Bitcoin Forum
May 25, 2024, 03:03:23 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 [27] 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 463 »
521  Bitcoin / Wallet software / Re: Firmware Upgrades for Hardware wallets their weakness? on: May 20, 2022, 12:40:45 AM
This layered approach is a little bit what Trezor Model T and Foundation Passport are doing; the actual firmware is MicroPython and it runs little Python scripts on top. I do believe that firmware released by these companies upgrades still replace the whole thing, but since the actual base firmware is probably fairly stock MicroPython runtime, there is less risk of the devs messing something up real bad.
Most bricks would likely happen when the bootloader is upgrading. It probably wouldn't matter what the firmware runs on, if you lose the method of communicating with the host device, then your HW wallet is bricked. I think that the devs are unlikely to really mess it up because there is a certain procedure to test the updates against their device before pushing it out. Failing to test it would just be general incompetence.
You don't even have to buy two devices up front; just get whatever is the latest and greatest / most secure whenever your existing hardware wallet breaks / bricks. As I said on page 1, the wallet is mostly an electronic representation of your seed which allows you to quickly use it. But the actual 'set in stone' secure location for your seed should be on paper or metal backup, stored in a handful of secure locations.
Largely depends on if you store everything in your hardware wallet. It might be wise to have a spare hardware wallet so you can seamlessly shift to your new hardware wallet when it breaks without any delay.
522  Bitcoin / Bitcoin Technical Support / Re: Github build vs downloading source on: May 19, 2022, 04:33:55 PM
The official releases are meant to be stable and they are meant for people to use.

You can clone and compile from the master branch but they are work in progress so they are supposed to be used for testing and not for normal users. If not then, you can compile from the stable branch as well (ie. git checkout [version]). You can validate against the signature when you're compiling.
523  Bitcoin / Development & Technical Discussion / Re: Why rely on a single hash function? on: May 19, 2022, 04:20:29 PM
Why would the latter not be possible? Assuming that I can mine essentially for free, I can just re-create a version of the full blockchain, keeping all transactions identical to the original, except for the destination address in some coinbase transactions (those which are attributed to Satoshi in the original chain). Not sure what would prevent me from doing this.
Simply because you won't be able to generate hashes like these just like that. There has never ever been any attacks which allows users to find pre-image in this manner.

You can do that, but the community won't recognize your chain as valid. It is quite obvious which chain to follow.

Ok, but breaking SHA-256 would not imply that one-way functions don't exist (and neither would breaking ten or a hundred different hash functions).

Anyway, it still seems to me that there is a lot (too much) riding on the fact that SHA-256 will not be broken, or if so, that it would be broken in a slow, and visible fashion. I am quite surprised by this, seeing as Bitcoin's main tenet is immutability guaranteed by PoW, which falls apart in case of a break. Admittedly I don't know anything about cryptography, but the single point of failure strikes me as strange.
As I've mentioned, the manner which the topic postulates SHA-256 to be broken seems to suggest a catastrophic failure of it and for which I'm inclined to believe that the only scenario that happens is when all the other algorithms are also broken. Speed ups in the PoW is counter-acted by difficulty increase, at best there would be a minor reduction in the complexity of pre-image but not financially sensible enough to exploit it.

I think there is a clear distinction between what should be classified as a point of failure, which in this case is how the algorithm can become insecure. I don't doubt that SHA-256 would eventually be broken, but what I do doubt is that it would be broken in this manner. The most likely scenario is that we would recognize its weakness decades in advance and when it finally becomes (remotely) feasible, then we would've long shifted from using SHA256 as the PoW algorithm.
524  Bitcoin / Wallet software / Re: Firmware Upgrades for Hardware wallets their weakness? on: May 19, 2022, 04:10:16 PM
People are mainly scared of applying firmware updates to hardware, in general, because of the risk that it bricks the device.

Generally, there is no warranty or support for when your device breaks due to a bad update. It is also unlikely that any technician can fix it, given that bricked hardware is virtually unusable. This forces the user to purchase a second device, data be damned.
I think that it is fairly unlikely for hardware wallets to actually be bricked because most of them actually validate the firmware for any inconsistencies before applying it. Unsolvable bricks are far few and between.
For hardware wallets in particular, I would recommend a Linux "hypervisor" (extremely stripped down to reduce the amount of security updates required as much as possible) as the main OS that then boots up the actual hardware wallet OS.

