Bitcoin Forum
June 27, 2024, 07:18:42 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 [94] 95 96 97 98 99 100 101 102 103 104 105 106 107 »
1861  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 25, 2012, 03:30:55 PM
Please stop spreading FUD  Roll Eyes P2pool is open source and there is nothing suspect in the code. Do you know what variability and luck is?

I am far from suggesting there is any malicious intent in this. This does not make sense at all and contradicts everything I see in this thread.
Of course there won't be a "hey, I found a haxx0r backdoor in line 713 which steals our monies!!". And no, I don't plan to read the code, as I am not knowledgeable to do so.

But, obviously for me, there is a general and (now) constant problem nevertheless. I don't write this to hurt p2pool, the opposite is the case. There are enough outcries and "have to go back to xypool" here to justify a closer look, even without the problem being visible in the luck chart for weeks now.

Ente
1862  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 25, 2012, 03:24:52 PM
Please stop spreading FUD  Roll Eyes P2pool is open source and there is nothing suspect in the code. Do you know what variability and luck is?

All right.

This is what the "luck" graph looks like:

(as can be seen here: http://u.forre.st/p2pool/luck.png)


This is what "variability and luck" would make me expect it look instead:



But, in fact, it looks much more like this, which is not "variability and luck", but a inherent problem besides variability:


The red line is like the average block-finding rate. Do you see the angle between the black "hashes calculated" graph and the red "blocks found" graph? THAT is what I am talking about, not the stochastic ripple in the original blue line, which I crudely smoothed out with the red line.

It does not seem to be caused by block orphans, as people stated before that these are in the low % range. Neither has it anything to do with local orphans or local deads, as these don't add to the (black) "hashes calculated" neither.


I am not confident enough to calculate the "we are losing x % hashingpower" from this graphs, maybe someone else is. To me it seems clear to be a constant "loss", therefore the two graphs resemble two lines with an angle.
My wild guess would be we are effectively losing 15% hashingpower, in the sense that we have 15% less blocks, since 2 months.

Ente

edit: fixed images
1863  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 25, 2012, 07:29:56 AM
IMHO Kano is correct, and I don't see the relevance of the Central Limit Theorem to the question of whether bad luck in the past will be compensated for in the future.  The idea that tossing a fair coin and getting, say, six heads in a row will be "evened out" by disproportionally more tails in future tosses is known as the Gambler's Fallacy.  If you've had bad [or good] luck in the past, then your lifetime expectation for luck is bad [or good]; you cannot change the past -- it is the baseline for your future.  More generally, probability theory deals with unknown (often future) events, not known past events.

No, of course not "compensated" as a reaction to the bad luck streak. But "evened out" in the sense that this single bad luck streak has less and less influence as the time or number of draws rise.

I am pretty sure we all are more or less talking about the same thing, and actually agreeing. How about we say "there are bad times, there are good times, everything is fine", and leave that page-long non-p2pool-related statistics/probability stuff?

The still unanswered question remains:
Is p2pool in fact statistically "working", in the sense that 100 Th will yield the [statistically] same amount of blocks as 100 Th on a single bitcoind or centralized pool?

Ente
1864  Bitcoin / Project Development / Re: Create a game that accepts Bitcoin for currency on: April 24, 2012, 10:36:35 AM
http://www.geekwire.com/2012/bitcoin-startup-coinlab-lands-funding-tim-draper-monetize-games/

Quote
CoinLab, a Seattle startup working on projects involving the Bitcoin digital currency, has raised $500,000 in seed funding
[..]
The startup [..] is starting with a plan to use the Bitcoin system to help video-game companies make money from people who play free games, without requiring game companies to deal in Bitcoin directly.

Wow, things are starting to move! :-)

Ente
1865  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 24, 2012, 09:42:57 AM
um...
average out to 3.5 ... not 3

:-)

Ente
1866  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 24, 2012, 07:29:25 AM
Just my fucking luck...  Angry My dedicated miner runs for 10 days straight without issue, and on the day that p2pool finds a billion blocks, I come back to a rig that won't give video. Restart and everything is fine and dandy again. WTF is that?!?! It's like every 10-12 days this shit happens and on the day p2pool has good luck, my share count is 1/6 what it typically is.  Angry

..let me know a few hours before your rig goes down, next time, ok? I would like a "warning, blockfinding-spree ahead!" warning system! ;-)

It all evens out after some time.

