Bitcoin Forum
May 26, 2024, 05:47:35 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 [262] 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
5221  Bitcoin / Development & Technical Discussion / Re: Can Bitcoin traffic (mining or transaction) be blocked by providers? on: May 07, 2012, 11:51:58 PM
It seems the most vulnerable thing now is how your client finds other nodes to connect to.  Right now, I think, the irc channel is the way you find most nodes and if that server where shutdown there could be some short-term problems.  It might be a good idea of having the client save a list of ip address for every node it ever sees and if it can connect to the irc channel, or any other central place, your client could start trying ips in that list.

We don't use IRC anymore— not by default, you can manually enable it but it's off because:

*It didn't work well, most nodes it gave you were not listening
*It was a point of substantial centralization (easily shut down; operators of a single obscure network IRC could manipulate it)
*It degraded node's privacy— it announced the IPs of the majority of nodes that were not listening and thus didn't need to be made so public.
*It was frequently confused for a Botnet and was blocked by major providers several times, and resulted in nasty "you're infected" notices sent to users on a few ISPs.


In addition to dnsseeds, Bitcoin nodes have always remembered past nodes they've learned about over the network (it used to remember _all_, but thats a DOS vulnerability— now it maintains a large but finite set in a specially randomized way that makes it attack resistant).  You can also drop a textfile in the bitcoin data director "addr.txt" with a list of nodes to use, or provide nodes with the --addnode command line. There is also a hardcoded set of fallback addresses (which are updated every few releases) which it will use if all other means fail.

I don't consider this the biggest vulnerability.

It makes the protocol more complicated but it is possible to design p2p systems which use random ports and encrypt the payload.
Bittorrent does this and it has been futile to curb (Bittorrent now account for about 50% of internet bandwidth).

peer detection becomes more difficult and anytime you add overhead like that troubleshooting everything else becomes more complicated.  Still if push comes to shove it wouldn't be impossible to make Bitcoin traffic undetectable.

Bittorrent is nowhere near 50% of internet Bandwidth anymore (Figures range from about 8%-18% and declining, depending on who you asked and what timespan their data covers). It's frequently shaped by a fair number of ISPs and there are a number companies that specialize in selling tools to manipulate bittorrent traffic.    Bitcoin would be be even worse off: The network itself is highly public and there is only one network... so you'd simply start one Bitcoin node to enumerate all the other publicly available ones.   These attacks can be resisted— see the tor bridges arms race for an example—  but it's better to let the experts in that area handle that for us and take advantage of our common needs.  Bitcoin is very tor compatible, its a good mix.

Sure you could embed Bitcoin stenography— but you'd lose the additional privacy and effort sharing that comes from sharing with groups like Tor who already work hard to get around censorship.
5222  Bitcoin / Development & Technical Discussion / Re: Can the rules of Bitcoin ever be changed? on: May 07, 2012, 07:12:34 AM
I was under the impression that only miners broadcast blocks once they'd solved one.

In Bitcoin everyone broadcasts everything which is valid.  It uses a lightweight inventory exchange to avoid sending a bunch of data redundantly. This is part of how Bitcoin, as Satoshi wrote, "takes advantage of the nature of information being easy to spread but hard to stifle". The fact that everyone passes on all the good information makes it so someone can't disrupt the system with a few misbehaving nodes.
5223  Bitcoin / Development & Technical Discussion / Re: Can the rules of Bitcoin ever be changed? on: May 07, 2012, 07:00:35 AM
Wow, I cannot believe you used relativity as the argument as to why an agreed order of bitcoin transactions is not possible. It kind of makes me want to gouge my eyes out with a spoon.

Well why not—  if you abandon a privileged position, a reasonable thing to abandon if you're stipulating _decenteralized_, it's makes perfectly reasonable example.  If you use things like finite processing speed as examples as to why attack resistant decentralized autonomous agreement isn't possible people will just argue what IFs involving faster computers and other such spherical bovine.   Going to a more fundamental argument, even if its totally wanky makes it clear that the goal is really autonomy but its simply not achievable, and so we instead take majority ordering with eventual consistency.

