Bitcoin Forum
July 12, 2024, 03:28:29 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 [305] 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 ... 422 »
6081  Bitcoin / Development & Technical Discussion / Re: Contingency plans on: September 20, 2011, 08:06:35 AM
In case of such virus it might be useful to have a contingency plan section that describes how to disrupt the network so that clients going online could find it difficult to connect. Something like switching off IRC channel used for peer finding and all the hard-coded nodes.

This isn't possible. Even if all three bootstrap methods were shut down (which is probably itself nearly impossible), existing clients would still be able to connect easily using their address databases.

Third-party alert systems may be a good idea. These might also have faster responses than Bitcoin network alerts.
6082  Bitcoin / Development & Technical Discussion / Re: Contingency plans on: September 20, 2011, 07:29:39 AM
Here, I wrote a page about alerts:
https://en.bitcoin.it/wiki/Alerts
6083  Bitcoin / Development & Technical Discussion / Re: Contingency plans on: September 20, 2011, 06:46:00 AM
Cool. Didn't know that. Where can I read more about this?

There's no documentation for this. Though it really would be a good idea for large services to check for alerts automatically.

Old versions of Bitcoin used to shut down RPC automatically when an alert was received. This should be brought back as an opt-in feature.
6084  Bitcoin / Development & Technical Discussion / Re: Contingency plans on: September 20, 2011, 06:31:12 AM
You can already do that by polling the getinfo "errors" field. It will fill with alert text when an alert is issued.
6085  Bitcoin / Development & Technical Discussion / Contingency plans on: September 20, 2011, 05:23:09 AM
I've written some contingency plans for emergency network events:
https://en.bitcoin.it/wiki/Contingency_plans

Someone mentioned this months ago in another topic, and I thought it was a good idea. If plans and code are written before issues occur, then the response will be much quicker. I've not written any code for this yet, though I described the actions that should be taken after a few possible emergency events.
6086  Bitcoin / Development & Technical Discussion / Re: Address transactions via json on: September 20, 2011, 04:11:37 AM
To get a transaction's sent value:
- Collect all prev_out structures for each "in" that is associated with one of your addresses
- For each prev_out that you have collected, find output number n in transaction with hash. The value of this output is the input's value. This transaction will exist either in your local transaction database (if you're using block hash stops), or earlier in the same mytransactions output.

The "in"s and "out"s that are not associated with your addresses can be ignored in your case.
6087  Other / Meta / Re: Tapatalk on this Forum on: September 20, 2011, 03:12:36 AM
The Tapatalk modification is a massive amount of code that is clearly messing with the security system. I don't have time to review all of this code, so I will not apply it.
6088  Economy / Marketplace / Re: Hollie/Ninja/Stefanie Andrea/SHlFT/Pearikay scammers on: September 20, 2011, 03:00:36 AM
Remember that the board doesn't verify email addresses.

SHlFT
Original username: Ezio
66.87.97.168, 107.29.108.104, 107.29.74.71, 107.29.92.252, 108.103.210.228, 108.116.107.92, 173.130.182.167, 173.130.62.126, 173.149.185.128, 173.96.255.163, 173.96.66.112, 184.207.25.127, 184.219.9.39, 66.87.96.215, 66.87.97.181, 66.87.97.184, 66.87.97.222, 66.87.97.230, 66.87.97.232, 66.87.97.90, 66.87.98.133, 66.87.98.151, 66.87.98.180, 66.87.98.247, 66.87.98.72, 66.87.99.20, 71.21.81.140, 72.56.215.231, 72.56.247.91
Email: auditore.sales@gmail.com
Secret question: ooi

Pearikay
Original username: zztop
66.87.96.209, 107.42.18.207, 173.106.62.117, 173.147.200.70, 66.87.96.13, 66.87.96.23, 66.87.96.254, 66.87.96.89, 66.87.96.96, 66.87.97.138, 66.87.97.168, 66.87.97.88, 66.87.98.240, 66.87.98.92, 66.87.98.96, 66.87.99.172, 66.87.99.255
Email: Alex@teleworm.com

