Bitcoin Forum
May 27, 2024, 12:37:20 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 [6] 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 »
101  Other / Archival / Re: delete on: October 07, 2014, 01:58:13 AM
Quote
Innovation is a very tight incrementalized process that falls away exponentially under high communication load. Group-wise open source is very effective at refinement however. But before refinement, you need innovation. Can't put the cart before the horse.

The innovation happened with the original code.  what's left is adoption, improvement, & perfecting in that order.

most innovation falls by the wayside due to lack of those three things not lack of invention.

Agreed all, and emphasize the last sentence.

Note however, that the "adoption" is limited by the dynamic headroom of the initial innovation.
102  Other / Archival / Re: delete on: October 07, 2014, 01:56:21 AM
So with out further a do here is your leaders grand Monero wisdom..

If you are referring to reptilia he has no leadership role with Monero. He runs the MEW group he started and is essentially a user group, but other than that he is just a user like anyone else (though certainly a vocal and opinionated one, for better or worse).


Seriously, ROFL

rpietila IS Monero

You are confused. Monero is an open source project i.e. https://github.com/monero-project. rpietila doesn't even have access...

He's a user and self-appointed promoter.

If Mark Karpeles shows up here..

I am not sure if I agree with you that rpietila destroyed Monero.

It would be better for your own reputation if you did not misquote me, or quote out of context.

Who is confused?
103  Other / Archival / Re: delete on: October 07, 2014, 01:50:54 AM
So with out further a do here is your leaders grand Monero wisdom..

If you are referring to reptilia he has no leadership role with Monero. He runs the MEW group he started and is essentially a user group, but other than that he is just a user like anyone else (though certainly a vocal and opinionated one, for better or worse).


Seriously, ROFL

rpietila IS Monero

You are confused. Monero is an open source project i.e. https://github.com/monero-project. rpietila doesn't even have access...

He's a user and self-appointed promoter.

If Mark Karpeles shows up here..

I am not sure if I agree with you that rpietila destroyed Monero. I think maybe it would have occurred any way without him.

My statement is both true due to a technical fact, and also because group-wise innovation is an oxymoron. Innovation is a very tight incrementalized process that falls away exponentially under high communication load. Group-wise open source is very effective at refinement however. But before refinement, you need innovation. Can't put the cart before the horse.
104  Other / Archival / Re: delete on: October 07, 2014, 01:44:43 AM
...
Quote
Oh my dog, Sputnuts noise is back.  Cry

Enjoy the walls of text.



For anyone that reads his crap.

http://lifehacker.com/breakup-splits-walls-of-text-into-paragraphs-1642400700

I suggest a more efficient tool:

/dev/null
105  Other / Archival / Re: delete on: October 07, 2014, 01:33:50 AM
The distributed checkpointing allows for the ability to get all the honest nodes back to work even if there is a novel form of attack based on any type of chain forking attack, not just the TW, and further allows for self service of the solution.

I don't understand how decentralized checkpointing can work because if you don't put them on the block chain, then there is no decentralized record, and nodes don't know if they are part of the majority otherwise. If you put them on the block chain, they can be unwound by an attack.

Do you mean centrally issued checkpoints?

This novel attack was contemplated when searching for any way a TW attack could have any effect at all.
It was considered in the solution offered within the 72 hour "first threat window".

Kudos. My understanding of TW was too immature back then. I am catching up.

The checkpoints may be issued centrally or not.  Checkpoints are not put on the block chain.  The decentralized record exists in the same systems that the block chain exists, on the miner systems, but not in the block chain.  To say that makes it not a decentralized record, strikes me as strange.

If they are issued centrally, then it means the coin is not autonomously decentralized. It is antithetical to TacoTime's upthread paranoia about BBR's compression by discarding ring proofs, wherein the only known vulnerability if is the developers can't be trusted and would plant bugs in the open source.

If they are issued by each miner taking a snapshot independently, then as I wrote before, no miner knows if it is part of the majority thus the only way to find out is to attempt to publish a block and see if it stays in the longest fork. Thus independently captured checkpoints works if all clients independently reorganize (rewind) a fork and then vote using PoW. But that is not what you are talking about here. You are talking about the centralized developers issuing an instruction to rewind to a checkpoint and all miners following the instruction because they have copy of the checkpoint. Thus this is really paragraph #1 above.

Adding checkpoints is a human intervention, and always has been.

Exactly, thus they are paragraph #1 above.

And remember my point was that if the transaction activity gets too mixed into a Gordian knot on the attacker's fork, then there might be considerable human political resistance to unwinding that bad fork.

Thus although checkpoints could aid a centralized recovery, we must note they may not always work in every scenario.

Given Monero's very low tx rate, the Gordian knot is unlikely.