Quote
You were going for an answer that fit your impression of how bitcoin works. It does not work this way, however. In fact, if in the future a lot of people are outraged about the bitcoin elite and wish to fork it to something more fair, they are only hurting themselves because anyone who accepts this new fork must also accept all the existing and duplicate coins that existed when the chain forked. It is silly and much more logical to just start a new chain with different rules and let those who want the new rules to convert to the new chain.

I can't believe it. I completely agree with a statement of yours. I'm flabbergasted.
5224  Bitcoin / Development & Technical Discussion / Re: Can the rules of Bitcoin ever be changed? on: May 07, 2012, 06:54:15 AM
No, a majority of miners cannot decide to change some aspect of the protocol. If they do, they will be mining on their own fork.

So it can be done. Despite the fact that it would create a rift in the network, a change can be made part way through the mining of a Bitcoin chain.

[...]

Guess that's what I was going for. As much as I would like to see the pandemonium of such an event, like a bad train wreck, I also understand that politically, it would end up doing more harm than good.

No it can't "be done".  You're misunderstanding what fork means in this context.  It's an independent universe.    For example, you could create a FuzzyCoin which has 84 million coins and blocks every 2.5 minutes— you could even copy the history of Bitcoin into it, so that anyone who was holding bitcoins when fuzzycoin started would be holding the same amount of FuzzyCoins.  ...  but none of the Bitcoin users/clients would know you existed.   This is what a true fork is.

And of course you can do that. Nothing can prevent you from creating an independent system.... but the Bitcoin system will not talk to your system unless your system is exactly the same rules as Bitcoin (thus being the same system), and it doesn't matter how many miners you have.
5225  Bitcoin / Development & Technical Discussion / Re: Can the rules of Bitcoin ever be changed? on: May 07, 2012, 06:40:04 AM
I was under the impression that whatever rules the majority of miners agreed to run on would control the network, hence the concern over a 51% attack.

You misunderstood.

Bitcoin is not a democracy. Bitcoin is a zero trust system. Each full node is autonomous, it validates the entirety of the rules on its own— trusting only its source code (which you or anyone else can audit).  Only through autonomy can you have independence and the assurance that the majority of wolves won't vote to have you for supper.

Unfortunately, to resolve to double spending a digital cash system must have a way of agreeing what order the transactions happened in.  Its is not possible to have a decentralized antonymous system where everyone agrees on the same order of events— because the apparent temporal ordering of events depends on the relative position of the events and the observers in space— this is a consequence of relativity.  So before Bitcoin many people believed that this sort of system was fundamentally impossible.

Bitcoin solves the fundamental impossibility by relaxing the autonomy by the minimum amount necessary:  We use a majority of computational power to decide on the ordering of transactions.  But _ONLY_ the ordering. Nothing else. That one compromise makes all the rest possible.

Of course, controlling the ordering of transactions is a powerful thing— because a transactions validity depends on its order relative to possible conflicting transactions penned by the same author.   This is why it's important that the majority of the Bitcoin computing power is well distributed,  that we don't let it consolidate into the hands of a few service providers (like mining pools or exchanges).  The use of computing power makes the the system not only resistant to attack, but it makes the attacks have a clear and fairly consistent real monetary cost— so people can reason about the risks, and the economics of the system make it so that it should hopefully be more profitable to cooperate than to attack it.

The state currencies of democratic nations is theoretically democratic money, unhappiness of the current state of affairs is part of the motivation behind Bitcoin. Democracy is not a good method of making decisions— it's often just the least bad option.  But Bitcoin is something stronger than democracy, ... though not quite as strong as the laws of nature.