This has the advantage that if the wallet OS breaks because of some firmware update, a technician can boot up a Linux shell and revert it to a known good version.
That might actually be counter-intuitive. Most hardware wallets are actually designed with proprietary firmware and bootloaders to try to minimize additional attack vectors and possible external problems. Running your hardware wallet inside a Linux Sandbox wouldn't help because you now have to consider the security of Linux as well.

No one would realistically send their hardware wallets or anything to Ledger or the hardware wallet manufacturer. I don't find a point in them giving out warranty if you realize that it is virtually impossible to check if the data is cleanly wiped from your device before sending it to them.
525  Bitcoin / Wallet software / Re: Want to recover funds FROM Multibit 0.5.13 on: May 19, 2022, 02:56:57 PM
Are the addresses that you're trying to sweep empty or do they still have funds?

Do the private keys that you've extracted start with 5, K or L? What errors did you get when you swept it with Electrum?
526  Bitcoin / Bitcoin Technical Support / Re: [TESTED IT] Minimum transaction value on: May 19, 2022, 11:35:52 AM
Blockexplorers are not nodes and they usually have weird criteria when relaying TXes as some of them are custom implementations, which may not conform to the rest of the network. One of the blockexplorers that I've tried before actually didn't allow me to push a SegWit non-dust transaction though the reference limit was lower than the 546 threshold. A more accurate representation would be to directly broadcast to the nodes on the network.
527  Bitcoin / Development & Technical Discussion / Re: Why rely on a single hash function? on: May 19, 2022, 04:39:08 AM
1. Would it be useful in other contexts to be able to find "small enough" hashes?
Most of the applications of cryptography in real life requires the property of it having to have a certain degree of pre-image resistance. If that were to be broken, the hash is no longer a one way function, to which it becomes useless for certain real-life applications. Even before that, we have the collision resistance being broken, which already means that the hash function wouldn't be very useful for sensitive operations.
2. Perhaps there are other very valuable uses, but Bitcoin does have half a trillion market cap. You could for example place a gigantic leveraged short on BTCUSD just before publishing your proof that SHA-256 is broken. Or you could rebuild the chain unchanged except for reassigning the Satoshi wallet to yourself.
The latter is not possible. As for the former, if you were to approach NSA or related organizations directly, you would probably have a guaranteed payout rather than to attack the chain and risk being labelled a criminal and getting yourself investigated. You'd probably have much better things to do if you could discover a feasible way to generate collisions anyways (at low costs of course).

Anyways, current resistance is still sufficiently high and that is expected for the near future.
Why would all of cryptography be dead if this was possible for a specific hash function?
Because historically well studied algorithms has never been broken with very little computational power/efforts. If you were to prove that one-way function don't exist, ie. P=NP, then any other cryptography functions would also be dead.
i think you might be assuming sha256 is a one-way function. it might not be. and thus there could be an easy way to reverse it that no one ever though of yet.
Proving P=NP would be sufficient to prove SHA256 is not a one-way function.

maybe their approach was just less than optimal.
Nope. That is just not what ASICs do.

Not sure about that.
Then a concrete proof would be good, either that of a past algorithm that has been broken or any theoretical attacks.
they would just need to use something more secure.
You can't really do much once you prove P=NP.
528  Bitcoin / Development & Technical Discussion / Re: Why rely on a single hash function? on: May 18, 2022, 03:36:05 PM
not sure what you're addressing. i was saying it sha256 got cracked, then that would obselete mining hardware from cpus to gpus to asics, everything.
Actually NotATether brought up quite an interesting point that I actually didn't consider.

Any reduction in the complexity of SHA256 either requires a very specific set of hardware or just your regular GPU clusters which allows you to parallelize your calculations. ASICs are unfortunately too specific for this. Pre-image attacks are actually not very common still, I know MD2 was cracked but that required an enormous amount of memory and huge computational resources. You must realize that the complexity reduction of those are not significant enough, MD2 being 2^73[1] with varying memory requirements. In fact, SHA hasn't even been cracked yet, to any extent within the realm of feasibility.

There is no such thing as producing a valid block hash with little computations, that is not within our reach for the near future. If that happens, you can be sure that cryptography is dead.


[1] https://eprint.iacr.org/2008/089.pdf
529  Bitcoin / Development & Technical Discussion / Re: Bitcoin peer IP addresses on: May 17, 2022, 02:17:06 AM
I'd also like to add that Bitnodes doesn't list Tor nodes at all; therefore as dkbit98 pointed out, when Bitnodes show ~15,000 nodes, it's probably 3x or higher in reality.
They do: https://bitnodes.io/nodes/?q=Tor%20network. People running Tor node might not want incoming connections so that might have a lower percentage on Bitnodes as compared to the clearnet. However, those that allows incoming connections are still indexed.
530  Bitcoin / Development & Technical Discussion / Re: Why rely on a single hash function? on: May 17, 2022, 01:14:24 AM
interblock times would go down if it had been broken. such that they always beat everyone else to the punch. so that's how you can detect it.

