Bitcoin Forum
April 27, 2024, 03:01:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 [87] 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 »
1721  Other / Off-topic / Re: Religions and business on: March 01, 2011, 03:18:50 PM
http://www.youtube.com/watch?v=7IH4iLhhL7k&t=6m30s
And part2: http://www.youtube.com/watch?v=vN_A_NIDjM0 (until 2 mins in)

This puts it all in perspective for me.
1722  Other / Off-topic / Re: Religions and business on: March 01, 2011, 11:30:24 AM
yeah why argue about things you cannot change. it's just wasting your time and making yourself angry over nothing. we live in the world. this is how it is. work with what you have instead of trying to reform it, and if you can cause concrete changes then that's great.
1723  Bitcoin / Project Development / Re: Google Summer of Code 2011 on: March 01, 2011, 11:25:29 AM
From past experience other projects I worked on tried to use summer of code to recruit outside developers. Mostly it turned into fail because these devs would leave after it ended dumping a mass of incomplete code they didn't maintain.

If this is done then I suggest recruiting from the ranks of developers already working in or around bitcoin.
1724  Bitcoin / Bitcoin Discussion / Re: Bitcoin: The Digital Currency of the Future on: March 01, 2011, 09:56:48 AM
Can I co-opt your page for the wiki? With corrections.

I will link your article on the talk page.
1725  Bitcoin / Development & Technical Discussion / Re: Core Bitcoin Development Help Wanted on: March 01, 2011, 09:35:40 AM
Why not keep an up-to-date TODO list of small tasks for new developers to get mucked into? A launchpad.
1726  Other / Archival / Re: Silk Road: anonymous marketplace. Feedback requested :) on: March 01, 2011, 09:34:16 AM
hahaha! great idea
1727  Bitcoin / Development & Technical Discussion / Re: Idea for encrypted wallet implementation on: March 01, 2011, 09:33:49 AM
I wrote this program,
https://github.com/genjix/sekureco/blob/master/sekureco

Together with a cloud backup service (see www),
https://github.com/genjix/sekureco

I need someone to vet the security by me explaining what it does. I also need to clean up the code (comments, organisation, consistent naming), but for now it encrypts / backs up to server.

For integrating inside a bitcoin client.

./sekureco is a command line tool you can run with help instructions. See README also.

It works by using symmetric encryption for the wallet file (AES) and encrypting the AES key using an asymmetric encryption scheme (RSA).

For the server backup side, you upload (once only) your RSA keypair + encrypted AES key. The server responds with a 40 character long random ID code which you then use to upload your encrypted wallets. If the client wishes to backup their wallet they need the ID to download the latest version. If the user correctly enters the pass to the RSA keypair they can download the keys or ID (which can be used for fetching the encrypted wallets or uploading new versions). If they guess the pass incorrectly then the restore functionality for that account is locked for 10 hours.

I'm very interested in this feature...if you upload the RSA key pair and the encrypted AES key, wouldn't the server then have everything necessary to decrypt the wallet?  That wouldn't be good.  Here's what I think I would do:
Yeah but this is a necessary trade-off for people who aren't technical users. If they lose their keys.

Quote
First, I think support in the official client for a wallet backup is an absolute must have.  From a user perspective, they would fire up the client, enter info once for a wallet backup service provider, all the encryption would be done in the official client (only strongly encrypted wallets are ever sent to the backup service provider).  The user should only have to enter a domain name for the backup service of their choosing (I'll leave the design for billing out of this post for now...mainly because I would hope this service would be offered for free initially while bitcoin is gaining in popularity...but also because I haven't given it any thought).  Once the user enters the domain name for the service of their choice, it'll contact the service and get some unique id for the backup (this id would be used for recovery and the user should be instructed to keep that id in safe location in case they ever need to access the backup for recovery purposes).  I suggest just using an id so that the service doesn't have to implement any account creation and such and the user doesn't have to go through that process (however, another alternative would be to use a users email address and doing email confirmation...that would minimize the risk of a user forgetting an assigned backup id).

