Bitcoin Forum
November 19, 2024, 06:43:32 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 3 »
1  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: February 20, 2014, 08:31:57 PM
is it possible to protect the keys with BIP38 encryption?

I've been looking into this recently.

The conclusion I've came up with is not to implement BIP38 because in the long run it will hurt users more then it will help them.

Here's why:
BIP38 is still just a proposal (BIP = Bitcoin Improvement Proposal), and it's been a draft for more than a year now. Until it's not accepted as standard there is no guaranty that this proposal won't changes, and it probably will to some extent after it's fully reviewed. Until that time, if I were to implement this, users would be tied to that (non-standardized-now) implementation even when standard changes later. That's why I won't implement it and I advise not to use BIP38 from any other site because it will just bring problems in the long run.

I can think of scenario in future where we have one piece of encrypted date that can be decrypted to different private key using old non-standardized and new standardized BIP38, and which can be then used to create compressed and uncompressed public key. Resulting with 4 addresses. (Compressed key is madness on its own which doesn't bring any benefit to bitcoin community at all, but that's not the topic here...)

Still it might be good idea to implement some other standardized secure way of encrypting important date (private key in this case). AES probably makes seance (which is also proposed to be used inside BIP38) because it's broadly used, secure and standardized. Although data encrypted using AES will be a bit longer then it would be with BIP38, but not much.

2  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: February 01, 2014, 07:04:09 AM
Hmm. I can't replicate this. If I try to access the site via HTTP the connection is always redirected to HTTPS. If you can provide steps to reproduce accessing via HTTP I'd like to see them, thanks!

I'm glad it's fixed now.

Regarding offlineaddress, once I've loaded the site over SSL, what do I do to make sure the code hasn't been tampered with by a hacker?

Not much, as I've explained here, dedicated hacker will always succeed.

For power-users the easiest and obvious way is to open terminal and type:
Code:
git clone https://github.com/mikewoods/OfflineAddress.com
After that you'll have the whole site locally ready to run, you don't even need to unzip it.
3  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: January 26, 2014, 10:28:14 AM
I've added HTTPS to my site.

I've also made extra effort so that my site can't be accessed from HTTP anymore, all requests will be redirected to HTTPS.  Cool

@canton: I've noticed that your site is still accessible from HTTP. What's the point of having HTTPS and letting the users access the site over HTTP?
4  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: January 21, 2014, 05:59:07 AM
The only protection is to store his pgp key now and use it forever
+ and hope current connection is safe, and hope his pgp key is never compromised, and trust the author  Grin
5  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: January 21, 2014, 05:45:23 AM
@canton
@Patel
@IAS

The difference between my 'laziness' and 'expertise' lies in being very well familiar with MitM attacks...

It seems to me that you guys think HTTPS is some kind of 'excellent security', while I'm well aware it's hard to even call it 'good security'.
HTTPS it there to 'make people feel secure', it won't prevent any experience hacker, and that's why I wasn't rushing to add it to my site.

Let me explain how ridiculous is it to think that having HTTPS and signed code will make users safe:

For example caton's site (I hope he doesn't mind discussing vulnerabilities in his site publicly) is open to SSLstrip attack making HTTPS useless in the first place:
1) Site isn't using HSTS (there are no STS headers served).
2) Even if it was using HSTS first-time user could still be attacked. Unless all users are using 'HTTPS everywhere' and caton's site was on their list (which is not the case).
3) Even if all measures above ware implemented (and all users had HTTPS everywhere installed), this would only protect site from active MitM attack that do not compromise the certificate trust model - there are multiple parties that can issue fake SSL certificates that will be accepted by the client.
4) Only solution is to use the public key fingerprint as the server address (anonymous networks such as Tor and I2P), but their DNS is pretty much nonexistent, so the connection will depending on SSL security to obtain the address/public_key. So, it's still not secure!

5) Also signing won't help because:
GitHub link is served from the site (which can be SSLstrip-ed) - attacker can provide link to his repository that has his version of software signed with his key.
GitHub serves STS, and even if we assume user is on correct GitHub page, and has HTTPS everywhere - still, private key to check signature isn't in GitHub, it's served from private site, which is served over HTTP Shocked, even worse, it's linked from HTTP site to other site also served over HTTP (so you can chose where to do MitM, and you don't even have to strip HTTPS).
Now, how could that be even remotely secure?