There's no difference between this and newer/more ASICs coming online. You can argue that someone might start mining all of the blocks but even that is unlikely because any breakthrough takes years to progress and SHA256 wouldn't possibly be broken overnight.
531  Bitcoin / Development & Technical Discussion / Re: Empty blocks on: May 16, 2022, 04:58:15 PM
The problem is the double-spending. An SPV could set you up, if say, another miner paid them so.
I don't really think it makes sense for this to happen. The premise of SPV mining and the security of which would assumed to be similar. It doesn't make sense for anyone to do so, simply because it is so expensive and serve little to no purpose other than a few minutes of wasted work, which is far less than the money you spent because most people don't generate a block every 10 minutes. You cannot possibly manage to trick and mislead the pool or miner for long enough, and if you do then the costs of which is far too much (>$190K per block). It is the same principle as an attack on an SPV client, unless your opponent is a small time miner that takes virtually no precautions, then the chances of success is not high at all. Any reasonable miner would be as well connected as possible with multiple redundancies.

Just to reiterate, I don't think anyone is purely SPV mining without any validation but this attack would be as pointless as a 51% attack on the network.
532  Bitcoin / Development & Technical Discussion / Re: Empty blocks on: May 16, 2022, 04:38:11 PM
do you have any links for the 2015 event?
i dont recall this, but could be wrong.. bitcoin has always validated the block contents and transactions before accepting it.

james
It doesn't affect full nodes which are upgraded.

It is invalid by the newer version of nodes but valid by those older version/SPV nodes. https://bitcoin.org/en/alert/2015-07-04-spv-mining
533  Bitcoin / Development & Technical Discussion / Re: Empty blocks on: May 16, 2022, 03:10:18 PM
The timestamp difference is likely not 3 minutes, though that would be indicative of some sort of block withholding/selfish mining but I highly doubt so. It is far more likely for an inaccuracy between the timestamp. From my past experience, my node always received the blocks within ~1-5 seconds of each other which is congruent with the propagation time of the network. You can still use the timestamp as a variable if for some reason you need it though.

The main problem with SPV mining (or mine now, validate at the same time) was the major fork back in 2015 by the various larger pools which has largely resulted in a huge income loss by the larger pools. If you read back on the issue and the topic at that time, they actually didn't really care if they validated the block or not which resulted in a total mess that the community had to deal with. The point at that time was that they wanted to gain an edge over the others, not because of bandwidth constraints. It simply made more sense to just get a server that does it for you or to just join a pool. The profits from the block transaction fee far outweighs the cost.

I highly doubt that any farms would bother to not include transactions because those up/down speed would be okay for stratum, considering the fact that you can still cut down on unnecessary transmissions to the pool. It is still faster and more cost efficient to rely on an external server to compile and feed the data instead of pure SPV mining. With that in mind, most of the larger miners/pools used to use Bitcoin Relay Network or now known as FIBRE but I'm not sure if its still in use or replaced again. They actually do have an edge over the others by that alone though SPV mining was a prominent practice at that time. I think there was some proof that it actually didn't really made sense now with all the optimizations.

Also, at some point in time, the empty blocks might've been due to covert ASICBoost but it isn't happening now that overt ASICBoost is so prominent.

P.S. I don't think intentional sabotage is likely because that is quite expensive in the first place, only happened once accidentally.
534  Bitcoin / Development & Technical Discussion / Re: Bitcoin node over TOR on: May 16, 2022, 11:27:50 AM
I see some inbound connections that have IPv4 addresses. These IPv4 addresses do not show up on bitnodes, so I am a bit curious as to what these addresses are.
Likely node that do not accept incoming connections. They do not show up on bitnodes because bitnodes cannot connect to them through the crawlers. Can also be due to the other reasons I outlined in the other thread as well.
Is my node running both on IP and TOR?
You are only connecting to onion addresses through the proxy because you specified oniononly. However, the reason why you're seeing IPV4 nodes is because you didn't bind your node to your Tor instance. As such, peers are still able to connect to you because you are still listening on your local IPV4 address. To prevent this, add bind=127.0.0.1.