Of course— the rules of the system can be changed, but it requires basically everyone to agree to the change because the old system and change system won't talk to each other, it's basically like replacing Bitcoin with something else.   This has actually happened, for example, there was once a bug in the rules of the system where the values of transactions could overflow and someone exploited the bug to create a billion bitcoins for himself.  People noticed this right away and published a fixed version of bitcoin which rejected the block containing that transaction and all blocks after it... and everyone applied the fix, because it was obviously in everyone's interest except the attacker's, and life went on.

But if people are afraid of e.g. the supply of Bitcoin being changed they really shouldn't be.  Yes, almost all the Bitcoin users could switch to some fork of bitcoin that had different rules— but with the same effort they could just switch to paypal.  There is always the risk that someone will use something else. But Bitcoin itself isn't subject to petty majority rule.


(I wrote basically the same thing at https://bitcointalk.org/index.php?topic=61922.msg723476#msg723476  too ... couldn't find it at first because the only quote I could think of from it is all over the internet now Smiley )
5226  Bitcoin / Development & Technical Discussion / Re: A proposal for a scalable blockchain. on: May 07, 2012, 03:29:30 AM
Has anyone considered this idea using address/P2SH hashes as the "key" of the tree instead of TxOuts/OutPoints?

Then I arrange a bunch of transactions under that key and unbalance your tree. Updates become O(N). Yuck.   (And bumping zombie threads? double yuck!)
5227  Bitcoin / Development & Technical Discussion / Re: Can Bitcoin traffic (mining or transaction) be blocked by providers? on: May 07, 2012, 02:52:31 AM
I have nightmares where the government simply tells the internet providers to block all Bitcoin (or any crypto-currency) related traffic and that'll pretty much kill the currency for anyone within the country.

An internet connection is a vital requirement for bitcoin, that's where it exists.

I know they could've done that with torrents, but file sharing wasn't directly threatening their control over the economy.

Are there measures against that? Or would that be a death blow.

Technical attacks are the ones you should lose the least sleep over.   Attacking Bitcoin by making it unlawful and thus driving it underground, thus making it mostly worthless (as even outlaws have little use for outlaw money) is a prerequisite for that kind of technical attack...   If the technical attacks come without the legal attacks then lawsuits— by all the people harmed by the conspicuous unlawful attacks on the computer system their businesses depend on— will fly and be successful.

The kind of conspicuous resource expenditure bitcoin's Proof-Of-Work system requires for security means that outlawing Bitcoin would be rather devastating.  The solution to this risk is to grow Bitcoin. If many people use it and like it and recognize it as legitimate it will not be possible to outlaw it it— at least in the more free parts of the world.

That said—  the Bitcoin protocol itself is utterly trivial to block.  But it doesn't have to be hard to block: It runs fine over tor and the tor support is improving all the time.  Tor itself is becoming harder to block, and blocking tor has collateral damage.   The Bitcoin developers currently have the view that anti-blocking is not a goal for us, we'd rather leave that to the experts working with Tor but fortunately we benefit from their efforts too.


5228  Bitcoin / Bitcoin Technical Support / Re: 0.6 bitcoin-qt stuck at block 176947 on: May 05, 2012, 06:00:23 PM
I'm on the Satoshi QT client, version 0.6.0.6-beta.

At some point on 23 April 2012, the client crashed in boost library code (unfortunately I didn't save the error message) and since then the client has been unable to make progress in catching up to the network; it's stuck at block 176947. I tried -rescan with no success.

Does anyone know what might be causing this?

Will the next person who gets stuck please get in touch with me via PM.  Peter thinks he fixed a dangling get stuck bug (https://github.com/bitcoin/bitcoin/pull/1196), but unfortunately its hard to reproduce the problem.   If you could cleanly shut down and make a copy of your bitcoin director then we could give you a fixed binary to test.
5229  Bitcoin / Development & Technical Discussion / Re: Version 0.6.1 release candidate 2 on: May 02, 2012, 06:18:59 AM
It looks like that commit has been merged?
It is merged in git, but it seems to be missing from this rc2.