And what about compromising GitHub account (or email) - git history can be rewritten. What about compromising server?

...


There are too many problems to address and dedicated attacker will always succeed!

That attack on randomness can be done on addresses created in the past(!), while MitM attack has to be done on live connection - which makes randomness problem more important (instead of pretending to serve secure site).

Anyway, I'll add HTTPS this week. Peace.  Cool
6  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: January 20, 2014, 07:37:05 PM

Can I persuade you to change your recommendation to downloading a ZIP file from github and validating the hash? And actively *discourage* visitors from trusting HTML loaded from a live website? Yours is the only paper wallet site recommending this approach, and I can't figure out why.

There's no reason for a visitor to believe that they derive much additional security from disconnecting from the Internet after loading the offlineaddress.com code live. As you well understand, if the RNG is compromised in the HTML they receive, it doesn't matter whether or not the visitor is still online when they generate wallets.

Your recommendation seems doubly problematic when:

1) You don't force HTTPS on your server.

2) You don't provide a mechanism for a visitor to validate the integrity of the HTML they're receiving from your website against some signed codebase of your own.

In short, you're advocating blind faith in the security of your web server. The only argument I've heard you make in support of this is that it's unrealistic to expect visitors to download a ZIP file from github and run the HTML locally. I'm really alarmed by this. I like your concern about RNGs, but I'm wary of your lack of concern about website security. You've got a nice site, good software, and strong promotion -- but you're advocating a standard of security that's much more relaxed than anyone else doing this. Why is this?

I appreciate your concerns.

Recommendation for downloading zip from GitHub will be added once code base isn't growing too fast.  Cool

If RNG is compromised users will still be secure because all random date is user-provided.

Instructing users to primary check hashes is not appealing to broad audience (you know how hard it is to check hashes or signatures on Windows machines  Shocked).
Discouraging users from using loaded HTML doesn't make sense to me - there is no purpose in having website saying you shouldn't use it.

1) I'm working on this, HTTPS will be added within a week or so.

2) I provide GitHub commit ID, and hashes will be added soon.

In short: yes, there are few things that should be added (like HTTPS and hash validation), and I'm working on it.
I'm concerned about both web security and RNGs.  Grin
7  Economy / Service Announcements / Re: Check out my awesome site for generating secure OfflineAddress.com on: January 18, 2014, 11:17:42 PM
I've released a new version of bitaddress.org with improvements to the entropy collection:
https://www.bitaddress.org/bitaddress.org-v2.8.0-SHA1-87dcf19f02ee9fb9dd3a8c787bcf52eef944aa82.html
 - more entropy from browser fingerprinting for PRNG seed
 - user can add entropy through URL hash tag
 - seed mouse movement as 16-bit number
 - whole seed pool initially filled by window.crypto.getRandomValues
 - added textbox as an alternative input source for entropy
 - address will not generate without a minimum amount of human added entropy from mouse or keyboard
 - discard mouse movements less than 40ms apart
 - visualize points of entropy collection from the mouse

@mikewoods, thank you for the ideas about discarding mouse movements less than 40ms apart and about visualizing the mouse collection points to encourage people to move the mouse more randomly.


That's great news! I'm very happy to be able to help!

I like how it works now - users will be motivated to try to get that number to 0.  Smiley
8  Bitcoin / Bitcoin Discussion / Re: Any good ideas apart from Overstock to get BTC public mainstream quickly ? on: January 17, 2014, 08:10:28 AM
I think we've reached a point where theres a domino affect.  The days of having to beg/educate a merchant to accept bitcoin seems to be quickly fading away.

True, we just have to be patient now.