Ente
Actually ... no it doesn't.
If you lose out in a good luck spree there is no guarantee whatsoever that you will get it back later.
There is no memory in bitcoin hashing.

There is no memory in bitcoin hashing.

Exactly!
That is exactly why it evens out after some time.
If you roll dice, and have a particulary unlucky streak with four "1" in a row, that is bad luck. And happens quite rarely too. But as you go on, after some time, you will eventually hit four "6" in a row. Then it will have evened out. Sure, you will have dozens of "three 1" and "three 6" in between, maybe even another "four 1" too. But if you roll long enough, and the dice *really* dont remember anything (i.e. not broken or manipulated), you will eventually have an average of exactly 3. It may take a few hundreds or many thousands of rolls, depending on how many decimals you want to converge to "3".

Anyway, I think we are talking about the same here ;-)

(And to me it is not entirely sure yet that the *whole* p2pool setup is working entirely as expected and calculated. There seem to be an additional, constant small-% loss in the way.. observing the "luck.png" graphs..)

Ente
1867  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 24, 2012, 05:52:18 AM
Just my fucking luck...  Angry My dedicated miner runs for 10 days straight without issue, and on the day that p2pool finds a billion blocks, I come back to a rig that won't give video. Restart and everything is fine and dandy again. WTF is that?!?! It's like every 10-12 days this shit happens and on the day p2pool has good luck, my share count is 1/6 what it typically is.  Angry

..let me know a few hours before your rig goes down, next time, ok? I would like a "warning, blockfinding-spree ahead!" warning system! ;-)

It all evens out after some time.

Ente
1868  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 23, 2012, 10:30:55 AM
Hopefully, auto-adjusting difficulty based on hashrate is something that will be coming in a future version.

That got me thinking.
Yes, this seems to be a good idea!
How to adjust the individual share difficulty?

- To have it similar to now (one share each 10 sec), each node would poll the number of nodes and the p2pool hashrate. If the individual hashrate is "high" compared to the average node's hashrate, make the local share-difficulty higher.
Quite complicated, maybe unstable, and all in all not too elegant, in my view..

- Drop the "one share every 10 sec" altogether. Make every node find one share, say, every 10 mins. Big miners will have a high local difficulty, small miners a low one. Depending on the amount of nodes, the sharechain would grow faster or slower than now. With those 10 mins per local share and approx 200 users at the moment, there would be a new share every 3 secs. This probably is too short, so we may make it "node, find a share every 30 mins!" for an approx sharechain-growth of one share every 10 secs.

This would not scale too far neither. But it would be a lot easier and with less drastic changes than the other, older proposals (sub-p2pool, multi-p2pool etc). So it might be a bridge-technology, as we say here.

Ente
1869  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 22, 2012, 06:16:05 AM

Might be worth running the calculation to see how much hashpower it would cost a large competitor (pool) to run a p2pool node and refrain from sending in blocks. It would need to do this only at a level that makes p2pools persistent "bad luck" slightly worse than paying fees at pools to be effective.

Back of envelope says 5-10% has gone missing somewhere, assuming it is not all bad luck, so say around 30 GHash/s? Would it be worth it to "them"?

"Worth"? That assumes some gain by doing that. To drive away p2pool-users? It would be easier by a magnitude to use those 30Gh/s to "normally" mine for profit, and attack a regular centralized pool with DDOS. That would drive off their users to some degree, maybe attracting some of them for his own pool.

All data is there already anyway. We see which nodes exist, which nodes contribute how many shares (to add to the p2pool net hashpower) and which nodes do or do not find bitcoin blocks (to reduce the luck). If someone wants, he should be able to dig through the stats to verify/falsify this. Even if those 30Gh/s were on dozens of individual nodes, they probably come from the same IP. Even if not, with 30Gh/s you should be able to find anything, any clue.