Can you bring up the about dialog and tell us exactly what version it shows?
5230  Bitcoin / Development & Technical Discussion / Re: What is the diameter of the Bitcoin network? on: April 29, 2012, 12:21:42 AM
1. What is the diameter of the Bitcoin network?
2. How much time it takes a Bitcoin mined block to propagate to every node?
3. How much time it takes a single node to broadcast a block after it has received it?
4. What is the strategy of nodes and miners in the presence of competing chains? Do they abort and switch to the longer chain?
5. How many nodes are connected by each node by default ?

The network is almost a randomly wired graphs. Nodes make 8 outbound connections (unless modified, a few people run modified nodes). Nodes will take up to 125 connections by default (unless the user has configured it otherwise). Nodes will not make outbound connections to two hosts with addresses in the same /16 (in order to make it harder to DOS attack by spinning up large numbers of nodes from a single network, though this is fairly weak protection).

Only a small fraction of nodes accept inbound connections, though it's impossible to know the exact fraction as non-listening nodes are invisible unless one happens to connect to you. (Of course, they still relay data between the listening nodes they connect to)

(And FWIW, I believe the figures on http://bitcoinstatus.rowit.co.uk/  are not especially accurate— but at least they're something)

The amount of time it takes to broadcast a block depends on how long the node takes to validate it, so its hardware dependent.  The logs on my nodes indicate that it's deeply subsecond, but I don't have high enough time resolution to tell you more than that.  Obvious network latency gets added on top of validation, but since a significant portion of the nodes are clustered in Europe and the Americas there isn't a ton of additional network latency.

Miners always attempt to extend the first received longest chain. If another chain becomes longer they'll attempt to extend it instead.  Your use of the word 'abort' concerns me: Mining is memoryless, each attempt is independent.

From this information and a few guesses about the things we can't answer you could arrive at some figures for your questions.
5231  Bitcoin / Development & Technical Discussion / Re: Taking Down Bitcoin on: April 29, 2012, 12:00:27 AM
Not so sure. People are greedy. I think the attack would work (although I guess we will not see such an attack in the near future).

For example: Upload a modified Bitcoin client which accepts a bounty of 500000 BTC per block starting from a specific block. Rent Amazon and Google hashing power and produce some 20 blocks faster than the Bitcoin community does. During this time, produce 500000 BTC per fresh block and pay a large number of bitcoin addresses some extra Bitcoins (as a kind of bribery...). Then reduce the bounty again to 100 BTC per block (or, different approach, 50 BTC) and distribute the information on what you just have done to many forums.

Now there is this interesting dilemma: If a user/miner adopts your software and the new block chain...he gets a share of the extra coins. If he does not...he will not get a share of the extra coins. Of course you will also get a big share of extra coins. I am not so sure how many users will stick with the old block chain and not be tempted by the extra share they might get ... if they switch. (Of course, getting the modified software to accept the modified blocks is not a trivial engineering task - but it can be done).

You are confusing this thread with your thread. Is this confusion intentional?

What you're talking about is getting people to replace their Bitcoin software with software the validates some other rules.  This is totally orthogonal to attacks involving large amounts of hash power.

The alternative chains we saw thus far were based, to the degree I know and IMHO, on changes which did not produce visible benefits to the user and thus were not able to activate the greed reflex.

They have _all_ been 'beneficial' to their users in that by participating in them you're one of a much smaller set of miners, and thus getting a far larger percentage of the total produced coin than in Bitcoin. This is more extreme in some chains than others— for example LQC had block rewards starting at 1000 coins and then  dropping 4% every 1000 blocks or so, while Litecoin has payout's much more similar to Bitcoin but a single person could pretty easily be 1% of litecoin's total hashrate.



I have intentionally not responded to your thread because other clueful people have responded and you just keep continuing the boring debate. Please don't spread it to other threads.
5232  Bitcoin / Development & Technical Discussion / Re: Taking Down Bitcoin on: April 28, 2012, 08:09:58 PM
Admittedly this IS exactly what I'm doing.  Its in the OP.  I"m asking for some brainstorming to take down bitcoin.  Thats the point.  

