Bitcoin Forum
August 04, 2024, 11:43:40 AM *
News: Latest Bitcoin Core release: 27.1 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
141  Bitcoin / Development & Technical Discussion / Re: WTF is this? Someone found a trick for fast mining? on: May 06, 2015, 10:40:12 PM
If 10 people I respect tell me I am wrong, I have to accept that conclusion even if I do not understand why.
Couple of years ago when I said BFL are crooks and low life 10 people I respected (incl. mods) told me I was wrong. They were just bribed by BFL to do so.

That's a good first step, you've just admitted that you are capable, like the rest of us, of making mistakes (nobody should be respecting 10 people all of whom are easily bribed).

If we brush off all the pseudo scientific gibberish what gmaxell is basically saying we should treat all the irregularities as regular because of the big figures. Do we have to accept this knowledgeable explanation and move on

Absolutely not! However your rational are choices are limited. As with any argument based in science or logic, you can either:
  • Educate/fund yourself to the point where you can make investigations and an assessment on your own, or
  • Ask someone you trust who has the relevant education/funding for their opinion.

I have never, not once, been into space. Yet I still believe there is (practically) no air in space. This is mostly as a result of the second choice above.

When it comes to this particular thread, I have enough of a background in math to easily follow gmaxwell's reasoning, and to largely dismiss valiron's.

The larger problem is the hubris which valiron seems to be displaying. If valiron were a troll, this would be expected. If valiron is simply having trouble following gmaxwell's reasoning, s/he should take a moment to consider that maybe s/he wrong, given the number of opponents there are.
142  Other / MultiBit / Re: Brute-Forcing using the bash script given on the Multibit website on: May 06, 2015, 10:17:46 PM
So....

.key files are encrypted with AES-256 (in CBC mode), which is a block cipher. It operates on blocks of exactly 16 bytes.

In order to deal with the case where a plaintext isn't a multiple of 16 bytes long, encryption tools often append additional padding bytes to the end of the plaintext to make it a multiple of 16 before encrypting it.

A very common padding standard (at least in the Bitcoin world) is standardized in PKCS7. MultiBit and openssl both use this style of padding.

When openssl decrypts a ciphertext, its exit status is zero (as you already know) if the decryption "succeeds", and non-zero otherwise. When a (properly encrypted) ciphertext is decrypted with the wrong key, the output should appear completely random. To check if a decryption succeeded, the only thing openssl can check is whether or not the padding at the end appears valid as per PKCS7.

After reading the description of that padding standard (linked above), you may notice if a plaintext is one byte short of being a multiple of 16 bytes long, the padding that must be appended is a single byte of value 0x01. That means that any ciphertext that happens (by random chance) to decrypt into a plaintext which ends in a 0x01, openssl has no choice but to assume that the decryption succeeded.

In short, about 1 in every 256 (actually slightly higher) decryption attempts will result in positives from openssl, even though they may be false positives.

btcrecover uses additional knowledge about what's in a decrypted .key file to throw out these false positives. Actually, btcrecover only bothers decrypting the first 16-byte block (in the interest of speed), and then it looks for a properly "WIF" encoded private key. This also has a chance of false positives, but it's on the order of 1 in 300 billion... much more palatable Wink.

I'm going to be quite busy for the next two days with work but I'll get stuck into this at the weekend and whether or not I have any success, expect a little something coming your way.

Thanks! Tips always appreciated! Grin
143  Bitcoin / Development & Technical Discussion / Re: WTF is this? Someone found a trick for fast mining? on: May 06, 2015, 09:00:10 PM
  • [or] Someone has launched a Sybil attack against you [valiron]

Or...

Someone has launched a Sybil attack against gmaxell's fan club.

I don't understand.... I was trying to imply "we're all alts of of gmaxwell" as being the third option (however unlikely IMO).

As this forum doesn't run on blockchain technology, we cant be sure large corporations or nation state governments havn't affected the data that has gone into this chart.

Into my "chart"? I'd rather think that if a government wanted to pollute this thread with puppets, they'd all be in support of valiron's FUD, not against it.
144  Bitcoin / Wallet software / Re: [ANN] Bither - simple&secure Bitcoin wallet.( Bither now on Bitcoin.org ) on: May 06, 2015, 08:15:01 PM
Are the calculations vanitygen has to perform of the same kind as bitcoin mining? Could somehow a hardware miner be used to accelerate those calculations?