You see, even with this "bad luck", people are sticking to p2pool, as can be seen in the stats. Not because p2pool is necessarily paying out better than all other pools at any time, but because p2pool is superior and healthier for the whole bitcoin universe.

But yes. I believe p2pool has a problem which may have stayed unidentified yet. The "hashing power reflected by hashes" and "hashing power reflected by blocks" are two fairly straight lines, but clearly diverging. Its not two overlapping lines, its not one line being crossed by the other all the time.
Connectivity seems to be one problem for the individual miner. Not for the global p2pool efficiency though.

Ente
1870  Other / Off-topic / Re: [Announcement] Bitscalper under new management. on: April 19, 2012, 10:30:42 AM
[..] we need a tag for "incompetent" as well.

That is a good idea, actually!
..And this tag would obviously stick a lot longer to someone.

Ente
1871  Bitcoin / Pools / Re: [360GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: April 18, 2012, 01:15:24 PM
went from 91-92% efficiency running p2pool locally (over 100 shares) to > 100 % (only 31 shares so far but just one dead) running it on a virtual server in a good datacenter

Interesting! I wouldn't have expected this.. Nice find! Report back in a week, curious how this turns out!

Ente
1872  Bitcoin / Project Development / Re: Create a game that accepts Bitcoin for currency on: April 17, 2012, 08:41:33 PM
Simple steps:

Install i2p.

Create a tunnel to MUDgaard.i2p

Telnet or MUD-client through that tunnel.

-MarkM-


..I was more asking about the bigger picture.. The one at which's end a multi-million player game is, you know.. ;-)
No i2p here, yet. Maybe later though..

Ente
1873  Bitcoin / Project Development / Re: Create a game that accepts Bitcoin for currency on: April 17, 2012, 01:19:31 PM
I don't understand all genre words you use, nor do I understand all concepts you lay down. But what I do understand does really sound great! :-)
I never thought about the "initial population problem" before. I was a WoW addict many, many years ago, and consider myself cured by now. But this, for the good cause, would get me into MMORPG again! :-)

I much appreciate your work and effort.

So, in easy words: what would be the next (first?) steps? Contacting small gamedeveloper-companies? Raise money? Get more (bitcointalk-) people together? Work on basic concepts?

Ente
1874  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 08:07:38 PM
gmaxwell convinced me that it is not safe to let users chose their passphrase.
this is why the passphrase used by Electrum is generated by the software.
it has 128 bits of entropy plus key stretching.

A kid's question:

A kid (9 years old) asked me why he can't make a long passphrase just repeating one letter, and I coudn't answer properly.

Example: kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkbitcoin
(30 k's and the word bitcoin)

As long as noone knows this "password generation scheme" (because it is the standard or someone watched me typing one key three dozen times and counting to 30) it doesnt make a worse password than another 37 random small-letter password.
You can either attack with a dictionary, permutations of words from a dictionary, or every combination through bruteforce. 30*k+bitcoin will only be found with brute-force, I would say.
Oh, but there may be funny details in your *implementation*. Like the old windows passwords as well as icq passwords would truncate after 8 letters.. ;-)

And, to add another heresy: I prefer to choose a long, strong password, and barely change it at all. Some of them I use for years now. If its only used for one login/website, I see no reason to change it at all, ever.

edit: I like that kid. Please buy it icecream and give it a hug.

Ente
1875  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 02:22:07 PM
However, it might be a good idea to write down how exactly the wallet was created. So the wallet could be recreated later, or even the program could be recreated to create the same wallet with the same passphrase.

Of course, the whole point is to not have a wallet, but a passphrase in memory. No idea where to write the instructions "how to recreate the wallet" in that case ;-)

Oh, I know! If its a standard, and all clients/services use the same way to create the wallet? duh!

Ente
1876  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 10:52:29 AM
I've been working on a specification for deterministic wallets, to be included in the reference client (and Armory might adopt it as well). It is a bit more complex as it (optionally) supports multiple independent keypair chains, for different accounts and for public and non-public addresses.