Hollie
Original username: Darkness
184.171.168.202, 108.116.212.19, 108.116.28.128, 173.135.103.122, 173.149.144.123, 173.96.31.42, 184.209.248.98, 184.209.33.8, 184.231.206.17, 209.184.116.69, 64.134.157.255, 66.87.66.40, 66.87.96.11, 66.87.96.183, 66.87.96.195, 66.87.96.235, 66.87.96.236, 66.87.96.247, 66.87.97.136, 66.87.97.168, 66.87.97.192, 66.87.97.195, 66.87.97.212, 66.87.97.248, 66.87.98.115, 66.87.98.116, 66.87.98.151, 66.87.98.199, 66.87.98.239, 66.87.98.246, 66.87.98.47, 66.87.98.72, 70.3.226.211, 71.21.81.140, 99.200.197.89, 99.200.30.168
Email: jameslovecock@live.com

Darkness
66.87.97.248
Email: xninja.llc@gmail.com

Stefanie Andrea
107.28.115.141, 107.28.115.39, 107.28.137.251, 107.28.157.204, 107.28.189.208, 107.28.236.187, 107.28.244.20, 107.28.4.167, 107.28.98.107, 107.33.133.10, 107.33.136.196, 107.33.137.168, 107.33.139.187, 107.33.142.242, 107.33.145.229, 107.33.151.27, 107.33.168.5, 107.33.21.220, 107.33.210.140, 107.33.227.97, 107.33.251.103, 107.33.36.31, 107.33.96.37, 107.42.106.33, 107.42.155.238, 107.42.165.200, 107.42.188.172, 107.42.57.45, 107.42.92.3, 108.103.118.133, 108.125.66.189, 173.106.109.70, 173.106.119.219, 173.106.224.91, 173.106.230.69, 173.106.238.80, 173.106.40.46, 173.106.62.182, 173.115.145.46, 173.115.170.26, 173.115.212.240, 173.115.231.4, 173.115.25.75, 173.115.40.218, 173.115.55.132, 173.115.83.235, 173.147.109.202, 173.147.109.52, 173.147.112.202, 173.147.144.157, 173.147.193.37, 173.147.48.31, 173.147.72.239, 173.147.92.189, 173.147.92.235, 173.147.99.80, 173.7.104.162, 173.7.163.60, 173.7.17.165, 173.7.186.176, 173.7.205.9, 173.7.38.118, 173.7.47.95, 173.96.25.55, 209.184.116.42, 209.184.116.69, 66.87.96.113, 66.87.96.17, 66.87.96.173, 66.87.96.183, 66.87.96.209, 66.87.97.1, 66.87.97.138, 66.87.97.192, 66.87.97.248, 66.87.97.47, 66.87.97.64, 66.87.98.227, 66.87.98.228, 66.87.98.47, 66.87.99.114, 66.87.99.78, 68.241.102.227, 68.241.186.220, 72.56.144.250
Email: InfamousKraken@gmail.com
6089  Other / Meta / Re: Why dont we have a security subforum? on: September 18, 2011, 06:17:25 AM
I just don't think there would be enough topics for a security section. If I saw like 30 active security topics, I would consider it.


Two of those wouldn't belong in a security section.
6090  Other / Off-topic / Re: How much time have you logged into bitcointalk forum? on: September 17, 2011, 06:24:20 PM
You probably should start using a vitamin d supplement.

I already do!  Cheesy
6091  Bitcoin / Development & Technical Discussion / Re: Address transactions via json on: September 17, 2011, 01:52:16 AM
Yeah, the /q pages are there for the benefit of automated services, so feel free to use them. Please use the caching features of that page where possible, though (HTTP ETag and the "block stop point"), and don't refresh data more than every few minutes.
6092  Bitcoin / Development & Technical Discussion / Re: Address transactions via json on: September 17, 2011, 12:17:14 AM
http://blockexplorer.com/q/mytransactions
6093  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANNOUNCE] New alternate cryptocurrency - Geist Geld on: September 16, 2011, 11:11:45 PM
Yeah, I'd guess isolation. Unless the network really did produce no other blocks in that timespan.
6094  Alternate cryptocurrencies / Altcoin Discussion / Re: Comparative confirmation security of different alt block chains on: September 16, 2011, 08:32:55 AM
So, basically, in terms of "confirmation values", confirmations that are longer are more valuable in situations where an attacker has exceeded 51% (The "match the network" part) and is about to retroactively edit past blocks ?

