I see there are many providers now accepting Bitcoins. But all of them has very stupid rules saying that torrents are not allowed and copyrighted material not allowed... I think it is bulls****. I'm a member of the Pirate Party and I believe that non-commercial file-sharing should be allowed. I think service providers that have such limitations are kissing asses of copyrigh-mafia and supporting idiotic laws.
So I'm asking if anyone knows a VPS-provider that does allow torrents and so called "pirated" content. After all it is my decision what I put on my server, the provider just gives me a place for that.
I share your views on copyright law, but I do not share your views on whether a VPS provider should openly go against the law. Whether or not we agree, copyright law is still in effect and hosting providers should abide by it to protect themselves from liability, not put themselves at risk of liability.
|
|
|
I have the following: A private key (or several) A bitcoin address I want to send funds to No blockchain
How can I create a transaction which I can then transmit into the network that will send funds from the private keys to the specified address with the following constraints:
No reliance on third-party services No bitcoind
Is this even possible or not?
I suspect it to be impossible without knowing the previous input transaction for the provided private key, so what is the simplest way to find those input transactions rapidly?
If I remove the "no bitcoind" constraint, is there a simple way to do this without importing the private key into the client wallet?
|
|
|
Awesome display! Yes, that's all I can say
Hey, it rhymes
|
|
|
The point is to encrypt what's REALLY sensitive and hiding it behind something that's embarrassing but not sensitive.
Gay porn is plausibly embarrassing enough that people would encrypt it and when the Bad Guys™ come calling and ask what the encrypted data is, you can show the gay porn without revealing the REAL data.
Unfortunately, there are still countries where you better should unlock your bitcoin wallet to oficials and pretty darn hide gay porn. Better choose something still embarrassing and not illegal anywhere. Hmm, what about own attempts to poetry? I'm basing this on UK and US law, where "vanilla" gay porn of 2 adult men doing stuff is legal but embarrassing to possess. Obviously if you're in a different legal climate you should use other material, your own attempts at poetry might be embarrassing but it's not the kind of thing people usually realistically hide, whereas your collection of gay porn or whatever is. Porn in general is something that's "dirty", and thus people will plausibly hide it, especially if it's not the vanilla kind. If you are an "out" homosexual of course the above should be altered - perhaps gay guys should hide straight porn instead. It probably says a lot about me that I struggle to think of material other than porn that would work for this trick. what's 'vanilla'? you mean softcore? ...softcore to hardcore is a blurred line that still puts you at risk of some overbearing authority's subjectiveness. it would be embarrassing for a die-hard rock fan to have a stash of celine dion mp3's... but there we go again with the legal issues. Vanilla means ordinary
|
|
|
The point is to encrypt what's REALLY sensitive and hiding it behind something that's embarrassing but not sensitive.
Gay porn is plausibly embarrassing enough that people would encrypt it and when the Bad Guys™ come calling and ask what the encrypted data is, you can show the gay porn without revealing the REAL data.
Unfortunately, there are still countries where you better should unlock your bitcoin wallet to oficials and pretty darn hide gay porn. Better choose something still embarrassing and not illegal anywhere. Hmm, what about own attempts to poetry? I'm basing this on UK and US law, where "vanilla" gay porn of 2 adult men doing stuff is legal but embarrassing to possess. Obviously if you're in a different legal climate you should use other material, your own attempts at poetry might be embarrassing but it's not the kind of thing people usually realistically hide, whereas your collection of gay porn or whatever is. Porn in general is something that's "dirty", and thus people will plausibly hide it, especially if it's not the vanilla kind. If you are an "out" homosexual of course the above should be altered - perhaps gay guys should hide straight porn instead. It probably says a lot about me that I struggle to think of material other than porn that would work for this trick.
|
|
|
Oh, that's assuming you did calculate the headers right of course - test with a balance query first.
|
|
|
It's the order of parameters - it needs to be precisely the right order
|
|
|
If anyone asks, I really am into gay midgets - they're so hot.
|
|
|
This reminds me of the best way to use TrueCrypt's hidden partition trick:
Put gay porn or pics of yourself naked on the outer partition - anything that is embarrassing (to give a plausible reason for encrypting it) but both harmless (aside from embarrassment) and 100% legal.
there are many reasons for encrypting less embarrassing documents... for example source code that you've developed that you want to keep out of the hands of the competition for as long as possible. even things like 'lists of available domain names worth registering' would be best kept encrypted until the time comes to actually register them. i guess i'm the more cautious type, but my 'my documents' directory only has one file in it. A 20 gb truecrypt container. i'm sure a lot of people who don't encrypt would feel quite violated if their pc was ever stolen. for me, it would just mean buying a new pc, and asking a certain friend for that encrypted bdr i stashed at his place. The point is to encrypt what's REALLY sensitive and hiding it behind something that's embarrassing but not sensitive. Gay porn is plausibly embarrassing enough that people would encrypt it and when the Bad Guys™ come calling and ask what the encrypted data is, you can show the gay porn without revealing the REAL data.
|
|
|
This reminds me of the best way to use TrueCrypt's hidden partition trick:
Put gay porn or pics of yourself naked on the outer partition - anything that is embarrassing (to give a plausible reason for encrypting it) but both harmless (aside from embarrassment) and 100% legal.
|
|
|
yeah, step-4-infinite-loop-attack. + none-of-the-wallets-look-like-a-plausible-real-wallet-so-i-continue-to-hit-you-with-a-$5-wrench-until-you-give-me-more-wallets-attack. btw: how exactly to you give them a secret wallet without doing the xor operation in your head? i mean you cant really tell them "my key is sha256(helloworld12345) xor privatekey" without revealing your method.
