Bitcoin Forum
June 21, 2024, 01:58:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 [116] 117 118 119 120 121 122 123 124 125 126 127 128 »
2301  Bitcoin / Development & Technical Discussion / Re: bech32(1) for encoding/decoding of Bech32 strings & “Bravo Charlie” Addresses on: December 31, 2017, 01:07:25 AM
Quote
MODE_ONION_ENCODE

Thanks for that.  Cool btw I notice that others well-known web sites (such as uj3wazyk5u4hnvtk.onion ) already get updated  Tongue

Well, thanks for looking at my source code!  At least at the top of the main .c file.  And yes, all strings with a suffix of “.onion” are automagically detected.  The bech32(1) tool does not know about any specific .onion sites, although I had to pick one for a manpage example.

If you like this particular feature, then you will be pleased to see the proposal I just made on tor-dev:

https://lists.torproject.org/pipermail/tor-dev/2017-December/012743.html
2302  Other / Bitcoin Wiki / Upgrade Interwiki links http → https on: December 30, 2017, 05:04:13 PM
Bottom line up-front:  I ask a change which will likely require SQL database access.  Admin attention requested, please!

I have started a binge of wikignome minor edits to upgrade http links to https, where appropriate.  On the Main_Page, via Template:MainPage_FAQ, there is a link to http://en.wikipedia.org/wiki/Public-key_cryptography (plain http).  In place of that link, the source of Template:MainPage_FAQ says this:

Code:
[[wikipedia:Public-key cryptography|public-key cryptography]]

A check of the Mediawiki Manual:Interwiki indicates that changing the target requires either editing the SQL of the wiki’s database, or appropriately using an Interwiki extension if one is installed.  Obviously, this tiny fix is far above my access level.

It is good that once the Interwiki link is fixed, it will automagically fix all links using that format.  After Interwiki links are made https, I will then go around changing hardcoded Wikipedia links to the Interwiki format.

Thanks!


Edit:  Other Interwikis also need to be fixed; e.g. in the Main_Page itself, this also outputs a plain http link:

Code:
[[mw:Help:Formatting|Help]]

Somebody with appropriate access should upgrade them all to https, please.
2303  Other / Bitcoin Wiki / Re: Request edit privileges here on: December 30, 2017, 03:51:47 PM
@MeshCollider, @Taras:  Based on the quality of requests being made here, I suggest editing Taras’ original post from 2015-04-15T23:29:34Z to add the following note:

We get so many requests here but almost none of the accounts promoted to editor from this thread actually ever edit anything. So perhaps, to avoid the odd occurrence of spambots being promoted to editor, it should be a requirement to also post why you want to be editor or a specific example of something you would do with edit privileges

With that being on page 45, I myself only saw it by happenstance.  Of course, I also consider that to be no more than common sense.  Who would make a post with just a username?  What’s the point?

Edit:  Based on the profusion of one-post newbies who apparently created a Bitcoin Forum account solely to request Wiki edit privileges, I also suggest indicating that requests will be more likely granted for those with at least a modicum of reputational history.  Not necessarily a forum posting history:  Reference to a well-established blog, open-source contributions, mailing list posts, Reddit user profile, Wikipedia edit history, etc. would serve the same purpose.  If spammers can create a new wiki account, they can create a new forum account, too.

~~~~ Nullius (Talk | contribs)
2304  Bitcoin / Development & Technical Discussion / Re: CBlockHeader::nTime, is that a problem? on: December 30, 2017, 04:39:02 AM
yes, sure, it's not important. I find out this problem when i read every blockhead into memory and sort by nTime.
I suppose it's a fast way to retrieve the chain. Yesterday, i find wrong time, just in few minutes.
But today, I find out the block# 301596, the nTime is wrong more than 3 hours.

I think we should resolve this later,  how about some miner give a nTime = 2030year  tomorrow.
ofcouse , It's doesn't matter, but just look a little bit ugly.
They can't. The timestamp of a block is not offset more than 2 hours from the network adjusted time which is the median of the time that is retrieved from the nodes. You definitely cannot enforce blocks to be within a small timeframe for a few reasons I can think of:
1. Miners include the timestamp in the block header and sometimes, they increase the nonce as a variable before they hit the target.
2. Propagation takes some time.

Add to this:  3. Secure, reliable agreement on a reasonably high-precision network time runs into the very same “General” (hah) problem which mining is intended to solve.  Indeed, off-the-cuff, I can think of some constructions which may perhaps maybe could be used to replace mining—if we had secure, reliable high-precision network time agreement.  (And if I had wings, and if all cows were identical and spherical...)

No one should be using the timestamp to sort out the block, only the block height.

No one should; but you know, somebody will (and just did).  I think there’s a rule somewhere that if you provide a variable value, somebody will (ab)use it for purposes neither foreseen nor supported by the design.  I will now wait for someone to use the nonce in some way which requires meaning it does not have.
2305  Bitcoin / Development & Technical Discussion / Re: “Lightning Network vs. Genital Herpes” on: December 30, 2017, 03:59:51 AM
Why the hell does the Bitcoin Development & Technical Forum look like this?


“Lightning Network VS SegWit2Mb(S2X)”
“Lightning Network vs Bitcoin cash”

I have a better idea for a thread!  “Lightning Network vs. Genital Herpes”.

Or maybe, “Lightning Network vs. Involuntary Coprophagy”.

Or worst of all, “Lightning Network vs. JPMorgan” (ewww!).

Really, what is this obsession with comparing an excellent new Bitcoin technology with disgusting, useless things which have nothing to do with Bitcoin?  It does not even make sense.
2306  Bitcoin / Development & Technical Discussion / Re: My technique to split seed for cold storage on: December 30, 2017, 03:40:31 AM
I was looking for a technique to store a wallet seed. Because if somebody find your seed that person can steal the bitcoins. I found a way to split the seed in two parts for cold storage.

- the technique can be use for any seed. Any number of words in the seed or dictionary. On a software or hardware wallet.
- encryption and decryption is simple and can be done with pen and paper if you want. I also made a python scrypt to encrypt (split) and decrypt (reassamble).
- Both parts contains only words and looks like an ordinary seed. No need to write a series of random characters that is error prone.
- The technique is based on the One time pad encryption.

I will show you how it's done manually. First you need a seed:
park color slice trade remove depend meadow bus clock curious where where

You create a second seed that will be use for encryption. I call that seed : "encryption seed A". It's one of the two part of the splitted seed. On electrum I use the make_seed command to generate it:
goddess clump renew require timber pitch loan bless sock hint ecology finish

To generate the second part that I call "encryption seed B". You need the dictionary file used by your wallet. Most of the time wallets are using https://raw.githubusercontent.com/bitcoin/bips/master/bip-0039/english.txt. For each words in your seed and in your "encryption seed A". You need the word number in the dictionary. The first word is number 1 and the last one is 2048.

[...]

Why are you performing modular arithmetic on wordlists, when computers think in bits?  N.b. that you will break the checksum this way.  BIP 39 stuffs 4–8 checksum bits into the last word; how many, depends on the length of the seed.  I presume you will want means to check that your seed_b is recorded correctly, without access to your seed_a or your original seed (which I will call seed_0).

Also, Electrum does not generate BIP 39 seeds.  You are mixing two different standards.  Off the top of my head, I don’t know whether Electrum uses the same English-language wordlist by default.  But I do know that Electrum’s competing Seed Version System was designed to be fully wordlist-independent, which makes wordlist-arithmetic an even worse idea.

I suggest you XOR two seed-sized values drawn off /dev/urandom, then encode the results into BIP 39 seeds.  You can do all of this except the XOR using dd(1) and easyseed(1), a secure BIP 39 seed generator which I so happen to have published yesterday (forum thread).  easyseed(1) can take a file as input, or read from stdin.  Producing the bitwise XOR of two equally-sized files is a trivial “hello, world” jobs in C, and probably in Python, too.  Also, this could be done in memory without touching disk with a tiny bit of modification to easyseed(1); or, just use a memory disk and be sure to wipe it when you’re done.

Well, that is if you want to do the scheme you said.  As HCP pointed out, SSS is really the right tool for the job here.  Your splitting scheme is secure, on condition that you never XOR the same values with anything else (see “pad reuse”).  But it severely reduces availability.  Using SSS and transforming its output to words through a secure mnemonic scheme would be much safer.  I have been mental-whiteboarding a tool based on SSS, mnemonic phrases, and some other tricks for exactly these kinds of scenarios, though it may be awhile before I actually write it.


I've too recently came up with an idea for seeds and I hope some experienced cryptographers here will tell me if it's good or not.

First, we generate seed A which is our secret seed and used to create main wallet.

Then we generate seed B, which will act as a decoy.

Then we calculate a key such as (key + seed B) mod 2048 = seed A

Seed B is used to store small portion of BTC savings, so in case someone will get access to your private storage (thieves, kidnappers or police), they will get only a small portion of your coins, while you will be able to later restore your main wallet with a backup copy of seed B and the key.

My question is, is this scheme viable, or are there better ways to do it, like having independent decoy while hiding the main wallet through other means?


I am not a cryptographer, experienced or otherwise.  But that sounds fine to me—with the killer caveat that your “key” will need to have as many bits as an independent seed, so why bother?

A better scheme may be to use a secret master seed, seed_0, run it through a KDF (as will be done anyway when your BIP39 seed is turned into a BIP32 HD wallet), and use the KDF to generate two independent seeds:  seed_1 for your real treasure cave, and seed_2 the “decoy”.  BIP39 simply takes a bag of bits as input; so you can still use easyseed(1) to turn your seed_2 “decoy” into a string of words, write it on a yellow sticky note, and “hide” it somewhere that bad guys will be allowed to find it after they begin to torture you (so it’ll be convincing) but before they torture you too much (what is your personal tolerance for being hit with a $5 wrench?).  Meanwhile, keep the words for seed_0 secret—not only that, but keep its existence secret!; and it can be used to recover both other “seeds”.


Instead of your technique OP you could just split the seed into two halfs:

seed: park color slice trade remove depend meadow bus clock curious where where
seed part 1: park color slice trade remove depend
seed part 2: meadow bus clock curious where where

part 1 and part 2 have the exact same security profile as your seed A and seed B, only that splitting and re-combining is faster.

WRONG WRONG WRONG WRONG WRONG.  As another person already told you:

Terrible advice! Do not do this! It will vastly decrease the security of your wallet!

They do not have the same security profile. Your method reveals half the information of your seed, the OP's method does not.
2307  Other / Off-topic / Re: The Nullian Bitcult on: December 29, 2017, 11:59:13 PM
I. The Basic Laws of Bitcoin

The god of Bitcoin has no mercy.

21000000 is a number sacred unto the god of Bitcoin, and beloved in his eyes.  Never shall there be more than twenty-one million bitcoins.

The god of Bitcoin grants unto you full power over yourself:  No king, no priest, no judge, no senate, and no army can command or countermand your decree over your own bitcoins, as signed with the sacred mark of your private keys.

The god of Bitcoin demands that you take full responsibility for yourself:  For it is a law of Nature and Bitcoin that power and responsibility are as two sides of the same coin.

The god of Bitcoin commands, you shall keep safe your private keys.  An ye lose your private keys, the god of Bitcoin shall curse ye.  An ye let your private keys be stolen, the god of Bitcoin shall bless the thief and curse ye.

The god of Bitcoin demands obedience to the divine Law of Consensus.  The damned who hardfork without consensus are renegades, abjurers of holiness, rapine oath-breakers, frauds, sowers of discord, and traitors, who shall be consigned damnatio memoriae with their chains to eternal poverty within the depths of Tartarus, where all hashes are broken and all bits are made nothing.

For their service in the unending sacred task of Byzantine fault-tolerant transaction ordering, miners are blessed with riches, yet cursed to eternal struggle against each other.  The god of Bitcoin hungers for hashes, and shall devour lightning and worlds to secure the transactional ordering of the blockchain.

For his judges and executioners, the god of Bitcoin appoints full nodes.  Full nodes execute the will of the god of Bitcoin upon the network.  His legions thus shall cast into the alt darkness all who dare violate the communion of Holy Consensus.

We of the Bitcult Faith gather in the sacrament of the Consensus, in worship of the Bitcoin, in homage to the memory of the prophet who was our forerunner, Satoshi Nakamoto.
2308  Other / Off-topic / The Nullian Bitcult on: December 29, 2017, 11:58:26 PM
The Nullian Bitcult.  (Send tithes and sacrificial offerings.)


NULL. Inception

I was pleased, when I saw this:

Nullius' sole objective is to facilitate the mass adoption of bitcoin.
And anyone that somehow put an obstacle to his service (by saying negative things about bitcoin) is being targeted as a threat.

Pleased, yes; yet I was also confused, for this high praise came from someone who 44 minutes earlier in the same thread had said, “nullius has the intention to commit sin and fraud”.  I had taken that seemingly grave accusation with a grain of salt, for reason that that its source lacked credibility:  Dorkie had previously accused theymos of being part of an “inside job” hacking forum accounts—replete with a Bible quote, to warn theymos about Judgment Day.

So why now should I have bestowed on me such an ode of hagiography as I wished to frame and hang on my wall?

Nullius' sole objective is to facilitate the mass adoption of bitcoin.

Scrolling back through the same thread, I suddenly felt as if a vision and a calling were decrypted before my eyes:

A lot of entities here favor worshiping the new money god that is bitcoin.
And these entities would like everyone else to follow suit and worship the same.
Such conduct is sin and corruption.

Lo!  Unwittingly as if possessed, I had acted in loyal service of the new money god that is Bitcoin!  ’Twas for that, the Divine Bitcoin lavished me with this compliment as a reward:

Nullius' sole objective is to facilitate the mass adoption of bitcoin.

A reward—and a guiding light, showing me to my true calling.  I now see it all so clearly, yea:

I am called to devote myself to the sacraments of Bitcoin Divine.  Bitcoin of holy name, whose prophet was Satoshi, whose coming answered the prayers of the cypherpunks.  Bitcoin, who keeps the world ledger of all souls’ wealth, has commanded me that my “sole objective is to facilitate the mass adoption of Bitcoin.”

Bitcoin has called, and with joy do I answer.



Thread Rules: Read Before Posting

  • This is a self-moderated thread.
  • As the exalted Leader of this cult, I shall pass judgment on posts:
    • I will delete any post which offends the god of Bitcoin.
    • I will delete any post which offends me personally.
    • I will offend any post which I deem stupid, illiterate, lacking in sufficient substance to justify its forum existence, and/or lacking in sufficient substance to justify its author’s mortal existence.
  • The sole exception to said rules:  At my discretion, a post which fails to meet Cult standards may be spared by me—solely for the purpose that I may shower it with derision, and humiliate its author.
  • The standards of the Bitcult shall be unapologetically elitist—aristocratic, in the original sense of the term.  Just as is Bitcoin.

I shall take liberties in editing my own posts, including this one, for the exclusive purpose of polishing and perfecting the scripture of the Cult.  I also may lock and unlock this topic as I please.  Most importantly, as a cult leader, I have the prerogative of taking advantage of my adoring followers financially (and the attractive female followers in other ways).

All hail the god of Bitcoin.
2309  Bitcoin / Development & Technical Discussion / Re: Licensing with a Bitcoin Consensus Clause on: December 29, 2017, 11:53:50 PM
But I find revolting the idea that my code could be abused by or for a scamcoin which pretends to be Bitcoin.  Now, as long as there exists an idiotic copyright/licensing régime, it is illegal for my code to abused in such a way.  I don’t mind being pragmatic about that.

Have you considered at all the possibility that the current "Bitcoin Core" contributors might in the future lose control over that moniker?  That a different set of developers could rise up and create an alternate set of consensus rules under the name "Bitcoin Core" while the rest of the world all sticks to a set of consensus rules that are not part of future "Bitcoin Core" scamcoin pretending to be Bitcoin?

Under those circumstances, have you just created a situation where your code can ONLY be used by a scamcoin attempting to usurp the Bitcoin name and lead everyone astray?

You’re right.  It is a problem.  (I will make a little edit to my original post.)

I will keep that clause in my own code; as copyright holder, I could re-license it in response to such adverse events as you describe.  But for large-scale collaborative projects such as Core itself, such a solution is obviously impracticable.

Projects with centrally controlled development typically have a trademark, restricted on terms similar to what I describe.  For but one of many examples, Firefox.  You can hardfork it all you want, but not use the Firefox name and logo.  Whence my little idea.

In a situation where persons with horrid ulterior motives attempt hostile takeover of a project from a myriad of angles—repeatedly, for years—it seems self-defeating to avail to such persons the technological improvements of which they have demonstrated themselves incapable.  It is a political problem—by the etymological definition of that word, a people problem; and people problems cannot be solved solely by technical solutions.  I look to use every tool at my disposal, on strictly pragmatic grounds.  Perhaps may there be another way, on similar lines?
2310  Bitcoin / Development & Technical Discussion / easyseed(1) secure, multilanguage tool for BIP 39 mnemonic & seed, BIP 32 xprv on: December 29, 2017, 11:06:31 PM
I have released an initial version of the easyseed(1) utility for secure generation of BIP 39 mnemonic phrases, BIP 39 seeds, and BIP 32 master extended private keys (“xprv”).  As any worthwhile software, it comes replete with a manpage, q.v.  It generates mnemonic phrases in these languages and writing systems:

  • Chinese (Simplified) (汉语)
  • Chinese (Traditional) (漢語)
  • English [default]
  • French (Français)
  • Italian (Italiano)
  • Japanese (日本語)
  • Korean (한국어)
  • Spanish (Español)

My original motivation for writing this was that I needed a lightweight, reliable BIP 39 mnemonic phrase generator with easily auditable sources and minimal dependencies for use on a stripped-down airgap machine.  The source code is concise, easy to read, and lovingly commented; it can be readily understood by anybody with a basic knowledge of the C programming language.  Its only external dependencies are cc(1), make(1), and libcrypto.

Now that it’s written, easyseed(1) is also the first necessary component for my campaign to urge that users stop using saved webpages to generate their Bitcoin magic bits.  What kind of an airgap machine has a web browser installed, anyway?  But most importantly, as a rule of thumb, Javascript code cannot reliably acquire proper entropy for generating random numbers.  This is a persistent general problem, and specifically subject to extended fretting by the author[1] of the most popular BIP39 webpage.

easyseed(1) reads bits straight off /dev/urandom, or from user-provided keymat.  Gathering and processing of entropy is properly the kernel’s job.  My userland utility will let the kernel do its job.  Since it’s written in C, easyseed(1) can reliably obtain kernel-provided randomness on every Unix/Linux platform in about two lines of code (open(2), read(2), plus error checks)—rather than cooking up some tortuous “random” scheme which may or may not perhaps probably work sort-of.

This is a beta-quality initial release.  It is not yet feature-complete:  In particular, I have code partly written to add support for all languages which have wordlists in the Bitcoin BIP repository (currently Chinese (Simplified and Traditional), French, Italian, Japanese, Korean, and Spanish, in addition to the current English). — Done!  This is now approaching release candidate status, almost ready for Version 1.

Licensing includes a Bitcoin Consensus Clause, to prevent use by scamcoin pretenders.

I am here opening a Bitcoin Forum thread for discussion of this utility; over time, I will edit and update this post as appropriate.


1. Though that is not nearly in the same league as boneheaded absurdity from ignorant developers who confuse multiple distinct meanings of the word “entropy”.  pointbiz: “Perhaps more entropy can be gathered using techniques used on Panopticlick”.  #facepalm  cantonbecker: “I like this idea”.  pointbiz: “I used all the easy techniques from Panopticlick to gather entropy. [...] I added up the low and high entropy bits and my personal results are 34.3 to 42.8 bits of entropy.”  Oh dear heavens, are you using this to generate keymat for Bitcoin!?  Some people should be enjoined with a permanent restraining order forbidding that they ever approach within one hundred metres of crypto-related code.
2311  Bitcoin / Development & Technical Discussion / bech32(1) for encoding/decoding of Bech32 strings & “Bravo Charlie” Addresses on: December 29, 2017, 09:54:59 PM
I have released an initial version of the bech32(1) utility for encoding and decoding of BIP 173 Bech32 strings and Bitcoin “Bravo Charlie Addresses” (“bc1”).  As any worthwhile software, it comes replete with a manpage (text), q.v.

As part of its initial feature set, bech32(1) has special handling for RFC 7686 .onion special-use domain names; it detects such a name, and transcodes the RFC 4648 Base32 to and from Bech32 with an HRP of “onion”.  For Bitcoin “Bravo Charlie” addresses, bech32(1) takes and gives the witness version and the hexadecimal-coded octets of the witness program.  Otherwise, for the most part, it encodes and decodes hexadecimal data with user-provided HRPs.  I intend to add special interpretation of “pgp1” with a concept I call “PGP Descriptors”; but I need to spec that out first.

Some usage examples from the manpage:

Code:
Extract the witness version and Hash160 from the bech32 utility author's
Bech32 tip address:

      bech32 -S bc1qcash96s5jqppzsp8hy8swkggf7f6agex98an7h
      0:0xc76172ea149002114027b90f0759084f93aea326

Get a “hello, world” introduction to Bech32:

      bech32 -e -h hello_world 48656c6c6f2c20776f726c6421
      hello_world1fpjkcmr09ss8wmmjd3jzzwhs4ff

Generate a “burn address” with a Hash160 of all zeroes, which would be
spendable by the same unknown private keys as the infamous
1111111111111111111114oLvT2.  Warning:  Do NOT send coins here:

      bech32 -s 0 0x0000000000000000000000000000000000000000
      bc1qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq9e75rs

Bech32-encode the address for Wikileaks, to add error-correcting codes:

      bech32 -e wlupld3ptjvsgwqw.onion
      onion1kt50trm0nf4jxkskpcjy74

Now, decode the address someone gave you:

      bech32 -d onion1kt50trm0nf4jxkskpcjy74
      wlupld3ptjvsgwqw.onion

Licensing includes a Bitcoin Consensus Clause, to prevent use by scamcoin pretenders.

This is an alpha-quality initial release.  The code is still a bit messy; it needs test vectors, which seem insufficiently specified; features and the finer details of behaviour may be a bit in flux.  However, the basic user interface should be considered stable.  I am here opening a Bitcoin Forum thread for discussion of this utility; over time, I will edit and update this post as appropriate.
2312  Bitcoin / Development & Technical Discussion / Licensing with a Bitcoin Consensus Clause on: December 29, 2017, 09:32:10 PM
Today, I released the bech32(1) and easyseed(1) utilities; and I have been preparing to release more little Bitcoin gadgets.

When it came to the question of licensing, my gut instinct was to instead disclaim copyright and release the code to the public domain.  (The public domain is not a license, “CC0” confusion to the contrary notwithstanding.)  However, several real-world problems stopped me from so doing.  One is the persistent ills caused by imposters who fork Bitcoin code whilst stealing the trust engendered by the Bitcoin name.

Therefore, I released the code under an open-source license with some special clauses.  The clause hereto pertinent is what I call the Bitcoin Consensus Clause, which requires that derivative works with functionality related to digital money (so-called “cryptocurrency”) must either fully adhere to consensus rules fully compatible with Bitcoin Core, or use a name which does not contain the word “Bitcoin”.  I bashed this out in a few minutes, and didn’t yet spend any time tightening up the legalese; but the wording is clear on its face.

I do wish that Core itself had added such a clause to their license.  Why don’t they?  Has this ever been discussed?  If so, I have not seen it.  [Edited:  DannyHamilton pointed out the obvious problem.  Duh.]

Obviously, my intent in this particular clause is not to cause problems for honest altcoins.  By “honest”, I mean an altcoin which at least has the common decency to make its own name, genesis block, network and block magic numbers, etc.—otherwise stated, an altcoin which stands or falls on its own merits and does not pretend to be Bitcoin.

My general desire is that people should copy and use my code freely in both commercial and noncommercial projects.  But I find revolting the idea that my code could be abused by or for a scamcoin which pretends to be Bitcoin.  Now, as long as there exists an idiotic copyright/licensing régime, it is illegal for my code to abused in such a way.  I don’t mind being pragmatic about that.
2313  Other / Meta / Re: Bitcointalk Contact Info (Urgent) on: December 27, 2017, 07:19:17 AM
Hello,

I need to speak with one of the moderators of this website. If you want to protect your users then you're going to need to provide information on the user "Kumala". He runs CryptoStocks and Vircurex, both corrupt exchanges that have stolen millions of dollars worth of crypto currency from your users.

We are not asking for private information, only the contact email for this individual so he can be served court papers. If you do not cooperate then my hired law firm will file for subpoena and you will be forced to provide much more information than just an email address (as well as potentially appear in court for withholding information on a fugitive). The crypto currency world is no longer a boys club where you can operate as you wish, there are rules and regulations you'll be forced to follow like the rest of us.

Please reply via direct message in the next 24 hours, I would prefer to handle this without getting attorneys involved but I'm more than prepared to take the necessary steps if my hand is forced.

Regards,

Wow.  What an exquisitely disgusting combination of threats and insults.  After that, I don’t care how you were allegedly scammed; if I were administrator of this forum, I would now permaban you and never give you any information, ever.

You also insult the intelligence of the reader.  I’ve never even heard of a jurisdiction where service of original process could be effectuated via e-mail.  Moreover, you are conflating the idea of a civil lawsuit filed and served by you, with some nonsensical insinuation about criminal matters (“withholding information on a fugitive”).  Do you think we’re stupid?  What kind of scam are you trying to pull?

For those who did not check post history, I also note that you already posted the same garbage 53 minutes, 12 seconds before:

Hello,

I need to speak with one of the moderators of this website. If you want to protect your users then you're going to need to provide information on the user "Kumala". He runs CryptoStocks and Vircurex, both corrupt exchanges that have stolen millions of dollars worth of crypto currency from your users.

We are not asking for private information, only the contact email for this individual so he can be served court papers. If you do not cooperate then my hired law firm will file for subpoena and you will be forced to provide much more information than just an email address (as well as potentially appear in court for withholding information on a fugitive). The crypto currency world is no longer a boys club where you can operate as you wish, there are rules and regulations you'll be forced to follow like the rest of us.

Please reply via direct message in the next 24 hours, I would prefer to handle this without getting attorneys involved but I'm more than prepared to take the necessary steps if my hand is forced.

Regards,



...as to which you already received adequate reply:

I need to speak with one of the moderators of this website. If you want to protect your users then you're going to need to provide information on the user "Kumala".

Why are you threatening the users of this forum?   Huh

Now if you don’t like the “boys club [sic]” as you call it, I suggest that you put on your big-man pants and go have teatime, or whatever you imagine big men do.
2314  Other / Meta / Bitcointalk.org blocked by Cloudflare blocker! on: December 27, 2017, 06:34:39 AM
There is a new twist to our Cloudflare problem:


That’s the message which will be seen when security-conscious users try to visit the Bitcoin Forum whilst using a new anti-MITM Firefox add-on by “cypherpunks”.  (It also works on Tor Browser—as you can see.)  A whitelist function is available.  I will henceforth be surfing with that; based on what he’s said, theymos may appreciate the suggestion to do likewise.

I noticed that theymos’ well-said complaint about Cloudflare is quoted in the sidebar of the extension’s homepage.  Hmmm.


The Internet is seriously flawed if everyone needs to huddle behind these huge centralized anti-DDoS companies in order to survive...

See also Tor Bug #18361, Tor Browser Bug #24351 (reported by me), Debian Bug #831835, Firefox Focus (mobile) Issue #1743, Mozilla Bug #1426618, and likely others.  People are beginning to wake up and realize exactly this:

[...] a man-in-the-middle in your HTTPS [...]

I especially dislike Cloudflare, which I'm almost certain is basically owned by US intelligence agencies. [...]

The security implications are that Cloudflare can read everything you send to or receive from the server, including your cleartext password and any PMs you send or look at.
2315  Bitcoin / Development & Technical Discussion / Re: Bitcoin cash bcc and bitcoin btc use the same port number 8332 and 8333? on: December 27, 2017, 12:48:46 AM
So-called “Bitcoin Cash” is a rip-off which changes just enough to cause trouble, while keeping just enough the same so as to cause more trouble.  You should not look to it for guidance; if you’re making an altcoin, change the port number (among many other things) as I told you in one of the many other threads you’ve started.  You don’t want to be a rip-off, right?

P.S., myapple, please keep your closely related questions on the same subject matter within one topic, rather than spreading many redundant topics with minor variations of the same questions.


Bitcoin-ABC uses the same ports and the same data directory as Bitcoin Core.  On Windows, it also uses the same registry entries.  This causes problems if you want to run both programs on the same system.

I think that’s hilarious, in the sense that people who run that junk deserve any mischief it may cause them.  So, not only will it make users lose money due to the identical address format:  It will also clobber your Bitcoin installation?  I am asking.  I wouldn’t know.
2316  Bitcoin / Development & Technical Discussion / Re: address collision vs quantum attack on: December 27, 2017, 12:34:35 AM
Address collision is possible and has happened in the past.

[citation needed]

That’s a mighty big claim you assert.  Excluding buggy software with bad PRNGs, keys specially calculated to be “found” by LBC or the like, and other non-random situations, address collision is as good as impossible.  I’d bet all my money on it—actually, I more or less am!  As a practical matter, you are free to take my money if you can find one of the approximately 2^96 colliding keys for one of my long-term storage addresses.

As for the rest of this thread:  Worry about quantum computers is ridiculous when quantum computers do not exist.  (Excluding toy research implementations—which don’t actually do anything useful, and may never.)  If you want to put coins in deep storage for the next few decades, then don’t reveal the public key—just in case.  If you are one of the few developers who deals with long-term planning, get up to speed on PQ crypto.  Otherwise, this is a total non-issue for present-day usage of Bitcoin.
2317  Bitcoin / Development & Technical Discussion / Re: Bravo Charlie One: Branding Bech32 on: December 27, 2017, 12:03:45 AM
I am gratified to see the community interest in Bravo Charlie Addresses!  I’ll reply soon; meanwhile, for fun, here is the embryonic form of an idea which I call PGP Descriptors:

Code:
# Thanks to sipa for segwit_addr.[ch]:
$ make
cc -O2   -c -o segwit_addr.o segwit_addr.c
cc -O2   -c -o bech32.o bech32.c
cc -o bech32 bech32.o segwit_addr.o
# PGP Descriptor for my Ed25519 certification key (preferred):
$ ./bech32 -e -h pgp 0x16092B06010401DA470F01C2E91CD74A4C57A105F6C21B5A00591B2F307E0C
pgp1zcyjkpspqsqa53c0q8pwj8xhffx90gg97mppkksqtydj7vr7pskelgkq
# PGP Descriptor for my RSA/4096 certification key ("legacy"):
$ ./bech32 -e -h pgp 0x03A232750664CC39D61CE5D61536EBB4AB699A10EE
pgp1qw3ryagxvnxrn4suuhtp2dhtkj4knxssacakc6xa

This is off-the-cuff; and I do NOT want to unleash it into the wild unless/until I think it over, and at least draw up a proposed specification.  Those who may be curious about the extra octets I included should see references 0, 1, 2.

Now, let’s sauté some onions with the rich flavour of Bech32’s error-correcting code:

Code:
# A famous .onion:
$ ./bech32 -5 -e -h onion wlupld3ptjvsgwqw
onion1kt50trm0nf4jxkskpcjy74
$ ./bech32 -5 -d onion1kt50trm0nf4jxkskpcjy74
wlupld3ptjvsgwqw.onion
# Let's try another.  Snagged from LoyceV's signature:
$ ./bech32 -5 -e -h onion chipmixerwzxtzbw
onion1z8g0vghy3kehnepksy066l
$ ./bech32 -5 -d onion1z8g0vghy3kehnepksy066l
chipmixerwzxtzbw.onion

Bech32 is awesome.
2318  Bitcoin / Development & Technical Discussion / Re: Improving confirmation time on: December 26, 2017, 06:26:20 AM
the mempool

There is no such thing as “the mempool”.  Thus, you have tried to build a lofty tower on a wholly nonexistent foundation.

Each node has a mempool, consisting of unconfirmed transactions it so happens to have heard of through Bitcoin’s gossip protocol.  Each node’s mempool is different from the others.

Correcting this single error in thinking about Bitcoin can correct many other errors, too.

Spinning around what achow101 correctly explained:  We already have a “coordinated ordered transaction mempool”, as you call it.  Our “coordinated ordered transaction mempool” is called the blockchain.  Transactions are “coordinated” and “ordered” by the blockchain, through the very same “confirmation” process as you attempt to shortcut.  What you are really trying to do is to invent a replacement for the whole proof-of-work mining system; and obviously, you have not done that.

P.S., it is also impossible to descramble eggs.
2319  Bitcoin / Development & Technical Discussion / Re: Types of Different Bitcoin Transaction and Their sizes on: December 26, 2017, 05:53:16 AM
Looks like this article is missing segwit transactions, be it with the "3" format or with the bech32 (bc1) format.

Expanding on what you say:  The network itself has no notion of addresses; addresses are only a human interface feature.  Transactions involving Segwit addresses starting with a “3” are P2WPKH-nested-in-P2SH (Pay To Witness Public Key Hash nested in Pay To Script Hash), paid to the hash of a script consisting of OP_0 followed by the push of a witness keyhash (0x0014<20-byte hash>).  Bech32 addresses permit use of native Segwit tranactions, but are not backward-compatible.  An address starting with a “3” may or may not be a Segwit address; there is no way to tell, just by looking at it; it’s simply an ordinary P2SH address, which is why old clients can send money to it.