Now for wallet encryption.  I would ask the user for a password and enforce some basic minimum entropy and password strength.  You then take the password and apply a crypto hash with a salt (i.e. sha256) to yield a derived password of say 24 bytes in length.  This is the key that will be used to encrypt the wallet with AES-256.  The encrypted wallet is transmitted to the server using SSL (which uses public key crypto).  The server could encrypt once more for storage on disk (in case someone gains access to the files on the server).

The client would automatically backup to the server every time a new bitcoin address is created (prompting for the user's password if they haven't already entered it, but remembering the server and id/email details).  The user's password would never be stored on disk.
Prompting for a new password after every send or new address is made would be annoying. Maybe it can be done like PokerStars- they have a normal password entry to login (with the option to save the password) but you can also upgrade to an RSA key entry token device. Maybe we could look into issuing those for bitcoin users who want more security at a small fee.

Quote
Recovery would require the server assigned wallet id (or email address) to retrieve the backup wallet and the user would need to support their password (which would be hashed to get the AES-256 key for decryption).

Note: I do realize that hashing their password with a salt doesn't really add much additional protection against a brute force password attack if the attacker knows the salt and the hash algorithm (note, for a bit of extra security, the salt could be obtained from the server and be different for each account...an attacker would need to know what salt generation method the server was using).  If the attacker doesn't know the hash algorithm or salt, then the hash ensures a longer, and hence more secure, encryption key.

For even more security, the user's password could also be hashed on the client a second time (different salt) and that hash used for authenticating the user with the service such that someone else couldn't obtain download access to a user's encrypted wallet (keeping an encrypted wallet out of untrusted hands being one additional protection against a brute force attack).

One possibility I thought about, but discarded was to use GPG auth for authentication with the service and for securely storing a long, generated AES key on the client machine.  However, this has the disadvantage of relying on the local storage to keep the keys necessary for authentication and decryption (and then you would need a backup solution for this file as well!!!).

Yep, and I don't like messing with the user's keys either.

Quote
Note, the locally stored wallet should also be AES-256 encrypted on disk...the same password (with hashing and salting) could be used for the encryption key.  This would enable the user to enter one password on startup to decrypt the local wallet...and hash into a key for encrypting the backup.  The user's password would only be in memory temporarily for generating these hashes (thus reducing the risk of stealing this password out of memory...though the hash used for backup encryption would still be in memory).

Sounds pretty comprehensive and better than what I've done. Can anyone see a point of failure in this scheme?
1728  Other / Off-topic / Re: Religions and business on: February 28, 2011, 08:22:51 PM
Religion or no religion who cares. I think the idea is pretty crazy myself but who am I to judge? I believe some outlandish things myself.

This is a pointless argument for people with too much time on their hands. We live in a free world.
1729  Bitcoin / Development & Technical Discussion / Re: A full shell script implementation of bitcoin ? on: February 27, 2011, 08:07:07 PM
If you manage to figure out that (recomputing the hashes through shell) then that'd be great for everybody. I'm also curious how to do this.
1730  Bitcoin / Bitcoin Discussion / Re: bubble imminent on: February 27, 2011, 07:12:43 PM
Offer food, and I will (not just diet shakes and snack bars).  Food is the only thing besides bills I spend money on regularly, BTC or otherwise.  Blowing all my bitcoins on pizza doesn't seem wise, but if I could get good prices with reasonable delivery on bulk items I probably would spend a few BTC.  Amway just doesn't have much to offer that I want.

I think most of us are the same way. At least I am.
1731  Bitcoin / Development & Technical Discussion / Re: Linux packages should have an autodetect 32/64 bit using bash on: February 27, 2011, 03:36:55 PM
Auto-detection would be a good thing if it is foolproof, but otherwise it adds more problems than it solves.
You're right.

A 64bit kernel can run the 64bit bitcoin excutable as well as the 32bit one, whereas a 32bit kernel can only run the 32bit binary.  So I gather it would be safe to run the 64bit version if ‘uname -m’ explicitly says ‘x86_64’, and run the 32bit version in all other cases.  Am I correct?

