Bitcoin Forum
July 02, 2024, 05:44:53 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 [446] 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 ... 800 »
8901  Bitcoin / Development & Technical Discussion / Re: Double-spend prevention clarification on: August 01, 2012, 04:08:11 AM
An attacker with only 51% of the total hashing power could double-spend (or simply reverse) just confirmed transactions that he, himself, just spent; but still wouldn't be able to reverse the transactions of other peoples' bitcoins, only delay them from confirmations for as long as he could maintain the attack.  But even with 51% of the hashing power, 6 confirmations is safe.

As notme pointed out the attacker will always build off his attack chain.  With 51% of hashing power and enough time it is a mathematical certainty the attack chain will end up the longest.

Saotshi recommendations for x confirmations to be safe only apply for attackers with less than 51% of hashing power.  If an attacker has 51%+ then 6 confirmations isn't enough 106 isn't enough and given a patient enough attacker 10,006 confirmations isn't enough.

Confirmations provide security because they represent a given amount of hashing power if the attacker has the majority then no number can provide security.  You need some "non confirmation" method like checkpoints where the client will never re-org to earlier than the checkpoint no matter how much longer the attack chain is.
8902  Bitcoin / Mining / Re: What is up with this chart? time to confirm on: August 01, 2012, 03:49:22 AM
no data available.
8903  Bitcoin / Bitcoin Discussion / Re: Results of dictionary attack on SHA256 hashed keys on: August 01, 2012, 03:39:59 AM
Interesting.

Salt would be a good countermeasure against this type of search and so would a key derivitive function (as opposed to a simple SHA-256) to massively increase the computational requirements.
For example using PBKDF2 if someone birthday was 01/28/1977  they could perform 1,281,977 rounds of SHA-256.  The average GPU would be able to brute force maybe couple hundred passwords per second.

At say 100 keys per second a 14 million password brute force would take about 1.6 days.  Combined with a 64 bit salt would require couple billion years.

You do illustrate that without salt and/or key derivitive functions, SHA-256 is simply too fast for using in this fashion.  The same vulnerability exists for password tables hashed w/ single round of SHA-256/512.  If you spent a couple weeks you likely could exhaustively search all 8 digit passphrases.  A botnet could burn off cycles checking 9 digit passphrases over the course of months.
8904  Bitcoin / Bitcoin Discussion / Re: FORBES---Top 10 Bitcoin Statistics on: August 01, 2012, 02:25:01 AM
Also it is generally pretty crappy to post an article in its entirety.  At a very minimum you should include a link to the article.  Maybe post the top 3 paragraphs and if people want to read more they can follow the link for the full article.

http://www.forbes.com/sites/jonmatonis/2012/07/31/top-10-bitcoin-statistics/

In this case it is even more foolish in that Jon Matonis is a pretty level headed contributor to Forbes.  We want the leadership at Forbes seeing significant traffic/interest in Bitcoin stories.  More interest = more ads.  More ads = more articles on the same topic.  So link to it, tweet it, blog it, backlink it, cite it, quote it but don't blatantly copy it without crediting the source.

  
8905  Bitcoin / Development & Technical Discussion / Re: Double-spend prevention clarification on: August 01, 2012, 01:58:37 AM
Has anyone successfully completed a double spend?

No.  To do so would require having more hashing power than the entire remainder of the network.

Not true.  That would be a 51% attack which could be used to execute an unlimited number of double spends (or halt all transactions).

There are other mechanisms to execute a double spend.  

0-confirm double spend - requires no hashing power but would require very good timing
Finney attack - a variation of the 0-confirm double spend where the attacker has a double spend in a block ready to submit to the network.
Re-org attack - an attacker with a significant % of the network hashing power (but less than 51%) could produce the longest chain and double spend for a limited period of time.