You don't need to keep the method secret. The point is that for any private key, there is an insanely large number of possible keys to XOR it with to obtain a new key. Write some software that loads the private keys from step 1 from a file on disk and then uses a second key to decrypt it - that second key can be one of many, some of which are fake. Step 3 should be clarified - you don't build the secret wallets using mere numbers, you build your secret wallets using passphrases, and there's as many passphrases as there are possible private keys
|
|
|
1 - Generate a set of private keys with high quality entropy 2 - Hash your password+a numeric string to an SHA256 hash 3 - XOR the hash from step 2 with each of the keys from step 1 to get your new private keys 4 - Repeat steps 2-4 an arbitary number of times to create multiple hidden wallets 5 - Pay small amounts into all your addresses 6 - If cooerced, give the password for a secret wallet with hardly any coins in it
Anyone got plausible attacks against this scheme?
|
|
|
One note to everyone: Take care of the copyright issue. People who first upload something are prime targets, so please pay attention and don't be the first target.
|
|
|
I'm sure I can livestream it in HD, just shoot me a reminder a day before- I feel like I'd forget If i'm online at the time you'd better give me a URL too
|
|
|
The limits issue should be resolved now - please let myself or Yankee know if it isn't
|
|
|
Technically financial harm is a form of hurt - would you hurt yourself financially for bitcoins? Sell me 2BTC for 1BTC for example?
All kinds of silly stuff could be done here....
Being serious though - especially if you're doing anything to do with BitInstant please don't reflect badly on our brand, I reserve the right to be the sole crazy guy involved.
i'll pay you 1 btc to give me 2 btc in exchange for 1 btc Functionally that's already happened. You pay me 1BTC This authorises the trade of 2BTC for 1 BTC, so you give me another 1BTC and I give you 2BTC Which means in sum total you give me 2BTC and i give it straight back
|
|
|
Need to check security and server capability of incoming project.
Need DDoS attack, at precise date & hour.
Open to your offers.
If you need to check security and stability, why do you need an actual attack performed? You'd be better off working with a consultant if this is legit, and there are ways to loadtest your system without using questionable means such as DDoS attacks (which could very well involve botnets and thus be illegal). Having said that, i'd happily give you a security audit and assessment for about 10BTC including full recommendations on how to keep your site operational. Please PM me with the URL and proof of ownership and we can discuss.
|
|
|
Technically financial harm is a form of hurt - would you hurt yourself financially for bitcoins? Sell me 2BTC for 1BTC for example?
All kinds of silly stuff could be done here....
Being serious though - especially if you're doing anything to do with BitInstant please don't reflect badly on our brand, I reserve the right to be the sole crazy guy involved.
|
|
|
I have a (maybe silly) idea .. replace proof of work with proof of time. Instead of mining, run some time consuming process, which cannot be done faster, after which the proof of time will be the lottery ticket to win the block reward and secure it, too.
For example, imagine a device which is natural random number generator - let say a radioactive decay material with a beta particle detector (classic may know that a sufficient hot cup of tea may work, too). The detector will try to search for a rare event in the incoming stream of detected decays, like special sequence of delays between each detected particle. Or, the device may wait for all 2048 molecules of argon to collect at left part of some volume (unlikely, but with the Maxwell's deamon help, possible). Or, waiting for the special mutation of bacteria with large prime number encoded in its protein. Or, those who really understand quantum mechanics (yeah, I mean those 10 people on Earth), can bring up something even better.
Of course, such a device must be self-contained, where the part of testing the work is integral part of the device, cannot be cheated on (like faking the generator). This is the hardest part of the idea to implement and I know it. Speaking in words of one-way functions, the device must somehow report found solution, and somehow prove it, to avoid faking. Simulating the process on any fast computer must not help to find it (nature and its atoms are faster).
Such a device will silently, with minimal energy, run its lottery and its user can only wait (or collect more devices) until a possible solution is found and block secured.
As I said, maybe silly idea.
Fails the feasibility test and when you look at how to prevent fake readings you run into a brick wall and can't describe further. Not to mention that most of what you describe varies by observer and thus can not be verified by other observers.
|
|
|
I should add another rule: It must be feasible to actually implement and must support multiple untrusted users
Here's my solution:
Reduce the whole network to only 2 people who are best friends
|
|
|
|