1)  Construct an attack that greatly reduces the hash rate.  I suggested DDoS all the miners simultaneously.
2)  Use opportunity to make changes to the block chain (2x spend, whatever)
3) Huh?
4) Profit

You see, i am talking about a malicious attacker.  One who wants to destroy Bitcoin and has a budget.

Thanks for providing (2).  You did not provide that before.  The attack you're suggesting doesn't work.

Difficulty adjustments require 2016 blocks and can only change the difficulty by a factor of 4 per cycle of 2016 blocks.  Your DOS attack, if effective, would slow down block creation while in effect but it would not substantially change the computational power required to rewrite any of the existing chain.

(It's perhaps also worth pointing out that pools are constantly under DOS attack— and many have have been successful DOSed before without much impact, most miners now autoswitch to backup pools... — and the rise of p2pool closes that particular issue ::shrugs:: )
5233  Bitcoin / Development & Technical Discussion / Re: Taking Down Bitcoin on: April 28, 2012, 06:54:17 PM
Accomplish the mission.

What mission. You need to speak completely and concretely. Give the series of steps that will be performed and what the harms or profits are.

Otherwise you're just waving your arms, spreading FUD, and really just forcing the people trying to correct your FUD to spend the time inventing hypothetical attacks which you might mean but haven't even invested enough time or thought into to come up on your own.
5234  Bitcoin / Development & Technical Discussion / Re: MAVE: Digital Signature Protocol for Massive bulk verifications on: April 23, 2012, 01:45:51 AM
No. I specifically left Total anonymization out of the MAVEPAY paper, since anonymization gos against performance in every protocol I´ve seen. MAVEPAY aim is to have the best performance, and so pseudo-anonymous transactions are more expensive in MAVEPAY and total anonymization is not granted by the protocol.

Anonymity and privacy are two different but somewhat related things.   Banks are very private in a conventional sense.  Bitcoin (and MAVEPAY as described) can not have that kind of privacy— but what bitcoin does is uses weak pseudo-anonymity to provide the privacy that was lost.

This is fairly effective—  although it's not strong enough by itself to hide my activities from concerted attackers it can successfully prevent awkward questions from snoopy inlaws who are angry about you buying contraception when they want grandchildren— and in Bitcoin as as designed it's largely free, and the account level historical summarization that the related design precludes could only shrink the stored data by some constant factor.

I don't particularly think that anonymity is all that important a property, but I think that privacy certainly is — perhaps you can come up with some clever way to regain some privacy in your system.
5235  Economy / Speculation / Insecurities in Ragecoin betting site == Profit? on: April 21, 2012, 05:21:01 PM
Greetings.

So you want to make some money?

Well— people on IRC have been circulating links to https://ragecoin.appspot.com/  (there is also a thread here about it: https://bitcointalk.org/index.php?topic=63081.0 )

The site has two substantial security vulnerabilities.  One potentially in the sites favor, one in the users favor.

The site is totally anonymously run, so I can't report the vulnerabilities to the site: Their loss, your gain. My IRC logs strongly indicate that the site run by "Joric" but he outright denies this.  I also reported the vulnerabilities to him but he's clueless and just argued with me. Then again, he also denies running another site which I think mostly exists to part fools and their money (brainwallet) and which I have pretty much conclusive proof that he runs.  Danger will Robinson Danger.

In any case here we go:

The site sends you a cryptographic commitment to the next spin... E.g.  it tells you "57b12eb121a742b1cd0454408d1b38ec"  then you deposit funds and spin .... then it tells you MD5("0,1,0:W6Wv4t3x")  with the 0,1,0 being the slot positions you just got, and you can then see that this matches the commitment so that the site didn't change what it was going to spin for you based on your deposits.