The first two are prevented by not delivering product until 1 confirmation.  The risk of re-org attack is significantly reduced by waiting for higher number of confirmations.    Satoshi provides analysis and simulations on this type of attack.  The "wait for 6 confirmations" is a rule of thumb based on the low probability that anyone with less than 51% of hashing power could re-org more than 6 blocks.
8906  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 05:27:28 PM
according to some quick calculation, a password that uses a 62 characters big alphabet, and is 16 characters long has a maximum theoretical security of 2^80 (this figure is only a very poor estimation)you dont actually need to try all 2^80. you only need to go through 2^40 before you have 50% chance of hitting it. the attacker would compute this offline.2^80 requires a non trivial amount of work but anything below 2^128 is considered theoretically possible.

Uh no.

Also 80 bits of entropy can be computationally infeasible even with a planetary sized super computer.  Hell an 8 digit password can be made computationally infeasible.  You seem to forget that brute force is based on keyspace ..... AND .... throughput.

What if you can only attempt 100 passwords per second?

Quote
a 256 bit hash function gives a maximum theoretical security of 2^128.
No.
8907  Other / Off-topic / Re: SomethingAwful loves Bitcoin on: July 31, 2012, 05:21:03 PM
Quote
What about a bitcoin bank or exchange developed, hosted and managed by goons?

All savings and transactions secured against impropriety by goons insatiable desire to act smug about doing a better job than actual Bitcoin supporters

Smiley  Slowly ... 
8908  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: July 31, 2012, 01:34:34 PM
agreed however even a 6,000 word list has pretty common words.  Increases the size of the word list decreases the number of words required for a given strength.  I would also point out that key hardening can be used.  Most passwords have only 30 bits of entropy. 

60 bits of entropy in a 6,000 word list requires 5 words.    Using a chained iterative function (like PBKDF2) one can make it computationally in-feasible to brute force that 60 bit passphrase.  The downside (yes there is no free lunch) is the need to use salt to prevent precomputation attacks.  This will have to be recorded by the user.  Remember salt isn't a secret so it doesn't need to be safeguarded (use could email it to himself, print a copy and put it in a safe, put it in his drop box, and leave it in plaintext on his computer) but it does need to be recorded.

8909  Bitcoin / Bitcoin Discussion / Re: Brain Wallet standardization on: July 31, 2012, 12:52:13 PM
Btw.: Entropy is not everything. If you generate your password from many words, which occur in a dictionary and the attacker knows that, all the entropy of single characters is worthless, because the attacker can guess your password with a wordlist.

BTW entropy is everything you are just calculating it wrong.   If the passphrases comes from a dictionary list (and the person designing it will ASSSUME the attacker knows it) the entropy is (words in list)^(number of words)

i.e. if you have a word list of 5,000 words and generate a passphrase which consists of 10 of them randomly it would have

5000^10 ~= 2^122 or 122 bits of entropy.  (that assumes selection with replacement, too lazy to did the more common selection w/o replacement).
8910  Economy / Service Discussion / Re: BTC-e Hacked by Russians!! Price hits $60/BTC!!! on: July 31, 2012, 04:40:31 AM
I didn't realize that everyone's USD account balances were untouched... interesting. Are you aware of any case law relating to exploiting electronic representations of dollars elsewhere? I'd be interested... I think such things would probably have bearing on the eventual regulation of exchanges.

No idea but I am sure someone somewhere has falsified their USD balance on a brokerage account, or other non bank financial entity (like PayPal).  My guess is that despite these not being banks the Secret Service would investigate.  That would be your precedent.  Maybe some lawyer type can find something. 
8911  Economy / Service Discussion / Re: BTC-e Hacked by Russians!! Price hits $60/BTC!!! on: July 31, 2012, 04:19:36 AM
They didn't steal any USD.  They added fake USD to their account and used that to purchase goods (BTC) leaving the victims stuck with counterfeit USD.  

I agree the Secret Service likely won't investigate it because a) nobody will ask them to and b) the exchange in is another country.
8912  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 04:09:13 AM
Why is it unlikely btc-e have no cold storage wallet. Doesn't all exchange have a cold wallet?

