Privacy is only needed for crook and people who deem important enough. Most users don't fit into this category.
Not true. Most people (like you) don't deem privacy important enough until its too late and your privacy has been violated in a very bad way. Once it happens to you you'll understand why privacy is incredibly important. It's similar to health. There are a lot of people who do not care much about their health until they get very sick - then they realize your health is more important than anything else.
|
|
|
I'm using countermail. https://countermail.comWe are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
This is useless. You are still relying on their word that they are actually encrypting your messages and not saving the original before encrypting it. There is no way you can know they don't do this without doing the encryption yourself. You can PGP encrypt it on your PC before sending and eliminate this risk entirely - you can do this with ANY mail provider - no need to pay countermail for something you can't be sure they actually do. Since there are various PGP software providers to choose from (GoAnywhere, Gpg4couwin etc) Do you have a few you could recommend?
From what I understand those are just frontends, most of these use GnuPG as a backend which is the de-facto standard: https://gnupg.org/GnuPG is a command-line tool, so if you find it difficult to use you might want to install a frontend too or an email client that has plugins for it like thunderbird. Frontends: https://www.gnupg.org/related_software/frontends.htmlthunderbird plugin: https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/
|
|
|
Is there any email provider now that is based on tor? I saw some before but I havent tried it.
There was once tormail but that had a problematic faith, it was hosted on a server that also hosted kiddy porn sites so it was attacked by the FBI. Due to the way email works running an email server on a Tor hidden service is pointless as the IP of the server or a gateway server has to be known in order to receive email. You can use Tor with almost any email provider including gmail.
|
|
|
Buy a domain, buy a offshore vps or offshore hosting or use a spare pc in your home and become the email provider yourself.
If you buy a VPS, you need to trust the company hosting it. I would NEVER trust anyone other than me to handle my privacy and neither should you, you should always use PGP to encrypt private emails and do the encryption on your PC (not using your providers server-side tools). The email provider I use is https://unseen.isThey are based out of and hosted in Iceland and are OK although they lack the functionality of using "+" aliases in email addresses. I PGP encrypt anything sensitive so I do not need to trust them - the main driving factor behind choosing them was the cool domain...
|
|
|
Well, one problem is that altcoin developers will simply build their coins using the Bitcoin blockchain so that they can call it "Bitcoin 2.0 technology" and avoid being lumped in with all the other coins in the altcoin section.
The other thing is, "Bitcoin 2.0 technology" is a very misleading phrase. Mastercoin/counterparty are not part of or "officially" supported by the Bitcoin protocol specification nor are they included in the reference client. It's possible future changes to the Bitcoin protocol or reference client could break them.
Bitcoin has been studied carefully by some of the most respected cryptographers in the world, these other projects (by projects I am referring to all altcoins/technologies) have as of yet not been and could have really dangerous flaws (intentionally or unintentionally) for all we know. In the early days of Bitcoin serious problems were discovered such as the time billions of BTC were mined in a single block requiring a hard-fork.
Until these other projects have been carefully audited/studied it is obviously a bad idea to be trusting them with millions of real dollars like people are right now, they need to grow slowly and naturally and people should know using them carries significant risk. Calling them Bitcoin 2.0 is not only misleading but extremely dangerous as people may think that they are officially part of Bitcoin and have been carefully studied since 2009 (technically since 1998 as Bitcoin is clearly based off of Nick Szabo's work on Bitgold), which they have not.
You may claim that mastercoin/counterparty are different to other altcoins but they carry much of the same risks until the projects have matured as much as Bitcoin has. Taking them out of the altcoin section sort of implies they are safer, when they are not.
PS. about the thread being moved, I didn't even see it until it was moved to Meta. I honestly think more people will see it here and it is clearly the correct section.
|
|
|
Also, there are "Red Alert" scenarios, that would fix malicious attacks in the shortterm, even 51% attacks, but there is nothing longterm!