They are, for the most part, very different.

Miners (partially) calculate a double SHA-256 hash of some input.

Vanitygen is based around a bunch of much slower elliptic curve based math (plus also requiring an SHA-256 calculation, which takes relative little time).

Mining ASICs would unfortunately not be useful.
145  Other / MultiBit / Re: Brute-Forcing using the bash script given on the Multibit website on: May 06, 2015, 07:50:36 PM
Hi guys - I'd appreciate a bit of help here, if you have the time and don't mind helping a fellow fanatic - I'm trying to brute force my brother's multibit wallet after he has managed to forget his password. He gave me some 'stems' of words that he normally uses and I've set about trying to figure out exactly how I would try and brute force the private key encryption.

I can't directly answer your question as I'm unfamiliar with that bash script, but I can offer an alternative.

This sounds exactly like what btcrecover was designed to do. Instead of calling them "stems", it calls them "tokens".

There's a tutorial available here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#btcrecover-tutorial. As the quick start says, it's a big tutorial, but you can skip a lot of it. It sounds like the first two or three parts of The Token File section would be relevant, and so would the section on Expanding Wildcards for adding numbers onto the end.

If you have any questions, please feel free to ask (full disclosure: I'm the dev of that tool).

And of course, good luck!
146  Bitcoin / Development & Technical Discussion / Re: WTF is this? Someone found a trick for fast mining? on: May 06, 2015, 06:11:09 PM
valiron,

Nobody's perfect. Everyone is wrong sometimes, even gmaxwell, and even you. But consider for a moment this bar graph:



Either:
  • You are wrong, and everyone else is right
  • You are right, and everyone else is wrong
  • Someone has launched a Sybil attack against you

It takes an enlightened individual to conclude that they are likely in err despite that they may not realize why. If 10 people I respect tell me I am wrong, I have to accept that conclusion even if I do not understand why.

Of course, I would seek to understand why I am wrong, but it is not the onus of these other 10 people to be my teacher. (The fact that gmaxwell has voluntarily chosen to try to teach you, and has shown so much patience in the process, certainly says something about his character.)

I mean no disrespect. I only hope that you can be this type of enlightened individual.
147  Bitcoin / Bitcoin Technical Support / Re: bitcoind recieve version message from 127.0.0.1:8333 every two seconds on: May 06, 2015, 04:36:53 PM
Wumpus (a Bitcoin core dev) noticed the same thing last year: http://bitcoinstats.com/irc/bitcoin-dev/logs/2014/09/11

At the time, he identified them as connections from Blockchain.info, and suspected that it was a bug (of Blockchain.info's custom software).

It seems likely that the connections with that "/BitCoinJ:0.12SNAPSHOT/Satoshi:0.2.0/" user-agent are (still) from Blockchain.info: here's one (edit: oops, forgot the evidence link, here it is) from March with an IP of 37.187.136.15. Note that markets.blockchain.info currently resolves to that same IP.


Are you running any Java-based Bitcoin applications (including wallets like Multibit)? The fact that the IP is 127.0.0.1 (even if "our" IP) suggests that the loopback interface is being used.

That was my first thought too, however the log messages are a little misleading. That "us" IP is the IP which the remote peer claims to be connecting to, however this IP is simply added to the payload of the version message by the remote peer. Nothing restricts the remote peer from lying or being buggy (as seems to be the case here).

(FYI it's there to help bitcoin clients identify their "real" public IP in the case that they're behind NAT).
148  Bitcoin / Electrum / Re: ascii codec cant decode byte 0xca in position 22: ordinal not in range(128) on: May 06, 2015, 02:14:34 PM
What kind of trouble?

Install 2.1.1. Launched. Introduced seed password, and then pops up: ascii codec cant decode byte 0xca in position 22: ordinal not in range(128)

It has something to do with using a non-English letter somewhere, maybe a non-English letter in your username? I'm not sure yet.

What is your operating system?
149  Other / MultiBit / Re: BIG BUG with multibit on: May 06, 2015, 12:09:50 PM
democrite,

If you want to start messing with your MultiBit folder, you must be careful with what you do and don't deleted.

These three items are safe to delete:
Code:
"multibit CHECKPOINT File"
"multibit SPVCHAIN File"
the "log" File folder

These critical items you must back up:
Code:
Every WALLET File
the "multibit-data" File folder

There are some other files in there too, they contain preferences and transaction notes you've added. They're not critical to back up, but there's no reason to delete them either; just leave them alone.

