Bitcoin Forum
May 13, 2024, 03:56:40 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 »
801  Local / Mining (Deutsch) / Re: Aktuelle Grafikkarten [OC-Übersicht][UPDATE: 04.07.2011] on: July 10, 2011, 02:39:55 AM
HD6870

Core: 1050 MHz
Memory: 334 MHz
332.27 MH/s


mit:

Hallo, von welcher Marke ist die Karte /modell?

(meine Asus DirectCU geht nur bis 1020 stabil)

mfg
802  Bitcoin / Bitcoin Discussion / Re: POOLS under DDOS ATTACKS on: July 08, 2011, 07:19:46 PM
Do you really know how a botnet works?

muaaahhaha? harder please ;-)
803  Bitcoin / Bitcoin Discussion / Re: FIght Back idea on: July 08, 2011, 01:24:23 PM
There are several issues with this:
1. When successful you will be taking out internet connections of people that have nothing to do with it (whose computer is infected with a bot).
2. Your bandwidth is already getting raped, so it'll be hard to send anything of significance the other way Smiley
3. You typically can't just find the C&C server... you only have the IP addresses of the infected computers/rooted servers that are attacking you. It would take a considerable amount of cracking (into a compromised server or computer) to figure out where the C&C is.
4. You will only be able to attack 1 or a few IPs at the same time... botnets often rely on numbers rather than individual capacity, rendering your attack useless. When you stop attacking a machine, it just comes back as if nothing happened.
5. It's blatantly illegal to do all of the above, and will most likely not only get your server shutdown by your hosting provider, but will also get you into legal issues.

1. They have a lot to do with it.
When you have a car accident and it was your fault, the police didn't take the "excuse me it was my car, i did nothing to do with it" ;-)

2.just droping ALL incoming pacets and requests doesnt work? and just remember the IPs to send back?

3.that was not my intension , because i know it doesnt work.
4. maybe then an anti-botnet-trojan/worm is needed xD
5.ah and why the providers dont take the infected machines down, and send to the owners letters with rembering to the terms&conditions of the ISP?!? just reroute traffic isnt illegal.
804  Local / Deutsch (German) / Re: Temperatur Problem hd5850 EX on: July 08, 2011, 03:09:21 AM
Hallo,
also nur um sicher zu gehen, du betreibst das Gehäuse doch nicht geschlossen oder?
Dann ist klar das da 90grad bei raus kommen ;-)
über 80grad  sollte man nicht gehen.

hier mal ein tipp vielleicht kannst du dir die Lüfter so Bauen dann wird die Temp garantiert runter gehen.
Bei dir würde ich 4x120mm Lüfter empfehlen.

http://forum.bitcoin.org/index.php?topic=18355.msg318078#msg318078

mfg
805  Bitcoin / Bitcoin Discussion / FIght Back idea on: July 08, 2011, 02:48:18 AM
I have an idea,
isnt it possible to fight botnets to reroute the traffic back to its own pcs?
But,Only 1 PC of this Botnet at a time gets all the traffic for a limited time.
If this PC hangsup, next PC of the Botnet gets the traffic.

does anybody think this could work?

(maybe send the Traffic at the Command & Controll port? )
806  Bitcoin / Bitcoin Discussion / Re: POOLS under DDOS ATTACKS on: July 07, 2011, 03:16:18 PM
BOTNETS are in computer terminology AIDS for PCs
807  Bitcoin / Bitcoin Discussion / Re: DEEPBIT problem? on: July 07, 2011, 03:12:14 PM
Damn switched to slushs, now after 30min this pool gets DDOSed - but now Deepbit works again.
it seems that it is only one Botnet-asshole, which could only DDOS one Pool at the same time...

The difficulty increased today, so i am out i think.
I will try until tomorrow and see how much my rate sinks (yesterday 0,2 BTC/24h)

808  Bitcoin / Bitcoin Discussion / DEEPBIT problem? on: July 07, 2011, 02:53:50 PM
Hello,
before 2,5h i stopped mining in Deepbit, to watch porn xD, came back after 2,5h and now it doesnt work anymore. is there again a shitty DDOS or what?

i switched now to slushs until it works again...
809  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 06, 2011, 06:51:06 PM
mmmh
 interesting do you mean a thing like hcbi-banking-device?
810  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 04, 2011, 08:39:49 PM
Hello,
thanks for your answer.
So i understand that 2 things dont work, a TAN system with short characterlenght and a tan system with numbers offcourse.