Sure there is. If we are being 51% attacked by a miner using SHA256 ASICS we could switch to another hashing algorithm. If we are being 51% attacked by some multi-purpose hardware that can efficiently run many hashing algorithms, then we can replace the POW system with something else. While these kind of changes will be hard to swallow and you may have a hard time convincing people to make these kind of changes, they are always an option.
|
|
|
The easiest way to do this is by destroying every copy of the Blockchain in existance and inducing amnesia in every Bitcoin user.
Anything less than that will be rolled back. You can have a kill switch that works "temporarily" and may cause mass panic and losses for Bitcoin users, but whatever you do can be undone.
|
|
|
Just to be clear: I'm not accusing anyone of anything. I would never do that unless I had something other than my opinion to back it up with. I'm hoping someone reading this may learn a valuable lesson is all. your right but luckily that not the case! If you don't know who I am then you should check my trust and check my 3 threads for all the starbucks that I sell. You will find all happy computers that keep coming back and not ONE person has reported any issues with their cards!
While that may be the case, lets dive into some Bitcoin history. There was a user here named PirateAt40. He was the highest rated user by far on http://bitcoin-otc.com (the forum didn't have a trust system back then so this was what most people used for feedback). He offered an investment scheme where he paid 7% interest a week. He paid every week on time in full for well over a year. While some people were suspicious of the scheme, their voices were drowned out by the people proclaiming his trustworthiness, pointing to the fact that he always paid on time, was a very good currency trader and his identity was well known. He even met a few users face-to-face (he paid to have them flown out to meet him in Las Vegas). He also had acquired so many Bitcoins that he was somewhat able to manipulate the Bitcoin price, convincing even more people that he was legitimate as they thought he was a very good trader who was making tons manipulating the Bitcoin price. He became so successful lots of other trustworthy users began reselling his scheme which lead to all kinds of problems when the scheme met its demise. He kept this up for over a year, paying on time in full every single pay-day. He did not have any scam accusations or anything - he was completely legit, before he suddenly ran off with all of the Bitcoins he was borrowing via the scheme - which at the time were worth in excess of millions and are probably now worth hundreds of millions. Moral of the story: Past performance does not equal future performance.
|
|
|
Collateralized with Starbucks gift cards.
It's probably too late to tell you this now but if Starbucks gift cards can be bought with a reversible payment method such as a credit card or PayPal, then they are likely unsuitable as collateral as they may have been obtained fraudulently. If that is the case and it is found out by Starbucks they are well within their rights to dishonor the gift cards, leaving you in the red.
|
|
|
The BTC in my brain is for long term storage. By the time I need to spend it, there will be wearable tech that detects my unique heartbeat (we all have unique heartbeats) to secure my transactions.
Oh no! your wearable tech contains a backdoor that transmits your heartbeat data to an attacker each time your heart beats. Bye bye BTC... I'm not afraid of this because I don't use USB ports .... they are disabled from BIOS Until your BIOS has a backdoor that enables them or just steals the BTC itself. BTC gone. Unlike the above one these are actually not uncommon. http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/PS. I know I'm being silly but everything I said is not that difficult to do in the grand scale of things. In reality an attacker who wants to get your BTC/data that bad will just drug you and hit you with a wrench until you give it up.
|
|
|
Personally I've got nothing to worry about until USB can plug into my brain.
What about when you go to spend your brainwallet? You remember and verify all of the blockchain data in your head? and you do all the ECC math to sign transactions in your head?
|
|
|
This is why you use a HDD or SSD as cold storage. I always figured that something used so widely would cause a lot of problems if an vulnerability was found in it.
Everything described in this article is possible to do with a HDD or SDD. And this problem isn't just limited to storage devices, it encompasses ALL of your computer hardware. Similar attacks have been done by modifying a motherboards BIOS, firmware on network cards, and this has been known for a LONG time. http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/Think about it: even your mouse could have a tiny wireless receiver in it that would allow an attacker to move it remotely, or be pre-programmed with a macro that executes when you're not using it. Or how about your Trezor (hardware Bitcoin wallet)? Even the NSA leaks showed us that the NSA intercepts computer hardware in the mail going to "targets" and make modifications to it: http://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spyHow do you prevent it? If you feel that an adversary would try these kind of attacks on you, source all your hardware from reputable sources that you trust and if you know how, check it hasn't been modified in any obvious way - just like you should do with software you install on your machine.
