if i understand correctly, this is kind of a 'paying' random number generator : if I got the need for a rand, i call your contract
This message was deleted
fzzr- @fzzr- Hi there :)
I don't fully understand the contract. Any doc on English plz?
Quentin de Beauchesne
+1. Can someone add a doc in English ?
@tomlion Is this contract meant to be a production ready contract at some point? Or are you just hacking for fun? There are a lot of potential issues with it it - but I don’t want to waste time, if this is just a fun project to learn
@u2 Thanks for your reply. Yes, I saw this address. The question was on which testnet, because I couldn't find contracts on any known by ethscan (ropsten, kovan, rinkeby)
Hi there.. Is this project still being maintained?
love to help.. is there a Url for a live version of the site (I see a index.html, but couldn’t find any links to the working site)
Question: what prevents a malicious player from taking over all the participant slots and getting a pre-determined outcome?
How secure can you get using this hashed with something like an oracle? Theoretically it should be more secure because the attacker would both have to exploit the oracle and this system right? I wonder if there are any easy bypasses for it or maybe it is redundant to do that type of randomness.
also this is active on main net right?
how exactly are you able to call the contract to get an unknown random number? Does it have to provide the number at a later block? Cause wouldn’t all of the values be already known in the current block? Forgive me for not understanding entirely...