So the main Problem is that there is no instance(s) in the Network which could act intelligent like a Server which decide over valid and invalid inputs and connections.
(Like the Bank, which blocks after 3 false tan inputs, )
So if a privatekey is characters 130 it makes no sense to use this as a TAN, because it is not life proof ;-)

If this could not be done,
thee are only 2 other ways to become a bit more security.
1. encrypt the wallet (built in function, and an option to close the wallet but run the client to support the network)

2. split the money in different wallets (an import export function is a good feature, and the name of the wallet.dat shoul get an random add of for example _5gBS78d to avoid overwriting if a wallet is importet to the client)

what do you think about nr.1 & 2 as an feature request?
811  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 04, 2011, 05:46:32 AM
Hello,
you repead it now the third time, yes
I know how private key encryptions works, didnt you read my answer?
So we could mark this as solved.

In my latest post i wrote just to use a second private key encyption as "TAN"
which is not able to copy by trojans, because it is offline stored on paper.(input protection is secure? because i didnt get an answer)
There is no plaintext or privatekey broadcast, so the evilnodes are not needed (useless ;-) )

to be sure i repeadit it, I know how private key encryptions works

please dont make my suggestion more worse than it could be, i wrote 12-34 charcters
and not 8-12.
Also with a Privatekey encryption 12 Characters are not a problem (could be doubled easy, when adding a TANlistNumber-code, not a TAN)
You said in "bitcoin uses public-key-cryptography. the algoritm used is called ECDSA"
which is safe against bruteforce and evil nodes,
so if a second second privatekey encyption as "TAN" uses the same technique this problem is also solved.

My idea was not to make a big change, just a small.
For example with a new wallet, a user could gernerate 100 bitcoin adresses.
So my idea is instead of using 100 Adresses to modify the system to uses the 100 Adresses as TANs for one Adress.
(like i understand each adress has its own private key or not?)
if so these 100 Privatekeys (99+1) are perfect and easy to modify with a TAN system.

greets
812  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 03, 2011, 08:10:16 PM
@ kokjo
thanks for your explainaition.
I aleready known this, but now we are sure we speak of the same thing.
So if it is possible to sign a transaction without sharing the public key like you discribe it, why do you just wrote on the other hand
a TAN system spread a private key?
My intension was that a theoretical TAN uses exact the same way like you described!
so the difference is...zero and...

@ Theo
that the benefit of of a second private keysystem like TANs are offline and not so easy to capture (and not possible to crack! like you wrote before -> see kokjo's post)
The goal is to protect the prvate key (file) , with a second security layer.


that a server does not exist i know , i just named it to name a schematic system (exchange server with bitcoin network).
Today who does verify the transactions in the Bitcoin network WITHOUT knowing the private key of the users?
(the same way a TAN could be verifyed without getting the private keys)

So we come closer together i think
813  Bitcoin / Development & Technical Discussion / Re: a pseudo TAN that doesn't affect the block chain but grants pretty good security on: July 03, 2011, 03:09:56 PM
Yes this is a good idea, and a similar idea i posted on the other thread.
maybe you could read my last post there so i did not rewrite it here.

I think also like you that it should be done something like a TAN to improve the secuity,
but a lot of people just think about how a improvement NOT work.
Instead they dont try to help by saying HOW IT WORKS to prevent an attack...
a lot of negative people, just read my thread to get an idea what i am talking about :-)
814  Bitcoin / Development & Technical Discussion / Re: a pseudo TAN that doesn't affect the block chain but grants pretty good security on: July 03, 2011, 02:48:54 PM
LOL, i had the idea before.
Didnt you see it, just come here to dicuss it on the main thread
http://forum.bitcoin.org/index.php?topic=23476.0
815  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 03, 2011, 02:46:06 PM
do really don't understand it do you?
of course, they are stored as hashes. but when you need to proof that you know the plain text, YOU NEED TO SEND THE PLAINTEXT. and the attacker can just capture it, and retransmit a transaction that send your coin to him.

unless you understand this, please don't say more.

instead of say such unpolite things, i try to solve this "misunderstanding" you think i have...