If I were you, I'd
 1. close MultiBit
 2. take a copy of the two critical items above, just in case (right-click & copy, then go to another folder e.g. My Documents, right-click & paste)
 3. delete the three deletable items above
 4. re-install the latest version of MultiBit (v0.5.18) from here: https://multibit.org/
150  Bitcoin / Armory / Re: SecurePrint strength? on: May 06, 2015, 11:46:28 AM
Wow, thanks for such an in-depth answer.  Appreciate it!

I thought it was going to be a lot shorter when I started on it.... oh, well Tongue
151  Other / Off-topic / Re: Repairing a switch ? on: May 05, 2015, 05:26:14 PM
They can be purchased all over the place for well under $50 USD working.

Also, much better alternatives can be purchased for about the same....
152  Bitcoin / Armory / Re: SecurePrint strength? on: May 05, 2015, 05:23:22 PM
I wouldn't worry too much.... but here's some more detailed info. TL;DR: just read the bolded parts.

Armory's KDF & encryption for SecurePrint looks approximately like this:
(in short, it generates a random SecurePrint code, runs that through a KDF with good key stretching, and then encrypts your master private key.)

constant_pi = SHA-256(SHA-256('3.1415926...'))  # an arbitrary constant
constant_e  = SHA-256(SHA-256('2.7182818...'))  # an arbitrary constant

Step 1/3: create the SecurePrint code from the master privkey and chaincode
--------
ext_master_privkey = master_privkey + chaincode
# ext_master_privkey is now 64 bytes long and has
# 32 bytes of entropy (the chaincode contributes zero entropy)

code = PRF(key=ext_master_privkey, message=constant_e)
# where PRF is similar to HMACSHA-512; it requires 2 SHA-512 computations.

code = code[0..6]  # truncate to 7 bytes long
code = code + SHA-256(SHA-256(code))[0]  # append a single check byte
code = base58_encode(code)
# code now has 7 bytes of entropy (not 8 as the code comment says inside Armory)

Step 2/3: key stretching
--------
key = KDF(passphrase=code, salt=constant_e)
# where KDF is similar to ROMixSHA-512 using ROMix
# (a memory-hard mixing function) as defined in the scrypt paper;
# it's hardcoded here to use 224 bytes (16 MiB) of RAM
# and require 224 / 64 * 1.5 = 393216 SHA-512 computations.

Step 3/3: encryption
--------
encrypted_privkey = CBC-Mode-EncryptAES-256(encryption_key=key, salt=constant_pi[0..15], plaintext=master_privkey)

So, brute-forcing a SecurePrint code would take, on average, about:
    224 / 64 * 1.5 * 27*8 / 2 = 1.5 * 273 ≈ 1.4 * 1022 Total SHA-512 operations

What you'd probably like to do next is use these results to approximate how long / how much $ it would take to brute-force a SecurePrint code. Unfortunately, that's really hard (for me, anyways) to approximate.

You can't compare Armory's KDF to SHA-512 (Bitcoin) ASICs because Armory requires 16MiB of memory to do its work. Comparing Armory's KDF to scrypt (e.g. Litecoin) ASICs might seem better, but... Litecoin uses 128x less memory than Armory's KDF. It also uses the much faster Salsa20/8 hashing algorithm, somewhere around 15x faster per block (but it uses more of them). Finally, Armory doesn't use the full scrypt... it uses a portion of scrypt (ROMix), and a modified portion at that.

To make things even more complicated, you can tweak the numbers above via a space/time tradeoff according to this formula:

table_size   = 224 / 64  # number of hashes stored in RAM when no space/time tradeoff is used
mem_required = 224-n  where n is in 0..18 (mem_required is in bytes)
SHA-512 operations per guess = table_size + 0.5 * table_size * (1 + (2n-1) / 2)

For the sake of a comparison to the Bitcoin network, let's pretend we can build an Armory KDF ASIC that holds just 16 hashes (has 1024 bytes of memory per parallel attempt, so not much more than 0), you set n=14, and get:

SHA-512 operations per guess = table_size + 0.5 * table_size * (1 + (214-1) / 2) = 262144 + 131072 * (1 + 8,191.5) = 1074069504
SHA-512 operations to brute-force = 1074069504 * 27*8 / 2 ≈ 286 ≈ 7.7 * 1025

