Bitcoin Forum
May 06, 2024, 06:49:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 195 »
561  Bitcoin / Development & Technical Discussion / Re: ECDSA Weak signing on: September 09, 2013, 03:55:20 PM
I fully support adding checks to the signing code to detect degenerate conditions, but finding k=d doesn't mean you got really lucky, it means your RNG is completely and totally broken and you need to alert the user.
562  Bitcoin / Development & Technical Discussion / Re: For fun: the lowest block hash yet on: September 09, 2013, 03:52:06 PM
The nonce is only 32 bits; could there come a day with the difficulty is high enough that no nonce works?

That day was back in like 2009 or 2010.  A difficulty of 1 corresponds to an average of 1 valid block per nonce range.  At difficulty 2, you expect to find one valid block per 2 full iterations through the range (on average).
563  Bitcoin / Pools / Re: [8000GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: September 07, 2013, 05:07:29 PM
And if you want your signature in a block, the patch to bitcoind is trivial.  Smiley
How is it done? Cheesy

I use this in the binary for p2pcoin's bitcoind:

Code: (init.cpp)
    const char* pszP2PCOIN = "[P2PCOINv0]";
    COINBASE_FLAGS << std::vector<unsigned char>(pszP2PCOIN, pszP2PCOIN+strlen(pszP2PCOIN));

I also have command line options for -addtag and -addhextag that I use to add my personal tags.  They are done pretty much the same way.
564  Bitcoin / Pools / Re: [8000GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: September 07, 2013, 12:22:46 PM
p2pool already has several unique features that can be used to identify the blocks.

And if you want your signature in a block, the patch to bitcoind is trivial.  Smiley
565  Bitcoin / Development & Technical Discussion / Re: For fun: the lowest block hash yet on: September 07, 2013, 05:03:24 AM
Can a hash *ever* repeat?

This question is oddly difficult in bitcoin.  In bitcoin, the hashes are used as identifiers.

As pointed out by others already, cryptographic hashing systems are essentially lossy compression.  For a given sha256 output, there is at least one input that creates it, and possibly an infinite number.  A block header is 80 bytes long, and a sha256 output is 256 bits long.  If we assume an even distribution for both the bits of a header (known to be false) and for sha256 (see previous posts, and my addition below), we can expect about 2384 possible block headers per block ID, with 384 being 640-256.

It gets messy in reality.  Large portions of the block header are not evenly distributed, and several of those portions are moving targets.  Someone could probably work up reasonable estimates for the actual bits of freedom for a given block header candidate, and from that estimate how many such candidates we can expect per output.  I find it interesting enough, but it is late, and I'm tired, so I won't bother.

With that pointless aside out of the way, back to identifiers.  We use the block header hashes as identifiers for the block.  The network enforces uniqueness of these identifiers in an odd way.  Say you are hashing along, and you find a nonce that satisfies a header for the next block, but by a strange twist of fate, that hash just happens to be equal to a freakishly low hash previously found*, perhaps one listed in this thread.  Your node announces this to peers by sending them a message with the new block's identifier.  They all ignore you, because they already "have" that block and so there is no point asking you for the rest of it.  I'm actually not sure how your node would even handle it.  I'd have to check the code to see if it would overwrite the old block, or drop the new one.  Odds are good that we'll never find out the hard way.

With transactions, it is even worse.  The same mechanism exists, but nodes do not (by default) keep full track of all transactions, just unspent ones.  It is possible** to create a new transaction that happens to have the same hash as an old transaction.  Again, I'm not sure how it would end up without reading the code.

* I'm not sure if this would qualify for impossibly good luck, or impossibly bad luck.  Certainly one of these extremes though

**  Not really.  The birthday attack on 2256 is still impossibly huge.


I don't actually know that we know if there is a hash with all zeros.  The state space of the SHA2-256 compression function is 'only' 768 bits and it's not at all constructed like a permutation on the input. There is clearly internal cancellation, so  AFAICT some outputs may be unreachable but we don't know which ones are.

