Bitcoin Forum
June 21, 2024, 08:43:14 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 [160] 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 »
3181  Economy / Economics / Re: The Fallacy of Mining Cost and Bitcoin Price on: June 26, 2011, 08:14:50 PM
The system is a chaotic multi-variable nonlinear system where all the parts are interlinked.  Please stop trying to make sense of it by inventing serial relationships that do not exist.

If you serialize it into a false string of A causes B causes C relationships, you can be absolutely positive that you will never understand it.

Edit: 2011-06-26, proofreading failure.  understanding
3182  Bitcoin / Development & Technical Discussion / Re: Add option to add a fee to dead transactions on: June 26, 2011, 08:04:39 PM
The only way to cancel an unconfimed transaction is to make it invalid and the only way to make a valid transaction invalid is to spend one of its inputs and get this confirmed in a block before the unwanted transaction makes its way into a block.

The problem I see here is that as long as the unwanted transaction is already hanging around in the miners' memory pools the new transaction would not even be allowed to enter their memory pools.

Should be trivial to recognize and allow a transaction that differs only in the fee (and thus, the change).

It might also be a good idea to alter the spend behavior to include a little change in the input even when not strictly necessary, so that the resend attempt doesn't need to add a new input.
3183  Bitcoin / Development & Technical Discussion / Re: Modular FPGA Miner Hardware Design Development on: June 26, 2011, 07:58:20 PM
[...]
  • The (mother) board has [...] one Molex 8981 connector for power supply.
  • Only the 12V pins (+12V:1, GND:2+3) on the Molex are used (for simplicity).
[...]

I just had a look at different ATX power supplies: while they had 9A of +12V their 5V rail was above 20A! So maybe I picked the wrong voltage?

The reason why I picked one voltage at all instead of allowing the use of both 5V and 12V: some may not want to power their FPGAs from an ATX power supply but use something dedicated. There, a single supply is strongly preferrable.

On that note: these people may not like the Molex 8981 as much. What about the Tyco 284513-2 from the Buchanan series:

It's basically a question what there are more of: ATX power supply users or dedicated supply users?

I would still stick with Molex 8981.  People using bench supplies can easily stick a Molex on their wiring, and people using ATX are already set.  If you use a different connector, then everyone has to make custom cables.

And I would go with a 240 pin DIMM socket for the cards.  Figure on about a third of the pins being grounds.  Add a few for SPD, a few more for JTAG, a few more for whatever serial bus you come up with.  Still leaves you with plenty of open pins for power, even if you go with 8 or 10 pins for each likely voltage level.
3184  Bitcoin / Development & Technical Discussion / Re: Split private keys on: June 26, 2011, 06:03:37 PM
If the device does all of the wallet stuff itself, you can take it on the road.

I want this thing to be my wallet.  Not a glorified dongle that allows me access to the wallet stored on my PC.

If I remember correctly, ArtForz is already working on a secure key storage and signing device. I'll see if I can find a chat log.

Found it: http://bitcoinstats.com/irc/bitcoin-dev/logs/2011/05/05/20#l485685

Sounds like he and I came to the same conclusions, he just beat me by a month or two.

I really need to start hanging out on IRC.
3185  Bitcoin / Bitcoin Discussion / Re: Shift the decimal point over? on: June 25, 2011, 10:42:32 PM
My vote is to NOT change BTC, but get used to talking in micro-BTC (UBT,UBC,uDTC,whatever the concensus), but that's not clearly available in the vote!

"micro" sounds too tiny when spoken aloud. I suggest a new name altogether. And it needs to be 2 syllables.

UBC is ok. But when spoken aloud, it should sound like "you-coins" (not "micro-bit-coins").

mBC is ok. But when spoken aloud, it should sound like "em-coins" (not "micro-bit-coins").

I wonder if mBC might be confused with "million". The m comes from micro, but obviously the real abbreviation for micro looks more like u.

So, let's go with UBC, pronounced "you-coins".

I'll send an "you-cent" to anyone who agrees with me Wink

I suspect that people will just say "milli" or "micro", just like we now say "cent" rather than "percent of a dollar".