If we apply the entire Bitcoin network's hash capability of 3.5 * 1017 H/s to this problem (and it's all been magically converted to Armory ASICs, and we assume that SHA-256d costs roughly the same to calculate as SHA-512), we get:
7.7 * 1025 H  /  3.5 * 1017 H/s  ≈  2.2 * 108 s  ≈  23 years (on average)

Of course, maybe we can build ASICs with more RAM than this and speed things up, but presumable there'd be a point of diminishing returns; I really have absolutely no estimates on that topic, and my guesses on time/spcace tradeoffs in ASICs are probably wildly off.

All of the above is missing several important assumptions:
 1. The encrypted printout was stolen (e.g. by a snooping printer), but the SecurePrint code was not.
 2. Either:
   a. The encrypted wallet file was also stolen (we need access to the chaincode, which is always stored unencrypted, to figure out if a guess is correct), or
   b. We can do EC scalar multiplications and address lookups in the blockchain at the same order of speed as the code guess rate (3.3 * 108/s in this wild example), which is yet another very tall order; figure around 10,000 32-core servers, or additional specialized ASICs.

The reason for (2) above is that there's no way, just by looking at a decrypted private key, if the guess we tried for the code is correct unless we have something to check it against (either the chaincode or the blockchain, and the latter would require EC math which is also hard). Kudos to the Armory devs for not using any padding during private key encryption, which is different from every other wallet I've ever looked it.

I, for one, am not particularly concerned (but of course, keep your backups safe and offline! Smiley)
153  Bitcoin / Wallet software / Re: Is there a good web wallet suitable for mobile payments? (i.e. with QR scanning) on: May 05, 2015, 12:16:38 PM
This is just for cases where there is no better solution at hand. And then still, only for pocket change. Just for quick and easy mobile spending, not to store large sums of money.

I'd only consider non-custodial wallets (where you control your own private keys) and HD wallets (for easy backup).

I like GreenAddress.it. It has packaged apps (which are all just packaged HTML & JavaScript) for Android, iOS, and Chrome for desktops, as well as being accessible from any modern HTML browser. They also have a still somewhat experimental SPV wallet for Android called GreenBits, although it's missing some features available in the (non-SPV) GreenAddress.it apps/web page. It does support QR codes, even w/o one of the apps.

It may not be convenient enough for you though.... they never store your copy of your keys on their servers, so if you want to use it on a new device which doesn't have the keys already cached (and encrypted) locally, you need to type in (or scan) your full mnemonic. I see it as a security feature, but others may see it as an inconvenience.

The only other option I'd consider is Hive Web. It also has packaged apps for Android and iOS (but not for any browser), and can be accessed from any modern HTML browser. It also doesn't store your keys online (for better or worse).

Comparing the two, Hive has a simpler (IMO) interface than GreenAddress.it. On the minus side, it's not multisig and therefore can't offer 2FA nor GreenAddress's optional centralized "instant confirmations". It has no QR/camera integration, although it can display QR codes and it does support its "waggle" address sharing feature with other nearby Hive users. It also doesn't support multiple accounts based on a single mnemonic, nor does it support read-only logins as GreenAddress.it does (which is nice for public terminals, as long as your OK with the potential loss of privacy). (FYI Hive for OS X is something completely different & incompatible.)

I wouldn't touch blockchain.info (for security reasons) nor BitGo (for philosophical reasons).

Finally, although both Coinbase's and Coinkite's default wallets are custodial, they also have multisig options you may want to consider (I've never used either and so can't comment).

Just my 2¢....
154  Bitcoin / Wallet software / Re: Is there a good web wallet suitable for mobile payments? (i.e. with QR scanning) on: May 05, 2015, 12:53:19 AM
what about bitcoin's official mobile wallet, it has QR code scanning feature, search for this on google playstore and see if it suit your needs
Is there an "offical" bitcoin mobile wallet? Huh

Certainly there isn't (and I'm happy that some people realize this); there isn't even an "official" desktop wallet.

But I meant web wallet as in: not an app for any specific platform. An app typically only works on iOS, or only on Android, or only on Windows Phone, etc.

I'm sorry that I'm not directly answering your question, but web wallets have at least one big disadvantage. Even if they're non-custodial (if you control your own private keys), they're still auto-updating.

