Bitcoin Forum
May 14, 2024, 06:42:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 [210] 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 ... 288 »
4181  Alternate cryptocurrencies / Altcoin Discussion / Re: Idea for {drawingthesuncoin} on: August 16, 2013, 09:27:56 PM
Sorry if it offends, but people labeling their personal wild ass ideas "Bitcoin 2.0" creates confusion.
4182  Bitcoin / Bitcoin Discussion / Re: Does bitcoin really has no central authority? on: August 16, 2013, 03:36:23 PM
Even though there were more v0.8 clients running at the time, the "economic majority" were using v0.7 and thus that's the side of the fork that mining capacity jumped to once it became obvious coins mined on v0.8 were going to become worthless.
Nit: There was _far_ more <0.8 nodes at the time than >=0.8. What there was more 0.8 of is hashpower. This disagreement between what everyone else runs and what mining runs can easily happen because ~3 people control the operation of >50% of the hashpower, and miners in general had updated to 0.8 quite quickly.

I don't know anything about codes, but I guess that it couldn't be done by ordinary folks.
I have no clue who made that transaction, but it was an "ordinary folk", no special privileged was required.  Electrum's server reimplementation of the Bitcoin protocol was fatally incorrect in a way which that transaction was structured to trigger, thus isolating them from the network. Fortunately (?), the transaction also included a fix.

aren't premiminers kind of like a central authority?
Perhaps you've mistaken Bitcoin for one of the whole cloth pump and dumps in the altcoin forums?  The public had access to Bitcoin from the start.
4183  Bitcoin / Development & Technical Discussion / Re: Blockchain on: August 16, 2013, 03:29:21 PM
The network will still be decentralized as many businesses will want to run a full node in order to be able to directly verify transactions.
Why?  I've found it hard to convince people that full nodes offer additional security. (Indeed, I've found it hard to convince people that SPV clients provide more security than JS web wallets).

Doubly so because the inflationary threat running full nodes is most uniquely suited to fighting is generally not that relevant to businesses. We do not see businesses standing up to fight fiat inflation. Generally businesses care more about differential advantages with their competition, can avoid fixing contract prices in inflation resistant terms, and can afford the resources to invest away (self or otherwise) inflation risks.

In some ways I'd expect businesses to prefer running SPV nodes that get blocks from a single source which cryptographically signs them. The security model is more traditional and thus easier to understand, it completely closes some kinds of risks, and gives them someone to sue if things go wrong (except when the wrongness is produced by a state level threat, but see above). Today we see businesses very frequently depending on parties like bitpay for their whole transaction processing needs, a step even further towards centralization end of the spectrum then SPV with signed blocks.

Decentralization is hard and it's costly. Anyone who believe it will be easily retained in Bitcoin if Bitcoin grows is fooling themselves.

4184  Other / Meta / Re: narayan - attempted code injection on: August 16, 2013, 07:08:30 AM
I'd suggest that you also implement some protections just in case something clever get past your eyes.

beyond some programmatic 'xss' matching, one idea would be to iframe the html/css ads on another domain, so even if they do go rogue the browser sandboxing will rescue you.

I'd also be a little careful with assumptions like "CSS can never be a security risk", CSS is now a huge amount of code, it's a big attack surface, and I wouldn't be surprised if there were some zero-day CSS remote execution exploits (though... getting through manual inspection would be tough). Conversely CSS loading images and other assets from remote hosts could be used to trigger exploits in the image handlers, or just act as webbugs.
4185  Bitcoin / Hardware / Referral link spam on: August 14, 2013, 04:34:44 AM
Posters: Please don't create threads just to promote your referral links. It's spammy BS and if everyone did it the forum would be useless... rewarding just the few of you selfish enough to behave in a way that harms the forum is not in our interest.

The form has official ads, and the social norms here seem to tolerate advertising in signatures— or limited referral links in the context of places where you would naturally provide the same link absent the referral incentive. Creating a bunch of new threads purely to direct people to referral links clearly harms the signal to noise ratio here.

Vendors: Please don't create referral programs which are highly vulnerable to abuse, and to the extent that your programs can be abused by spamming please police yourselves by de-crediting users who promote through outright spamming.  If you don't do this you may find your services completely blacklisted from places where they've become a nuisance.  You can't claim zero responsibility for the foreseeable abusive behavior your programs encourage.

4186  Bitcoin / Bitcoin Discussion / Re: All kinds of stuff for sale with BTC. we need to be careful on: August 14, 2013, 04:24:04 AM
"To enjoy freedom, [...] we have of course to control ourselves." --Virginia Woolf

Empoweoqwj, you're not really adding to the discussion here.  It turns out that the world is a complicated place.  When Bitcoin users are persecuted by association or Bitcoin itself is attacked on the basis of its unlawful use by some of its users that hurts all the users of Bitcoin including those who aren't engaging in those activities.   Because none of us use Bitcoin in isolation we all have a responsibility to our fellow users to execute our freedoms with consideration and minimize the collateral damage to others.  Even when that damage comes from places that are believed to be unjust or misguided, it is no less _real_ and does no less harm to people. Special care is required when an activity is very profitable to you, since that can create biases that help you ignore the costs/risks your justifiable-to-you actions indirectly impose on everyone— including a lot of people who aren't sharing in your profits.

In my view one of the limitations in popular libertarian philosophy is that it takes an overly limited view of violence against others, because a more complete perspective must acknowledge how very difficult and limiting completely avoiding harming others through your actions can be.

I would imagine that a lot of that stuff is just pure ignorance. In any developed place on earth the number of laws and regulations makes their scope beyond any single person's ability to comprehend them.  While some are enforced more frequently than others, it's not actually that surprising to encounter people who are not aware of the rules they may be violating. Even something like selling alcohol— in the US its normal for supermarkets to have beer and wine (and liquor in many places), it's not hard to imagine that someone might think it to be no big deal to sell some on Bitmit.

A possible course of action would be to just politely contact the people selling this stuff (or the sites hosting it) when you run into something that you're aware is problematic and express your concern. ... if people can't handle a little nagging and tattling by other community members they're surely not going to enjoy some state agency breathing down their throat.
4187  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 14, 2013, 02:38:12 AM
thus making XSL-style attack a bit easier.
I look forward to your paper, as I'm sure DJB would as well. Tongue  (Though sure, if you're not going to go all the way to a deterministic signature, might as well use lots of randomness instead of a counter)
4188  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 14, 2013, 01:24:39 AM
So if I understand your correctly, the developers have did just nonce = Random_value, where Random_value come from a bad RNG?
Correct! (and this is what is normally described, e.g. FIPS DSA, so the developers can hardly be blamed).

The idea of making the nonce H(message||secret||random) is to just armor against bad RNGs without making K non-random, though it doesn't need to be non-random— it just need to be secret and distinct per message.
4189  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 14, 2013, 01:01:41 AM
gmaxwell:
Then, what causes the privkey to be revealed? (What this thread is about)
What I have understand, is that if the nonce are reused in a ECDSA signature, the privkey can be calculated, given that you know that the 2 nonces are equal, even if the nonce is unknown, since you simply solve a equation to get the privkey?

Two things can happen,  given two distinct messages with the same unknown K you can recover K, or Given K you can recover the private key.  (also, knowing fairly small amounts of K in several signatures can also allow you to recover the key through more complicated techniques)

If the nonce is H(message||secret)  then if you have identical data being signed you will get a completely identical signature and learn nothing (otherwise I could crack any key by just writing another copy of the same transaction down! Tongue).  If you have non-identical data being signed you will have non identical nonces.
4190  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 14, 2013, 12:47:04 AM
The thing that affects is then that if 2 identical transactions are posted, (same amount and same input and output) then you reveal your privkey.
No you don't.
4191  Bitcoin / Development & Technical Discussion / fastblockrelay on: August 13, 2013, 12:14:12 PM
Sending only the hashes accomplishes mostly that.  Let the node ask for missing transactions.
adding multiple round trip times, this is the exact opposite of the desire here. Round trip times can easily dominate the process. You already largely know what txn your peers have because you know what they've advertised to you, and you know what you've sent them. Bloom filters this way already. It works great. Sending a bit of extra data is no biggie, if you don't like it— relay early. Smiley

I clipped out a lot of details, half was superfluous, half is already in that code linked above. Patches not posts if you want things to matter. Tongue This is really off the topic of the paper and should probably be in another thread.
4192  Bitcoin / Development & Technical Discussion / Re: Information Eclipsing and the 49.1% Attack... some short term solutions? on: August 13, 2013, 09:11:00 AM
One practical problem here is that you can't effectively observe all forks.
Your peers actively work against you seeing them, and in some cases they never leave the miner at all (eg, when they are also a stale share).
Doubly so because all (?) large pools have a tiered architecture and don't expose their mining nodes to the public network (otherwise they get DOS attacked). Interesting point.

Some other minor comments, "each kilobyte in size costs an additional 80ms delay until a majority knows about the block". A majority of nodes isn't the interesting metric. For the purpose of rate dilution and orphaning a majority of hashpower is, because of the rather unfortunate consolidation of mining power, it seems unlikely that these too figures are greatly related to me, as something like three (administrative domain) nodes have a majority of the hashpower alone (though the (D) results show that the consolidated connectivity isn't magically perfect), so we know the "simplifying assumption" on this is a pretty poor one. But it's unclear to me what the magnitude of the impact is, though it might have been interesting to reason about the expected improvement from (D) vs the realized improvement.

"By extracting the timestamps"— block timestamps are lies due ntime rolling, with the overall fitting it may not really matter, but I'd generally caution against using them for much of anything where accuracy better than an hour is wanted.

4193  Bitcoin / Development & Technical Discussion / Re: Information Eclipsing and the 49.1% Attack... some short term solutions? on: August 13, 2013, 06:52:08 AM
Edit:replaced brief comment after reading the paper.

Having now read the paper (excepting the background parts, which I trust are correct), I'm excited to see good measurements. I am, however, disappointed that they are probably too old to inform the system as it practically is today (as they occurred prior to some of the performance improvements I mentioned above). I am also disappointed that the authors were apparently unaware of the implementation of the (A) and (B) proposals in August 2012 (see Luke's patches), prior to their work, and the related results.  After some more contemplation I may have additional thoughts on some of the measurement techniques used.

Separately,

While this may be mostly the fault of academic publishing norms, I believe that the work's academic integrity is degraded by its over-reliance on citations of other, often fringe and unimportant, academic publications on Bitcoin--while ignoring the substantial base of open source industry activity that takes place here, on bitcoin-development, and on github. Doubly so when the end result is that the authors will be credited in future publications for inventions which, in actuality, substantially predated their work.

In this case, the work does not cite a single piece of the industry discussion of block propagation timing concerns or potential solutions which occurred prior to and during the time under study. While this complaint is not unique to this work, I've reviewed preprints which have done far better, and I do not believe some other authors' similar behavior excuses the exclusion of the relevant citations here.
4194  Bitcoin / Development & Technical Discussion / Re: Information Eclipsing and the 49.1% Attack... some short term solutions? on: August 13, 2013, 06:44:45 AM
Without following the link, yet:

I've been telling people this for a while, but their dilution figures are far lower than I would have guessed. So at least that much is good!

Luke had partial patches for exactly that verification speedup change last year, but they were diminished in value by the general blocking/single-thrededness of the networking code.  The ECDSA caching really took a big bite out of the verification times, since most txn have been observed first. Ultraprune made other big improvements, and people haven't seemed to care quite so much. Our primary approach to poor propagation time was to make validation enormously faster. I do note that what Luke did was create a separate message type for unvalidated blocks in order to indicate to the peers that the block is unvalidated. This allows limiting the radius of bad blocks, avoids imperiling SPV nodes, and prevents an attacker from creating huge network partitions around an aggressive relayer by giving them bad blocks which trigger the anti-DOS logic and an instant 24 hour ban of a peer that forwards an invalid block.

The other obvious enhancement would be to split block forwarding to avoid sending redundant data for transactions which have already been received by the far end, this can be done without increasing round trips by just using the existing INV caches to track what txn we know the peer already knows.

At some point you start bumping into the actual networking delay limits and get diminishing return.

I'm not following where "must be found" is coming from there, but I suppose that means its time to follow the link.
4195  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 13, 2013, 05:46:24 AM
gmaxwell: how? I Think I misused the term "nonce" in my previous text, I mean the random value that is used in nonce calculation, that may not be reused.
So then, solving for the private key when one msg is signed with sha256(message||privkey||R) and the other is signed with sha256(message||privkey||R+1), would be impossible unless you can break sha256 in a way allowing solving for privkey?
Okay, it wasn't clear that you were still assuming the H(message||private||). Technically you can leave the "R" in that out entirely. The deterministic secret K is fine as far as anyone knows. However, it violates FIPS. So would your counter. For some things people care about this.
4196  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 13, 2013, 05:02:33 AM
What i understand, it does not matter if anyone can guess the nonce, the privkey can ONLY be recovered if 2 signatures share the same nonce.
You understand incorrectly. If K is known a single signature can recover the private key.
4197  Bitcoin / Development & Technical Discussion / Re: Bad signatures leading to 55.82152538 BTC theft (so far) on: August 12, 2013, 10:14:44 PM
I have to say, I'm somewhat disappointed in the devs not checking to ensure that the random number generator they use, actually works properly and assuming it's all OK, given they know how important the randomness is.
Right, because the -Qt devs ensured their PRNG was working well.
I'm not sure if you're being snarky here or what. But I personally, and several other people (e.g. I'm aware of jrmithdobbs testing it pretty extensively too) have checked the RNG used in the reference code.  It's really easy to break (EC)DSA with a bad RNG at runtime and that makes me paranoid (e.g. my minor contribution to a netbsd security advisory).  That isn't to say that any particular flaw might not have gone unnoticed, especially a racy, platform specific, or library version specific issue— go link bitcoind/qt against some some novely broken openssl and all bets are off.

Without knowing all the details here it's hard to do retrospective analysis with the benefit of hindsight to say if something could better have been done here with the android wallets.  The one point I'm aware of is that I think back in January we had some evidence that some bitcoinj users may have had poor nonce entropy, but I think this was chalked up to old bad android. Perhaps in hindsight more exploration should have been done of that issue, or more proactive monitoring of the amount of R reuse.
4198  Bitcoin / Bitcoin Discussion / Re: [ANNOUNCE] Android key rotation on: August 12, 2013, 04:52:43 PM
IIRC if you seed it before ever pulling a random number from it, it will only be seeded from your (quite likely weak) seed, and not the OS provided randomness. Seeding it should be unnecessary, and it makes it easy to screw yourself.
4199  Bitcoin / Press / Re: 2013-08-09 Politico - Bitcoin: Tax haven of the future on: August 12, 2013, 04:19:02 PM
"There’s no mechanism to ensure that people who make money through such digital currency report the income to the Internal Revenue Service"

:-/

There's no mechanism to ensure that people who make money through CASH report the income to the Internal Revenue Service... and yet the world continues on just fine.

Generally law enforcement in free societies is accomplished via sampling and stiff penalties for cheating... not some crazy panopticon of ubiquitous surveillance. There are places where Bitcoin creates some different challenges, taxation isn't one of them.
4200  Bitcoin / Bitcoin Discussion / Re: Your questions for a miner on: August 12, 2013, 02:40:09 PM
Uh. This forum is full of miners.  If anyone here wants to ask a miner a question, they can just— you know— send one a private message. Tongue

But hey, I can play along— for a miner that has an Avalon and mines on a 3% fee pool.  "Do you think you're getting $90/month per Avalon you have mining at that pool?"
Pages: « 1 ... 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 [210] 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!