No indication was provided as to what the announcement might be.... "We've created a software update for our ATMs that uploads all those photos and palm vein scans we've been taking to the FBI's new database automatically at no extra charge!"
|
|
|
Empty blocks in the context of a 51% attack. That paralyzes bitcoin. Much worse than a double spend. Average confirmation time for transactions goes from 10 minutes to 20 minutes and that's a paralyzing disaster worse than a double spend?
|
|
|
Only 20% of respondents believe that out-of-band double spend services are not complicit in fraud ( https://bitcointalk.org/index.php?topic=502571.0). If I send these services trial double spends and detect the block with the transaction that I know to be fraudulent, based on the results of my poll only 20% of the bitcoin community would disagree with me. So I think it is a valid concept and that one might achieve enough consensus to implement this. People can believe what they want, but it doesn't make it possible to solve the Byzantine General's Problem without actually solving the Byzantine General's Problem, which is what "a technique to reliably detect malicious blocks created by double-spend services" means.
|
|
|
If I as a miner have a technique to reliably detect malicious blocks created by double-spend services In addition to what DannyHamilton said, you don't have one of these because it's not a valid concept.
|
|
|
It was my most commonly used pw for sites I don't care about with one added salt. I have a few variations, but not many. It was such an easy pw that it was the only one I didn't bother to write it down precisely. I did test it as well before loading the bitcoins. Is it one of your bible codes?
|
|
|
It seems to be impossible to turn of email notifications from Cryptsy. Every time a user makes a wallet to wallet transaction, cryptsy sends an email containing ALL the data - how much of which currency was sent from user's cyptsy wallet to external wallet. This effectively links an email address to cryptsy account and to the outgoing wallet.
We all know that big brother loves to collect emails. Cryptsy helps them to easily compile a database of millions of wallet addresses - link them to emails - link emails to people, thus uncovering who owns what and does business with whom. LocalBitcoins does the same thing, except they do allow you to disable email notifications. I've asked them for about six months to provide an option for receiving PGP encrypted emails, but so far they haven't added that feature. We really should be demanding that option from all Bitcoin companies as a general principle.
|
|
|
Bitcoin is like the metric system of finance.
There's absolutely no good reason for people to create and use competing, incompatible units for measuring mass - that's how you get expensive space probes to crash into planets.
Separate currencies for every country, or every interest group, or every business is a monstrous step backwards which will become apparent in the future when altcoins fail to progress beyond the P&D stage.
|
|
|
It sounds like we agree then. If miners establish techniques to detect malicious blocks, they are free to choose not to build upon them.
Miners choosing to collude is one of the potential failure cases of Bitcoin. The protocol should not be changed to make this collusion easier to engineer, or more difficult to detect.
|
|
|
What is your opinion on #1? Miners are free to include or exclude any transactions in their blocks that they wish, and are also free to chose which valid block to extend the chain from. The proof of work algorithm is the process of determining which chain is canonical.
|
|
|
I dislike #2 because I see it as a slippery slope to coin confiscation There's no slope - that's exactly what it is. Spending outputs without satisfying their scripts is a fundamental perversion of the network - it's like building a calculator that sometimes will declare that 2+2=5 when a committee decides that the result of some equation " doesn't deserve" to be 4.
|
|
|
there gotta be a vmless solution here
Given the deplorable state of PC security these days, the necessity of VMs goes way beyond Armory. If you're not already running virtual machines to segregate network-facing services from each other and the host OS then you're behind the security curve. That's the bare minimum you need to do just to have a slight hope of keeping your machine clean.
|
|
|
The best way to use Tor is to run your privacy-sensitive application in a virtual machine, and use firewalling and virtual networks on the host side to make sure it's absolutely impossible for the VM to send packets anywhere except through your Tor proxy.
Does require some advanced Linux networking and sysadmin knowledge to do correctly though.
|
|
|
I have some small problems with the Armory client and since i'm not sure if it's 0.91 related or not (i think it's not related to this beta version). My Bitcoin Core client is running as a full node and i wanted to stop it and run it only with 8 active connections.
Running a separate Bitcoin Core client: - When using the "listen=0" option in the bitcoin.conf file Armory doesn't connect to the Bitcoin Core client; - When using "-Maxconnections=8" command line option Armory keeps disconnecting and connecting nonstop to the Bitcoin Core Client.
Running Bitcoin Core client in the background by Armory: - When using the "listen=0" option in the bitcoin.conf file Armory is stuck at Synchronizing with Network
I know that this isn't a big priority thing, but is there any other option that i can use? Or is there something that you can change in the Armory code so that i can have the Bitcoin Core not run as a full node?
Thanks!
The real solution for this problem would be for bitcoind to drop the global -maxconnections parameter in favor of per-interface limits.
|
|
|
Amazon is the same company that is building a smartphone with five front-facing cameras, to better image your face for the FBI's new database.
When they "their customers" don't want Bitcoin they are telling the truth - you are just gravely mistaken about who their customers actually are.
|
|
|
http://cryptome.org/2012/07/gent-forum-spies.htmTechnique #6 - 'GAINING FULL CONTROL'
It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms.
|
|
|
It's happening to me too, when I tried to change my password.
|
|
|
There is no proof of a widespread market for CP in BTC though. There's no proof that such a market really exists in any currency. For all we know, 99.9% of the child porn market is just sting operations selling to other sting operations, serving no purpose other than to keep a convenient digital bogeyman around to demolish inconvenient civil rights.
|
|
|
Where is we used a key server that was decentralized like using a DHT, we can then not have to worry about hacks on CA's or it being expensive to start your own.
We also could use each full node be a key server and then you query everyone of them for the public key for the company you want to validate from. With majority rule on what is the correct public key.
Can't Namecoin potentially solve much or most of this problem?
|
|
|
|