Bitcoin Forum
June 22, 2024, 08:57:05 PM *
News: Voting for pizza day contest
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency (mandatory upgrade) on: August 31, 2014, 03:24:48 AM
I see. After a lot of posts that debunked allegations in the orignal thread, they moved it to a place without comment.

Their campaign is very interesting to watch.
2  Alternate cryptocurrencies / Altcoin Discussion / Re: Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of Monero) on: August 22, 2014, 04:47:50 PM
Look at this. I checked the snapshots of CSS files RethinkYourStrategy posted here and this is what I found. It don’t match. I checked every web page myself and the CSS code from his snapshots is different from the reality. Since I found this I don’t trust his research anymore. Every single thing that he claims must be doublechecked.  

Obviously, the CSS has been changed to no longer reflect the original findings. There is no reason such a change would not be made.

Checking website contents or adding new website as proof for something, in such a way that it cannot be verified with archive.org, after the time of this reveal does not prove anything, because websites are easily created, modified and timestamps are trivial to falsify.

As we are all here for the purpose of reasonable discourse, I hope for your understanding and hope that no more of this type of unreliable evidence is posted.
3  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency on: August 19, 2014, 04:25:54 PM
Check in the block explorer. Just paste your address and find the right tx ID.
http://monerochain.info/

The anonymity features of Monero work. You cannot just look up all transactions to and from an address.
4  Alternate cryptocurrencies / Altcoin Discussion / Re: Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of Monero) on: August 18, 2014, 04:58:17 PM
This is really good analytical research about the whitepapers.
There are indeed 2 possibilities here (IMO): It was a genuine mistake from the CN website (not really 100%, on this one) or it was a malicious act to try discredit the technology itself. Lets not forget that when competitors consider you  a threat and to their own interests, they will go in all lengths to discredit you.

But do BCN devs not also refer to the CN website? It would be strange for damaging material to be posted in that place.

Since some time has passed since the publication of the original analysis in this thread, the possibility of a "corrected" backdated whitepaper being posted on one or both of these sites should not be discounted.
5  Alternate cryptocurrencies / Altcoin Discussion / Re: Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of Monero) on: August 16, 2014, 06:11:41 PM
This brings me to my last point. Claims made not just by you, that ppl which are not native English seekers is racist crap and should be avoided at all cost! It is not important how much Hero or whatever status member has – speaking like that just reduces his credibility significantly and mark him as FUDster troll, subtle in some cases but troll nevertheless.

This is very funny. Nobody is making racist claims. It is just that bad English is an easily identified trait that can be found in many of these specific shill posts.

Even more funny is that I have seen before those shill accounts making claims of racism when this property of their posts was pointed out in different places at similar times.

To make a point, my English is less than perfect, but I have not been accused of being a "FUDster troll" up until now.
6  Alternate cryptocurrencies / Altcoin Discussion / Re: Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of M... on: August 15, 2014, 04:28:48 PM
It is fascinating to see all these puzzle pieces laid out so clearly. You did good detective work.
7  Alternate cryptocurrencies / Altcoin Discussion / Re: -> Monero Community Hall of Fame <- on: August 11, 2014, 09:36:35 PM
I have sent 2 XMR.

4cbda4a2a1323f41b8ffd8f6efe6b98c0c0b7e7ab200e8fb56c8624427f74ba2
8  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: August 02, 2014, 11:33:29 AM
Monero was released with an intentionally crippled hash function. Whether the Monero devs realized it or not, the crippled hash was included to give someone an unfair advantage.
So BCN devs could have mined Monero faster. But BCN devs do not appear to care for Monero. Do you have anything that strongly indicates BCN devs mined Monero back then?

If somebody who was not involved in the creation of the hash function optimized it, the fact that it was intentionally crippled instead of accidentally crippled does not matter for fairness.
9  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 28, 2014, 04:25:24 PM
Afaics, there can't be a layer outside the onion routing maintaining constant flow to outputs of the network unless you have masternodes in control of maintaining the constant flow, which would then be egregiously vulnerable to Sybil attack. How do you envision it working otherwise?

Thus constant flow is inimical to the obfuscation of fixed points through randomization, which makes a Chaum mix-net work.
You can build what is basically mesh network with fixed capacity connections upon which you run the mix network. Whenever you open a connection to another peer in the network, you keep open the connection and both sides keep sending packets at the agreed upon rate while tunneling their actual communication through this constant stream. Packets are routed through this network to the target peers chosen for the onion routing route for the given packet.

I see that this design is probably more than can be easily implemented on top of I2P if it was desirable at all.

It occurs to me that this discussion is probably off topic here.
10  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 28, 2014, 03:35:15 PM
But I don't see how cover channels can even work as you describe them? Where does the constant flow originate in onion routing?
My idea is that the cover traffic channels would be the outermost layer for communication between nodes participating in the mix network. You perform routing and onion routing through these channels.

Why do you mention that? Even if you Sybil attacked the entry node, you wouldn't know what the destination packet looks like due to the onion routing.
Following the above, if an attacker controls all nodes to which you connect, the attacker can tell what part of the traffic is cover traffic.

If you find a way to switch around the order of layers, this can possibly be avoided. However, as you noted, doing cover traffic inside the onion routing network would be difficult.

My point is that 10-20% of the relay nodes Sybil attacked is not needle-in-the-haystack odds, more like the odds of flipping a dice or pair of them.
I see this point.
11  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 28, 2014, 02:21:57 PM
I assume you mean relay nodes sending out dummy packets at random intervals, so latency doesn't increase for legitimate traffic (as long as relay nodes can handle the additional bandwidth).

I have been thinking about establishing fixed capacity channels between sets of nodes instead. The negotiated capacity is filled completely at all times, either with padding or real data. Because channels are encrypted, an attacker cannot differentiate between them.

The user's packet has to be in the same form as it entered the network when it leaves the network going the miner. Afaics, your proposed cover channels accomplish exactly nothing.
If your threat model includes the attacker looking at clear traffic on both sides, you have lost anyway, because the attacker can already read the transactions senders send and know who the senders are. Otherwise, the attacker cannot tell the way the packet looked when the sender sent it, because from the side of the sender the attacker only sees say 100 packets per second of constant size sent to 16 different nodes each, which also behave this way.

Please understand that this proposal is intended to counteract opaque timing attacks only, not sybil attacks.

Sybil attacks are very hard to defend against...Despite all, in 2012 the NSA was still obstructed in some degree by even Tor use. The least we can do is make it a bit harder for them.

A Sybil attack doesn't mean you succeed 100% of the time, as you don't have 100% of the relay nodes.

I want anonymity by needle-in-haystack, not anonymity by pair of dice.

Apparently nobody knows what percentage level of relay nodes the NSA controls on Tor (or I2P).
I entreat you to stop mentioning Tor. It is a different system than I2P, which is being implemented.

It is still a haystack, just of different size. It is still better than nothing at all. A hypothetical attacker with infinite budget cannot be defeated. We can model an attacker with specific capabilities and attempt to design system which defeats the attacker with a given probability. We do not actually disagree on this?
12  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 28, 2014, 01:40:25 PM
If mining is centralized then the exit points are probably easy to find.
Can you please explain this in more detail? Neither are there exit nodes, nor are transactions sent directly to miners. Transactions are broadcast through the whole network. How do known miners make it easier to perform traffic analysis in a cover traffic scenario?

I assume you mean relay nodes sending out dummy packets at random intervals, so latency doesn't increase for legitimate traffic (as long as relay nodes can handle the additional bandwidth).
I have been thinking about establishing fixed capacity channels between sets of nodes instead. The negotiated capacity is filled completely at all times, either with padding or real data. Because channels are encrypted, an attacker cannot differentiate between them.

