assuming honest participants; but in a cryptocurrency protocol we also need incentives. To accomplish that, we use a set of primitives called verifiable secret sharing , that allow us to determine whether a given node was acting honestly throughout the secret sharing process.

Essentially, this process works by doing the secret sharing math in parallel on two different levels: Elliptic curve points are convenient because they have a commutative and associative addition operator - in essence, they are magic objects which can be added and subtracted much like numbers can. By doing the secret sharing math on the number level and the elliptic curve point level at the same time, and publicizing the elliptic curve points, it becomes possible to verify malfeasance.

For efficiency, we can probably use a Schellingcoin-style protocol to allow nodes to punish other nodes that are malfeasant. So, what do we have? If the blockchain is a decentralized computer, a secret sharing DAO is a decentralized computer with privacy. The secret sharing DAO pays dearly for this extra property: