Bitcoin Forum
May 30, 2024, 11:30:45 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 [150] 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 ... 288 »
2981  Bitcoin / Hardware / Re: CoinTerra Update: Engineering and Production status on: January 30, 2014, 07:40:49 PM
And, as we know.. the lowest cost bitcoin mining equipment available today costs $3/GH and some of it is trading at $20-40 per GH, so that $3/gh price is at the extreme low end of the market ...  so for the sake of argument, lets assume that it stays at that price for the next 3 months...
Don't confuse retail with "cost", do you think KNC is paying $3/GH for the hashrate they are putting online themselves?

I agree that 10x in three months is pessimistic, but 6x is what 2%/day suggests— and thats what we've been averaging for some time now (http://bitcoin.sipa.be/growth.png).  It can't continue forever, of course, but long enough to prevent profit for everyone buying at $3/GH delivered months from now? I absolutely think it can.
2982  Bitcoin / Hardware / Re: Announcement: Bitmain launches AntMiner solution, 0.68 J/GH on chip on: January 30, 2014, 05:27:15 PM
Why do you think they are in stock and dropping on price constantly?
None of the antminers I've received showed the slightest evidence of being used. The reason they are dropping prices is that they're selling these things near or beyond the boundary of profitability, and so as more hashrate increasing days go by they need to lower the price to keep it from being an obvious loss to everyone.
2983  Bitcoin / Hardware / Re: [Antminer S1 open for sale again] The first round after the Chinese New Year on: January 30, 2014, 04:34:37 PM
I didn't see a way to transfer the coupons, how do you do it?
2984  Bitcoin / Development & Technical Discussion / Re: Deterministic tie breaking of >2 length forks on: January 30, 2014, 04:21:40 PM
A deterministic tie breaking rule would break the tie in favor of the block with the lowest hash.
And would also create a concrete incentive to delay your block announcement when the block you have is a likely winner.

I'm fairly sure this has been proposed before and debunked.
2985  Bitcoin / Development & Technical Discussion / Re: Blind signatures using Bitcoin-compatible ECDSA on: January 30, 2014, 04:06:57 PM
They'll recognize r when they see it in the network.
2986  Bitcoin / Hardware / Re: HashFast announces specs for new ASIC: 400GH/s on: January 29, 2014, 09:10:52 PM
No, you are wrong. If BTC fell from $100 to $50, buying BTC still would have been the better investment.
You would buy a BJ for 60 coins, and earn back, lets say, 10 coins. You spent ~$5750 and ended up with $500.
If you had bought BTC, you'd have 60 BTC, and at the end it would be worth $3000. Still the better investment.
Yup. Unless you get into touchy feelies soft valuations of your contribution to the Bitcoin network security (which you probably shouldn't unless you're running and mining on your own node), there is no scenario where a miner which produces less in Bitcoin than you could have had instead is to your advantage.
2987  Bitcoin / Hardware / Re: CoinTerra announces its first ASIC - Hash-Rate greater than 500 GH/s on: January 29, 2014, 08:12:57 PM
I only wish the reduced rate had come with better than anticipated power usage instead of the reverse.
2988  Bitcoin / Hardware / Re: CoinTerra announces its first ASIC - Hash-Rate greater than 500 GH/s on: January 29, 2014, 06:47:43 PM
did cointerra not convert your december order into a jan (+1 later) order?  (with your agreement)
I think the point there is that the claim that they're shipping is a currently unsubstantiated. People with early orders, who would have expected to have heard something, seem to have heard nothing so far. Sad
2989  Other / Archival / Re: delete on: January 29, 2014, 05:29:15 PM
But he only makes the stats for the least 32 bits, and not for the entire numbers - it doesn't matter?
It doesn't matter (and for some curves— e.g. ones where the x^2 term is non-zero, though IIRC in scep256k1 there isn't a tidy LSB pattern, some 32 bit LSB patterns are unused entirely). About half of the X values are not points on the curve, but this is accounted for in the order of the group. There are ORDER points on the curve, and the private keys 1..ORDER-1 uniquely map to them.  Lets say that all the X values were even— they're not— but lets say— it doesn't matter since any search is already limiting itself to valid X values, e.g. any statement about the security already excludes the points which are not part of the curve, which can't be reached by any private key, and which wouldn't be included in any key search.
2990  Other / Archival / Re: delete on: January 29, 2014, 05:18:43 PM
Would that be impossible or just take a good amount of time but still possible.
It's not possible. Though the fact that you can 'search from both directions' is why 256-bit ECC has 2^128 security. Rho is an enormous speedup but the parameters are chosen to make it irrelevant.

