Imagine putting your money in a coin without a whitepaper

Imagine putting your money in a coin without a whitepaper
are they fucking serious? how does this shit have 30 million market cap

Attached: 1_Zdz7q99GiG9w0eFsx0OoYA.png (700x250, 19.98K)

Other urls found in this thread:

ieeexplore.ieee.org/abstract/document/7163223
github.com/enigmampc/SecretNetwork/commit/f0f01a8ceec6a06dd7340d04029a5830c4902cc5#diff-0be1edec8ac094d08d47e3cefdeb4b99dff41672dcf2d0d5f578a36f3ae22fbf
theregister.com/2019/02/12/intel_sgx_hacked
csoonline.com/article/3489502/remote-hackers-can-modify-cpu-voltage-to-steal-secrets-from-intel-sgx-enclaves.html
securityfocus.com/bid/101919
securityweek.com/intel-chip-flaws-expose-millions-devices-attacks
twitter.com/themadstephan/status/1270403954946592769
build.scrt.network/protocol/intro.html
forum.scrt.network/t/dont-trust-verify-an-untrusted-host/1669
twitter.com/SFWRedditVideos

Imagine not reading the thousands of lines of unique code on GitHub and completely failing to realize the magnitude of value this coin provides. Don’t worry fool, you can buy my bags at $10.

Attached: 33A50661-A1AB-48F4-B04E-E11E852370B7.jpg (4032x3024, 2.77M)

No whitepaper? It's based on the 5th most cited published paper (out of 1000+) in the blockchain space.

1500+ citations.

ieeexplore.ieee.org/abstract/document/7163223

White papers are memes for vaporware. SECRET network just builds the stuff. No need to say you will do something when you just fucking do it.

Is this the best fud you got, user?

>unique
you mean the cosmwasm "fork" and some brainlet CLI?
it's not even a proper fork, this nigga just copy pasted the code practically violating the license by removing the commit history
github.com/enigmampc/SecretNetwork/commit/f0f01a8ceec6a06dd7340d04029a5830c4902cc5#diff-0be1edec8ac094d08d47e3cefdeb4b99dff41672dcf2d0d5f578a36f3ae22fbf

unless it's a 1:1 implementation (which it's not) they still need a whitepaper

wHiTePaperz!!

YOU ARE ASKING FOR A WHITE PAPER WHEN THEY HAVE A FINISHED FUCKING PRODUCT
Go read the code
Go use the network

It fucking works.

Secret has a direct collaboration with COSMwasm. Stop with the bs.

Some of the same members of the cosmwasm team are the ones building on secret network. Christ, you're an idiot

scrt is a scam my guy

define how it is a scam
don't simply assert it

kys shills, you obviously don't understand the product you're investing in. You're asking to get rekt.
The first thing someone serious looking to use the network will do is look for the whitepaper, if they can't find it they might just assume it's another pajeet rugpull. Even pajeet rugpulls have decent whitepapers.

theregister.com/2019/02/12/intel_sgx_hacked
csoonline.com/article/3489502/remote-hackers-can-modify-cpu-voltage-to-steal-secrets-from-intel-sgx-enclaves.html
securityfocus.com/bid/101919
securityweek.com/intel-chip-flaws-expose-millions-devices-attacks
twitter.com/themadstephan/status/1270403954946592769

"Most scams have a white paper. This project doesnt have a white paper. Therefore secret is a scam"

Crackerjack logic.

you come into every thread to FUD Secret
guessing you are a ROSE holder

ROSE holders at least can DYOR because they have a fucking whitepaper, despite also having a working product
you people haven't researched shit, you're just looking for a quick pump and dump and are shilling this to normies for the FOMO

It's sad you're so retarded and can't read. The post said they have NO white paper, when even pajeet scams have AT LEAST a white paper. It's like the bare minimum for a project.

build.scrt.network/protocol/intro.html

go ahead and read retards

Fuck white papers. Secret is built and running. Bags are packed.

this barely covers anything, where do they cover security concerns? what do they do if a new exploit is found for the intel SGX?

Read the post again, genius.

does this "working" product even have a security audit? probably not, because they keep everything glued together in a monorepo, they would need a new audit on every commit

shills, if this is a finished and working product, why have they not fixed any of their "theoretical" attacks?
write a fucking whitepaper .

Attached: 2020-12-07_19-20.png (809x773, 127.47K)

"TODO add more" LOL, they obviously have never had a security audit
dec 14 my ass

they say that it's up to the contract developer

then why don't they show how to fix/avoid it? where's the code?
you act like this replaces the whitepaper, but a whitepaper would cover this in a much higher detail

hey shills, where do I find the people working behind this? I don't see them anywhere on the website, and the Enigma github org member list is not all of them, because there's only 4 people there

Attached: 2020-12-07_19-36.png (1097x524, 51.62K)

because it is a pretty obvious attack
you need to be aware that malicious node can run replay attacks
they are just trying to warn you not to be stupid

weak fud
learn to github

it's not obvious at all you retard shill
how about you show me. If you come up with the contributor list I'm gonna laugh my ass off, anyone can get there

13/30 replies. You ok bud?

>ad hominem
>how come OP has 13 replies!!

> it's not obvious at all you retard shill
read this
forum.scrt.network/t/dont-trust-verify-an-untrusted-host/1669