Bitcoin Forum
May 24, 2024, 07:09:47 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 [46] 47 48 49 »
901  Economy / Lending / Re: 4 BTC Loan- 30days 4.5 repaid**edit**5BTC to be repaid on: September 16, 2013, 09:59:14 PM
Considering court costs, lawyer, the cost to serve you, and filing costs alone, I do not see how this would be a "secure" loan.
Even if a cost of litigation clause is written into the contract, it's too risky. You can easily be sending a Photoshopped ID and signing with a fake name.
Only way to overcome this is have it notarized and even then the lender would have to verify it was genuinely notarized.

Either you send your collateral physically via mail to an escrow or third party, and they hold it until loan is complete, or it makes no sense.
902  Other / Beginners & Help / Re: would like to fairly borrow on: September 16, 2013, 09:51:30 PM





Easiest denial I've given today.  Cheesy
903  Economy / Securities / Re: Cloudhashing ASIC mining contracts, UK LTD company - Now Mining & Paying Bitcoin on: September 16, 2013, 09:44:56 PM
Not good news Phillip Sad



I was hoping for a positive story, but I guess the truth is the truth.
904  Economy / Lending / Re: Need loan 150 BTC for buying BFL on: September 16, 2013, 08:50:48 PM
905  Other / Archival / Re: 0 on: September 16, 2013, 08:43:09 PM
906  Bitcoin / Group buys / Re: [OPEN/32/40 shares avail]R2: Bitmine or Cointerra + Host,BTCrow ESCROW,Est.$4-5K on: September 16, 2013, 08:33:51 PM
I've been partial to the Cointerra ever since I saw it.  Grin

Looking at the charts, it does seem to be the best bet. But, I'm a little apprehensive because of the tsunami of ASIC's hitting homes in the next 1-3 months.
907  Economy / Scam Accusations / Re: Bryan Micon's Butterfly Labs Scammer Investigation including Josh Zerlan on: September 16, 2013, 08:27:28 PM
I read part of the thread, and the common consensus is that the people who went got bought off with a ASIC machine that was given to them.



Sad.  Cry
908  Economy / Scam Accusations / Re: Bryan Micon's Butterfly Labs Scammer Investigation including Josh Zerlan on: September 16, 2013, 06:39:29 PM
Well then.

Do you guys want a Nightline type of interview going in guns blazing, or is a hidden camera/undercover type of sting better?




cp1 I don't have time for such mundane things like clicking on websites. I think you understand that already.

I'm surprised more of you haven't gone to their offices in person if you are aware of their address....

909  Economy / Lending / Re: $3000 Loan on: September 16, 2013, 06:13:52 PM
910  Economy / Scam Accusations / Re: Bryan Micon's Butterfly Labs Scammer Investigation including Josh Zerlan on: September 16, 2013, 05:56:23 PM
A few things....


It seems they are delivering because the proof of delivery (tracking number or confirmation) is enough to show the order was fulfilled and will grant them a win if you place a chargeback on your credit card.

Does anyone have the address of BFL headquarters? I am involved in the media (business and financial reporting) and would love to pay them a visit and get them on the record.
911  Bitcoin / Group buys / Re: [OPEN/32/40 shares avail]R2: Bitmine or Cointerra + Host,BTCrow ESCROW,Est.$4-5K on: September 16, 2013, 05:41:54 PM
What is your expected return per share?

I am interested and so far your GB looks good.

Hi Andrew,

Thank you! I try hard to provide a great value at the lowest possible costs and lowest cost miner host fees.

Expected return per share? Honestly, your guess is as good as mine! We can play with calculators from BitcoinX and The Genesis Block all day long, but those are just estimations roughly grounded on future network difficulty changes. We all hope to make a profit but if things go sour, well at least risk is shared and any refunds requests will be handled as promptly as possible. We also hope to sell the unit(s) at the 6-7 month mark to recoup investment costs and split the proceeds among owners.

We do know that from user FCTaiChi's hard work that the current #1 and #2 pre-order options as far as estimated returns are CoinTerra IIs and IVs. Group Buys are meant for those miners trying to get access to the best values at the lowest prices and are hoping to hedge their bets across multiple strong bets.

Shall I put you down for a soft reservation for 1 share?



Understood partially, apparently I'm a little confused.

If the miners will be sold at 6-7 month mark, when is ROI achieved? 4 months in? 5 months in?


Can you please put an estimate profit as you see it? You seem to know your stuff and your guess is better than mine at this point.
912  Other / Beginners & Help / Re: would like to fairly borrow on: September 16, 2013, 05:35:47 PM
As I'm a noob at this so maybe someone can help, how is this a scam attempt, if im offering any kind of collateral you guys suggest even if it means mailing something and handing over all the proof for my identity?


There is a difference between verifying your identity and actual collateral.

