Bitcoin Forum
July 02, 2024, 03:08:35 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 [115] 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 195 »
2281  Bitcoin / Bitcoin Discussion / Re: The problem of stolen coins on: March 05, 2012, 07:16:04 AM
how would you react if...
          you received 100% tainted coins from the source?
          or 100% tainted coins but jumped through a few addresses?
          50% tainted?
          10% tainted?
          <1% tainted?


Me personally, I wouldn't care the slightest once my coins are tainted less than 10%.

I would pay a modest premium for high purity stolen coins of notable lineage in small quantities.  Like I'd probably be willing to pay 5 BTC for 1 BTC that was stolen in the latest incident, if it were 100% pure and had only a small number of intermediate wallets between, for example, bitcoinica's wallet and my own.  I suspect that plenty of other people would be willing to start a collection of famous coins too, if they could only just figure out how.
2282  Bitcoin / Bitcoin Discussion / Re: Linode and the law. on: March 04, 2012, 08:05:14 PM
Internet lawyering aside, a real court won't really care what bitcoin is, and will probably go very far out of their way to avoid setting any sort of precedent if they can possibly avoid it.

Instead, they'll rely on centuries and centuries of precedents from other cases involving intangible "stuff".  Regardless of what bitcoin may be, we still have a property interest in our balances.  The courts have a long, long, long history of protecting property interests in intangible stuff without much regard for what the stuff is.
2283  Bitcoin / Bitcoin Discussion / Re: Multisig methods don't need multisig bitcoin to prevent thefts on: March 04, 2012, 06:34:04 PM
Absolutely -- almost by definition, singlesig means a single point of failure.  It's a considerably harder target though -- how do you get the IP of a mobile phone?  How do you get a remote shell on it sufficient that you can grab the private key?  There is certainly mobile malware out there; but given the owner would know how serious it was they would probably not use it as their primary phone and wouldn't install any superfluous apps, and even if they did, how would the malware author target that specific phone?
Maybe I'm being a bit crazy here - you'll have to excuse me if I am - but would it be possible to create an ECC key pair where the private key is 2GB in size (that's 8589934592 bit) and the public key is only 256 bit?

That's not how it works.  Sorry.
2284  Bitcoin / Development & Technical Discussion / Re: Backups in a Multi-sig world on: March 03, 2012, 03:08:36 AM
It should be fairly easy to recreate P2SH addresses as long as the keys aren't lost.  Assuming a standard for key ordering, all else that is needed is an identifier that can be negotiated when the keys are created.  Sequence numbers or hashes should be enough to synchronize the two keysets.

Basically, if everyone is using deterministic key sequences, they can all store the seed and when they need key N, they just make key N.  But, if anyone is using random keys, then they need to store the key indexed by (the hash of or the sequence of) at least one of the other keys.
2285  Bitcoin / Development & Technical Discussion / Re: Client 0.5.2 - how many incoming connections are considered normal? on: March 01, 2012, 05:34:31 PM
My router forwards port 8333 to my PC, which runs the client in server mode. But I currently only have 9 connections from the internet, which seems low to me.
What are your numbers?
You should have a lot more than 9.
My client has 64 connections right now, for example.
Looks like something is blocking port 8333.

I have the impression, that I formely had higher numbers too ... will have to check firewall and so on.

Dia

I used to use the hub patch and regularly had over 100 connections.  I haven't bothered with that patch in a while, and now my node that accepts incoming connections rarely goes over 20 or so.  It restarts every night, so it doesn't have time for a slow build up.
2286  Bitcoin / Bitcoin Technical Support / Re: bitcoin commandline ubuntu on: February 29, 2012, 04:06:53 PM
No dash.

Code:
bitcoind getdifficulty
2287  Bitcoin / Bitcoin Discussion / Re: BIP 16 / 17 in layman's terms on: February 29, 2012, 03:13:01 PM
All the measures you outline in the second verification process mirror the existing fiat currency verification procedures and would (in my opinion) be accessible and controllable by those authorities

But it doesn't have to be that way.  The service doesn't have the ability to spend your money, and if you set things up right, they can't prevent you from spending it either.

Think of a script in a transaction that can be redeemed either with Key C, or with the pair (Key A + Key B).  This is usually called "(A and B) or C".

You generate a bunch of these offline.  Key C is protected somehow and is never in a computer connected to a network, like printed on paper and stuffed in a safe.  Key B goes to the service (or comes from the service, either way).  Key A goes in your wallet.dat.