There may be automations added to further reduce the efforts, and I am aware of some that have been discussed by the XMR dev team, but thanks to the BCX threat, Monero remains the current leader in defenses against this sort of attack.

The unpublished thing I mentioned to smooth is where I have worked through that logic about automation and I can assure you that reorganizing from longish forks (whether an attack or naturally induced) can not be automated. The only decision you can make is to let the longest fork win and destroy instantly all the conflicting value in the shorter fork, or you can put a maximum fork length rule so that the two forks live on simultaneously and the market decides how to value them.
106  Other / Archival / Re: delete on: October 07, 2014, 01:11:20 AM
watch your ass you will get banned smart ass !

Fine with me. Probably the best thing that could happen to me.

Except in this face TheFascistMind isn't a Monero supporter at all. So I don't think that theory really holds up. Smiley

Shhh.  Lips sealed

Don't kick a sleepingromping dog.
107  Other / Archival / Re: delete on: October 07, 2014, 01:08:48 AM
And don't forget to say Checkpoint are useless and the devs can't do anything so people continue in fear.

I never said that. Never. I said checkpoints can be an illusion "in some scenarios".
108  Other / Archival / Re: delete on: October 07, 2014, 01:02:49 AM

...but we have to do better than that to graduate from FUD.

What is your guess about this vaporware below?

How the hell do I know? Correct would be especially hard to say if it is unpublished, since that would limit who might be scrutinizing it for errors or unstated (here at least) assumptions.

Cool I wanted to see how you reacted to lack of data. Because it seemed you were implying that probing is FUD. Nicholas Taleb made his fortune on the Taleb distribution, which is basically correctly valuing long tail events. You would not be well served to assume just because my probing doesn't find a vulnerability that BCX could attack, that means I never find anything earth shattering.

I am 90% certain that what I wrote exists and doesn't have an error, because it is quite simple, at least on first thoughts.
109  Other / Archival / Re: delete on: October 07, 2014, 12:40:19 AM
TFM is one of a very rare breed and highly valued for that.  Problem finders are rare enough, problem fixers are also rare.

Thanks for that. When I worked for Mark Zimmer and Tom Hedges at Fractal Design Corporation in the early to mid-1990s on what is now Corel Painter, they were enamored that on my first day of work I had built a test suite for the printer drivers and was isolating bugs in it. Afaik Painter was the first software to come in a paint can, and it was the first commercial software to realistically simulate the effects of real media, such as paper gain, ink bleed, stylus pressure (employing a Wacom pressure tablet), etc.. The core algorithms were often written in Motorola and Intel assembly code and were entirely undocumented. I remember I isolated a bug in the some undocumented, convoluted, nested algorithm which unraveled the paper grain relative to a brush model, and doing so not by understanding what the function was doing precisely but by reverse engineering the state machine (totally in my mind, no written notes) and using induction to narrow possibilities. In short, I often see possibilities that others do not. I am able to build an elaborate imagination of a design or issue in my head. Put it another way, I have a vivid imagination and it is known that my IQ is concentrated in the visual mathematics realm (I loathe details that I can't handle in my head that have to written down).

Here is my photo in 1993 in Aptos, CA at Fractal:




110  Other / Archival / Re: delete on: October 06, 2014, 03:19:53 PM
The next context was "Will it fail fast?"  Essentially, if a TW were launched, even though it is doomed to not be the longest chain, would the time it takes to make that determination by the honest nodes (and thus not doing so much hashing) allow dishonest nodes to continue building on the TW chain, or even to just build on the good chain but win more blocks by essentially denying hashes to nodes busy with making this determination?

That is a novel attack. Normally verifying each hash of a fork takes much less computational power than was consumed to generate each hash, because at normal difficulty levels it requires 1000s or more of hash computations before a block solution is found but only 1 hash computation to verify the block solution hash. But if you can lower the difficulty to the minimum then each block solution could consume only 1 hash computation and thus verifying would consume as much hash power as generating.

Thus the honest hashrate would be consumed for some duration verifying the extremely long fork of the attacker, while the attacker will be mining nearly exclusively on the honest fork during that delay, so the attacker can rewind some portion of the honest fork before the honest nodes finish verifying and rejecting the attackers diversionary long fork.

The attacker wouldn't necessarily need very much hashrate, rather a lot of time to generate a super long secret fork.

The simple mitigation is to not verify further newly presented forks for which the difficulty drops very significantly below the currently known fork. We assume we don't want to consider too long lived forks any way, so if difficulty drops that much it is very unlikely is rose back up again sufficiently to catch up.

The distributed checkpointing allows for the ability to get all the honest nodes back to work even if there is a novel form of attack based on any type of chain forking attack, not just the TW, and further allows for self service of the solution.