With iOS (actually I'm not entirely sure about iOS) or Android, the application author must log into their Apple/Google account in order to upload a new version of their wallet (which then gets reviewed, signed by Apple/Google, and then finally published to the store).

With web wallets, no such extra layer of security exists. If a hacker manages to break into the web-wallet's website, they can upload their own version of a web wallet which steals your password and/or your private keys.

In other words, with apps or browser plugins, a hacker has to first break into a Google/Apple server or a Google/Apple account. It's not an insurmountable goal by any means, but it is more difficult. That's why I'd avoid them if I were you.

Of course, there's always a security/convenience trade-off. It's just that whatever convenience you gain in using a web wallet (vs. a mobile or brower-plugin wallet) is pretty small IMO compared to the security you gain from using a mobile/browser-plugin wallet.
155  Other / Off-topic / Re: Repairing a switch ? on: May 04, 2015, 11:48:17 PM
The Cisco 2900 XL series is painfully outdated... they're not even GigE capable (well, there are GigE modules you can plug in, but your module is a 100BASE-FX module). If memory serves, they also don't have per-VLAN bridging tables, which can be a very confusing cause of problems in certain setups.

IOW... I don't mean to be rude Sad, but this thing is pretty much worthless. It'd probably cost you more in just power to keep something like this plugged in for a year or two than to just buy a new or lightly used cheap 24-port switch in its stead.

(also, this is quite off-topic for this subforum....)
156  Bitcoin / Electrum / Re: Unable to install Electrum 2.1.1, please help on: May 04, 2015, 07:58:52 PM
Looks like you can blame this one on Google Wink

pip versions prior to 1.4 (which you three apparently have) will inadvertently install pre-release versions of libraries uploaded to PyPI, and Google uploaded a broken pre-release of Google protobuf on May 1st (here's the bug report).

Luckily, the are two easy work-arounds. (1) upgrade pip (this option will overwrite the system-provided pip):

Code:
sudo pip install --upgrade pip

or (2) force pip to install the most recent stable version of protobuf:

Code:
sudo pip install protobuf==2.6.1

After doing one of the above, just install Electrum normally.
157  Bitcoin / Armory / Re: armory on raspberry pi on: May 04, 2015, 05:16:17 PM
As for entropy, as far as I know it's best not to use manually generated random data (sometimes the data isn't as random as we think it is), but maybe someone can talk about this in a better way than me.

You might find this thread on the topic of some interest: https://bitcointalk.org/index.php?topic=682842.0;all

Personally, I'm fine with a well-shuffled deck of cards.
158  Bitcoin / Electrum / Re: JUST HAD 0.92329 BTC STOLEN - HOW??? on: May 04, 2015, 12:26:10 PM
No! I understand Bitcoin transactions cannot be reversed! I meant to say that even though the coins cannot be pushed back maybe the seed can be recovered with the script Smiley

if he deleted the wallet file and can't remember most of it, it's lost, and not that valuable now that the theft has occurred except for research.

I agree with the latter half of your statement, but not the former. Please read this earlier post....
159  Bitcoin / Wallet software / Re: CoPay wallet in windows app store, STILL not working on Windows Phone? :( on: May 04, 2015, 12:19:21 PM
Have you tried sideloading it from the windows store here?
160  Bitcoin / Electrum / Re: JUST HAD 0.92329 BTC STOLEN - HOW??? on: May 03, 2015, 03:24:06 PM
Even if he did, that doesn't mean his seed is definitely unrecoverable as you imply.

Electrum, until recently, truncated the wallet file before writing to it for each wallet save. This could leave the (possibly encrypted) seed in multiple blocks on the drive, depending on how often Electrum saved the wallet file, even if he shredded it. (Newer versions of Electrum create a new wallet file, and then unlink the old one, again leaving the seed in potentially multiple blocks).

MZ's questions are good ones.

Sorry But I am not a technical guy and I didn't get what you said Tongue
Anyway, "Shred"="Permanently Delete"! That's what I have heard till now! If that can be recovered either I am using an outdated technology or you are using a new one Tongue

In other words, whenever Electrum saves the wallet file, it does a normal delete, and then creates a new wallet file. If OP shredded his wallet file, he only shredded that most recently saved file. Other older copies of the wallet, as deleted by Electrum, might still be on the drive somewhere.
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!