There are two problems with this, first the one potentially against your favor:  The site is doing nothing to prove that its RNG used to come up with the spins is fair.  E.g. it may be the case that it will _never_ produce results with big winnings, thus giving lower payout than advertised and screwing over the player.    This could trivially be avoided using the pick-and-split cryptography I came up with for bitjack21: The server commits to a random value,  the user provides a random value (by default based on JS RNG, but modifiable)— the draw is based on the hash of the committed random (not the commitment itself) and the user random.  Thus proving that the site's RNG is unbiased.

The next is the one is in your favor, or at least in the favor of hackers with gpu farms:   The secret salt values, the part after the : in the value its committing to, only have log2(62^8) = 47 bits of entropy.   You could construct a rainbow table of all values that start with 0,0,0:.  Then you keep spinning until it gives you a "next hash" which is in your table. You know that hand will give you a 256x winning.  Bet like hell on that one.    If you want you can build a larger table that has additional winning combinations in it so you don't have to respin as much. Alternatively, you don't even have to cover all the 0,0,0 values... even a 'small' table will let you win if you don't mind spinning a whole bunch of times.

Building a table for all values for a single spin result is the same computational complexity as building an md5 rainbow table for 8character passwords from the A-Za-z0-9 set, and many such tables (and larger) already exist... so the computational work is high, but totally doable.   If anyone does this… I want a cut of your winnings. Wink (PM for deposit address, thanks!)

(Also, since you don't need to know the full preimage of the hash you could save a ton of space with some small chance of incorrect results by simply using a very large bloom filter: Figuring out the size needed in order to maximize profitability is an exercise left for the reader)

Keep in mind that this is a glaringly obvious vulnerability.  The operator of the site may have expected someone to figure this out, build the table, then drop 1000 BTC on a 0,0,0 win, and if you do that they may just vanish with the funds.   A lot of scams are powered by making you think you're the one scamming them.


In any case, enjoy and keep safe!


Edit: I dropped this in the speculation subforum because while gambing may be gambling, compromising a gambling site is a lot more like speculation than a lot of things people here consider speculation Smiley plus the site I'm talking about was previously discussed in this forum. Another cute thing: my vanity address probably took more computation than rainbow table for a single slot value would take. Smiley
5236  Bitcoin / Development & Technical Discussion / Re: MAVE: Digital Signature Protocol for Massive bulk verifications on: April 20, 2012, 04:23:37 PM
As I promised, I’m publishing the preliminary paper on how to apply MAVE-3 to P2P cryptocurrency.

The paper would be a lot more readable if it didn't constantly make factually incorrect statements about Bitcoin, it makes it somewhat irritating to read.

Some examples,  (though there are a great many— I think, in fact, the majority of the comments about the bitcoin system are arguably incorrect or misleading— including things as simple and factual as transaction sizes)

Quote
One of the key differences between Bitcoin and MAVEPAY is that Bitcoin has no "free rides". Every transaction can (and ussualy must) pay a fee.

This is incorrect, and you could have verified in just a couple minutes that an overwhelming super-majority of transactions pay _no fee at all_ right now.

Though fees are one mechanism bitcoin uses for anti-dos— resulting in a _reusable proof of work_ system which is arguably superior to any one-shot POW system, at least so long as mining is creating substantial amounts of coin,  Bitcoin also uses coin-immobility-time as an anti-dos mechanism— and the effectiveness of this is why most txn don't carry fees.

Quote
One of the problems with Bitcoin is that, in order to prevent transactions of being broadcast ad-infinitum, each client maintains a hash table of cryptographic hashes of each transaction ever seen and avoids reprocessing a transaction previously processed by checking every transaction against this table. This protocol requires the eternal storage of transaction hashes.

I'm not even sure how you're making this error.  It simply isn't true.  Transactions must spend a previously existing transaction, and they exhaust it in the process thus making duplicates of that transaction invalid. Nodes do remember transactions they've already forwarded to peers to avoid excessive rapid retransmission, but there is no protocol requirement of this and the storage is purely in memory not eternal.