Not in mother Russia apparently. 

Why can't I talk in btc-e chat?

You likely logged out.  Try logging back in.
8913  Economy / Service Discussion / Re: BTC-e Hacked by Russians!! Price hits $60/BTC!!! on: July 31, 2012, 04:07:03 AM
When Gox got hacked in June 2011, the media frequently reported as fact that the value of BTC's dropped to a penny.

What will happen when the media reports as a matter of fact that the value of BTC's just eclipsed their all-time high?  That alone will make a lot of people say "holy shit" and take a double-take, even if it's total bullshit.

If Bitcoin had a PR department you could spin this as "USD suffer a massive hack today* and in the flight to safety Bitcoin spiked to an all time high.  Bitcoin the new reserve currency for the world's reserve currency?"

* Technically the hackers actions could be best described as counterfeiting USD dollars.  Those counterfeit USD were then used to buy BTC.
8914  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 03:36:12 AM
So as an experiment I deposited ~ 1 BTC sold if for USD, bought the BTC back using my USD balance and withdrew the 0.8 BTC.  Yeah i "lost" 0.2 BTC but the point was to test the liquidity of the BTC side.

This makes me very confident that my (and others) original theory was correct. The attacker ONLY increased the amount of USD.  Period.  Nothing else.  There also appears to be some (at least 0.8 BTC as of 2 minute ago) BTC left.  Likely the hacker hit some per account limit or got his account suspended preventing him for getting 100% of the BTC.  

So what that means if you will very soon see HYPER INFLATION on the BTC-E exchange.  Think of BTC as the "goods" in the BTC-E economy.  The BTC-E USD money supply has been massively inflated but the amount of "goods" (BTC) hasn't.  This is the recipe for massive inflation.  It was inflated by the hacker/counterfeiter.  Normally we think of central banks as the one doing inflating and generally that is true in major economies however any increase in money supply  (even illegal ones like counterfeiting) causes inflation  As people realize this they will dump USD for BTC driving the price higher and higher and higher.  $50, $100, $500, maybe even $25,000 USD per BTC.

There is SOME (who knows how much) real BTC on the exchange but anyone hanging on to USD "profits" is an idiot.  Selling USD for BTC at 50%, 70% even 90% loss is better than holding on to a hyperinflating currency.  You may say "the money supply is no longer inflating" while that is true, but price action often lags the actual increase in the money supply.  If the hacker increased the USD money supply by say a factor of 50x then eventually USD:BTC will rise by a factor of 50x.  Under that scenario BTC-E "USD" are worth only 1/50th of "real USD".    

How much did the hacker inflate the BTC-E USD money supply?  I don't have a clue ... but do you want to find out holding BTC or BTC-E "USD?"
8915  Economy / Exchanges / Re: BTC-E.com exchange Bitcoin, Litecoin, Namecoin <-> USD\BTC (fee 0.2%) on: July 31, 2012, 03:20:35 AM
Have you ever considered depositing the BTC-E code, buying coins (at any price) and then withdrawing the BTC?  It looks like the hacker only "faked" USD.  The BTC wasn't stolen or "faked" thus eventually the price will crash back to nearly nothing skyrocket to infinity* but you should still be able to cashout BTC.

* On edit: the price will keep rising as less and less real BTC remain and the huge pool of fake USD tries to reclaim any value.  It is kinda like a game of musical chairs.

Key point is that EVENTUALLY THE EXCHANGE WILL RUN OUT OF BTC.  So don't try to "protect" your $40 USD/BTC profits.  Get BTC YESTERDAY.  BTC withdraws seem to be processing so likely the attacker was constrained (BTC withdraw limits ?) leaving some BTC for legit users.  It won't last.  Eventually people will be bidding $100, $500, $20,000 fake haker USD for the last few BTC.
8916  Bitcoin / Bitcoin Technical Support / Re: How do I import private key using bitcoin-qt.exe on: July 31, 2012, 03:07:01 AM
Code:
bitcoind importprivkey <bitcoinprivkey> [label]

Get to learn how the command line bitcoind works.  It is your friend.
8917  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 02:47:04 AM
Not really. I was able to withdraw from btce many minutes after the price spiked to 40s.