Cheers,

Yes. Agreed.
1732  Other / Off-topic / Re: OpenLeaks accepts Bitcoin on: February 27, 2011, 03:34:33 PM
Nice try Wink


I doubt the OP is a scammer. He's made helpful posts in other threads.
1733  Bitcoin / Development & Technical Discussion / Re: Linux packages should have an autodetect 32/64 bit using bash on: February 27, 2011, 02:09:20 PM
No, because if it was the other way around then uname -m would show 64 bit on the 32bit version of Ubuntu.
I don't think you'll be able to run a 64bit version of Linux on a 32bit machine, whereas you can run a 32bit version of Linux on a 64bit machine without any problems whatsoever.

Cheers,

You must have misunderstood & I wasn't clear enough:
The CPU is 64 bit.
The kernel is compiled for 32 bit.

uname -m displays i686. If uname -m showed the hardware arch then it would display x86_64, no? Therefore I conclude that uname -m is displaying the machine hardware type as compiled into the kernel, not detected from proc.

Quote from: random forum on google
all methods above are wrong. If the system was installed with 32bit OS the result will always be 32 unless it has a 64bit Linux running.
The correct way to do is:
cat /proc/cpuinfo
and look for flag “lm” in the flags: column. If it’s there then it’s 64bit CPU no matter Intel or AMD.

I'm inclined to think that uname -m is simply reporting back the compiled flags inside the kernel.

Here is the terminal output on this dual processor system:
Quote
x@l:~$ cat /proc/cpuinfo | grep flags
flags           : fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx lm constant_tsc arch_perfmon pebs bts aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
flags           : fpu vme de pse tsc msr pae mce cx8 apic mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx lm constant_tsc arch_perfmon pebs bts aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm sse4_1 xsave lahf_lm tpr_shadow vnmi flexpriority
x@l:~$ uname -m
i686

Note the presence of lm (64bit CPU) but reporting of i686 from uname.
1734  Bitcoin / Development & Technical Discussion / Re: Linux packages should have an autodetect 32/64 bit using bash on: February 27, 2011, 11:32:21 AM
I'm on a computer with a 64bit processor but 32bit Ubuntu. uname -m shows i686
That answers ribuck's question, doesn't it?

Cheers,

No, because if it was the other way around then uname -m would show 64 bit on the 32bit version of Ubuntu.
1735  Bitcoin / Project Development / Re: Live solely off of bitcoins [Bounty of 400 BTC] on: February 27, 2011, 10:58:22 AM
How much could you get by with in NH?
1736  Other / Off-topic / Re: Hot times in Ireland on: February 27, 2011, 10:36:24 AM
What's wrong with the Euro currency? Don't know too much about this.
1737  Other / Off-topic / Re: 8-bitcoin on: February 27, 2011, 10:34:59 AM
What license? Am I free to use these in my next site?

Suggestions:
Half the size for coin and halve the pixel size.
Use low-key colours- give it a faded gold look.
Add a bit of shine in a band across them.
1738  Bitcoin / Development & Technical Discussion / Re: Wallet backup in the cloud on: February 27, 2011, 10:31:02 AM
@genjix: Technically it looks good, but (don't get mad on me) IMO it fails to do what it's meant to do in a way that is easy for the end user, especially non technical end user.

That's because it's meant to be integrated into a client (which I'm also working on making).



The user just sees a big shiny restore wallet button.
1739  Bitcoin / Development & Technical Discussion / Re: Linux packages should have an autodetect 32/64 bit using bash on: February 27, 2011, 10:29:21 AM
1) check hardware
Code:
# cat /proc/cpuinfo
2) check used kernel
Code:
# file /sbin/init


Is that platform agnostic? AFAIK aren't some distros replacing the classic init runlevel?

I'm on a computer with a 64bit processor but 32bit Ubuntu. uname -m shows i686
1740  Local / Other languages/locations / Re: Bitcoin Translation Room on: February 27, 2011, 10:25:54 AM
It is Esperanto
Pages: « 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 [87] 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!