Bitcoin Forum
April 19, 2024, 09:21:08 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 »
441  Bitcoin / Bitcoin Technical Support / Re: libBase58 C++ implementation on: August 30, 2014, 01:37:08 PM
I don't get it. That's it.

Help me understand  Grin


"Encoding Base58
---------------

Allocate a string to store the base58 content, create a size_t variable with the
size of that allocation, and call:
   bool b58enc(char *b58, size_t *b58sz, const void *data, size_t binsz)
Note that you must pass a pointer to the string size variable, not the size
itself. When b58enc returns, the variable will be modified to contain the actual
number of bytes used (including the null terminator). If encoding fails for any
reason, or if the string buffer is not large enough for the result, b58enc will
return false. Otherwise, it returns true to indicate success."



It's good old fashioned C 'optimized' API. If you have a buffer already allocated of size_t, you can try to use it.
However, it's too short --> you get false. And you need to try with a bigger buffer.
If it's ok, it returns the effective size that was used. The string is null terminated but by giving you the size back, you avoid a strlen which scans the string.
Believe me or not, but these kinds of cubblesome API used to be the norm when memory was precious.
442  Bitcoin / Bitcoin Discussion / Re: How would you store >100 Bitcoins? on: August 30, 2014, 05:51:10 AM
If u were to choose to buy trezor or use armory which would u rather have? Not to worried about the purchase of trezor as I like the concept. I also have a comp for armory too. If something went bad with trezors company does that mean u lose your bitcoins or can u still get them?

The most important thing is to have your seed. All the major wallets are open source and anyone can see how private keys are derived from the later. AFAIK, Trezor uses BIP-32 which is a open standard. Worst case Trezor goes out of business and somehow deletes all their code from the web. I'm sure someone will have kept a copy of the code and will be able to help you out.

Trezor is like Armory or Electrum offline computer on a chip. There is still an online part that you need to install on a regular computer but Trezor removes the need to do a USB key dance. Personally, I don't mind the USB transfer because I rarely have to spend from cold storage since I keep a hot wallet too.
443  Bitcoin / Bitcoin Discussion / Deterministic wallet backups and multisig lockboxes on: August 29, 2014, 12:48:24 PM
Deterministic wallets have a very good backup feature: They only require you to backup a single piece of data - the seed (Electrum) or the root key (Armory). All present and future keys are created from it.
It's a very comforting idea to know that regardless of what I do to my computer - as long as I have the seed stored somewhere safe - nothing can happen to my funds.

But now what happens if I use multisigs? They use P2SH scripts which basically moves the responsibility of remembering the participant public keys to the redeemer. It's easy to fund a lockbox, it's just an address.
If I create a lockbox for a trust fund, it may take years before someone wants to redeem it. By then, if no one has a copy of the lockbox definition, the fund is lost.
Essentially, when using multisigs I am back to having to maintain individual backups for every multisig address - less I risk a permanent loss. It's much more work than the deterministic wallet case, don't you think?

Am I missing something?

Thanks

PS: As a workaround, I considered sending a small transaction to the participants when the lockbox is created in order to store its definition in the blockchain.
444  Economy / Service Announcements / Re: BitcoinStrings.com - blockchain in words on: August 29, 2014, 12:26:39 PM
This is the data that miners can put in the coinbase transaction since the script is irrelevant there.
Unfortunately (?), unless you solve a block you can't write in the blockchain this way.

However, there is a nifty trick. One can create a transaction that pays to a bunch of addresses and they
make the message. Maybe you could try to decode these?
445  Bitcoin / Bitcoin Discussion / Re: Tracing the chain on: August 29, 2014, 09:54:50 AM
Due to the fungibility of bitcoin, linking two addresses is computationally difficult and the result could be too large to be useful.

For example, what if SatoshiDice is in the path? You could end up connecting to all their users.

Not if filters are installed.

I asked about this very same thing over a year ago. It seems like it's something easy to built, but perhaps it's not to somebody(s) best interest to have such readily available due to how the tool would be used, and boy would I use the shit outta it.

You need to be more specific in your description of a solution. Many of the problems related to graphs are NP-complete even when they appear easy to describe. It seems to me that a variation of the A* algorithm could work but considering the size of the graph (millions of nodes) and the difficult choice of a distance to target heuristic, it still looks difficult. Maybe that's why it's not implemented.
446  Bitcoin / Bitcoin Discussion / Re: Tracing the chain on: August 29, 2014, 07:35:08 AM
Due to the fungibility of bitcoin, linking two addresses is computationally difficult and the result could be too large to be useful.

For example, what if SatoshiDice is in the path? You could end up connecting to all their users.
447  Economy / Scam Accusations / Re: Warning, ANXBTC is a scam!! on: August 28, 2014, 10:48:12 AM
Ok, the support guy didn't understand that you already withdrew from the anx wallet. Their system has a few bugs.
The same thing happened to me before. Does the withdrawal show up in the account history? If so, what's its status?
If their hot wallet is empty, the transaction fails on their side but still shows up as done.