I don't understand how decentralized checkpointing can work because if you don't put them on the block chain, then there is no decentralized record, and nodes don't know if they are part of the majority otherwise. If you put them on the block chain, they can be unwound by an attack.

Do you mean centrally issued checkpoints?
111  Other / Archival / Re: delete on: October 06, 2014, 01:14:02 PM
I don't know if I understood the latest posts right, but:

Suppose that, in his private netwoek, the attacker has tricked the Monero protocol to lower the difficulty to 1/2 of what would be appropriate for his hashpower.  So he is capable of generating blocks with 30 sec mean gap, instead of 60 sec.

However, if the attacker finds a solution after t seconds, instead of posting it right away, he keeps mining for another t seconds. Then, among all solutions that he found, he posts the one with the smallest hash.

That way, the private blockchain still has 1 block every 60 seconds on average, so the protocol will not raise the difficulty.  However, the complemented hashes will be higher than normal on average.  So, the alternate blockchain, while just as long as the legitimate one, will probably have a greater "weight".

Would this attack (or a variation thereof) work?

Afaics, smooth is correct. There is no way to build a chain of hashes that has a greater sum of their modular additive inverses than your hashrate can generate, i.e. that metric is invariant w.r.t. to the difficulty level . Thus as long as forks are measured by that metric, the longer one will always be the one with the greater hashrate (except for small probabilities of success with less hashrate) regardless the relative difficulty rates.

It seems you were sort of thinking about the way a selfish mining attack works, c.f. Majority is not Enough: Bitcoin Mining is Vulnerable.
112  Other / Archival / Re: delete on: October 06, 2014, 01:04:01 PM
...but we have to do better than that to graduate from FUD.

What is your guess about this vaporware below? Don't worry you won't offend me, just be frank.

Does such a credible and correct unpublished white paper exist? Yes or no?

Here is a quadruple dose of FUD...

Wouldn't it be ideal if a coin's whitepaper has a mathematical proof that it isn't vulnerable to anything less than a 50% attack (other than the normal 6 confirmations type risk of double-spend)?

And wouldn't it be porn, if that proof showed that every other proof-of-work coin (including Bitcoin) is so vulnerable?

And wouldn't it triple sexy if that proof showed that all (untraceable block chain) anonymous coins can't be fixed to remove that vulnerability?

Excuse my drooling, I can't contain myself.

Edit: I have not withheld any quantification of TW attack on CN afaik. I shared all of my (limited) knowledge on that. I am referring to something different above.
113  Other / Archival / Re: delete on: October 06, 2014, 01:01:29 PM
Yeh.... Until 22 days passes with nothing happening and BCX and TFM decide to change the goalposts yet again: "Oh, sorry everyone - just made a new calculation and it transpires the attack won't materialise for another 6 months..."

I wouldn't ascribe to such nonsense. I am trying to figure out what form a possible attack could potentially be, so I would know what symptoms to look for if any, and so maybe I could dismiss the entire thing early or increase my expectations.

Also to make sure I have designed around any such possible attack in my own coinz.
114  Other / Archival / Re: delete on: October 06, 2014, 12:38:10 PM
Clearly you see now the potential problem in Cryptonote with the 20% discard rule. It enables the secret chain to hide a bunch of blocks without causing a rise in difficulty.

No, it isn't clear. You can't really hide any blocks just by making them outliers because the outliers starting at the most recent end of the adjustment window (for example if you timestamped into the future) still have to slide through the middle before exiting the window on the other end. So you can only defer them from contributing to the adjustment for a little while, but eventually they do get counted (similar in effect to a window-based adjustment like Bitcoin).  The outliers at the farthest-in-the-past end might be able to slide off without ever being counted, but even if you could figure out how to drop blocks there right away, that would only increase difficulty, not decrease it. There still might be a flaw, but we have to do better than that to graduate from FUD.

Not printing the timestamps far into the future, rather the statistics of the variations in gaps between the timestamps. You could bunch some them closer at a faster rate in time so they are deemed statistical outliers (I presume, haven't seen the math presented in any white paper), so they don't get counted in the computation of the difficulty.

But even this won't matter if the total difficulty of the forks is compared as the sum of modular additive inverses of the block hashes, then there is no way the secret fork can be longer (other than diluting the honest fork's hashrate with DDoS or orphans via selfish mining or block propagation interference).

Thus I rescind my opinion that BCX  is attacking with such a secret fork. He could possibly attack with some other vulnerability (such as my idea about messing with the ROI of miners thus driving network hashrate down), but not this one.