Collateral means offering up something physical or virtual that has value, as a promise you will repay your loan, and making it so we can actually collect incase you default. A trusted third party is usually used.

Watcha got?  Smiley
913  Bitcoin / Bitcoin Discussion / Re: SHA-256 has no backdoors =/= Bitcoin has no backdoors on: September 16, 2013, 05:28:19 PM
Time to shut up, listen, and learn. School is in session.


One of two articles, the first showing how NSA puts backdoors in encryption.


Quote
Did NSA Put a Secret Backdoor in New Encryption Standard?

By Bruce Schneier
Wired News
November 15, 2007

Link: https://www.schneier.com/essay-198.html

Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency.

Generating random numbers isn't easy, and researchers have discovered lots of problems and attacks over the years. A recent paper found a flaw in the Windows 2000 random-number generator. Another paper found flaws in the Linux random-number generator. Back in 1996, an early version of SSL was broken because of flaws in its random-number generator. With John Kelsey and Niels Ferguson in 1999, I co-authored Yarrow, a random-number generator based on our own cryptanalysis work. I improved this design four years later -- and renamed it Fortuna -- in the book Practical Cryptography, which I co-authored with Ferguson.

The U.S. government released a new official standard for random-number generators this year, and it will likely be followed by software and hardware developers around the world. Called NIST Special Publication 800-90 (.pdf), the 130-page document contains four different approved techniques, called DRBGs, or "Deterministic Random Bit Generators." All four are based on existing cryptographic primitives. One is based on hash functions, one on HMAC, one on block ciphers and one on elliptic curves. It's smart cryptographic design to use only a few well-trusted cryptographic primitives, so building a random-number generator out of existing parts is a good thing.

But one of those generators -- the one based on elliptic curves -- is not like the others. Called Dual_EC_DRBG, not only is it a mouthful to say, it's also three orders of magnitude slower than its peers. It's in the standard only because it's been championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.

The NSA has always been intimately involved in U.S. cryptography standards -- it is, after all, expert in making and breaking secret codes. So the agency's participation in the NIST (the U.S. Commerce Department's National Institute of Standards and Technology) standard is not sinister in itself. It's only when you look under the hood at the NSA's contribution that questions arise.

Problems with Dual_EC_DRBG were first described in early 2006. The math is complicated, but the general point is that the random numbers it produces have a small bias. The problem isn't large enough to make the algorithm unusable -- and Appendix E of the NIST standard describes an optional work-around to avoid the issue -- but it's cause for concern. Cryptographers are a conservative bunch: We don't like to use algorithms that have even a whiff of a problem.

But today there's an even bigger stink brewing around Dual_EC_DRBG. In an informal presentation (.pdf) at the CRYPTO 2007 conference in August, Dan Shumow and Niels Ferguson showed that the algorithm contains a weakness that can only be described as a backdoor.

This is how it works: There are a bunch of constants -- fixed numbers -- in the standard used to define the algorithm's elliptic curve. These constants are listed in Appendix A of the NIST publication, but nowhere is it explained where they came from.

What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.

The researchers don't know what the secret numbers are. But because of the way the algorithm works, the person who produced the constants might know; he had the mathematical opportunity to produce the constants and the secret numbers in tandem.

Of course, we have no way of knowing whether the NSA knows the secret numbers that break Dual_EC-DRBG. We have no way of knowing whether an NSA employee working on his own came up with the constants -- and has the secret numbers. We don't know if someone from NIST, or someone in the ANSI working group, has them. Maybe nobody does.

We don't know where the constants came from in the first place. We only know that whoever came up with them could have the key to this backdoor. And we know there's no way for NIST -- or anyone else -- to prove otherwise.

This is scary stuff indeed.

Even if no one knows the secret numbers, the fact that the backdoor is present makes Dual_EC_DRBG very fragile. If someone were to solve just one instance of the algorithm's elliptic-curve problem, he would effectively have the keys to the kingdom. He could then use it for whatever nefarious purpose he wanted. Or he could publish his result, and render every implementation of the random-number generator completely insecure.

It's possible to implement Dual_EC_DRBG in such a way as to protect it against this backdoor, by generating new constants with another secure random-number generator and then publishing the seed. This method is even in the NIST document, in Appendix A. But the procedure is optional, and my guess is that most implementations of the Dual_EC_DRBG won't bother.

If this story leaves you confused, join the club. I don't understand why the NSA was so insistent about including Dual_EC_DRBG in the standard. It makes no sense as a trap door: It's public, and rather obvious. It makes no sense from an engineering perspective: It's too slow for anyone to willingly use it. And it makes no sense from a backwards-compatibility perspective: Swapping one random-number generator for another is easy.

My recommendation, if you're in need of a random-number generator, is not to use Dual_EC_DRBG under any circumstances. If you have to use something in SP 800-90, use CTR_DRBG or Hash_DRBG.

In the meantime, both NIST and the NSA have some explaining to do.