You are like the guy who says riots are good because he got a free TV. Smiley

Sure some withdraws may have made it through before the attacker emptied the hot wallet but 99% of people who tried to capitalize on $40 BTC are stuck with worthless $40 IOUs.  You may have lucked out but that doesn't mean a massive amount of economic damage didn't occur.

Plus I am pissed because I had 0.0087382 BTC stuck there from months ago because it was below the withdraw limit.   DAMN YOU HACKER!
8918  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 02:22:58 AM
While mildly exiting, it is actually no fun. Are you, guys, saying that someone can ‘inject’ fake btc into major exchange/service provider, then exchange between the currencies/withdraw and the surplus of the coins would be recorded into the blockchain?

No.  Any "faking" of USD or BTC would be on BTC-E books.  The bad news is that the victims are now left with more coins & dollars on the books (BTC-e internal books) than actual coins.  No amount of hacking can produce BTC from nothing.  The attacker merely transfered the real wealth of victims with fake balances on BTC-e books.


The "good news" is hopefully BTC-e wasn't totally stupid and after Bitcoinica reduced the size of their hot wallet.   If the attacker cleaned out the hot wallet then the % that users will lose is the % that the hot wallet makes up of total funds. 

Example (numbers out of my ass):

Say prior to the hack BTC-e had
5,000 BTC in hot wallet
50,000 BTC in cold wallet (plus all new deposit going directly to cold wallet)
50,000 BTC equivelent in USD.

The 5,000 BTC may be gone but victims should still get $0.90 on the dollar of their combined BTC/USD balances.  Now if BTC-e ran one giant hot wallet with all incoming deposits going directly into the hot wallet then victims may have lost everything.


8919  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 02:21:53 AM
I understand all that. What I was saying is that simply putting 50000 in the BTC balance box doesn't mean there is actually 500000 BTC there.

Well obviously the attacker can only withdraw the max in the hot wallet (or any per day limit unless compromised). 
That limit is the same regardless of if the attacker "fakes" BTC or "faked" USD to build up his BTC balance.

Say the hot wallet only had 10,000 BTC (hopefully it had a lot less) and the hacker was able to compromise the withdraw limit (by using multiple accounts).

"fake" 50,000 BTC you can only withdraw 10,000 BTC
"fake" $1M USD and buy 50,000 BTC you can still only withdraw 10,000 BTC.

Once the hot wallet is empty the hacker is "maxed out" regardless of what tricks he pulls.

Unless BTC-E is very stupid incoming deposits should go to the COLD WALLET thus not increase the amount stolen.

8920  Economy / Service Discussion / Re: HOLY SHIT BTC-E.COM hit $40 per BTC! on: July 31, 2012, 02:12:15 AM
They wouldn't be able to withdraw any USD since it's fake. Saying you have 500000 fake BTC on BTC-e doesn't mean anything if you don't actually have the keys to those coins in an actual wallet. They used fake USD to buy real BTC then ride off into the sunset laughing.

Dude.  All exchanges use a pooled wallet.  There is no such things "your" BTC or "your BTC" wallet on BTC-E, MtGox or any other exchange.  The exchange simply has one (or more) hot and/or cold wallets.  Then they maintain a database of each user's balance, and trades change those balance.     One could withdraw "fake" BTC just as easily as selling "fake" USD for BTC and withdrawing that.

The likely reason for faking USD is simply because that is the exploit the hacker founds.  Hacker found a way to add USD to his USD balance.  Once had had that why try hacking any further.  Give yourself huge amounts of USD, buy BTC and remove them from the exchange.
Pages: « 1 ... 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 [446] 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 ... 800 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!