|
|
|
This key has been revoked, my new key can be found here: https://bitcointalk.org/index.php?topic=768727Below is a copy of my GPG public key. You can use it to encrypt private messages to me or verify messages from me. I will ALWAYS sign my bitcoin addresses with this key, and if you ask me to sign a message I will NEVER refuse to do it. If I refuse to sign a message consider my account compromised. I don't think many people will sign my key, so be sure to check its authenticity by verifying it from multiple independant sources as this post could be edited by an attacker. Fingerprint: A9DF 9A8A CC52 8291 F675 EA26 B201 CD2E 94AB 8CA2 Use this command to automatically get my key from a keyserver: gpg --keyserver hkp://keys.gnupg.net --recv-key 94AB8CA2 Here is my public key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0
mQINBFPWw+EBEADnNKsofbwklf6+SPAPFYtfV8K1z9cuxWZ10d4+wexghy1CDeuP /ohYUH6UoXxzrpwuAlprSDD1jhOg8YML9cMBXaOncVlDDBB1I3TUJfr9SE/KeYBz jruv1nN5K8XPs3hMZx5BYlxQkJRyt8M3a4Z2HIiIj8hxZwOWxT76dcLxJORWsKA2 oKWl0QoCTshEHDWSjEk3krLZLkyCfwVEANeh8/MWDOvEbbWcbCUkmXve/znM55Tn wBOFefFoB0xmq8/UnIunTujvdIRul11DPzeH58yaHbT1WXHlG6qTDctKxWFnoZ8c P7yb6HuWtnBXZ6JL/AE8/gX/EZ+oXFnL/o6q9Q7SzL2zaSzEZYYWvZqXwqvkMg46 BhHoE0yP8G9CuVj5YnvxFfBsneJnmJ6h+6Oaj1xqwmDMdJCE1E5ct9DPir5DV2Z8 NdbcUAl0/dg9+vKfDuOBiHvMbckmO2zXSabpe0RVIxoqO5OOmjASpZYIiKFhioFi TV2oetCD6U+KLkxo4UkpPE4xsVRmV6icir4nlgWULnEsjtL8R6B31ddRXIdKNhJz BzG8LvKV978j5z4KyC7z+BdKjdW3PUyjlNpqodVyFuUyQFcFSK2tOlMIFQYXNmYR 5ojhOP93KPFVctCBVjn/kT/K3cCnwUC5xJ0Qmnr244vf2HfNk+Ci0miJrQARAQAB tEdGb3Jnb3R0ZW5QYXNzd29yZCAoSG90IEtleSkgPGZvcmdvdHRlbnBhc3N3b3Jk QGJpdGNvaW50YWxrLm9yZy5zZW5kLnBtPokCOQQTAQIAIwUCU9bD4QIbAwcLCQgH AwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJELIBzS6Uq4yitM0P/Rq0XFjMaCz4KJiF VeunLiIyMWPv08qy3pBW/3QHqOMsMvqC2gTlOarcOWxxPA3UUDufPH0WWpMROBuT oxtQRatpvniJJ5RI+2/2eoDvS0QjVFgnvA+ccbrTjdT8/AdYv9IirWghuLgNQy8C uCP/iyW1AceDr/NRMjKPTY/tPnLvu9H0aoCkRSFh9vdupwRh1k9OQENuuawq916D x4sBieWIeMcnpZ9q+5BNUOzJ9YqQB1iIuH3MWtUT+y8GcaiGDZbrtU/14ednkH2g