Bitcoin Forum
May 27, 2024, 08:00:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 »
461  Other / Archival / Re: delete on: September 21, 2014, 08:13:46 AM
So it is unsure if I have proven amplification, but I would say it is very likely.

Remember, we had already proved amplification, if by amplification you mean that the attacker can gain knowledge of additional payment linkages beyond those revealed directly by knowledge of his own outputs (our research bulletin called this a chain reaction). http://lab.monero.cc/pubs/MRL-0001.pdf

In that sense I would say you have proven amplification, since your method identifies all of the cases identified in our paper.

It seems likely at this stage that your method will also demonstrate additional amplification, but two things are needed:

1. To show the additional amplification indeed happens. This seems relatively easy.

2. To show that it is a viable method (resource requirements to achieve #1 are reasonably feasible). Not sure about this one, but I would say >50%

Almost there.

BTW, I don't think the BBR feature is directly effective against Sybil attackers. It prevents disclosure to the public (for example by someone spending without a mix) but a Sybil attacker can easily create these min-mix outputs, and then you will choose them as your "safe" mixin. But the damage is done as soon as you use the attackers outputs in a mix (he knows his are not the real ones so yours is identified by elimination); whether or how he spends does not matter.

The BBR feature may slow down the rate of chain reaction sunder some conditions, I'm not sure.

In any case we move on to...

Quote
BCX has admitted in the trollbox that he needs a TimeWarp attack to rewind the blockchain and spend the private keys he cracks. He claims he has that TW attack and he also thinks he can crack the private keys. But we have not yet figured out either of those two things. And we are skeptical (well lets say they are skeptical and I am not sure what I think, I'm too sleepy).

Agreed, except I would say the skepticism is greater on the math, less on the code.

Just read this. Seems all very reasonable at this point. I don't know why anyone is saying the devs are skeptical about my contribution.

Smooth is referring to the "Outs with guaranteed anonymity" feature of BBR, which would require a hard fork to add to XMR.
462  Other / Archival / Re: delete on: September 21, 2014, 08:02:39 AM

The 11 BTC is too small to compensate me for the time lost. It is a matter of principle. People who break their word of honor with me incur my wrath.

Look, I really don't want to know about what is too small to compensate for what you require compensation for.  That sounds like a personal problem.

And your breath is probably enough of a wrath so I am glad I'm not in your physical presence.

Douchebag.

Would you prefer I quit now?
463  Other / Archival / Re: delete on: September 21, 2014, 08:01:17 AM
I have been thinking why OP made this thread, I can only reach to one conclusion, it was all a bluff and he didn't expected anyone to believe, the problem is he has a history of social engineering his BS to harm coins, news of CN code being obfuscated reached him so he decided to "strike" again, what happened was someone (anonymint) said to had an epiphany about a possible bug, maybe as the experienced individual he actually is, looking at the abyss for long enough he thought the abyss looked back at him, note that the possible exploit "found" by anonymint does not allow privatekey seizure nor can limit anonymity as result of a fix, the result imply either OP is a genius at level of satoshi or total scum bag. After the news from anonymint reached him, he decided to "change" his plans and announce an "attack" on XMR with a long enough dead-line to people shake in fear, because now his plot had "external verification", or so he wanted us to think, furthering his agenda of exploiting fear on the nascent XMR community.

He probably want Monero hash-rate to drop low enough so he can fire up his mining machines and make an actual damage with 51%, or just buy low.

Everything you wrote is plausible except for "nor can limit anonymity as result of a fix". I am not sure about that yet. Still trying to characterize it and potential mitigation.

Also I take exception to, "looking at the abyss for long enough he thought the abyss looked back at him". My philosophical beliefs about coming global economic smashup 2016 - 2024, doesn't leak into my rational programming. I don't see how it can. For example, in my private conversation with smooth, he wrote "well as the chain gets is arbitrarily large, there is [no] guarantee it will even produce any at all (in viably finite time)". I agreed and responded with a tweak to the pseudocode.

This is complex shit that is above most your pay grades.
464  Other / Archival / Re: delete on: September 21, 2014, 07:50:56 AM
BCX and TFM are playing good cop/bad cop.

I've never known him before yesterday. I have no such relationship with him.

I will get my 11 BTC bounty whether he attacks or not (if I am correct about my contribution).