Second article.

Yall outa know by now, NSA will NOT let any cryptography be released that THEY are not going to be able to plant a backdoor in. The nation's security is too important to leave anything to chance.



Quote
New York Times provides new details about NSA backdoor in crypto spec
The paper points a finger definitively at the long-suspected Dual_EC_DRBG algorithm.

by Megan Geuss - Sep 11, 2013 3:00 am UTC
Link: http://arstechnica.com/security/2013/09/new-york-times-provides-new-details-about-nsa-backdoor-in-crypto-spec/

Today, the New York Times reported that an algorithm for generating random numbers, which was adopted in 2006 by the National Institute of Standards and Technology (NIST), contains a backdoor for the NSA. The news followed a NYT report from last week, which indicated that the National Security Agency (NSA) had circumvented widely used (but then-unnamed) encryption schemes by placing backdoors in the standards that are used to implement the encryption.

In 2007, cryptographers Niels Ferguson and Dan Shumow presented research suggesting that there could be a potential backdoor in the Dual_EC_DRBG algorithm, which NIST had included in Special Publication 800-90. If the parameters used to define the algorithm were chosen in a particular way, they would allow the NSA to predict the supposedly random numbers produced by the algorithm. It wasn't entirely clear at the time that the NSA had picked the parameters in this way; as Ars noted last week, the rationale for choosing the particular Dual_EC_DRBG parameters in SP 800-90 was never actually stated.

Today, the NYT says that internal memos leaked by Edward Snowden confirm that the NSA generated the Dual_EC_DRBG algorithm. Publicly, however, the agency's role in development was significantly underbilled: “In publishing the standard, NIST acknowledged 'contributions' from NSA, but not primary authorship,” wrote the NYT. From there, the NSA pushed the International Organization for Standardization to adopt the algorithm, calling it “a challenge in finesse” to convince the organization's leadership.

“Eventually, NSA became the sole editor” of the international standard, according to one classified memo seen by the NYT.

The details come just as NIST released a promise to reopen the public vetting process for SP 800-90. “We want to assure the IT cybersecurity community that the transparent, public process used to rigorously vet our standards is still in place,” a memo from the Institute read. “NIST would not deliberately weaken a cryptographic standard. We will continue in our mission to work with the cryptographic community to create the strongest possible encryption standards for the US government and industry at large.”

Still, NIST asserted that its purpose was to protect the federal government first: “NIST’s mandate is to develop standards and guidelines to protect federal information and information systems. Because of the high degree of confidence in NIST standards, many private industry groups also voluntarily adopt these standards.”



Class is dismissed.
914  Economy / Securities / Re: Cloudhashing ASIC mining contracts, UK LTD company - Now Mining & Paying Bitcoin on: September 16, 2013, 05:19:42 PM
So is the consensus that the calculator DOES factor in increasing difficulty and the calculators ARE correct?
915  Economy / Economics / Re: The Switzerland of Bitcoin on: September 16, 2013, 05:10:12 PM
You ignore that the poster referred to using Bitcoin to bypass American sanctions imposed on Iran. That's just illegal.
American sanctions are just American sanctions. The free world doesn't care about them. Maybe it's time for you to consider renouncing your US passport and move to live in some free country. Bitcoin is not a property of the US government.

Sorry, I am a proud American. You can keep your filthy commie ideas to yourself.



If you choose to ignore US, and NATO, and EU sanctions on Iran, that is your choice. Your douchey life, your choice.



916  Bitcoin / Bitcoin Discussion / Re: SHA-256 has no backdoors =/= Bitcoin has no backdoors on: September 16, 2013, 07:08:54 AM


Shhh.... if people hear you talk, they'll know you're dumb.  Wink
917  Bitcoin / Group buys / Re: [OPEN/32/40 shares avail]R2: Bitmine or Cointerra + Host,BTCrow ESCROW,Est.$4-5K on: September 16, 2013, 06:54:13 AM
What is your expected return per share?

I am interested and so far your GB looks good.
918  Economy / Securities / Re: Cloudhashing ASIC mining contracts, UK LTD company - Now Mining & Paying Bitcoin on: September 16, 2013, 06:33:07 AM
Do you investors expect to make ROI?

If so, how much profit do you realistically hope to earn? Please include the contract (silver, gold) you purchased.
919  Economy / Long-term offers / Re: ♔ RUSTYRYAN's 3.0% Weekly Term Deposits ♔ on: September 16, 2013, 06:09:11 AM
What a thread!

This thread should be required reading for people before they are allowed to deposit Bitcoins with anyone.
920  Other / Beginners & Help / Re: would like to fairly borrow on: September 16, 2013, 05:03:11 AM
Who can go wrong trusting a Russian businessman?


Hell, I'll give you 4 BTC cause you're such a great guy.

 Grin
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 [46] 47 48 49 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!