And mBTC will never be confused for MBTC.  The context will always make it clear.
3186  Bitcoin / Development & Technical Discussion / Re: Split private keys on: June 24, 2011, 08:18:20 PM
Your real wallet is in the device.  The PC on your desk can keep a copy of the public keys so that it can show you your current balance as a convenience, but that's it.  When you want to pay, it sends the destination address and the amount, only.  The device then creates the transaction all by itself, using transaction records it already knows.

Yes, the private keys are stored only on the secure device, but that wasn't my question. My question was, if the client can create the required unsigned transaction, which requires nothing more than knowledge of the public block chain, why does the secure device need any more data than just that unsigned transaction, which it then signs. Everything but the actual transaction signature is public knowledge, the only thing the device needs is the transaction itself, so that it can properly sign it. It does not need to know all other unrelated transactions that I've done in the past, and it has no way of knowing whether to trust them anyway.

If the device does all of the wallet stuff itself, you can take it on the road.

I want this thing to be my wallet.  Not a glorified dongle that allows me access to the wallet stored on my PC.
3187  Economy / Economics / Re: Bitcoin as legal tender on: June 24, 2011, 07:32:05 PM
Why would a government impose as legal tender a currency that it can not print and therefore can not profit from it?

As others have pointed out, it happens in certain situations. Even worse, governmnets are willing rely on currencies issued by other governments in those cases: Not only do they not hold the pwoer over the currency as with bitcoin, there's even someone else holding that power.

Here's a few examples:
Montenegro and Kosovo used the German Mark and now use the Euro.
Many small states use the Euro.
Lichtenstein uses the Swiss Franc.
East Timor and Ecuador use the USD.

With the exception of really tiny states this usually happens in times of turmoil, civil war and major economic crisis. We could use that knowledge to make Bitcoin more widespread and to create a suitable global environment for further acceptance of Bitcoin.

Bitcoin is the first non-government money system that I think would be suitable for becoming an official currency.  The main problem right now is that the market is so tiny.  No one can really throw the Euro or the Dollar around, but with a couple million dollars someone could easily take BTC on a violent rollercoaster ride until everyone runs away puking.

These little countries use major reserve currencies because they are too big to mess with, not because they really care about the currency itself, or the nation that issues it.  Oh, and don't forget geography.  Using the same money as your neighbors is another big advantage.

So, to answer the OP, bitcoin needs to grow first.  And then it will be suitable to be granted legal tender status by some nation.
3188  Bitcoin / Development & Technical Discussion / Re: Split private keys on: June 24, 2011, 07:25:24 PM
getPublicKeyTransactions -- why do we need that?

The secure device needs copies of all blocks involving keys that it contains, so that it can generate new transactions later.  It would use this request to ask for them.  As an aside, the secure device should only make this request upon a command from the user.  That way you can plug into your home box, which is probably honest, and update your information, but when you plug it into a retail POS, you don't give it the chance to give you bogus data.

But if you're getting the unsigned transaction, that will include the proper inputs. I'm not sure why you'd need all the previous transactions. The idea is that we don't assume anybody is honest. The secure device makes sure we're never doing anything except sending the displayed amount to the displayed address. It's impossible to do anything else with that signed transaction no matter what you feed the secure device.

Your real wallet is in the device.  The PC on your desk can keep a copy of the public keys so that it can show you your current balance as a convenience, but that's it.  When you want to pay, it sends the destination address and the amount, only.  The device then creates the transaction all by itself, using transaction records it already knows.

Unless the tiny spec I read was missing something, there was no way in JSON to authenticate, that detail being left up to the layer below.  Since there is no layer below when using serial, either we make one, or we use digests to authenticate commands.

My first guess is that there is nothing in any of these commands or responses that needs to be kept secret, but a few things that we would like to have authenticated.

I'm probably missing something here. If we know the secure computer or device's public key and encrypt the whole JSON response with that key, what else do we have to worry about? In any case, all information being sent here is in the public block chain anyway so I'm not sure if there's a point encrypting it.

Encrypting the whole thing would certainly work, but it is probably overkill.  You can't just encrypt the data using the keys themselves, or you provide the attacker with a whole lot of known plaintext to degrade your key with.  Most encrypted streams exchange session keys and do a whole lot of crap behind the scenes, and we would have to do all of that ourselves, all to protect stuff that doesn't really need to be protected.