It uses a 512-bit master key, but could very well be generated from a seed of only 128 or 256 bits of entropy (this is not yet specified). My preference would be having this part be generated randomly, to prevent weak user passwords resulting in entire wallets being exposed.If a nice standard can be agreed upon for converting such an amount of entropy to a human-readable (and hopefully rememberable) string, it could function as a very nice brainwallet.

The current draft can be found here.


Nice to hear you are on this as well!
Create a human-rememberable output from 256- or even 512 bit randomness? I dont believe this is doable in that way. The human-languages-keyspace would be too small or the resulting token ridiculously long. You could brute-force many random keys until you find one which has a corresponding rememberable token. But this would be no different to, for example, hash a human-rememberable token and use the hash as a pseudo-random key..

May I suggest KISS? :-)

Ente
1877  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 10:46:58 AM
I dont believe it is that bad. Display how any bits are used in the user's passphrase, maybe with an estimate of how quick it could be cracked.
yes, such "displays" exist. they are all wrong.

All wrong? So you say it is not possible to calculate the "strength" of a passsphrase in bits? Easy way: calculate the bits for a brute-force case, from length and keyspace. More clever way: Let the user enter a few additional infos, like "there are three real-world words in that phrase". I am not saying this is a must or necessarily worth the effort, but I don't agree "they are all wrong" at all.

do you trust a program just because it lets you chose a passphrase?

Of course "I can choose my passphrase" is not enough by itself for me to trust it. But in such a case I could (and might) skim through the sourcecode. If there is nothing hinting it transfers data through the internet as well as it seems reasonable it does what it states (i.e. use the installed openssl libraries to make hashes), I am reasonably sure. If then I dont find any warnings online, find some recommendations, and use it on a live-cd, I feel safe enough to trust it with some value.

If said program creates the passphrase (or a list of words), it doesn't have to transfer any data online. If there is a backdoor which makes the combination of the words non-random, it is close to impossible to find in the sourcecode as well as close to impossible to detect in the created passphrase. I would (and did) read through sourcecode. But I will definitely not make a statistical analysis of so-called random passphrases a program generates for me.

I will not trust any program/service/page/algo if I can not reproduce the output with a different method. Easy with pywallet and the like, I verify its working as intended with online sha256- and Hex/Base56 generators. If both ways lead to the same privatekey, I use the program in a secure (offline) way to create the privatekey I finally use for funds.

btw, Electrum uses two secrets: a key generation seed (generated from the 128 bits passphrase) AND an encryption password chosen by the user

Does that mean the user chooses a password and the seed is generated from this as well, or
the user chooses a password and gets an additional passphrase from the program?

Ente
1878  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 09:59:21 AM
You could've put those digits in the passphrase itself, which would increase the required iterations much more.

Good point - so perhaps the idea could just be to use something like name + bithdate + "x randomly chosen words" for the pass phrase.


exactly. And then you are at the beginning, again, where the user is responsible to create a secure passphrase, by which means he chooses. If everyone uses the same (given) scheme to generate the passphrase, it gets substantially more insecure..

Ente
1879  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 09:57:32 AM
One way to do this (but does require you to remember 2 things) would be to have a pass phrase and a "pin" number (say 6 digits) where the pin is actually the number of times to hash the pass phrase.

This adds almost no security.

You could've put those digits in the passphrase itself, which would increase the required iterations much more.

This adds security.

gmaxwell convinced me that it is not safe to let users chose their passphrase.
this is why the passphrase used by Electrum is generated by the software.
it has 128 bits of entropy plus key stretching.

I dont believe it is that bad. Display how any bits are used in the user's passphrase, maybe with an estimate of how quick it could be cracked.

I, however, would be very sceptical of a program/service where the passphrase is generated for me, and that passphrase gives immediate access to substancial value. I would either skim through the sourcecode, or drop that program right away.

Ente
1880  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 08:51:11 AM
Yes, I agree to "do 10000 hashes of the phrase", but only if the number is given by the standard. Make it changeagle in "expert mode", if you like. But its trivial for a computer to generate 100000 times the hash of a phrase, and stop when one of the hashes matches a known address. It would not add security, but be another thing the user has to remember.

Ente
Pages: « 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 [94] 95 96 97 98 99 100 101 102 103 104 105 106 107 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!