Bitcoin Forum
May 25, 2024, 11:37:08 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 [35] 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 288 »
681  Bitcoin / Bitcoin Discussion / Re: VIDEO: The Killing of Satoshi Nakamoto on: April 24, 2020, 07:19:13 PM
This guy is a scammer trying to promote Craig Wright's con.

Here is a post where I nail him for lying about knowing Satoshi: https://bitcointalk.org/index.php?topic=2112829.msg54279907#msg54279907
682  Bitcoin / Development & Technical Discussion / Re: Cost to perform a 51% attack on the BTC blockchain? on: April 24, 2020, 03:59:00 PM
This thread keeps getting derailed by offtopic trolling. Locked.
683  Bitcoin / Development & Technical Discussion / Re: where is the source code for BaseSignatureChecker.CheckSig() method in core? on: April 23, 2020, 08:11:22 PM
Yes, hybrid keys in non-segwit scripts are valid-- as they were accepted by the original software by virtue of openssl's behaviour, but they're non-standard so they generally won't relay or get mined on mainnet.
684  Bitcoin / Development & Technical Discussion / Re: where is the source code for BaseSignatureChecker.CheckSig() method in core? on: April 23, 2020, 07:19:08 AM
ANSI X9.62-1998 Sections 4.3.6 and 4.3.7, "Hybrid pubkeys".

It's a useless combination of compressed (sign flagging) and uncompressed (65 bytes).
685  Bitcoin / Bitcoin Discussion / Re: Craig W. only claims to be Satoshi, because he knows the real Satoshi is dead? on: April 23, 2020, 03:30:27 AM
this has been discussed o many times and we have made a conclusion that craig is not satoshi but faketoshi. By discussing him again and again we are doing what he exactly want i.e. giving him popularity. so I suggest all members not to discuss this faketoshi.

"I knew Satoshi Nakamoto. Satoshi Nakamoto was a friend of mine. And you Sir are no Satoshi Nakamoto."

https://p2pfoundation.ning.com/friends/SatoshiNakamoto

You added yourself years after Satoshi was no longer active: https://web.archive.org/web/20141022054522/https://p2pfoundation.ning.com/friends/SatoshiNakamoto

It looks like you created your account in March 2014 and the first thing you did was leave a comment promoting a shitty altcoin on a more than five year old post by Satoshi.

If you knew Satoshi in any way there certainly isn't any evidence at the link you provided-- quite the opposite: Most people don't tend to go around writing impersonal "Thank you for the clarification" messages to five year old posts by their friends. They especially don't go sticking tacky ads for their competing offerings on them.

Why do all these satoshi obsessed people need to be incompetently lying pieces of shit?
686  Bitcoin / Development & Technical Discussion / Re: Why does OP_CheckMultiSig not fail on an invalid public key? on: April 22, 2020, 07:27:03 AM
Is this another bug at protocol level?
Why would you consider this a bug?  Yes, it could have been implemented differently, but the definition of CMS is that signature validation passes N of M times.

Obvious ways of implementing it-- including the way it was originally implemented-- wouldn't provide for any way to determine exactly why a signature failed to validate only that it did.
687  Bitcoin / Bitcoin Discussion / Re: Craig W. only claims to be Satoshi, because he knows the real Satoshi is dead? on: April 22, 2020, 03:25:39 AM
He just knows most about BitCoin.
Nobody else ever disputed him on this matter.
Why?
In fact Wright has shown extremely profound technical ignorance about Bitcoin, but he says that what he is saying is brilliant. Because you, yourself, are incapable of directly evaluating his claims you make the mistake of believing him and other similarly uninformed persons.

Of course, not absolutely everything he says is untrue or gibberish-- some things he just copies out of the bitcoin wiki or old posts and chatlogs.
688  Bitcoin / Bitcoin Discussion / Re: Excuses and minimization offend people on the right side of an argument on: April 18, 2020, 10:47:45 AM
Hindsight is great and when a situation is stage managed there is limited time to make a proper assessment. Not everyone figures out how a trick is performed in a magic show.

Even if you are an expert:

This is a great point and it's something to keep in mind.  I do think that many of the people wright fooled could have and should have done better, but none of us should feel confident that we couldn't have been fooled. We could have. Maybe the trick that would have fooled us would have been different or the situation that succeeded would have been different. But humans make mistakes.

Quote
But Gavin wouldn't have been appointed as Chief Scientist for his forensic or detective skills.

To be fair, the only thing that ever appointed him as Chief Scientist of anything was an organization that he, alongside Jon Matonis (Former Nchain Vice President of Strategy), Roger Ver (another prior Wright sucker, massive shitcoin promoter), Peter Vessenes (stole millions from MTGox customers and is holding up the distribution of the remaining mtgox assets with frivolous litigation),  Charlie Shrem (went to jail for money laundering), and Mark Karpeles  (lost customer funds at MTGox and went to jail for smaller scale embezzling) created.

There are plenty of defences that can be offered for the Bitcoin Foundation and the people involved with creating it but I don't think anyone can argue that it was some dream team of people went on to demonstrate good and careful judgement.  Smiley

Validation of Wright's evidence is a question for a technical expert. Gavin had sufficient expertise to demand the right things-- he had even previously published a more or less reasonable laundry list-- and he didn't. He also knew enough to know the basic limits of his expertise, such as being unable to determine if a random windows PC had been tampered with. Most importantly, he should have known that he was being asked to participate because his enforcement would be taken as a high degree of assurance, nearly proof, by the media and the public -- and as a result deserved either an appropriately diligent vetting on his part or a refusal to participate if he was unable or uninterested in providing one.

From my perspective it was just another example of a long history of poor judgement.
 
The fact that anyone can be tricked is why it's so much more important for people who will be perceived to be an authority to make an extra effort to not get tricked or just not play along.  So I think here the issue isn't so much that wright tricked him, it's that he shouldn't have been exposed in the first place, and that to this day he still has do little to nothing to walk back the damage.  Wright suckers still continue to cite his equivocation as evidence to support wright. I  think Ver is one of the less ethical people around cryptocurrency, and yet even Ver did better and eventually provided an unequivocated statement against wright's claims.




689  Other / Meta / Re: Domain name update on: April 18, 2020, 01:04:21 AM
I'm really sad to hear this. It seems like bitcoin faces such tremendous headwinds.
690  Other / Meta / Re: {LIST}of the Merit Sources asking for more smerit. New Round. on: April 15, 2020, 11:04:50 AM
Indeed, I don't know that he'll run it again in May.  But when 6 months from the last run comes up I'm going to nag him to do it. Tongue  I got seriously gimped in the last update because I'd been inactive for a while. Smiley
691  Bitcoin / Development & Technical Discussion / Re: Should I offer NODE_BLOOM? on: April 15, 2020, 08:49:02 AM
if that's true then SPV clients are on a dark path. using methods such as what Electrum protocol provides is cool and convenient but it has a very big flaw: it lacks privacy. and that's something bloom filters could improve.
BIP37 has zero privacy.  https://en.bitcoin.it/wiki/BIP37_privacy_problems   Electrum also has extremely poor privacy but at least its upfront about that and actually works well, the BIP37 approach is pretty much the worst of all worlds-- it takes forever to scan the chain plus it identifies and links your addresses and it makes nodes DOS attack vulnerable in the process.
692  Bitcoin / Development & Technical Discussion / Re: Should I offer NODE_BLOOM? on: April 14, 2020, 11:32:23 PM
Apparently there are, because if I turn them on my "inbound" connections go from 20-50 to 120-200 . And over a typical days time I would serve out 30-40GB where in the last 24hrs on 0.19.1 with them off i've served 8gb.
That sounds like a DOS attack, to be honest.  I usually see weeks pass without a single connection from an actual SPV client,  though there are bunch of shitty spy things that pretend to be them.  It absolutely shouldn't be making remotely that kind of difference.


uh, also, 125 is the maximum connections.

Quote
Correct me if I'm wrong, but after reading some material on it, the privacy risk seems to be the clients and not mine, the risk is if I was running a node with intent to do something with that info the SPV clients expose to me.
The only issue it exposes you to are DOS attacks and any bugs in that functionality... though bugs seem fairly unlikely at that point.  The DOS attack issues have been exploited in the wild, so for a rarely used and not very useful functionality.
693  Bitcoin / Bitcoin Discussion / Re: Why reward halving instead of doubling? on: April 14, 2020, 12:45:56 AM
I wonder how much of an increase transaction fees would need to get to incentivize miners to stay.
Wrong question.  Difficulty is floating, it'll adapt to whatever is there.  A single asicminer using a hundred watts is enough to keep blocks being produced.

The question you should instead ask is "how much of an increase is needed to keep security acceptable?". Because if a single asicminer is all thats keeping the network going then two asicminers would be all that were needed to reorg blocks and replace recent transactions (and twenty could replace ones that weren't particularly recent!).

A couple years ago during congestion before segwit was rolled out, there were sustained total fees in amounts similar to the block subsidy!  So I think that's pretty strong evidence that fees can be high enough to provide for reasonable amounts of security.