Simple hashing seems sufficient.  At least for now.  Eventually, sure, we'll probably want the serial communication to be encrypted.  But for the first step, I'd like to be able to debug the thing with a 'scope.
3189  Bitcoin / Development & Technical Discussion / Re: Sabatoge: "Losing" Bitcoins (AKA the Goldfinger Attack) on: June 24, 2011, 06:09:10 PM
Just like a regular bitcoin, but slightly larger.
3190  Bitcoin / Development & Technical Discussion / Re: Faster bitcoin alternative tied in to bitcoins? on: June 24, 2011, 06:07:59 PM
I think the easiest way to do it would be to add BTC as a new currency on the existing system of magstripe readers.  Smiley

Of course, if you don't want to wait for Visa, MC or Discover to catch on, it'll have to be all online.  Start with a website, then add an API that lets ecommerce developers and POS vendors add your system as another payment method.
3191  Bitcoin / Development & Technical Discussion / Re: Merkle tree of open transactions for lite mode? on: June 24, 2011, 06:02:27 PM
I don't quite see what the problem is.  If you don't trust a peer to deliver accurate data, just make sure that you ask lots of peers and that you exclude the outliers.  It's already true that the client has to trust that it will get a complete, accurate, and up-to-date complete block chain from its peers.  If it's getting pre-pruned blocks from some other peer, then it should likewise not rely on just one peer for this information but get it from many.  And if one of those peers reports knowing about the block chain to a certain height but doesn't give the right answer given that height, then the peer can stop trusting it and just drop its connection, leaning on peers that it does trust.

There will also be commercial services in the future to provide trustworthy information.  I might even do it myself if this ever catches on.
3192  Bitcoin / Development & Technical Discussion / Re: Split private keys on: June 24, 2011, 05:41:17 PM
getPublicKeyTransactions -- why do we need that?

The secure device needs copies of all blocks involving keys that it contains, so that it can generate new transactions later.  It would use this request to ask for them.  As an aside, the secure device should only make this request upon a command from the user.  That way you can plug into your home box, which is probably honest, and update your information, but when you plug it into a retail POS, you don't give it the chance to give you bogus data.

Step 3.  Implement JSON over serial.  Could be actual serial, could be serial over bluetooth, could be serial over USB, could be a terminal program on each box with the super paranoid user relaying commands back and forth by retyping them.  I think we would need to extend the JSON spec, since it doesn't seem to contain any provisions for in-band authentication, and we won't have access to the HTTP layer doing it for us.  I propose that each string be followed by a hash of the command + password.

Why do we need in-band authentication? Why not just encrypt the JSON with the secure device's public key? I think it's best to use established secure protocols like TLS if at all possible.

Unless the tiny spec I read was missing something, there was no way in JSON to authenticate, that detail being left up to the layer below.  Since there is no layer below when using serial, either we make one, or we use digests to authenticate commands.

My first guess is that there is nothing in any of these commands or responses that needs to be kept secret, but a few things that we would like to have authenticated.
3193  Bitcoin / Development & Technical Discussion / Re: Pay miners to rewrite block(s)? on: June 24, 2011, 05:24:06 PM
Exponential difficulty increase summary:

My understanding is that the bulk of the discussion occurring under this subject heading revolves around a proposal by kjj linked to above which is not the behaviour of the current system.

May I suggest that you request help from a moderator to move your posts discussing this special system to a new thread (which it clearly deserves) as someone casually following the new posts to Dev & Tech (like me) gets confused because you appear at first sight to be discussing the behaviour of the current system but incorrectly.

If the proposed system for discouraging block chain re-organizations was in it its own thread (and explained properly) then I believe it would attract wider interest and be more easily found in future when such proposals are discussed again.

ByteCoin

Correct.  The thread for it is buried deep, page 8.  That's a lot of new topics for 3 weeks.

At any rate, yes, posts 29 to 37 inclusive are about my proposal, and are sorta off topic for this thread.  I like to point out that these attacks can be changed from improbable to impossible, and it occasionally leads to the tangent seen above.

But this is the difference between the way bitcoin works today and what you are proposing. Today, one would have to take on all 8 connections in order to keep the longer blockchain from a new node. With your scheme, one only needs to take on 1 and make sure that the new node sees your shorter branch first. The node eventually learns about the longer branch from its other peers, but doesn't switch. What's worse is that it is now effectively a poisoned node that will forward blocks to other new nodes in the same incorrect order that it received them. And so the rot spreads.