If I understand correctly when running a node on TOR, DNS seeders are not utilized and it defaults to the harcoded list of .onion addresses. My first outbound peer was not in the list of addresses in the file. Where could this have come from?
Connections do not necessarily have to be maintained after connections. The primary and intended purpose of your seeds is to establish an initial point of contact to the network and your peers will populate and allow you to connect and get to know other peers.

535  Bitcoin / Development & Technical Discussion / Re: Bitcoin peer IP addresses on: May 16, 2022, 10:15:34 AM
The list of IPs in the bitnodes site is not exhaustive. Bitnodes cannot crawl and index all of the nodes that are running Bitcoin clients because there are so many and certain nodes might explicitly block their crawlers or just not accept incoming connections. As such, it is perfectly normal to see nodes that were not indexed on the site.

Addrlocal contains your IP and the port as seen by your peer. It can be any arbitrary values because it isn't strictly enforced and certain nodes have it set at 127.0.0.1. If you're interested, the IP address is communicated with the version message in the addr_recv.
536  Bitcoin / Electrum / Re: Electrum transfer bitcoin to unknow adress bc1 on: May 16, 2022, 09:36:23 AM
No, sure nothing. If I create a read wallet with this address bc1q..... I see the bitcoins since the transfer always on this address.
I am a begginer, but I think perhaps it is a probleme with adress sigwit, bech 32 or something like that, or incopatibility between coinbase and electrum.
There is no incompatibility within any of the addresses. Any incompatibility would've resulted in a failed transaction and in no circumstances would Electrum initiate a transfer to any other addresses for you. It is natural that you can see the funds with a watch-only wallet because the funds aren't moved from that address but you won't be able to spend it without the key.

The only two plausible reasons would be either you forgot about a transaction that you've made or if your wallet is compromised, with the latter being far more likely.
537  Bitcoin / Electrum / Re: Electrum transfer bitcoin to unknow adress bc1 on: May 16, 2022, 08:39:27 AM
Sounds like either a compromised software installation or computer.

Have you downloaded anything suspicious recently? How did you download your Electrum? Did you verify and check its authenticity?
538  Bitcoin / Development & Technical Discussion / Re: Why rely on a single hash function? on: May 16, 2022, 04:30:16 AM
but if the same miner kept winning blocks you would know something was wrong.
No way of knowing which miners mined which blocks. The only reason you know certain pools are mining blocks is because they explicitly state it in their coinbase. Otherwise, you actually cannot tell them apart and any analysis can be defeated relatively easily (randomized nonce, timestamps, coinbase, etc).

Also defeating (not weaken) SHA256 or any cryptography like that is quite valuable, certainly not valuable enough to use on Bitcoin.

Although SHA1 pre-images are limmited to certain patterns imposed by the method of attack, enough pre-images migh be found in it that one day, a state actor (or someone stealing tools from a state actor) can forge SHA-1 messages with reasonable accuracy, and generally we cannot predict when this will happen due to the secrecy of these acts. [We usually find out when a zero-day for multiple software is discovered related to this instead]. That's why "unsafe" is the nominal definition for broken as far as cryptography is concerned.
IIRC SHA1 was considered insecure 2 decades ago or thereabout. The attacks were only somewhat practical fairly recently and even so they incurred quite a high cost and time.
539  Bitcoin / Bitcoin Technical Support / Re: Is it possible to get mnemonic seed from master key? on: May 16, 2022, 04:13:29 AM
Trezor's Shamir Secret Sharing uses SLIP39 and from what I recall, they are not interchangable. I'm assuming that you're talking about BIP39 seeds. If that is the case, then it is not possible. BIP39 uses PBKDF2 to generate the seed which is a non-reversible function and as such you cannot generate a seed from that. SLIP39 and BIP39 are fundamentally different so they are not compatible in the first place.

BTCrecover actually supports SLIP39. Refer to the documentation here: https://btcrecover.readthedocs.io/en/latest/Usage_Examples/basic_password_recoveries/#slip39-passphrases.
540  Bitcoin / Bitcoin Discussion / Re: How many BTC is in circulation? on: May 15, 2022, 04:54:10 PM
You can see the amount of Bitcoins in circulation simply by looking at the unique transaction volume over the past few weeks/months. That would still be inaccurate because you can always mix Bitcoin and the numbers would be inflated. Both trading volumes and declared holdings by exchange would be inaccurate as well because of the abovementioned reasons. You can possibly collate the number of Bitcoins by looking at the different cold storage and hot wallets of the exchange but it is impossible to ascertain the correct amount because no exchange would give any exact values and you can't possibly find all of the addresses associated with the exchanges, barring larger ones.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 [27] 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 ... 463 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!