(I know that you know this; I’m filling in for others.  Good call in your reply.)


I just don't get this about Segwit because the project got canceled but now it's back on again
as Segwitx2 because they are doing a fork on 28th Dec 2017

Did the Segwit team turn it on without a fork so it just worked with BTC or something or are we
talking about a message that miners can send if they want vote for it or something

Thanks in advance

Segwit is an excellent technology which activated in Bitcoin on 2017-08-24 with Block #481824.  Bitcoin already has Segwit.  The misleadingly misnamed “Segwit2X” is not Segwit and not Bitcoin.


Yes,but the project was said to be suspended actually not cancelled. However the B2X is available on some exchange and you can also find it on coinmarketcap cause the B2X project was phase into two project which is the SegWit activation and 2MB blocksize increase. Therefore, 2MB blocksize increase was the one suspended not the SegWit activation which occurs in August. SegWit Mail List Site for more information

The link you give is not to the Segwit mailing list.  It’s to the mailing list of a hostile takeover attempt which has nothing to do with Segwit, and nothing to do with Bitcoin.

Bitcoin no longer has a block size limit.  Segwit replaces the block size limit with a block weight limit, set to 4000000 bytes:

Code:
/** The maximum allowed weight for a block, see BIP 141 (network rule) */
static const unsigned int MAX_BLOCK_WEIGHT = 4000000;
2320  Bitcoin / Development & Technical Discussion / Re: Veteran programmer - Newbie BitCoin dev - questions on: December 26, 2017, 05:25:55 AM
- The book seems to favor Python, but the book is over 2 years old, a lifetime in this industry.  What is the "most favored" dev environment for BitCoin dev right now?
    + IDE? (E.g. - PyCharm for Python, or WebStorm for JS/TS, or whatever.  Doesn't have to be JetBrains, I just happen to like their stuff)
    + Programming language?  Python, JS (or TS)?, etc.

I have no idea.  I’m a C programmer; and I prefer to write code in vi(1).  Not “Vim”.  nvi.

The best language for writing Bitcoin-related code is C the language at which you yourself most excel.  Well, as long as it’s not COBOL, MUMPS, or BF, I suppose.

- How does the blockchain network prevent errors in the miner's calculations from corrupting the transactions?  For example, suppose a bunch of miners are using the same CPU or GPU that has a known defect in, for example, the overflow/underflow handling in the arithmetic logic units or perhaps a flaw in the transcendental functions on a GPU card, etc.?  I know a lot of miners use ASICs but I don't see why that architecture would be immune to such problems?

There is a common misconception that miners provide the security of the network.  This is patently false.  Miners have exactly one job:  To provide Byzantine fault-tolerant ordering of transactions, thus preventing double-spends.  It is a valuable and resource-intensive job; and that is why they get paid for it.  But it is still only one function in a machine with many moving parts.

This ACM Queue article provides an excellent overview of how Bitcoin fits together against the backdrop of decades of academic research.  As its centre, it explains how Satoshi Nakamoto repurposed Adam Back’s HashCash to create the first-ever practical implementation of a Byzantine fault-tolerant decentralized database with excellent Sybil resistance.  That is the purpose of mining, and its only purpose.

Validation security is provided by full nodes.  Each individual full node provides validation security for its owner; and all full nodes collectively enforce the consensus rule validation security of the entire network.  Thus here as everywhere else, Bitcoin aligns the individual’s selfish interest with the common good:  People who want the highest security will run a full node to secure themselves, and thus help secure everybody else, also.

In the scenario you describe, I do expect that hashing and signature validation would catch the errors; and the block containing corrupted transactions would be discarded by full nodes as if it had never existed.  A full node does not blindly follow “the longest chain”, as you may have heard:  Rather, a full node follows the independently validated and fully valid chain with the highest total proof-of-work.

This also applies to malicious mining of deliberately corrupted transactions, attempted thefts, ridiculously huge blocks, etc.  Sometimes you may see nonsensical FUD claiming that miners could seize money by planting theft transactions in blocks, e.g. by ignoring Segwit validation rules; no, they would get exactly the same result as if they filled blocks with the output of /dev/random.

- Regarding smart contracts directly on the BitCoin network (i.e. - not Ethereum based), I see two projects in the field: Ivy and Rootstock.  How does Ivy relate to Rootstock if at all?

I have not been following development of those lately, so I can’t say.

If you are interested in smart contracts, you may appreciate a peek at current R&D which may potentially someday become the future of Bitcoin smart contracts:  Simplicity (PDF).  Powerfully expressive smart contracts written with in a formally verifiable DSL, running on a formally verified VM, would have none of the exploding clown car disasters inevitably resulting from the stupidity of bolting a Turing-complete VM onto a blockchain.

- Please list your favorite tools and tutorials.

Tools depend on what job you need done; and I don’t really know any good tutorials off the top of my head.  But here are some educational links:


HTH.
Pages: « 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 [116] 117 118 119 120 121 122 123 124 125 126 127 128 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!