So you are wrong as usual. STFU!

You will get nothing and you will like it.

jl777 has promised I will get his 5 BTC portion. What the hell is wrong with you? I am trying to help. You need to go find your meds. Make one more asinine post and I am putting you on ignore.

The 11 BTC is too small to compensate me for the time lost. It is a matter of principle. People who break their word of honor with me incur my wrath.
465  Other / Archival / Re: delete on: September 21, 2014, 07:41:00 AM
BCX and TFM are playing good cop/bad cop.

I've never known him before yesterday. I have no such relationship with him.

I will get my 11 BTC bounty whether he attacks or not (if I am correct about my contribution).

So you are wrong as usual. STFU!
466  Other / Archival / Re: delete on: September 21, 2014, 07:38:10 AM
There is one sure way that your private keys could never be stolen by such an unconfirmed, hypothetical, threatened attack.

Make sure they've never passed through a ring signature since mining.

Checkpoint won't help us unless we can get it distributed out to all mining nodes within 72 hours.

What do you mean "Make sure they've never passed through a ring signature since mining."?

Make sure you can trace the ownership of your coins on the blockchain back to their coinbase mining transaction, because every tx they were involved with did not mix with any ring signature, i.e. n=1 in the CN whitepaper. Although that won't work if the CN code still applies the I=xH(P) when n=1. But that would be silly for the code to do that, so I assume it doesn't (haven't checked).

But it is silly for you to even do this, because if many of the other coins were stolen, the value of your coins would be destroyed too.

So the best is for us to analyze this. We need some time.
467  Other / Archival / Re: delete on: September 21, 2014, 07:30:07 AM
Please be nice?  Civility is one thing, pleasantry is another.  This is real money we are talking about. People don't have to be nice.

If you have real money at stake, and if he has the attack, then being nice is the way to protect your money, as we probably need the 72 hours to analyze this fully.

Plus, been on #monero-dev all night and the core devs don't seem nearly as existentially concerned as you are.  Perhaps I am misinterpreting, however something just doesn't smell right about this whole thing...

Maybe that is why he is escalating his threats, if the devs are may be making the same mistake as past coins which started to act arrogant.

Any way, I have not yet read their latest comments, so I don't know. I need to go interface with them now. I just woke up.

BCX appears to like coins that are much more interested in fixes than in denial. I have to agree with him. I can promise him if I ever do an altcoin, I will take his audits very seriously and I won't act arrogant.

I can understand being upset that he hasn't given us all the information upfront. Maybe he can't ascertain that some party in the chain of command wouldn't use that to attack before it could get fixed. Maybe that is why he wants us to fix it, even before we fully understand all the tricks involved. Although I am not quite clear if we can fix without knowing all the tricks involved.

And again, he could be bluffing. That is a possibility.
468  Other / Archival / Re: delete on: September 21, 2014, 07:25:05 AM
There is one sure way that your private keys could never be stolen by such an unconfirmed, hypothetical, threatened attack.

Make sure they've never passed through a ring signature since mining.

Checkpoint won't help us unless we can get it distributed out to all mining nodes within 72 hours.
469  Other / Archival / Re: delete on: September 21, 2014, 07:11:02 AM
So to clarify, Anonymint is working on the same exploit that Tacotime is already working on, and is no big deal.

And BCX is still lying about having the super exploit to steal funds. Why doesn't he just steal 500 bitcoin worth of Monero? Sounds like he can't.

This is entertainment, but not reality.

We don't know if he can or not, although we might be very skeptical, it doesn't help for you to push him.

If he does that, he destroys the value of the coins he stole.

My understanding is that the only people who can loan a huge amount of XMR for shorting are the whales, who thus I assume won't loan him the XMR so he could sell them before such an attack. Also they want BTC collateral so they might not return the BTC after such an attack. Perhaps this is why he challenged Rpietila to a 500 BTC escrowed bet.

I wish you all would stop punching him in the nose. I am trying to think and work on mitigation, so we fix everything within the 72 hours if there is anything that needs to be fixed.

I am trying to be careful with my words, because even though I feel reasonably confident there is a problem that needs fixing, I haven't written down proofs and exactly mathematical characterizations of everything.

