Bitcoin Forum
May 28, 2024, 12:58:13 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 »
141  Bitcoin / Bitcoin Discussion / Re: A clairvoyant on Bitcoin :) on: September 11, 2013, 03:00:56 PM
does she offer price analysis as a paid newsletter?
142  Bitcoin / Development & Technical Discussion / Re: BIP 0021 usability enhancement for paying tips in restaurant/bar conveniently on: September 09, 2013, 09:09:56 PM
have you evaluated how well an enhanced qr code would scan using a simple camera?

IMO, we are already pushing limits in usable qr code size, especially in weak lighting conditions
143  Economy / Exchanges / Re: [ANN] KRAKEN.COM - Exchange Now Open with Live Trading EUR, BTC, LTC on: September 09, 2013, 08:40:57 AM
i think there are compelling reasons to have a strong EUR market. bitstamp seems to be stuck on dollars, because of liquidity concerns. but this creates unwanted fees for converting between dollar/euro with their bank.

this is a gap that kraken could fill.
144  Economy / Exchanges / Re: [ANN] KRAKEN.COM - Exchange Now Open with Live Trading EUR, BTC, LTC on: September 09, 2013, 06:59:01 AM
ID verification does not seem to work. after submitting a number of times, making sure some of the technicalities are correct (btw filesize on a text-only pdf does not make much sense)
my documents never show up in the list.
also, the file picker seems bugged sometimes.

needs more UI testing i would suggest some more closed beta Smiley
145  Bitcoin / Development & Technical Discussion / Re: NSA might be behind weakening of Android Random Number Generator problem on: September 06, 2013, 10:20:28 PM
I am very suspicious about this issue.
My assumptions:

Very large bodies of software are written badly. Even an absolute majority of software. this is not a conspiracy, it's a sad fact of life.
Errors are generally only fixed if someone complains about it. (QA or customers)
Various TLA are actively looking for flaws in crypto systems.
If they find one, they exploit it secretly and do not report it, so the flaw can stay there for a long time.
a semi-weak RNG is the best angle, short of a root backdoor, to total control, especially if you already sit on a big pipe, listening, because it makes all crypto futile.
a semi-weak RNG is better than completely broken, because powerful TLA's can break it, random hacker guy can't. so it is still perceived as secure.
it is a fact that TLA's employ vast amounts of mathematicans, which suggest they are a few years advantage than the unwashed masses.
-----------
my personal conclusions:
don't trust any hardware RNG exclusively.
DO audit the full stack of RNG and crypto libs, if you see something say something, even if you think it sounds stupid.
hardware "accellerators" for crypto, AES or RNG - provide a very obvious angle for attack, use software alternatives if possible.
don't assume "it is a NIST standard, so it must be OK"
---------
"Errors are generally only fixed if someone complains about it. (QA or customers)" - this is the part where it becomes interesting to look at bitcoin. people DO complain when their money gets stolen. the world can thank us later.
146  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: September 03, 2013, 10:19:50 PM
Use the ambient light sensor please. It makes no sense to fade at noon in the Sahara.

yes i completely agree. i made a usability study in the sahara. all bitcoiners there agreed that it does not improve scanning accuracy.
147  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: September 02, 2013, 03:44:39 PM
Yes. we already presented a merchant application at Bitcoin2013. There are some infos out there how this worked, our NEFT ladies used it to sell stuff for bitcoin.

But i will not spoil all the fun you are going to have once we release it, we are working on a number of changes. It is going to be a seperate app from the Mycelium Wallet.
148  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: September 02, 2013, 02:42:30 PM
exchange rates from mtgox are fixed for now, especiall EUR quotes should be more accurate (but still Mtgox)

https://bitcointalk.org/index.php?topic=286422.0

In the future, you will see much less reliance on Mtgox and very flexible display of exchange rates, stay tuned.

We have the best Bitcoin Economist in the world working on how to handle exchange rates in Mycelium Bitcoin Wallet Smiley
149  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: September 02, 2013, 07:57:35 AM
Yes, this was observed by me as well. there is a slight bug where the old view is not discarded. A fix is underway where initialization is moved to onResume. The next beta will contain a fix for that.

a bug in mycelium 073:
150  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: August 28, 2013, 06:51:06 AM
Is rooting necessary in order to route Mycelium traffic through Orbot?
No. If you are rooted orbot can route any app through Tor. With this feature built-in also non-rooted users can enjoy orbot/mycelium together.
151  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: August 27, 2013, 09:02:01 AM
v0.7.4 pushed to the beta channel, should be online by now.

improved send dialog
support for socks proxies (for example orbot)
fading qr code for improved readability in low-light scenarios
freshly mined coins are now spendable according to standard rules (120 blocks)
manual address entry for desperate people.

please try out all the features and tell us how you like them.