It also works for attackers that have less than 50%. I gave average values. It's possible for an attacker to get lucky and solve enough blocks to match the network even with less than 50%.

I don't think there's any advantage to longer confirmations if the attacker is only trying to maintain control and is not replacing historical blocks.
6095  Bitcoin / Bitcoin Discussion / Re: Investors hiring for 'Bitcoin successor' on: September 16, 2011, 06:52:01 AM
Does this mean the Church of Scientology knows about bitcoin and wants to push out their own version; complete with celebrity endorsement?

I wouldn't be surprised if the Church of Scientology does use Bitcoin some day. LRH hated governments, so he probably would have loved Bitcoin. One of the questions on the whole-track security check is, "Have you ever debased a nation's currency?" Smiley
6096  Alternate cryptocurrencies / Altcoin Discussion / Re: Comparative confirmation security of different alt block chains on: September 16, 2011, 05:02:33 AM
Maybe someone with a better knowledge of probability will prove me wrong, but this is my understanding:

To replace 6 blocks, you need to make the same number of blocks that the network makes over a period of time and then re-do the blocks you want to replace. So currently with Bitcoin it'd be 12.5 Thash/s to match the network plus a fixed (7,500,000,000,000,000 * 6) hashes to replace the last 6 blocks.

If Bitcoin had a larger block interval, you'd have the same 12.5 Thash/s to match the network, but replacing the last blocks would take many more hashes. So confirmations would represent more work and be somewhat more valuable.
6097  Bitcoin / Bitcoin Discussion / Re: Bitcoin mentioned at congressional hearing. on: September 16, 2011, 03:08:16 AM
Here's where he mentioned it:
http://www.youtube.com/watch?v=8OOXKrxStn0&t=20m50s
6098  Other / Meta / Re: Info about the recent attack on: September 16, 2011, 01:38:55 AM
You can only hash one user at a time if you operate under the constraints you've outlined.

Right. Because there's a salt, so rainbow table attacks are prevented.

You said:
Quote from: Inaba
Gat3way detailed it fairly well, which explains why salts (when properly implemented) offer some protection against bruteforcing and, as you correctly stated, rainbow tables.  However, a properly implemented salt system increases the compute requirement for bruceforcing dramatically, slowing own the bruteforce by a factor inversely proportional to the complexity of the salt.

So you're saying that salts are helpful against attacks that do not use rainbow-table-like attacks. That is, you're saying that an attacker trying to reverse a single hash without looking at other hashes (a brute-force attack as opposed to a rainbow table attack) is worse off when there is a known salt present. This is false. In almost all password systems, salts are less than 32 characters, which does not make brute-forcing of a single hash any slower. If you're trying to slow down brute-forcing, you typically increase the number of hash iterations, which doesn't require you to store more data.
6099  Economy / Collectibles / Re: CASASCIUS PHYSICAL BITCOIN - In Stock Now! (pic) on: September 15, 2011, 07:29:18 PM
I just received a handful of these. They're pretty cool. I'm going to give one to each of my nieces and nephews.
6100  Other / Meta / Re: Info about the recent attack on: September 15, 2011, 07:07:08 PM
However, a properly implemented salt system increases the compute requirement for bruceforcing dramatically, slowing own the bruteforce by a factor inversely proportional to the complexity of the salt. (I think that's how the formula works out, but in any case, it does indeed offer protection against brute force attacks.)

No, it doesn't. The attacker always has the salt, so he doesn't need to bruteforce that, and hashing differently-sized data has no difference in speed when both sizes take up the same number of hash blocks. All password+salt strings under 512 bits take the same amount of time to compute with SHA-1.

Gat3way described how you can create rainbow tables for password sets when you don't use unique salts for each password.
Pages: « 1 ... 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 [305] 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 ... 422 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!