So, if someone breaks your computer and gets Key A, they can only spend small amounts, depending on the policy you've established with the service, and only until you realize that someone else has your keys and you tell the service to not sign anything any more.

If someone breaks the service and gets Key B, or if the service isn't trustworthy, or if the service is coerced by the government, they can't spend your money because Key B isn't sufficient.  They can stop you from spending it, at least until you go to your safe and fetch Key C, but that would instantly show that they have been compromised.
2288  Bitcoin / Mining software (miners) / Re: p2pcoin - a self contained p2pool node - boots from CD, USB or network on: February 29, 2012, 02:10:30 PM
With a fleet of rigs, I feel like BAMT is a better choice.  Running a p2pool node on every one of your miners is unnecessary.

Yeah, probably unnecessary.  But it takes no more effort to do.
2289  Bitcoin / Bitcoin Discussion / Re: Is NFC a mechanism to track all transactions? on: February 29, 2012, 07:20:06 AM
In the thread about Eric Schmidt's comments regarding Bitcoin, I began digging into Google Bucks.  It turns out he mentioned it in his 2011 keynote at the Mobile World Congress (see the other thread for the video and time ranges).  During that segment he also talks about NFC.  He mentioned a secure, 80 byte code that is embedded into NFC devices.  Previously I had just thought of NFC as a communications protocol, but these comments made me think there's more to it.  If NFC devices have an 80 byte code embedded in them, then presumably this is a private key of some sort.  If these devices are only available through providers that collect identifying information about you (i.e. mobile carriers that make you pledge your first born to obtain a phone), then surely they can connect any NFC device back to an individual.  And if they can do that, they can trace your every financial transaction (and if it becomes popular enough, perhaps your every communication).  I'm not an expert on NFC, but I wonder whether the standard is such that any person can create their own NFC device with a uniquely generated private key (good), or if they've instituted measures that ensure NFC devices (and the associated private key) can only be obtained through channels that would connect your identity to this NFC key (very bad).  I'm concerned it's the latter.

This poses the question: is NFC actually a strategy to institute a system whereby all communications (especially financial communications) can be tracked (by institutions that don't have your best interests in mind).

NFC is a communication system.  Essentially very short range radio.  Actually, it is an extension of RFID, from what I can tell.  My guess is that someone's patents were expiring, so they came to the amazing revelation that two intelligent devices may want to communicate with each other, rather than always assuming that the peer was an unpowered tag.

And since it looks like something very close to 100% of all NFC communication today is along the lines of "Here is my credit card number!", it doesn't seem productive to get upset that your phone is identifying itself at the same time.
2290  Bitcoin / Bitcoin Discussion / Re: BIP 16 / 17 in layman's terms on: February 29, 2012, 07:12:22 AM
To Kjj,   I accept all of your points but as the only one who does not want to change I hope you will accept my right to say that. It does seem that you think multi sig is the way to go and that also reflects gavins point in his original post but in his case I think "everyone  agrees" means the three main developers. Has he asked every one on the bitcoin network (he could there is a way to vote). As a non techie (I know that negates my position) it has been shown that multisig is already in the os program but not used due to bugs. So future development and alternative branches are not ruled out. Also I may seem paranoid to you but I am english and here the police have just trawled millions of phone calls and e-mails stored from the last few years to arrest  Sun journalists for phone hacking. Eventually (my main point) it was yourself who outlined in step by step how a multi sig would work and it looks difficult (to me) and time consuming defeating the speed of current transactions. So please put my mind at rest and do it again for someone like me, an average user who has no mobile, access to only one personal computer and here in the uk internet cafe's are rare and the public library controls access to its database? reg.

I think that the universe of bitcoin users can be divided into two groups: those that want multisignature capabilities and know it, and those that want it, but don't know it.  I'm pretty sure that you are in the second group, even if you think you are in a third group, those that are aware of multi-sig, and really don't want it.  I really, truly believe that you do want it but don't know that you want it, but it isn't something that I'm willing to argue about.  Smiley

The example using the mobile phone is pretty common.  I have no idea who first came up with it, but I fleshed it out in detail showing one possible way that it really could work in real life.  But there are other ways to do it.  Most of the other ways to do it haven't even been invented yet, so I have no idea what they will be.

If we want, we can abstract my mobile phone example back a step or two, and come up with something less specific, but still clear (I hope).