as usual, to get the latest build, join this group https://plus.google.com/u/0/communities/102264813364583686576 and enable testing at https://play.google.com/apps/testing/com.mycelium.wallet

this time there is no direct download from mycelium.com, will follow for the main channel release

sha1: c547c29162d47b298ec5ef3c5c7f61ac97e63ef8
152  Bitcoin / Bitcoin Discussion / Re: [ANNOUNCE] Android key rotation on: August 23, 2013, 09:41:11 AM
instead of toying around with XOR and |  you want to feed it in a cryptographic hash function such as sha256 to accumulate the entropy. "simply" feed every new genuine randomness to a MessageDigest
 and read the randomness from it. A proper application of this approach is the Fortuna PRNG. I will dedicate some resources into providing a library for Android + java from it, so we no longer have to trust /dev/urandom exclusively.
153  Bitcoin / Wallet software / Re: BitcoinSpinner / Mycelium on: August 20, 2013, 09:02:50 PM
some cameras apparently have troubles switching between macro mode and normal mode. for qr code scanning you normally need normal mode. especially the Nexus 4. turning off this feature disables macro mode.
on the N4 we already detect this and set autofocus to false. if you provide us with the exact Build.MODEL and other constants we could put this on the "blacklist" too.
154  Bitcoin / Electrum / Re: bip32 wallet structure for electrum on: August 15, 2013, 09:11:32 PM
are you panning to have a lookahead limit that electrum tries to enforce, in order to make recovery easy?
155  Bitcoin / Bitcoin Discussion / Re: Ambient Backscatter - Wireless Bitcoin Transactions ? on: August 15, 2013, 01:23:27 PM
i doubt you can do ecdsa signing/verification with this low amount of power in a reasonable amount of time.
156  Bitcoin / Wallet software / Re: BitcoinSpinner on: August 14, 2013, 11:54:10 AM
Wallet PIN is entered a lot less frequently. My one is longer, too and I take good care that noone watches (the whole sequence) when I enter it.

Please note that the pin protects you from a kid grabbing your smartphone while on the toilet. it can not protect against a dedicated attacked with physical access to the phone, or root-level malware, any 6-digit pin would be cracked in minutes anyways. what could work is server side pin support with 2-of-3 multisig. that could in fact help against root level malware (but we are not there yet)

therefore, the pin does NOT encrypt your private keys it is just a UI measure.
157  Bitcoin / Bitcoin Discussion / Re: [ANNOUNCE] Android key rotation on: August 13, 2013, 09:37:08 PM
My understanding is that if you sent Bitcoins from any of the addresses in your blockchain.info wallet more than once, it could reveal the private key of said addresses to anyone clever enough looking at the blockchain.  If you didn't generate any addresses or send any Bitcoins from it, then you should be fine.

If you did reveal your private key that way, your money should already be gone. if it is not gone its a pretty good indication that everything is fine Smiley
158  Bitcoin / Bitcoin Discussion / Re: [ANNOUNCE] Android key rotation on: August 12, 2013, 08:38:54 PM
I'm wondering if this means they aren't updating Bitcoin Spinner?  Got my phone set up the way I want it, and this means switching yet another app out.  I don't have any bitcoins in it right now, and probably won't in the near future anyway.  Haven't sent anything from it in months, so I'm not in too big a hurry to update it.
According to Jan, an update to bitcoinspinner was pushed to google play, will appear soon.
159  Bitcoin / Wallet software / Re: BitcoinSpinner on: August 12, 2013, 07:18:32 PM
I was suggesting using https://en.bitcoin.it/wiki/BIP_0032
What back up problem will that cause?
sure, this is the solution. but it means some more work for us both client and server side.
160  Bitcoin / Bitcoin Discussion / Re: [ANNOUNCE] Android key rotation on: August 12, 2013, 07:11:32 PM
another question i have in mind is chrome, firefox, opera mobile or the native android web browser itself. suppose, i'm using one of those on my android phone or tablet, and i'm using a web-wallet like blockchain or a bitaddress generator. do these browsers also rely on this flaw in java or do they circumvent this via native C code?
i think it depends on the browser …

nobody knows. auditing this piece of code is very complex.

just think about why some TLAs were boasting about "phenomenal breakthroughs" in cryptanalysis.
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1

a few months ago most of this speculation was conspiracy theory. now some of this is conspiracy fact.
seeing this kind of code audit failure/randomness failure makes me go shopping for tinfoil hats.

on my back-of the-spreadsheet envelope calculation i have estimated the "real" keyspace of SecureRandom to be very, very low.
definitely not 2^256.
edit: i don't even dare to write the number down - if the calculation is right this is too scary.

https://docs.google.com/spreadsheet/ccc?key=0Av2s7TgXTjFTdDNNZUlrb1ZPUG9EYmZGV0drZ1dWVlE#gid=0
this calculation is based on the fact that we have seen at least 1 collision of random values on android phones.
last time i did statistics was 10 years ago, so please point out any errors.

it also points out a discrepancy. if the entropy would be that low, we would see a massive amount of duplicate addresses. which are absent. i suspect the private key space is large enough - but the entropy provided at signing is too low.
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!