At the moment Bitcoin arguably has too much capacity now between changing usage patterns (e.g. batching, and sweeping during low fee times) and segwit and as a result fees are floating at about 2% of subsidy and often running right at the default minimum relay fee. After the halving they'll end up about 4% (though, likely they'll go much higher in a brief period after the halving due to congestion, due to the rate of block production going down for a little while).
694  Other / Meta / Re: Theymos, may be a custom title please. on: April 12, 2020, 09:25:41 AM
The little tombstone icon seems rather playful-- I'm reminded of old shareware rpgs-- for something that should be at least somewhat sombre. Maybe a unicode block instead of an image at all:  █
695  Bitcoin / Development & Technical Discussion / Re: brute-forcing public keys at amazing speed 2.2 PH/s on CPU [malware warning] on: April 12, 2020, 07:28:55 AM
One thing to keep in mind for these TMTO approaches is that the pre-computation size can be amortized across multiple problems. So, for example, on a 2TB ram (plus a few TB of disk) host you can build up a 2^38 ish-sized table and reuse it against multiple problems... and solve each additional 64-bit search with 2^25 operations each.

The optimizations to get low memory don't work quite as well for amortizing multiple problems, or at least are much harder to implement.
696  Bitcoin / Development & Technical Discussion / Re: is there any research about UTXOs that are not spendable without a fork? on: April 09, 2020, 02:04:26 AM
i am wondering whether anyone has ever looked into this to see what percentage of them are unspendable. i am guessing it shouldn't be that high due to standard rules.

Andytoshi wrote a static analysis tool that was sound but incomplete... it would find scripts that could never be satisified, e.g. because of types/length mismatched.

IIRC other than those large MTGOX outputs there wasn't a whole lot more.  There is a large number of low value ones created by a p2pool bug and a smattering of other things.

While standardness might have helped, the big reason you don't find any is because people don't like throwing their coins away! Tongue
697  Bitcoin / Development & Technical Discussion / Re: brute-forcing public keys at amazing speed 2.2 PH/s on CPU [malware warning] on: April 09, 2020, 01:50:06 AM
I also think it is unfair to say its malware or scam with warning so early.
Maybe Etar can say what his intentions are for creating this topic here?

Perhaps, but quite a few times people have shown up with "cracking" tools that turned out to be a scam. It's a pretty standard MO. In particular several of the more recent ones have setup making these seemingly pointless "advertising posts" then nailing people who PM them, e.g. by sending them the software privately where other people can't call it out for being malware.  I guess they feel better about robbing people because they imagine they're robbing other thieves.

698  Bitcoin / Development & Technical Discussion / Re: brute-forcing public keys at amazing speed 2.2 PH/s on CPU on: April 08, 2020, 12:41:28 PM
I am not talking that programm can found public key with criteria like 192 leading zeros or something.
If your program could actually do what you claimed-- evaluate 2.2 petakeys per second, then it could find keys whos pubkeys have 60-bit leading zeros quite quickly.

Quote
Read carefully!
I told that programm can brutforce keys to find public key with speed 2.2Ph on xeon.
if you know public key than YES program can found private key from this public key after some time...
But this time depends only how far the starting private key from the desired..

Do you see the difference in your task and what I write?

But instead you demand a starting point _and_ a public key (rather than, e.g. a key hash). Which means you cannot actually do what you claim, because you need to compute a point difference in order to use a precomputed table.  One we consider that, instead what you claim is not impressive-- it is outright slow.

Assuming that the pubkey isn't available for that challenge payment-- go solve it.  It's worth several thousand dollars, so if you could actually operate at the speed you could you wouldn't be wasting my time, you'd be collecting the bounty.

Or go start at key 1, within 2^64 operations you will find a pubkey that begins with 60 zero bits with very high likelihood.
699  Bitcoin / Development & Technical Discussion / Re: brute-forcing public keys at amazing speed 2.2 PH/s on CPU on: April 08, 2020, 12:22:43 PM
Seems you realy do not understand))
I talk about brutforce (you know what is this?) and you are trying to impose a search for an incomprehensible pubkey that I can look for years.
No I am talking about finding the private key for ANY pubkey which matches a particular criteria: one where the first 60 bits are zero, so that it will take on average 2^60 operations to find it.

Quote
look at fist post, i talk about brutforce speed, i am not talking that i can found ANY public key for 1hour or 1day
Your first post said a speed of 2.2 PH/s.

Quote
and what does 60 bit have to do with it?
1 day with speed 1ph it is 10^15*86400 points total = 86400000000000000000
2^60 it is 1152921504606846976 you see difference between numbers?
86400000000000000000  79 times bigger than 2^60
And I suggested two days.

You should be able to find a key matching the property I described in about 2 days at 2.2PH/s.
700  Bitcoin / Development & Technical Discussion / Re: brute-forcing public keys at amazing speed 2.2 PH/s on CPU [malware warning] on: April 08, 2020, 12:18:55 PM
1Ph/s speed is roughly 2^66 per 24 hours.
There is a bitcoin address with 0.64BTC and 64bit private key. You need 2^63 operations to bruteforce it.
Man, why you gotta tell me this at 5am when I'm too tired to go actually attempt collect it. I'm going to guess the pubkey isn't available, or otherwise this would have already been solved. Tongue
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 [35] 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!