So i ask the same in another way, how does it work that the Private key in the wallet.dat is not send in plaintext?
(or is this wrong and the privatekey is actually send in Plaintext??)
Just answer this if you know.

Whatever you enter into your computer, an attacker can grab. If you use a mouse keyboard, i log your mouse movements, if you randomize the virtual key positions, i use ocr, if you make a captcha out of each key, you see where this is going... Wink

Like i said i want solutions, if i want to know how it doesn't work i could write a hole book my self ;-)
Dont play to be my Opponent be a helper ;-)
always so negative here...

i doubt that will ocr work, why al this spam capchas are not already passed?
A way to solve this if it is possible is a server sided sessionhash which is randowmly generated as a checksum
Browser, hardware and more etc. so if an attacker could grab the TAN which i doubt really,
he couldnt use it because he has not the exact hardware/screenresolution/browser etc.
and also could not generate this checksum itself because it is not stored in the client, it is generated  serversided.
(even he emultates the same hardware, he gets an other checksum and then also an other TAN is questioned,
because the first than is actually activated be the vicim pc)

lol what a fantasy war ;-)
816  Local / Deutsch (German) / Re: Mut zur Freiheit on: July 03, 2011, 01:34:26 PM
Also 1 Hektar ist ja schon mal ein ander Maßtab da kann man auch mehre Megawatt Generatoren hinstellen und kann dann nicht nur mit Holz heizen, sondern auch mit Dollars xD
Es ist eine Frage für wievile Leute die Energie wie lange Reicht bei welchem Arbeitsaufwand. Das steht in der Rechnung nicht.
Ich könnte auch mit der hälfte ein Jahr klar kommen z.B.

Windgeneratoren sind nicht unbedingt Zufallsenergie, es kommt drauf an wo Sie stehen.
Ich wollte das einfach nur mal erwähnen weil das günstig im selbstbau ist.
Ich habe vor 1 Jahr in Griechenland gewohnt, in einem Dorf etwa 100-200m über Mehrespiegel auf einem "Bergabschnitt" richtung Meer.
da gab es so viele Wind Energie das man da locker pro Tag 6-18h Wind hatte oft auch recht stürmisch so das mann
da auch sicher eine +5-10KW gerät aus stellen könnte (was nur ein par Meter Platz verbraucht hätte) ;-)
naja leider wohne ich da nicht mehr ich hätte sonst gerne genaue Zahlen präsentiert.
Ich hätte Pivotflügel statt Propeller eingesetzt da die weniger platz verbrauchen (gehen in die Höhe statt Breite)
wie z.b. solche

http://de.wikipedia.org/wiki/Savonius-Rotor
http://de.wikipedia.org/wiki/Darrieus-Rotor#H-Darrieus-Rotor
http://de.wikipedia.org/wiki/Voith-Schneider-Antrieb
817  Local / Deutsch (German) / Re: Seit Mt. Gox hack SPAM ohne Ende im Email-Postfach on: July 03, 2011, 12:23:17 PM
Wieso versuchte Erpressung, er hat doch geschrieben das einer schon bezahlt hat ,-)
818  Bitcoin / Development & Technical Discussion / Re: Why not make Bitcoin more Secure with a PIN and TAN System? on: July 03, 2011, 12:13:28 PM
LOL
thank you for been active here, but i dont wanna hear it is not possible.
I want to discuss HOW IT IS  POSSIBLE :-)

you really don't know how it works, right?
as soon as you broadcast your TAN codes to the network, anyone else could take it and use your money.

scenario:
Node A, is your node. Node A knows Node B-Z, which you don't know anything about. Node B-Z was placed by an attacker, they are cancer nodes, they does not rebroadcast your transaction, instead they capture your TAN codes and gives them to the attacker.
this sucks.

you don't know any thing about this, and therefor you can only be protected from by publickey-cryptography.