Unless PayPal figures out that he'll die if Bitcoin grows, and decides to put in their 'Terms' that you're not allowed to except PayPal payments if you're accepting Bitcoins.
9  Bitcoin / Bitcoin Discussion / Re: Is Bitcoin's popularity fading? on: January 17, 2014, 04:49:47 AM
It's less popular if you look 30 days back:  Sad
https://www.google.com/trends/explore#q=bitcoin&date=today%201-m&cmpt=q

However, if you look at last 90 days, it's better then November:   Grin
https://www.google.com/trends/explore#q=bitcoin&date=today%203-m&cmpt=q
10  Bitcoin / Bitcoin Discussion / Re: Ebay UK annouces new policy for virtual currencies on: January 16, 2014, 07:38:21 PM
eBay is opening a Virtual Currency category to allow the sale of virtual currency in Classified Ads format on February 10, 2014.

"Classified Ads format" -  sounds like a lot of verifications/limitations/additional_problems
11  Bitcoin / Bitcoin Discussion / Re: Interesting capture of current public opinion on: January 16, 2014, 06:44:02 PM
People don't know what they talk about.
It's like asking my mom what she thinks about SHA256.
12  Bitcoin / Bitcoin Discussion / Re: What happens in china on the 31st Jan? on: January 16, 2014, 09:30:37 AM
China has a lot of people, but their purchasing power is smaller then most people think, they aren't that important.
13  Bitcoin / Bitcoin Technical Support / Re: Hypothetical: So, your cleaning out closet, boot up old PC from 2010 and find... on: January 16, 2014, 06:55:47 AM
Just start writing any passwords hints down.
I had similar problem and I ended up building program that generated all possible passwords based on hints I had - few hundreds of those - which ended up containing the correct one.
14  Bitcoin / Bitcoin Discussion / Re: Fork The Blockchain And Block The Seized FBI Coins. on: January 15, 2014, 06:37:50 PM
This may be the stupidest idea I have read on this forum so far.

And it completely goes against what bitcoin represents and strives for.


Yes, thank you cAPSLOCK.

Bitcoin has to be transparent, even in hacking situations that hurts majority of users. Even whole countries (and their currencies) fall and rise, we just have to live with it.
15  Bitcoin / Bitcoin Discussion / Re: What are the chances BTC is replaced by something better soon? on: January 15, 2014, 06:19:55 PM
Replaced, probably not.
Think of countries in EU that excepted Euro as official currency, they still use their old currencies as well.
16  Bitcoin / Bitcoin Discussion / Re: ATMs that Dispense Bitcoins for Cash - What's the Point? on: January 15, 2014, 07:57:43 AM
ATM leaves no traces about the buyer.
Most new bitcoin users have to give away their identity when buying their first bitcoin, and some of them are worried if it's even legal to use bitcoins.
So my guess is that anonymity makes ATMs quite useful.
17  Bitcoin / Bitcoin Discussion / Re: Do you have a bitcoin blog or business? on: January 15, 2014, 07:51:55 AM
If it goes life, add: offlineaddress.com
18  Bitcoin / Bitcoin Discussion / Re: Has anyone seen this paper from 1995? on: January 15, 2014, 07:47:39 AM
So old, yet it feels like it was written just a few years ago.
19  Bitcoin / Project Development / Re: Auto-validating bitaddress.org, bitcoinpaperwallet.com, brainwallet.org, etc. on: January 14, 2014, 06:10:20 AM
Browser plugin solution tied to web site seems like a nice combination.
...


EDIT:
We have to decide on common solution.
Check out canton's proposal below.
20  Bitcoin / Project Development / Re: Auto-validating bitaddress.org, bitcoinpaperwallet.com, brainwallet.org, etc. on: January 13, 2014, 08:23:38 PM
Hi, I'm developer of offlineaddress.com.

To be able to develop secure bitcoin services we need a way to allow developers to prove security of their sites, without hurting usability for average bitcoin users.

Validating service could be generalized and also useful to sites that aren't related to bitcoins.
It might sense to contact:
 - GitHub.com
 - EFF.org
 - TorProject.org
because it seems to me that they might want to solve similar problems.

Solution could be:
 - third site, as described by canton (general, or specific to bitcoin sites).
 - browser plugin that compares checksums automatically on each visit, for sites with specified meta tag with link to the source.
Pages: [1] 2 3 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!