Edit: the ideas about messing with the ROI of the miners remain. If you can push the hashrate up higher than it should be then prevent or delay the readjustment and also selfish mine, you can amplify the ROI pain on the honest miners over selfish mining alone.
115  Other / Archival / Re: delete on: October 06, 2014, 12:29:18 PM
Thus the secret chain can end up the longest chain without needing 50% of the hashrate.

This can never happen because the chain length is sum of difficulty not block count, although with some probability you might have a slightly lower hash rate and still get lucky and win more than half of the (weighted) blocks, as usual.

I agree if the comparison of two forks is the sum of the modular additive inverses of the block hashes.

In my prior post, I was trying to figure out how it was possible that the secret chain could be "longer" when it has less hashrate. Originally I didn't think it was possible, which is why I ignored the ideas from that thread and had presented other ideas further upthread. Then I reread that thread again.

Perhaps Auroracoin had a bug in that it only compared # of blocks? Or as you say Nite69 seemed to not know what he was talking about. That is what I originally wrote in my prior post, then just before I posted it I changed it because I guess I got confused in my haste as I was trying to figure what the heck those guys (Nite69 et all) were describing.
116  Other / Archival / Re: delete on: October 06, 2014, 11:07:00 AM
I said 22 days for it to come through, this is day 11.

ETA is Oct. 12, 5 days from now.
117  Other / Archival / Re: delete on: October 06, 2014, 10:30:25 AM
As far as I know the only time wrap exploit that has ever been clearly identified and described is the original off-by-one bug identified by ArtForz in BTC and its clones.

Evan claims a KGW exploit was deployed against DRK.

The descriptions of the theory of such an exploit explain the difficulty can be reduced quickly by setting the timestamp of the latest block far into the future for the secret chain so the secret chain is mined with much lower difficulty, and then the secret chain can be brought back to the present time before publishing it, because timestamps that walk backwards in time aren't fully counted.

To compute the relative PoW of a chain, sum the modular additive inverse of each hash (e.g. hash subtracted from 2256). The secret chain can't end up with more blocks thus has a lower sum and isn't chosen as the longest chain. Or what appears to be more correct (what that thread is alleging) is if the longest chain is chosen by the greater number of blocks, the secret chain can mine more blocks since it is at a lower difficulty. The key is being able to mine faster at a lower difficulty by being able to move forward and then backward in time asymmetrically.

KGW offers other vulnerabilities because the secret chain can drop the difficulty, then mine faster without causing a rise of difficulty for up a day or so, by staying under the exponential well trigger threshold.

Clearly you see now the potential problem in Cryptonote with the 20% discard rule. It enables the secret chain to hide a bunch of fast blocks (bunching them together in time) without causing a rise in difficulty. Thus the secret chain can end up the longest chain without needing 50% of the hashrate.

I now change my opinion to very likely that BCX is building a secret chain nowRescinded. How many more days to the 22 day countdown?
118  Other / Archival / Re: delete on: October 06, 2014, 07:14:29 AM
If I have time I will write up what I think I found in KGW more carefully and see if it really holds up. Perhaps some of the coins using it will find that interesting.

Count me as interested.

Edit: it might be the asymmetry of the threshold between increase and decrease (i.e. 100+20 is +20%, but 120-20 is -16.7%). Others had mentioned that already and it is obvious on the chart.
119  Other / Archival / Re: delete on: October 06, 2014, 07:12:09 AM
The selfish mining paper shows that above 25%, the attackers % of the hashrate is amplified.

That is assuming you have employed the γ = 0.5 fix suggested in the paper which afaik Bitcoin never did so I assume CN copied the Bitcoin flaw? Otherwise the amplification starts from 0%. See the chart on page 11 of the paper.

So the attacker can selfish mine at the same time, to further amplify his hashrate.

BCX mentioned 20%, so it appears if γ = 0, his would be amplified to 25% and that is not including the KGW exploit.

Any way, it appears you only need enough to get the ball rolling downhill, because your hashrate grows over time as other miners drop off due to the drag on their profitability.

I still agree you need to quantify how much the potential KGW exploit accelerates over the selfish mining by itself. It is already known that all PoW coins in existence can theoretically be destroyed with selfish mining and 25% of the hashrate, but it might take a heck of a long time (perhaps exhausting the attacker's hardware rental capital or the profit he earn from such an attack) depending on if γ = 0 or the hashrate is higher such as 33%.
120  Other / Archival / Re: delete on: October 06, 2014, 06:48:46 AM
This needs to be quantified to be real. If the hash rate you are using to drive and then pulling is large enough

On KGW, that should take you about 15 minutes if you are really interested. There is your 20% hashrate triggering at less than a day...

http://bitcoin.stackexchange.com/a/22265/3441

Pages: « 1 2 3 4 5 [6] 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!