gQMFPHUt1zBWy6grS5k/i6vlIpiGopdOkKq+Xwwb976DToB5m9PxXs35pF/aWRQT PQYoDg0WIxTWXb6g1bl1hsCkzk+m0WalOMKgQv1QJ8uHk0c1i5dHCNpqWaK2owq3 VDWyFS9HSePupMoiW8G67z+7PLhaEYA7WvWFV/8HWay9MFEQxdnJJtVSOm+VvxYz cnzh5ddWFSFVfknlbfm4KPFRzYKs1kEIDMwDrFn/FohIvYG3aBZFdO0KkX74xC9M yA+4Ygo/Nha/EQpDuLkmRiZKa21kQoV+SjmEN8iIh8RSryz5ZgAPZx3/WWzR1onZ h80QQsXOkwqCiOqq8C3jjOVkCtSCVJWz1c4IkaQ7Sf3cTObdl3VjUa4GYj2n09Y2 MALu3+2OiO0VzDay737o5df6fcdYuQINBFPWw+EBEADXzr0MzkCirlMvHvOikmFo taLcNLPz4qFttU6j+7N5sNFakrFNSlbJOf9gLjSwjLTQcN/7aVfv8uncz9Zwnh9Z HrVhbfRl0gtgg4oVTMCkP8QKVpUFShatjy3a79pVxeh2dCgNifTbXWDqFcJskcRe cznq/mG/qOTSHh5XZVBl68o3OxWe4f59DoblxKdtr2Ro7DtcBut9nsJZ1MW41kJX rpKCFGk1ko7UOy2hnrvjV8djrkX1yQrJ7LdK7p5mwWfVkVZjbkuUdI1ydLC6JmNR rkDJ3UlX1ixSrqeZqAp9chj+/cErwKU2YRrFLj6/g6Qka03xCP7t0RwbmHsNU0lN B2AdmwdpguTfU86uIkAaIANQGHXuURV4Z+/B5zLxuTJizS+XggBYrAIq4NKt+SG9 soe1/ykyO5DRMBcxGNlhav3PFbttnO805646+5lc86SZqd7MM0WjlmhL4Jq+tVFS lvcgnoIa6rQIW2029d7d2wTTIjtRwu6KPANiy/HySTHEB06WYSAvpyIu+y2samRF Ai4+wVQ2kOvIMH+8bWG/zj3zf6zARCtjPf9fJM5s9GMDu/NWoWa5tMG6A8UHs87Y QNAzWKPWdKDAFCf4F0lhuALPjuxDzaK9Ni2k/TJOLjPYQNMMliqB83vUXacBBI7z E7+QWjoP2fBSAwg5WKiblwARAQABiQIfBBgBAgAJBQJT1sPhAhsMAAoJELIBzS6U q4yid2MP/3qyQu5CbVN4IdqrQeSZgXlmorpj+EzGx8Y/avfEomrUkW6VMZAYOGqq Hdcc2Fyqodp6xm/dfVSJJttRwsyBHINCOhZXMUheNe9zP7dhZGs6tXcJNsElk+pR mDIXyn5To1/gFK6S0quZO4bygt5dk1uhEd8Ds67hnQKklD/yEPzWGNaNDfVp9Qer cP0nF41BnnJC7DZsX/wlMw9EtEqgq3ozx8cXwSbWC/Povyv5sPaXiDWGINF1xrtg NkrVxDHqAkDPT4WUhlCx3HvQY5aqPcDsCLJk5k9uCL55hb1vXpN5lMwhLV/3akKR U5W9zFbeTWZb0z5r35CwK9KZiLbuwJSabgoQ5i6h79IYB3wsF4l/brA6HavkuG4+ ZUEPSPlbhkBTBApwAW/K2jJx4ojce6+GcgWTmOYkMq165iwyH3fYHABJfD75+9Gr nltUN+pesIx4xIrXRrnF6wYHZTHMrC+4am3bkVqglvnx/a8cyfGlbEc5ZT2ZlJKL m1S1rjX+BJOCTzh3Cdg2TzBkE/SWq228zTl6FBuxrXhH9ObHi+0wT870mXGGTmRi GiIUnrK+AHdCo++x+TtKgqP4hhMhdYmyHbOQhLYvKBwfkWrFFXObD/RA0jaZ9bQN YGG52pvL0c40JggxiYkS4I71xhS+OcyrwWYWPsALwMhF8AlIP0Ye =IWnr -----END PGP PUBLIC KEY BLOCK-----
|
|
|
I recall reading a thread about a forum treasurer who suddenly passed away.
What ever happened to the funds he was holding? Did the family ever contact theymos?