Step 1, I tell my client to send 5 coins to address XYZ.
Step 2, my client creates that transaction, signs it with the key it has, then sends it to my wallet service.
Step 3, my wallet service looks up my policy preferences, and since the transaction is more than 2 BTC but less than 10 BTC (my policy), it invokes a verification step.  The verification step involves either me contacting the service, or the service contacting me, using some communication channel other than the one used to communicate the transaction.  This could be a text message on a cell phone, a regular phone call, a personal visit to the local branch office, a telegram, a website, email, a USENET post, snail mail, smoke signals, carrier pigeon, semaphores, chalk marks on mailboxes, etc.  This will be either a little bit slower (SMS) or a lot slower (chalk marks).  You will customize your policy preferences to balance your desires for speed and safety.
Step 4, the communication involves some means of mutual verification, such as challenge-response, code words, photo identification verification, etc.
Step 5, if I am satisfied that I am talking to my service, and they are satisfied that they are talking to me, I can approve or recant the previously sent transaction.  If approved, they countersign using their key.
Step 6, my wallet service now sends my double-signed 2-of-2 key transaction out to the bitcoin network.
Step 7, the bitcoin network checks that the two signatures on this transaction match the P2SH signature that was provided earlier, and the BTC shows up in the vendor's wallet.

This is a basic model that has already been invented, and in the abstract sense is actively used all around the world every day.  The specifics can be adapted in many ways to meet different needs while still keeping some essential features and characteristics.  Other models may also work that accomplish the same goals.

And I want to stress two important things that I think are easy to overlook in this discussion.

First, no one can force you to use multisignature systems.  Even if there was a proposal to modify the network to totally disallow single signature transactions (a change which would be approved by pretty much no one at all), it would be trivial to be your own verification service.  Your computer would run bitcoin, and also run a second program just to approve them.  This could either be automatic or manual.  If automatic, it would be exactly the same as what everyone is using now, as far as they are concerned.

And second, bip16/bip17 are totally not about whether multi-sig is good or not, or will be included or not.  They are about how multi-sig will work behind the scenes.
2291  Bitcoin / Bitcoin Discussion / Re: BIP 16 / 17 in layman's terms on: February 28, 2012, 08:56:24 PM
hi, I hope Gavin reads these posts! I am just a user but agree with Teramanga on this. There is nothing fundamentally wrong with bitcoin from my viewpoint- it's never been hacked. If wallets need better protection this should be a separate project. I refuse to use a mobile because it is a tagging device, it can and is used by authoritarian  regimes to download all contacts, information and data for further possible use by the state. Many third world countries do not have mobile penetration anyway. How the hell am I going to use separate signatures from one system? I for one will stay with the current version which works fine and hope that deepbit does as well! I do not think this has been thought through and would think the core program will be compromised and accessible and controllable by external authorities. reg.

This isn't about mobile phones.  That is just one example of one possible way to improve security.  There are countless other ways, most of which haven't even been conceived yet.  What they all have in common is that they require a way to divide signing authority so that a single point compromise isn't fatal.

P.S.  If this current single point system works for you, you can keep using it in the future.  It isn't going away.  But lots of people (approximately everyone but you) want the ability to use multisignature systems.

P.P.S.  Loosen your tinfoil cap a bit, and maybe poke some air holes in it.  And I say that as someone that keeps an old Palm Treo working because I don't want Google, Apple or Microsoft to "own" my phone.
2292  Bitcoin / Mining software (miners) / Re: p2pcoin - a self contained p2pool node - boots from CD, USB or network on: February 28, 2012, 08:14:20 PM
I would be careful here.  After months of field testing with BAMT (a usb based linux that makes every attempt not to write to the USB more than required) we see that some USB keys will die after a surprisingly short time (sometimes only a few weeks, with considerably less writes than running p2pool would generate).  It varies greatly from one model of key to another, but I would expect crappy keys to die in a matter of days running p2pool.  Maybe you don't care, but it would be best to warn users of this potential clearly.

If you are doing everything you can to avoid writes, and you are still killing drives, the problem is the drives.  I'll put a note at the top, but the answer in p2pcoin is to boot from CD or PXE if anyone is concerned about their flash drive.  Or even just not bother taking the extra time to add persistent storage.
So when you reboot you have to download the block chain again? That sounds like it could add a lot of downtime.

EDIT: Oh. you mention rsync. I missed that.  This sounds nice for someone with only one miner.

It is even nicer for someone with a fleet of miners that wants to configure once and walk away.

