This is such a no brainer. 75,000 weekly sessions and over 1,000,000 sessions total so far. Main net launching in a couple months. Supported by the big boys behind Cosmos and Tendermint. Pay for bandwidth in any token you want. Decentralized token mixer. Staking SENT will allow you to collect fees in BTC, ETH, Monero etc. True FOMO will hit once people realize they can make BTC and ETH by staking SENT.
>comes to biz >thinks there won't be any shilling kek
Don't you know user LINK whales already dumped on you and now have moved on to the next 20x? If you have been around for a while, you would see this pattern over and over. SENT is the next chosen one.
This is why you do testnet first dumbtard. Don’t know what you are talking about with DNS leak as I tested this myself. Main net will be even more secure with more privacy options.
Jayden Wright
This is looking like the next UUU
Oliver Nelson
sent just broke through resistance, its going to test ath and move higher
Jeremiah Cox
i bought millions for minutes. im stacked. lets go
Jacob Long
I hope user drops the FUD. I have been trying to buy this dip for a week now.
hey, i would like to join your shill group on discord/telegram. I can post about 30 posts on biz everyday. can you please send me the invite so that we can talk about it more there?
Nathaniel Taylor
it just broke through resistance, user you are fucked its going for the next leg up
he spams this in every thread you fucking NPC, if you’re that lazy that you’ll buy something off of that low quality of a shill you deserve to lose everything
Christian Martinez
Don't hate the player, hate the game user.
Connor Long
SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net SENT LEAKS IPV6 >ipleak.net
weak fud user, sent is still on testnet stuff like that is normal during testing period. thats why sent has been on testnet from the last april so that bugs like this can all be weeded out before main net
Josiah Richardson
Kek this guy tries to fud the same shit over and over. No DNS leaks for me. Devs said in the Telegram that some improperly configured nodes may be causing this and will issue a fix for it.
Jason Roberts
>Chrome Win10 v1.2alpha Is it just me?
Brody Reed
Oh no! A testnet has a small bug that devs said they will be fixing! Let's ignore all the other strong fundamentals of the project and miss out on 10x profits because I can't get over a bug on the testnet!
>Thinks DNS and VPN are a bunch of buzzwords. SENT team: your project looks interesting, pay more tech savvy shills, these guys are so retarded they make obvious
The more I look at this shit the less I trust it. It forces OpenDNS, which logs all traffic and their ToS and privacy statement say that they can retain your info and sell it to third parties. It uses easyrsa to generate the keypair, which it drops to /usr/share/easyrsa, and then tells OpenVPN to read from that file. As far as I've seen so far, it doesn't have any kind of verification, so in theory, it should be possible for anyone with root (literally any user) to just drop their own keys there and MITM the traffic. It also depends on log level 3, which logs way too much info that can compromise your privacy easily. I'm not on a PC to check what /etc/'s default permissions are, but this should probably be user readable (and that's a bad thing ™). They seem to do this to determine how much bandwidth you've used, which means if they want to sell shit per GB, any user with root can most likely just continually rewrite it to get infinite free bandwidth.
Plus, OpenVPN just isn't made for hopping.
So far I haven't seen anything that would actually stop any of this shit. This needs some serious review, because I wouldn't trust this as far as I can throw it.
Thomas Garcia
Kek user do you really not understand what a testnet is? Did you submit a bug report? The devs have always fixed bugs very quickly. You may even get a bounty for it. Implementation is moving to Wireguard which will will be used for relay / hops.
Julian Murphy
based AF retarded low grade shill that can't post links to the source or even refute any of your points. This PnD is gonna wrap up soon anons, don't be a bagfag
Nolan Hughes
How many you got pal
Charles King
How is "its a testnet" an excuse for sending all of your browsing history for sale?
Carson Thompson
Where do you guys buy sent from? What exchange?
Julian Jenkins
>thinks a testnet will be perfect and bug free right away Kek user you really are retarded
Devs already said they are looking into it and will release a fix in the telegram group.
Noah Richardson
This isn't a bug. This is the fundamental "backbone" the whole thing is built on.
Also what's the "it" they are looking into?
Jordan Turner
this user gets it. Sent fags getting buttfucked inside the echo chamber.
Wyatt Ross
They have quit responding because they have no answers for closed source code, violating the GPL and leaking personal information of users to their DNS provider. Still.. >Please post a link to the VPN source code or STFU
Oliver Brown
Who the fuck are you quoting
Christian Barnes
yall smell something in here?
David Jenkins
ya.. watch. Hey Rajesh, post a link to the VPN source code or STFU.
Shut up and quit avoiding the question or admit you are shilling a closed source clone or OpenVPN that leaks user info and is in violation of the GPL. These guys are gonna get you sniffed anons by shilling you insecure VPN software for profit
I arb'd myself 20K more SENT yesterday by getting some retard on yobit to fill my exorbitant sell order. You guys are the only ones I can tell. Love you all, we're all going to make it
Connor Fisher
Go to sleep user, you seem to be extremely confused as to whom you're actually replying to.
Aaron Morgan
Good fud user. I’m sure changing DNS provider will be easy fix. OpenDNS is pretty common, but you are right there are better options. I am in the SENT telegram and messaged them your concerns. I’m sure they will address this shorty. They have fixed bugs very quickly in the past. Always good to have a second pair of eyes on development. Thanks for the audit!
Juan Smith
Ask them how they're sandboxing the LAN once a user connects to a node. They have an iptables rule binding the VPN to eth0 but I can't see any sandboxing of the connected clients.
Also they should use their own DNS and send everything to /dev/null, this is a HUGE oversight that I'm sure everyone will try to downplay.
Nolan Edwards
Nice, this is the FUD thats gonna let me grab the dip.