I think I've pointed out the fraud in this thread clearly enough.  The impression was made that this tool was able to find the private keys of some portion of random keys enough for shill demonstrations in this thread.   I posted 200,000 keys with a substantial bounty for giving me the private key of any one of them.  Evil, where is my private key?  You said your software takes a few minutes— please either solve one of the keys I posted or admit that you cannot and that people have been mislead by this thread.
2991  Other / Archival / Re: delete on: January 29, 2014, 05:08:10 PM
From what I see, the guy is literally gathering a statistical data, hoping that maybe there is something about this curve that would make the balls more likely to end up in a certain places on the earth.
But, of course, there isn't. The group is complete, all $ORDER points are reachable by multiplying the generator from 1..$ORDER-1. Some points _can't_ be more likely than others as a property of the curve with a uniform input, or otherwise some points would be unreachable (obvious by the pigeonhole principle) and the order would be less.

Dozens off us with many machines are helping him gather this data, we'll see the results in the paper.
Exactly. It is a highly valuable project, because even if it fails, it still proves something.
All it does is reaffirms is that the world is full of fuzzy headed reactionary thinkers, unscrupulous parties, and pump-and-dumpers looking to cash in on hysteria.

Itod, you realize that the software you're running is indistinguishable from a cracker of EC keys, right?  I mean— no real reason to believe that anyone will find anything, but...
2992  Other / Archival / Re: delete on: January 29, 2014, 02:33:15 AM
But how is it known if the fraction of possibly weak keys is non-trivial?  Basically are you saying his approach is totally impossible or are you saying the amount of possibly weak keys he is referring to is too small to matter?
If he has anything at all then he can demonstrate it by cracking any one of the 200,000 keys I posted as a bounty and collect a bunch of coins from me.

What I was responding to was someone asking about testing if a key is "weak"— it's pointless, if any non-infinitesimal fraction is weak (e.g. by being generated from private keys known to an attacker) all keys are weak.
2993  Other / Archival / Re: delete on: January 29, 2014, 02:22:03 AM
Stupid question - why is the address he chose one character shorter than the preceding ones?

Also, I'm going to assume that the "random" address generator is, in fact, only generating weak addresses.  The question is, can the degree of weakness be detected in a public key?
There is no such thing as a weak key in secp256k1. If any non-trivial fraction of uniformly selected keys are weak then all keys are weak because there is a simple bit of algebra to convert an attack on a non-trivial fraction of random keys into an attack on any specific key.
2994  Bitcoin / Development & Technical Discussion / Re: Private Key cracker apparently demonstrated on: January 29, 2014, 02:19:01 AM
so that Evil-Knievel could just be banned for misleading and scamming people.
The crappy and super slow implementation of ECC arithmetic linked to on that website checks keys generated against a couple thousand 32 bit values. (Why use a slow thing like that if you've supposedly got some amazing gpu thing). My guess was that he's using this as bait to get people to run that program and the values that its looking for are all 'near' high value keys.

Or other wise it just another lame market manipulation attempt. Either way, ... if he actually can crack something I welcome him to go solve any of the 200,000 keys I listed and collect his bounty.