I have 4 rigs, each with 1 to 3 cards.  After I made the 0.1 release this morning, I copied it up to my PXE server and rebooted all of the boxes.  Bam, I'm done.  If I didn't have PXE, I could just burn 4 CDs or write 4 new flash drives and swap them.  Since all of the details are stored on the network, I don't have to customize the CD or USB stick for each rig.

Also, if you have enough RAM to use the RAM disk for bitcoin, but you also have persistent storage, stopping the bitcoin service cleanly (which happens during a normal reboot) will update the stored copy.  When it comes back up, it will only have to catch up to what happened when it was down.
2293  Bitcoin / Mining software (miners) / Re: p2pcoin - a self contained p2pool node - boots from CD, USB or network on: February 28, 2012, 07:41:18 PM
The name is confusing.  Makes me think it's another altcoin.

I took linuxcoin and added p2pool.  The first name that popped into my head was p2pcoin, and as far as I can tell, nothing else is using that name.

I'm open to suggestions, but I don't really think it is confusing.
2294  Bitcoin / Mining software (miners) / Re: p2pcoin - a self contained p2pool node - boots from CD, USB or network on: February 28, 2012, 07:26:06 PM
p2pool and bitcoind generate a lot of small writes.  Nobody is worried about this killing usb drives?

I use usb linux on each of my rigs (6) and then point them all to a non-mining machine running bitcoind & p2pool on a HDD.

If you have 4 GB of RAM, it uses ram disk.  Also, no, I'm not worried about killing the USB drive even a little bit.  It would take months or years, and you can get 16 GB sticks for under $20 now.

I would be careful here.  After months of field testing with BAMT (a usb based linux that makes every attempt not to write to the USB more than required) we see that some USB keys will die after a surprisingly short time (sometimes only a few weeks, with considerably less writes than running p2pool would generate).  It varies greatly from one model of key to another, but I would expect crappy keys to die in a matter of days running p2pool.  Maybe you don't care, but it would be best to warn users of this potential clearly.

If you are doing everything you can to avoid writes, and you are still killing drives, the problem is the drives.  I'll put a note at the top, but the answer in p2pcoin is to boot from CD or PXE if anyone is concerned about their flash drive.  Or even just not bother taking the extra time to add persistent storage.
2295  Economy / Marketplace / Re: The Armory - Weapon Marketplace on: February 28, 2012, 06:45:13 PM
The reason that we get nervous about gun registration is that those registration records come in really handy when confiscation time comes around.  And confiscation time pretty much always comes around sooner or later.
2296  Bitcoin / Project Development / Re: LinuxCoin A lightweight Debian based OS with everything ready to go. on: February 28, 2012, 06:39:17 PM
If anyone is interested, I've been working on a headless mining variant of this that uses p2pool.  It is still in early testing, but it offers some nifty features.

p2pcoin
2297  Bitcoin / Mining software (miners) / Re: p2pcoin - a self contained p2pool node - boots from CD, USB or network on: February 28, 2012, 12:20:26 PM
So, I think that about a half dozen people have downloaded this so far.  Did anyone get it working?  Does anyone have questions or comments?
2298  Bitcoin / Development & Technical Discussion / Re: [Bounty: 10 BTC] Bitcoind build instructions for Centos x86 and x64 on: February 28, 2012, 12:07:29 PM
Sure, put them anywhere you think they will be the most useful.

And the address in my signature will be fine.
2299  Bitcoin / Bitcoin Discussion / Re: Bitcoin is a magnet for hackers and crooks on: February 28, 2012, 01:28:22 AM
I've had a couple of ideas for bitcoin sites that I haven't bothered doing because I don't want the hassle.

Of course, I've had similar ideas for non-bitcoin sites too, and I usually don't bother with them either, because of the hassles that come with other payment systems.
2300  Bitcoin / Mining / Re: Bitcoin BIP 16 /P2SH/ is bad, your action is needed! on: February 26, 2012, 09:16:11 PM
I'm pushing this hard because I'm tired of hearing that users lost their bitcoins to trojans and viruses

And how many of those losses are not fault to the person who lost them?  Making a change to the network because of bad or irresponsible behavior is NOT a good idea?

So what is the current deficiency in the Bitcoin technology/network which has NOTHING to do with human behavior that requires this change?
Sam

You've never heard of safety engineering have you?

One guy crashes a plane into a mountain, pilot error.  Several people crash the same type of plane into mountains, design problem.

Lots of bitcoin users have crashed into mountains.  Each one of them made a mistake.  Gavin is trying to change the design so that the system is much more tolerant of these mistakes.
Pages: « 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 [115] 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 ... 195 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!