Indeed.  The output space of sha256 is currently unknown.  We suspect (hope) that it is close to [0-2256], but we don't exactly know that.  Cryptographic hashes look a hell of a lot like random numbers, by design.  One of the standard tests is to generate pairs of hashes from pairs of inputs that differ by a single flipped bit.  We expect that about half of the output bits will change between pairs, on average, and we expect a fairly flat distribution of flip counts for each bit position, again, on average.  The sha family passes these tests, and from this, we gain confidence (but not certainty) about the distribution of outputs.
566  Bitcoin / Development & Technical Discussion / Re: NSA might be behind weakening of Android Random Number Generator problem on: September 07, 2013, 04:05:55 AM
Anyway. Once the full details are made public you can review them and decide for yourself. Occam's Razor and all that. BTW hiding RNG faults in an open source OS is a really bad idea. The worst faults were in Jellybean, released end of 2012. Less than a year later the Bitcoin community discovered the issue. If that's the NSA's plan to undermine public crypto, they suck at it.

This (visibility) is the key point.

(I had more commentary, but the forums ate it.)
567  Bitcoin / Development & Technical Discussion / Re: Bug? Reduced minrelaytxfee allows creating (not just relaying) non-standard tx on: September 07, 2013, 03:45:10 AM
The rationale is that since a node cannot know the relay policy of the peers it connects to, it will only create transactions that it itself would relay if they came from a peer.

This was actually discussed quite a bit, but that change produced such a flood of crap posts...
568  Bitcoin / Development & Technical Discussion / Re: Multi-signature address never receives bitcoins on: September 05, 2013, 05:13:56 PM
Multisig addresses are not useful as-is.  External tools of some sort are required.

The reference implementation could be improved to be sure, but it will never be able to be the whole infrastructure for multisig.

As jgarzik notes, there are tools available already that are suitable for infrequent multisig usage.

The thing is, if bitcoind would simply include multi-sig transactions in the balance of each account, this entire problem goes away doesn't it?

A tiny little part of the problem goes away, sure.  But not the whole thing.

What would be needed is a general means to monitor specific scriptPubKeys.  There has been a lot of discussion on that topic over the last few months.  Check the mailing list and IRC logs to see why it isn't a simple change to make.
569  Bitcoin / Development & Technical Discussion / Re: `getbalance accountname` returning incorrect amount? on: September 05, 2013, 05:07:36 PM
I'm still not sure what's going on, since I never used the `move` command, but it's apparent that the account balance is not working as expected.

This is a frequent complaint.  Search the boards for many more examples of threads substantially identical to yours.

Accounts do not work the way you think they do.  They are not intended for the use you are attempting.
570  Bitcoin / Development & Technical Discussion / Re: Multi-signature address never receives bitcoins on: September 05, 2013, 04:58:40 PM
Huh

Multisig addresses are fully visible in blocks, just like regular addresses.

I was talking about using the bitcoind client. Are you suggesting that bitcoin users should manually parse the blockchain to determine if their funds arrived?

Multisig addresses are not useful as-is.  External tools of some sort are required.

The reference implementation could be improved to be sure, but it will never be able to be the whole infrastructure for multisig.

As jgarzik notes, there are tools available already that are suitable for infrequent multisig usage.
571  Bitcoin / Development & Technical Discussion / Re: What's new in version 2 of Block header message ? on: September 05, 2013, 03:00:31 PM
For something like this, a supermajority of miners have to move in lockstep, or there is risk of forking.
572  Bitcoin / Hardware / Re: HELP Jalapeno USB connector fell off on: September 05, 2013, 02:58:27 PM
Looks like the pads are totally gone.

Ask BFL for the other points on the board that are tied to the same nets as the USB pins.  Then, have someone that knows what they are doing solder small wires to those points, and then to a socket.
573  Bitcoin / Development & Technical Discussion / Re: What's new in version 2 of Block header message ? on: September 05, 2013, 02:23:33 PM
Anyway, this is not an information we can rely on.

I notice many blocks pretending to be version 2 but showing bad height encode values

See
http://blockexplorer.com/block/00000000000005d024e86337ca13439b7f3dbd5e1a005b1dbe510150d45b6e98 is block 200433 and pretends to be 436591499
http://blockexplorer.com/block/00000000000003c6947e260dc80d6ab426771a7ba9d8d5fb58ff66a0db26c361 is block 199914and pretends to be 436591499

May be such blocks must not be accepted by the network as the BIP34 is now enforced?

Early on, there was some debate about the proper encoding.  See this discussion for information on why the bogus encodings were allowed (specifically a post from gmaxwell on July 2nd).
574  Bitcoin / Development & Technical Discussion / Re: Multi-signature address never receives bitcoins on: September 05, 2013, 02:18:12 PM
You can check whether the transaction was included in a block.

You can only do that if you have the transaction ID. If someone simply sends you some bitcoins without the transaction ID, you're buggered. Smiley

Huh

Multisig addresses are fully visible in blocks, just like regular addresses.
575  Bitcoin / Hardware / Re: FYI: Think twice about replacing the thermal paste on: September 05, 2013, 11:34:17 AM
Paste is simply not suitable here.

Paste is intended to fill in microscopic gaps between a single package and a single heatsink.  It can not and will not work on multiple chips with a single heatsink.

The root problem is that multiple chips are never coplanar.  Hell, even single chips are rarely parallel to the board.  If you have a single chip with a single heatsink mounted with springs, you can use paste to fill in the microscopic gaps between them while the springs allow the heatsink to float relative to the board, matching the chip's bulk surface.

If you have multiple chips, they will all be at funny angles, and all at different heights.  A single heatsink will never make good contact, not with all of them, and usually not even with one of them.  For multichip designs, it is customary to back the heatsink off by a millimeter or two, use a rigid mounting to the board, and fill in the substantial gap with a thermal pad.

Something like tflex 600 (PDF) would be appropriate.
576  Bitcoin / Hardware / Re: BitSyncom Im still waithing on batch 1 order how is that possible on: September 03, 2013, 04:21:30 PM
Pff so getting my money back is out of the question  Cry Cry Cry 
currently overwhelmed, but I'll look into it, I don't have a problem with refunds if that was indeed a problem, but I do get a lot of shills that jumps on the brand wagon with batch 2 walletbit problem to request a refund for non-existing orders.

even right now, people are putting order number into that refund form for chips that does not exist, ( and in a phishing manner like consecutive order numbers, we don't use consecutive numbers for orders.)

Really hard to have sympathy for this.  You could have addressed the batch 2 problems many months ago, but chose not to.  How many tickets for missing orders did you ignore in May, June and July?
577  Bitcoin / Development & Technical Discussion / Re: New Mystery about Satoshi on: September 03, 2013, 11:17:30 AM
Possible option "E":  His next_nonce function was something other than ++.
578  Bitcoin / Development & Technical Discussion / Re: [REQ] Anti-keylogger features on: September 03, 2013, 11:12:29 AM
If the malware is advanced/integrated enough to record mouseclicks, screenshots, and implement OCR to identify the characters being clicked, it's advanced enough to pull your private keys out of RAM when you unlock your wallet.  At that point, the only thing that will protect you is to use an offline computer.

Bitcoin specific malware is a point and click choice now in malware authoring tools.  I do not see much value in anti-malware data entry, especially since it penalizes users from choosing passphrases which are long enough to withstand strong guessing attacks.

The proper solution, of course, is to practice good computer hygiene so that you don't get malware.  As has already been pointed out, it is foolish to hope for only "dumb" malware.
579  Bitcoin / Hardware / Re: Incoming Avalon News 8/9/2013 on: September 02, 2013, 02:18:25 AM
Anyone complaining about B2 is holding it wrong.

Or, you know, not holding it at all.  Like me, for example.  I placed my B2 orders on February 3rd and hadn't heard a peep from them until a few days ago.
580  Economy / Scam Accusations / Re: Yifu Avalon, Bitsyncom Batch #2 not Recieved, no response on: September 01, 2013, 02:01:31 AM
I wish I could say the same.  When I contacted him, he asked for details.  Haven't heard a peep back since I provided them.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 195 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!