you really don't know what i wrote, right? ;-)
The TANs are saved as "hashes" so they are NOT spread public in plaintext.(which you printed out)

scenario A is not possible because, the network accepts only transacions when the are valid
and saved at a minimum set of nodes.
So there must be a feedback between a the Network and the Client that gives a waranty
that makes sure an attacker could not capure a TAN and use it.
This could be done if the broadcost of the original client is send to a defined count but random nodes.
So that for example 10 nodes say broadcast the message the same way like a normal transaction is done.
after this is send this TAN is imidiatly useless by an attacker, because the other nodes already send the correct transaction and TAN.

if it is so useless, why is a normal bitcoin transaction not harmed by an attacker Node B-Z for example?
this answer to this question, why it is not affected, applies exactly on a TAN if it is implemented the same secure way.

Well, an attacker would still need to have my private key to be able to sign a different transaction with the TAN.

OTOH, if he already has access to my private key, he can just wait for me to broadcast a transaction (or keylog the TAN (Edit: assuming this is the way he also got the password for the soon-to-be encrypted key)).

NO, the plaintext TANcode is for security reason send to an pre-dfined email adress.
For example, when you first generate your first wallet, a private key is generated,
and the Public key is sync with the Network.
Exact the same could be done with a TAN codelist, BUT with the difference
the TANcodes are not stored on the  Computer, they should be printed out. (or send to and email Adress and then printed)
This is like a second code which is not possible to copy for a trojan, that is the idea AFTER that first
step. So keylogging is not possible because like i wrote the input is mouse based, no keys to log.
Plese read one more time.

There are two problems associated with this approach:
1. Storage space is limited in the block chain as it is mirrored on all clients. If you're allowing random clients save their TAN in the network, it could be easily spammed. So you would have to introduce a fee for saving TAN hashes in the network, similar to the transaction fee.
2. Online banking TANs with their 6 numbers have a very small search space which is only secure because your bank locks your account after 3 or so wrong entries. This is not possible in Bitcoin because you can brute force the public TAN hashes offline. Thus, the TANs must be impractically long like 30 characters or so.

To 1. dont be so pessimistic please :-)
why should it be allowed for random clients please? only because then the Idea dont work?
No offcourse it should NOT  be allowed for random clients, so it also dont get spammed.
Antispam technique should be implement client and serversided but are NOT
a special task because of the TANs.

2.Like i wrote instead of this it is possible to use more Charakters, for example like the lengh of 12-34 charcters.
There should be a method for protecting the hashes to not be easiliy harvested by an atttacker,

how does the Bitcoin network ensure that the privae key of the user cloud not be cracked offline?
the same way should be used for the TANs.

and if they are 30chars long, we are back to the beginning.
@X68N:
do you really think we are stupider then you?
no if they are 30 Characters long we are not ate the beginnig, never heard that 30 Charcters encrytion is unsafe ;-)
Same answer here
how does the Bitcoin network ensure that the privae key of the user cloud not be cracked offline?
the same way should be used for the TANs.

and no i dont think you are stupider, i just want to discuss a solution here.
There are no personal attacks.

819  Local / Deutsch (German) / Re: Mut zur Freiheit on: July 03, 2011, 10:49:38 AM
Ich würde als Stromversogung auch Windgeneratoren empfehlen, falls dort keine Windstille herrscht.

Windgeneratoren kann man günstig auch selbst bauen (im Vergleich zu Solar wo das nicht geht)
und Sie können auch Nachts Energie liefern.
Herkunft z:B. Gebrauchte Motore aus gebrauchtgeräten/Schrotthändler mit permanentmagenten
+ Stepdown PWM Regler (kann man einfach Basteln oder bei Ebay.com aus China bestellen) + Bleiakkupufferbatterie.
820  Local / Deutsch (German) / Re: Seit Mt. Gox hack SPAM ohne Ende im Email-Postfach on: July 03, 2011, 10:39:36 AM
Der Titel hätte auch besser so lauten sollen:

"Hilfe ich wurde GeGoxed, SPAM ohne Ende im Email-Postfach"

;-)

als Nachfolge von Gegutenbergt
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!