If I recall the Bitcoin address containing them was known. Have they been moved?
I'm wondering did the treasurer have some kind of system in place that would allow family to get access to the funds. I think this is something lots of Bitcoiners forget about even though it is seriously important.
I have been putting some thought into this and I'm convinced there must be an easy trust-free way to ensure loved ones will get your BTC if you unexpectedly die using nLockTime and I'm thinking about diving into it deeper and hopefully make a tool to make it easy to do. If anyone has some information on this topic please let me know.
|
|
|
Yep. This kind of thing happens all too often. People be careful when you press send! My personal favorite: https://bitcointalk.org/index.php?topic=135665.0111BTC sent as a transaction fee... incredibly lucky to get it back, he was so lucky it was a known pool who got it let alone an honest one.
|
|
|
How many people can NSA follow? Let's DDOS them going everybody on this site :-D
Haha! I would love to try that but I highly doubt we could pull it off. http://en.wikipedia.org/wiki/Utah_Data_CenterThe Utah Data Center, also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center,[1] is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger.[2] Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified.[3] The National Security Agency (NSA), which will lead operations at the facility, is the executive agent for the Director of National Intelligence.[4] It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in late 2013[citation needed] at a cost of $1.5 billion. 1 exabyte = 1 000 000 terabytes (TB) So suffice to say they've got enough disk space. I think the real way to fight the NSA is to fix the internet. Replace DNS, replace SSL with something more lightweight and auditable, replace the Certificate Authority model and re-educate people who do not understand the importance of privacy. If we can pull that off we stand a good chance of winning the battle.
|
|
|
now wait, you have 6 servers with core on them and you don't mind?
what are you doing chasing transactions?
makes zero sense to claim to have servers loaded with core and do no mining
what you gonna use a full blown core for
go bang your merchant biz through coinbase and swipe to electrum or something you don't need a full core on a server to do merchant trans for yourself
I don't know why I'm still replying to this but Electrum doesn't have a good API (does it have one?) it can't keep track of each users balance like bitcoin-core can and Electrum servers can do bad things like pretend transactions didn't happen, while bitcoin-core is completely trustless. And I also connect direct to the pools and relay transactions direct to them so that I am sure my customers payments will confirm in case they didn't broadcast correctly (happens a lot to people with crap internet). On top of that the Electrum code isn't as well studied as bitcoin-core and could have really bad bugs, I ain't taking that risk, look what happened to mt gox! (well, what they say happened). Use coinbase? LOL Why would I pay them commision? why should I trust them when I don't need to? They will probably pull a massive scam someday say they were hacked like every other service that "holds" your bitcoins for you. I also use some of the nodes for cool experiments, like trying to de-anonymize scammers (psst).
|
|
|
can you show a site with more nodes than that
blockchain have only 400 or so nodes on their network
Thats only the nodes that Blockchain's node is connected to right now, and its limited to max 500 at a time. They can only monitor 500 at a time which is why like I said it's difficult to monitor every node, even for someone as big as blockchain. that's how numbers work
I tried to read your explanation but I got a headache, your writing style isn't the easiest to digest... almost 8K nodes and they show 40%+ usa yet franky was no way that's WRONG
now you're saying yeah it's right but you think 8K nodies is off
personally it sounds right to me, 8K full core servers doing mining
Not all nodes are miners. None of my 6 nodes mine. Many websites and services need to run full nodes too. Nodes are run by merchants and pools, things like that, not miners or people by in large. 8K is the core user base IMO and that's the group getting the mining done
There is definitely more than 8,000 I can promise you that... now if you have a site with way more nodes show it
It's not easy or cheap to get the IP of every node. Back in 2011 when there was very little Bitcoin users there was a site that listed 10,000 nodes, I forget where it is or if it still exists. But even if you look at the amount of downloads for bitcoin-core or the bootstrap.dat torrent on a daily basis, you can see there must be way more than 8,000 nodes out there. I would love to try and count all the nodes using ZMap, maybe one day when I have time and spare money for a powerful enough server I'll do it. Even then though I would only be able to count those listening.
|
|
|
|