It would be pretty easy to code a startup mode where the client gets multiple copies of all blocks until it catches up.  And even if it does become a poisoned node, it still prevents a poisoned network.

3194  Bitcoin / Development & Technical Discussion / Re: merkle tree order of hashes on: June 24, 2011, 03:13:24 PM
According to the paper, if you have 4 transactions, then the procedure is

12 = Hash(1,2)
34 = Hash(3,4)
root = hash(12,34)

However, it doesn't say how to handle non-power of 2 trees.

For 5 transactions, it could be something like:

Pass 1:

12 = Hash(1,2)
34 = Hash(3,4)
5_ = 5

Pass 2:

1234 = Hash(12,34)
5___ = 5_

Pass 3

root = Hash(1234, 5___)

However, that gives an unbalanced tree. 

Another option would be

1,2,3,4,5

becomes

5,12,34

and then

512,34

and then

51234

Is there some flexibility?  I couldn't see how the tree was defined in block explorer.

Double the unpaired one.  https://en.bitcoin.it/wiki/Protocol_specification#Merkle_Trees
3195  Bitcoin / Bitcoin Discussion / Re: MTGOX Limit Orders placed prior to the breach.. Cancelled?? on: June 24, 2011, 02:58:40 PM
Hey, putting my text in giant red letters like a jackass was kinda fun.  I should do it more often.
Hey Kyle.. I sent you the bitcoins to buy the beer at Diggers..  I may be a jackass... but I'm a man of my word!

Cool thanks, Richard.  I don't get over that way very often, but I'll be sure to grab a beer the next time I do.
3196  Bitcoin / Bitcoin Discussion / Re: $300 Bitcoin "Guess the Price" Contest on: June 24, 2011, 02:56:54 PM
I have a highly scientific Bitcoin Value Predictor (dartboard) in my office.  Using careful analysis (mean of 3 sums of 3 throws), I calculate $27.333333 per BTC.
3197  Bitcoin / Bitcoin Discussion / Re: MTGOX Limit Orders placed prior to the breach.. Cancelled?? on: June 24, 2011, 02:50:43 PM
Grow some thicker skin.  I answered your question, and I only insulted you personally.  You, on the other hand insulted the entire community (very slightly) by disregarding forum etiquette.

Good luck with your post count and your mtgox account.
3198  Other / Beginners & Help / Re: My thoughts on the (rediculolus) idea of "blacklisting" coins on: June 24, 2011, 02:40:34 PM
Even better.  You don't know which coins you are getting until you already have them.  So now you have to send the tainted coins back, which is nearly impossible with the current client, or you can continue the transaction just as if you didn't use the blacklist at all, or you have effectively stolen them.
3199  Bitcoin / Development & Technical Discussion / Re: Block header should be 81 bytes but getwork:data is 128 bytes on: June 24, 2011, 02:20:34 PM
I couldn't tell without looking at the function, and I despise Java, so...  Hopefully someone familiar with bitcoinj will pop in and help.  Maybe change the subject of the thread.

Usually the first problem people run into when trying to parse/hash this stuff is the difference between network byte order and host byte order.
3200  Bitcoin / Bitcoin Discussion / Re: Square²Wear Needs a Marketing Manager on: June 24, 2011, 02:15:59 PM
Excellent!  Great to see you guys growing, hope things keep getting better and better for you.

Now make more black shirts.  Smiley
Shirt color is tough, man.  People having lots of mutually exclusive preferences (never wear black vs always wear black).  We're still experimenting with offering multiple colors.  Do you have a specific shirt you'd like to see in black?

I just ordered a couple of shirts.  I had to get I DIG RIGS in gray because it wasn't available in black.  Of course, for that one particular shirt, you'd have to invert the black art and text.  And, since I already ordered a gray one, I'm unlikely to order another if you make a black one.

At any rate, I'm firmly in the always wear black camp, and if places like thinkgeek and tshirthell are any indication, I've got plenty of company.  Then again, your target demographic might be different, and I'm hardly an authority on the shirt business.

While I've got your ear, any thoughts on polo/golf/work shirts?  I'm thinking like this one but with a bitcoin logo.  I never seem to have enough subversive shirts that I can wear around the office.
Pages: « 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 [160] 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!