• SilentDragon 1.1.0

    duke released this 3 weeks ago | 0 commits to master since this release

    This is a MANDATORY update to protect against attacks from Komodo Platform (KMD). Please upgrade ASAP!

    • 🚀 Binaries include Hush 3.6.0!
    • 🐇 Faster sync times due to increased UTXO caching
    • 🛡️ Protection against Malicious DPoW Attacks from KMD
    • 🤘 Drastically improved TLS 1.3 implementation via WolfSSL
      • 😄 Increases network-level privacy with less attack surface
    • Next block halving estimate is now correct again

    NOTE: You probably want the "with-params" file unless you know you have Sapling Params installed on your system, and in that case, you can download the smaller file. You can also download these files individually. They are what makes shielded addresses (zaddrs) function properly. Your hush node will not start without them.

    42ec4e2033c794b28df73de9ddc80049927d23049d104c0ca46e50a658269fa0  silentdragon-win-1.1.0.zip
    6d227824b928fd85fca3372eca5570658095d6e51f31bdb018cd00a459d89c60  silentdragon-win-1.1.0-with-params.zip
    2f0ebbcbb9bb0bcffe95a397e7eba89c29eb4dde6191c339db88570e3f3fb0e4  sapling-output.params
    8e48ffd23abb3a5fd9c5589204f32d9c31285a04b78096ba40a79b75677efc13  sapling-spend.params
    
     
  • SilentDragon v1.0.0 "In Zdust We Trust"

    duke released this 1 month ago | 22 commits to master since this release

    This is a MANDATORY update to support our migration to z2z and our Blocktime Halving in November 2020. Please upgrade ASAP!

    Hush full nodes will now attempt to use encrypted (TLS aka SSL) connections when speaking to peers, increasing the privacy at the network layer for the entire network. In particular, encrypted connections make it harder to determine the IP address of a node which originally
    submits or creates transactions to a global passive network adversary.

    🎉 ● Includes Hush 3.5.1 (which includes the mandatory 3.5.0 changes)
    🔒 ● hushd tab now shows local node TLS support and number of TLS connections
    🚀 ● Full support for z2z and Blocktime Halving at Block 340K


    TLS 1.3 Details
    We use the latest release of OpenSSL 1.1.1h and disable all ciphersuites except two:

    TLS_AES_256_GCM_SHA384
    TLS_CHACHA20_POLY1305_SHA256

    On startup, every node randomly prefers one ciphersuite or the other, which forces the network to use both ciphersuites, instead of all nodes using the first in the list.


    8db7c05b6c4ce3d751bc145bdaa1e666845c0b041df939151faf2fab6727bc44
    macOS-binaries-silentdragon-v1.0.0.dmg

    7f40a4774f47865f4c25204bf63bcfda0d290d677ea97c8c0288ea17ac6ab055
    Windows-binaries-silentdragon-v1.0.0.zip

    fed5907cf3fb51e97445ebb09cad1c0b3d55b5c6ef288286ed8a82dce0b2c4d2
    SilentDragon-v1.0.0-Linux-x86_64-noparams.tar.xz

    94cb1879da170c1d34476922fab4cd6ba2771381909df4d092e7839343933c82
    Linux-binaries-silentdragon-v1.0.0.tar.xz

    a430f08ab40dc7d9b55a0f01e1d7915853e2fb700550b728c7c31d1a634cae08
    SilentDragon-v1.0.0-x86_64.deb