Again we have not yet confirmed math for how he could steal coins. But that doesn't mean it is impossible. Normally it is impractical to factor a private key from a public key, in the equation P=xG mod l. But because the breakdown in the anonymity identifies the sending key P(i) where i = s, then another equation is revealed from the one-time ring signature, I=xH(P) mod l. If there exists some trick for factoring that is sufficiently sped up by combining the information from the two equations, which would make cracking the private key 'x' plausible, then he threat would be real. But we don't yet know that trick, if one exists.

Yeah it is possible that BCX is bluffing, but why push him and erase the 72 hours he gave us to get this fixed.

Note we don't yet know the precise characterization of how much the anonymity breaks down and what % of the coins the attacker needs to own, if any. That is what I was working on before I fell asleep. The CN paper that Tacotime linked upthread already characterizes some loss of anonymity, but seems to say it isn't that severe (note I haven't had time yet to completely wrap my mind around that paper). And they were working on mitigation. I think I may have discovered a method for amplication of the anonymity loss, which may be what BCX's threatened exploit does. But I haven't yet characterized my algorithm mathematically. I just wrote down some pseudocode. Now I need to go talk with the CN devs to see what they think or discovered about my pseudocode.

Please be nice.
470  Other / Archival / Re: delete on: September 21, 2014, 06:57:24 AM
http://lab.monero.cc/pubs/MRL-0001.pdf confirmed flaws in monero - crypto note is doomed-  stealthcoins chandran signatures is obvious the way to go

I haven't studied chandran signatures, so I don't yet know if they wouldn't have similar or the same problem.
471  Other / Archival / Re: delete on: September 21, 2014, 02:10:50 AM
Quote from: private message
So since i am a bit lost i would like to ask you that:

Even if there is an actual bug and it gets confirmed, can it be fixed? Whats your take on that...


P.S. Just the day that all this is happening my S3 died and i cant login to polo because of 2FA. So i dont even have an option of what to do Tongue

I answered already upthread.

My opinion is subject to change, but for the moment before I sleep I feel the aspect of an attack that can reveal spenders is very likely. However without the ability to crack private keys, then what is the financial motivation of performing the attack?

The cracking of private keys is much less likely, probably unlikely.

Also to spend the private keys requires a TW or 51% attack. Any TW attack hole can be fixed.

Also the Sybil amplification against anonymity can likely be mitigated somewhat too.

472  Other / Archival / Re: delete on: September 21, 2014, 01:55:54 AM
The "Good enough for you irmeli?" wasn't there when I read it. He must have edited the post.
473  Other / Archival / Re: delete on: September 21, 2014, 01:50:53 AM
don't take my word.  look at bcx post history.  to me it says he is not going to hit xmr.  if otherwise i would like evidence.

What makes you think the Polo trollbox thing was fake.  Man, I was there.  Seemed legit. I copy/pasted the end of the conversation on page 5 of this thread.

Edit: this is also reposted in post 192 on the page right before this if you want to find it. 

What I don't get is why he deleted his identity confirmation on BCT
The answer is simple, then he can go full retard like aminorex and claim that it never happened.

I saw he post confirmation in this thread before it was deleted. I guarantee you. Can't be denied any more.
474  Other / Archival / Re: delete on: September 21, 2014, 01:49:49 AM
got some BBR, tho', wonder how this will affect the old Runeberry?

Afaik BCX has explicitly stated XMR and not mentioned BBR.

Afaics the BBR feature that I mentioned upthread doesn't diminish the threat of BCX's exploit.
475  Other / Archival / Re: delete on: September 21, 2014, 01:45:59 AM
What are your thoughts and this 72 hour attack?  do you think it is a legit concern?  is it something different from what you are looking at?

We have not confirmed that private keys can be cracked by this. And some mathematicians are so far skeptical. I have not spent enough time on the private key aspect yet, as I have been more focus on the amplification described below since it is a prerequisite for the private key factoring and it is all I have to prove to collect the 11 BTC.

We have confirmed that sometimes the sender of a ring signature can be determined. But this was always the case due to Sybil attacks. What is new is that I have proposed an amplification algorithm which I think makes a little Sybil attacking a lot more powerful than it was. I believe this is a key ingredient of BCX's threatened attack (but not the only ingredient he needs). But I am having trouble characterizing the algorithm's performance but we are working on it. So it is unsure if I have proven amplification, but I would say it is very likely.