Perhaps it would be better in the future to describe your system without constant incorrect references to the Bitcoin system.

[I don't mean to be entirely negative—  the PoW-Chain-staggered-commitments as signatures is quite clever.  I'm not convinced as to it's use in currency systems, especially since ecdsa signatures (esp with the proper curve selected and bulk validation) are not that much slower, nor are lamport signatures that much bigger... but it's still a neat idea]

5237  Other / Beginners & Help / Re: Bitcoin client crashes when I enter in passphrase on: April 19, 2012, 02:29:18 AM
#UPDATE#
so I have a backup from client 0.4 of my wallet.  I tried to decrypt my wallet but end up having the following error
EXCEPTION: 9key_error       
CKey::SetSecret() : secret must be 32 bytes       

You are entering the wrong password.   There was (now fixed in GIT but not in any released version) a somewhat tricky bug where a small fraction of incorrect passwords caused a crash rather than the wrong password notice.

The log message of "secret must be 32 bytes" is a very strong and clear indication of this.

Unfortunately this behavior seems to convince the afflicted user that they actually have the right password, making it unlikely that they'll keep trying and get the right not.

Here is the related pull request: https://github.com/bitcoin/bitcoin/pull/1039
5238  Bitcoin / Development & Technical Discussion / Re: Using bitcoin for trusted timestamping? on: April 18, 2012, 01:37:23 PM
That is less hacky than a tx?

It's enormously less hacky.   It doesn't waste coins, it doesn't increase the size of the blockchain ... not by one byte... even if it were committing to trillions of documents per minute.   So it can actually scale to be widely used, if it did so it wouldn't risk breaking bitcoin in the process.

5239  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: April 16, 2012, 08:35:14 PM
As long as noone knows this "password generation scheme" (because it is the standard or someone watched me typing one key three dozen times and counting to 30)

But I do know the generation scheme:  Ask a human to generate a secure password.

This is something humans are not good at and so they are prone to doing things like ... picking passwords with a repeated character (or, alternatively completely avoiding repeated characters). For example, here are some of the cracked mtgox passwords (all except the Us were using the more secure freebsd crypt scheme): uuuuuuuuu, ggggggggggg, 999999999q, qqqqqq123, 111111111a, 999999999, 88888888, 99999999.

Uniformly probable uncertain length between 1-33 adds only 5 bits of entropy to the repeated character model.   Meaning that if you're already doing "every character repeated" (which is obviously a useful model which cracking tools already include) searching all of those lengths only increases your workfactor by 32.


5240  Bitcoin / Development & Technical Discussion / Re: A proposed solution to adjust for lost Bitcoins: wallet 'heartbeats' on: April 08, 2012, 10:18:32 PM
Don't worry, they don't have any chance to win Smiley
+1
Personally, I consider the coin creation function (50 BTC every 10 minutes, halving every 4 years) and rules for whether or not you can spend the coins you have (if, and only if, you can satisfy the scriptPubKey by creating an ECDSA signature then you can spend them) sacrosanct. Them's the rules of Bitcoin, change them and it ain't Bitcoin any more.

I agree too—

Though I would point out here that at some point in the future we may find that we need to upgrade cryptosystems for security reasons... and that if we don't _eventually_ deny the spending of coins sent to the old insecure system then we could well find that enormous deposits of zombie coins suddenly appear due to cracking and that their rapid unexpected introduction into the economy is very much not what anyone signed up for and could be disruptive.   So it would make sense to sunset insecure transactions.

Someone arguing for regular long-horizon sun-setting, instead of just a one time event, might have a lot more success arguing it at that time.  In particular, it would be much less bad if you know _in advance_ that you will have to heart beat your coins once a decade, then it would be to find out later that cryptosystem breaks mean you'll have to do it.
Pages: « 1 ... 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 [262] 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!