Thanks for decoding his JS, I'd just ignored it.
2995  Bitcoin / Development & Technical Discussion / Re: Private Key cracker apparently demonstrated on: January 29, 2014, 01:13:02 AM
Fwiw I haven't seen him claim that anywhere in his thread, and honestly think he's well enough versed in math to know he will not be able to crack an address with any amount of bitcoins in it in the foreseeable feature. I don't really know what he's trying to achieve, though.
The thread has several instances of newbie accounts providing single pubkeys which evil claims to crack e.g: https://bitcointalk.org/index.php?topic=421842.msg4800547#msg4800547

2996  Bitcoin / Development & Technical Discussion / Re: Standard protocol for Bitcoin/SSL content verification on: January 29, 2014, 01:06:57 AM
Encode these verifications in the existing blockchain.  
Encoding 'in the blockchain' is pretty much the absolute last thing you want to do for pretty much any question.

What you're describing also has the bad property that you can't prove the connection without disclosing the private key.

It also suffers from bad key management since coins will be assigned to non-backed up ephemeral keys which could be loss.

It also doesn't create strong evidence that the receiver of the coins actually knew of their existence... e.g. I fail to give you the private key, then I spend the coins myself, then I say you didn't live up to your side of a contract you never saw.

There are proposals for pay to contract which are much better, but they still have the data integrity issues.

The payment protocol supports x509 signing for non-repudiation of invoices, which is I think mostly what the OP wanted.
2997  Other / Archival / Re: delete on: January 29, 2014, 12:51:56 AM
Quoted. (is the april fools date intentional?)
Nah, coincidental. The only reason I put a limit at all is so I wouldn't feel ethically obligated to hold onto 50 BTC beyond that point in time.
2998  Other / Archival / Re: delete on: January 29, 2014, 12:37:44 AM
So you claim you can crack some random keys provided by people on the forum? Oh really.

Well here, I'll make it very profitable for you then:

Quote
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


I, Greg Maxwell, do hereby promise to pay 50 BTC to the first person that
provides the discrete log of _any_ of the following randomly generated
200,000 secp256k1 public keys. This offer is open until 2014-04-01.

None of the below public keys have been used on the Bitcoin blockchain as
of the time of the creation of this offer.

04abb9239d3a5131de45b977807c62bf879119b05c3da33e37d8e7be0901985ce73b6ca6dff5b97 34d1225ce0120bbe023066669c29e23d3ea82de9a57dd259b63

Full message at https://people.xiph.org/~greg/keysfun.asc

Surely if you can crack a single key provided by a person in the thread cracking any one of 200k keys should be a cinch.
2999  Bitcoin / Development & Technical Discussion / Re: Private Key cracker apparently demonstrated on: January 29, 2014, 12:37:11 AM
So you claim you can crack some random keys provided by people on the forum? Oh really.

Well here, I'll make it very profitable for you then:

Quote
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


I, Greg Maxwell, do hereby promise to pay 50 BTC to the first person that
provides the discrete log of _any_ of the following randomly generated
200,000 secp256k1 public keys. This offer is open until 2014-04-01.

None of the below public keys have been used on the Bitcoin blockchain as
of the time of the creation of this offer.

04abb9239d3a5131de45b977807c62bf879119b05c3da33e37d8e7be0901985ce73b6ca6dff5b97 34d1225ce0120bbe023066669c29e23d3ea82de9a57dd259b63

Full message at https://people.xiph.org/~greg/keysfun.asc

Surely if you can crack a single key provided by a person in the thread cracking any one of 200k keys should be a cinch.
3000  Bitcoin / Development & Technical Discussion / Re: Private Key cracker apparently demonstrated on: January 29, 2014, 12:07:03 AM
Analysis of Bitcoin Address Distribution Around Certain Rendezvous Points on the Elliptic Curve
http://bitprobing.com/
This is indistinguishable from a ECC cracking tool.

After reading the source code, it appears to me that you're using this crap as a cover to try to trick people into performing computation for you in an attempt to crack a couple thousand selected keys.

Unfortunately its impossible to determine which keys you're attempting to crack because its possible to cryptographically blind the cracking process (e.g. the matches are against key + s*G for some s known only to you).

It's pointless and a waste of time, but I guess you figure so long as other people are doing the computation for you that its worth doing.

It's doubly hilarious that you claim to have (and offer to sell) a GPU tool that can compute keys a "terra-tries per second", and yet you'd ask people to waste their time crunching with this rubbish python EC implementation.
Pages: « 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 [150] 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!