Seems to me the adversary could ignore all packets coming out of the exit nodes that didn't correlate with a low-latency to the targeted entry node.
Again: There are no exit nodes with I2P. This is also not possible with fixed bandwidth cover traffic channels.

Sybil attacks are very hard to defend against if your attacker can replace your internet connection with connection to NSA LAN instead. Despite all, in 2012 the NSA was still obstructed in some degree by even Tor use. The least we can do is make it a bit harder for them.
13  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 28, 2014, 02:54:48 AM
Also I don't believe Monero is anonymous to the NSA and authorities with high reliability given the weaknesses in I2P and Tor.

I believe Tor and I2P should not be conflated. Timing attacks are more difficult against I2P. With Tor, you have exit nodes which make it easy to see one of the endpoints for the purpose of correlation. It can still be done without visible exits, but this is a bit harder.

There has been some talk about introducing random delays to harden the mix network layer. Since that has various drawbacks, how about adding cover traffic instead? It is wasteful but should still allow low enough latencies while mitigating timing analysis. This is another thing that would not work well with an exit node based system.
14  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 22, 2014, 03:25:26 PM
That is better than nothing, but having only such a short part of the whole thing makes it hard to reason about with the bigger picture in mind. If there was the usual diff header, it would be a bit easier. Considering that it is also outdated already, I do not feel like investing time into figuring how it works. I hope you understand.


Quote
"Closed source can be everything and nothing." - you are free to make a transaction and find a link between sender and receiver in the blockchain. I think a bounty is still in effect for this.
Please see: Kerckhoffs's principle

Cryptographic contests and bounties where the systems inner working are not published, are generally not accepted among cryptographers.

While Kerckhoffs's principle mainly applies to cryptographic systems, following Shannon's maxim, I believe it should be applied analogously to anonymity systems. If the way the system works is opaque, you cannot reason well about its security.


   - it's not coinjoin, because it’s not centralised or semi-centralised. There's nothing akin to masternodes in XC either.
This is a very strange claim. CoinJoin was originally designed to be decentralized and trustless. To me, it sounds more like you have implemented CoinJoin the way it was originally supposed to be built.


- we'd avoid causing clones, which reduce the trustworthiness of the altcoin phenomenon

Whatever the other merits of your approach, this one is silly. There are hundreds of altcoin clones, with countless more released every single day. Whether or not your particular pet coin gets cloned or not makes no difference at all to the overall phenomenon.
Let us hope for their sake that nobody hex edits name and certain other things in the binary to launch a clone coin. :-)
15  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 20, 2014, 06:07:38 PM
Personally I'm very interested on someone's technical analysis of the anon tech in XC. I mean Darkcoin is constantly criticised  due to it's technical failings over the past few months. But the lack of criticism of XC leads me to believe that it's might fall in to one of these two categories:

1) That the anon tech is actually solid.

or

2) That the distribution and such was so bad that people don't even think it's worth analysing the tech and thus we don't actually know whether it works well or not.
I have tried looking at the source code (https://github.com/atcsecure/X11COIN.git) and could not see anything related to anon tech. There is also only a single commit, so maybe this is the wrong place. Do you know where I can find the current code?

If there is no code available, I propose:

3) No code available, so nobody with a mind will care about the coin and no analysis will be done.

To explain: Binary analysis is bothersome work to perform. I do not see a way of profiting by doing this work, so it is unlikely to be done. Without source, it is impossible to trust the coin or developer.
16  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: July 13, 2014, 08:37:26 PM
  • CN transactions can be Sybil attacked, so that you'd be mixing mostly with adversary's own generated transactions.

Good morning.

I have found this point impossible to ignore. You are misrepresenting the argument.

Sybil attacks can be used against IP anonymization layer such as I2P.

I assume you have made this mix-up, because these systems are called mix network. It sounds similar to the mixin parameter of Monero.

To compromise ring signatures with such an attack, an attacker needs to serve you a completely changed block chain that contains only their own signatures.

If an attacker can do this, you have lost and it does not matter what coin you are using.
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!