BCX has admitted in the trollbox that he needs a TimeWarp attack to rewind the blockchain and spend the private keys he cracks. He claims he has that TW attack and he also thinks he can crack the private keys. But we have not yet figured out either of those two things. And we are skeptical (well lets say they are skeptical and I am not sure what I think, I'm too sleepy).

So all in all, I think we will find a solution within the 72 hours.

If nothing else, they can set ______ ( I am so sleepy I can't remember the term for locking the history of a blockchain at a certain block forward). Mental block due to sleep deprivation.

Edit: a checkpoint
476  Other / Archival / Re: delete on: September 21, 2014, 01:33:49 AM
i got trolled too. i actually believed that bcx was offering 72 hours to attack.  now i see that it was just a trollbox fake account.

Huh? He posted in this thread to confirm the poloniex account. Also he has sent me PMs.

He deleted his post from this thread. Strange guy  Undecided

I thought the post he deleted was the one saying he had no intention of attacking XMR

that post is still live.

any deleted posts are probably available on the shadow forum bitcointa.lk

No that site can't keep up any more.
477  Other / Archival / Re: delete on: September 21, 2014, 01:26:59 AM
I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.

Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).
478  Other / Archival / Re: delete on: September 21, 2014, 01:21:26 AM
i got trolled too. i actually believed that bcx was offering 72 hours to attack.  now i see that it was just a trollbox fake account.

Huh? He posted in this thread to confirm the poloniex account. Also he has sent me PMs.

He deleted his post from this thread. Strange guy  Undecided
479  Other / Archival / Re: delete on: September 21, 2014, 01:14:36 AM
I probably did the wrong thing and should have only announced my discovery to the developers, so it could be vetted privately first. But my first reaction was how to short because if a coin killer I could earn a lot more. As I realized there is probably mitigation and also as I realized that to short I would be borrowing from the longs who are deep pocketed, that I couldn't win a shorting battle unless it was a fight to the finish and I have no desire to fight with my friend Risto nor the other developers I would like to work with in the future.

So the wisest action is to sell my insight to them if I am correct. Let them work on mitigation.

Wow, what a load of horse shit this is.

First you decide not to short because you realise you'll be profiting from a friends loss, you then decide a better course of action would be to extort the devs, while announcing to the public you have an exploit...and you know full well what that will lead to a dump...which in turn will also result in a friends loss...but hey, they can deal with that right?... you're the good guy in all this right?

So much for being an upstanding member of this community...dick.

I wanted nothing to do with it. Yesterday I received a PM from jl777 asking me how much BTC would motivate me to dig. I said 5 - 10 BTC. He then publicly offered a bounty, which BrilliantRocket upped to 10 BTC, so I felt obligated to investigate. When I awoke today, I looked at the math and didn't find the exploit I expected. So I quit.

At dinner I suddenly had an epipheny on the exploit. I initially thought I would short Monero, because it seemed it was doomed no matter what I did, because I also see another related attack against Monero because it doesn't have BBR's safety feature. I will detailing this in my next post.

But then while waiting for PMs of who would loan me XMR in sufficient size, I started to think of mitigations and then I realized if I short the whales will exhaust their BTC trying to defend and I would probably lose as mitigation would be found. Or if I won, my friend Risto could be destroyed. NFG! (no fucking good)

So then I had to decide if I do nothing, or help. I asked all by PM if we could agree on terms of the bounty.

Since I had already asked about borrowing XMR, I was being bombarded by PMs asking me if they should sell or not. I had no choice but to write a public message honestly.

Never did I intend to cause a price drop unless it would be unavoidable any way.

I agree I didn't operate calmly and methodically enough but cripes man that is too much happening in one day for an old man.

P.S. the younger CN devs have apparently gone to sleep, and my eyes are heavy now too. We've been trying to get the amplification algorithm characterized.
480  Other / Archival / Re: delete on: September 20, 2014, 10:18:58 PM
Well, I may just fire up some XMR miners this weekend.
Just to make it cost BCX a bit more to try this.
So long as he doesn't go off early, this can make it more expensive.
He's not the only one that can light up a datacenter.

No he most certainly isn't.

Careful you don't force his hand and eliminate our 72 hour window to fix this.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24] 25 26 27 28 29 30 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!