I sent them a copy of the account history and a link to the address in a blockexplorer. It was resolved shortly after.

448  Economy / Scam Accusations / Re: Warning, ANXBTC is a scam!! on: August 28, 2014, 10:25:31 AM
They refunded to your anx wallet. You have to initiate a withdrawal from there to your personal address. How is that a scam?
449  Bitcoin / Bitcoin Discussion / Re: Cannabis Road hacked despite using 3 levels of multi sig, 200 BTC hacked on: August 27, 2014, 01:13:15 AM
It is certainly not using multi-sig for their customer accounts. Maybe once they initiate a purchase, the system puts the money in escrow with a multi-sig transaction but before that, the money sits in at an address protected with a single key.

If you want to see why, follow the link they provided to blockchain.info
https://blockchain.info/address/1CatnMd3jsEKhwhSLUf8V862im8gBp3NDF

There are 4 transactions that totalled 50 BTC each. Click on any of them. They have lots of small inputs and a single output. Every input corresponds to a customer account.
Click on any of them. Look for the address in the output side. It's the transaction that funded that account. Follow that transaction. The output script looks like OP_DUP OP_HASH160 xxxxxx OP_EQUALVERIFY OP_CHECKSIG which is a standard pay-to-hash transaction.

Basically, their system has an inherent flaw. When a custom funds his account, he does a normal transaction. They have a script that collects everything from all the deposits and moves it to their own address. From there they can do the multi-sig stuff.

The developper of the website gave the tool to the hacker himself. The hacker just had to change one parameter, the target address and he was done.

Honestly, this looks like very shabby work and also shows once again that we shouldn't believe the marketing crap. Multi sig ... right
450  Bitcoin / Bitcoin Discussion / Re: How easy it is to KILL bitcoin. on: August 26, 2014, 09:27:11 AM
Quote
I never click external links, I just like reading n writing my friend..
Nice way to put your head in the sand. Just ignore information even from the official bitcoin site and make up some
stuff instead.

Quote
Imagine.. Gov switches off net. All sats.. all communication.. start agin time.. with a new network.. since the old blockchain is dead, a new one would be created. So many currencies using generaly the same loop..
Gov switches off the internet? Hmmmm OK

Quote
I mean a distributed wifi network can exist away from this internet and with it's own blockchain. all it would take is one machine on one network to add the hash to the other.. dont be telling me this cannot be achieved.. Wink
Yes it can, but the main chain won't accept these blocks because they have lower difficulty.

Quote
This can of course, only be done as long as mining is 'in progress', once the 21 coins are created, then it's script kiddie time lol
You could do the same after every coin is mined - provided that you beat the rest of the network to it.

When it comes to killing bitcoin, the easiest way would be to go the Australian method. Put a 10% tax on bitcoin purchases because it's not a currency but goods. Or the NYC way by requiring a ton of paperwork to open a business in bitcoin.
Either way, the hassle and cost outweight any benefits

A more technical way would be to build a massive hashing facility with taxpayer money and generate 50% of the hashrate. I don't think you even need to go that far. If they get enough blocks to make mining non profitable for the guys who actually have to pay for electricity and hardware, they will drive them out of the business. Thus securing even a bigger share of the global hashing power.
451  Bitcoin / Bitcoin Discussion / EBay Payments Unit in Talks to Accept Bitcoin on: August 15, 2014, 04:06:44 AM
Was this reported already?

In the Wall St Journal
452  Bitcoin / Bitcoin Discussion / Re: Coins unspendable until a particular date? on: August 06, 2014, 10:51:56 PM
I believe you can even though I haven't tried.

Transaction inputs have a 'lock time' before which it cannot be accepted into a block.
Transaction outputs are essentially a script. The most common is the pay-to-hash that allows someone to claim the coins if he provides a matching public key and digital signature. However, one can specify more complicated scripts. Armory implements what you want as a multi-sig lockbox but it doesn't have the time delay feature yet.

Regards,
--h



453  Bitcoin / Bitcoin Discussion / Re: bitcoin address generated so far vs total address ever on: July 27, 2014, 08:17:44 PM
You have a probability of having a collision of two addresses greater than 50% at around the square root.
So at around 2^80 addresses, there is a 1/2 chance of having two people generating the same address.
2^80 ~ 10^24. It's still a gigantic number.
454  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 25, 2014, 04:09:07 AM
This drawing is misleading because it applies to brute forcing a key. If you have a safe with 6 digits, a thief would not try to try every combination. He will use your birthday, your wife's birth day, etc first. If that doesn't work, he would drill a hole and peek through the lock tumblers. Basically, no one questions the breadth of the key space - but there might be backdoors to ECC or bugs in its implementation.
That's like brute forcing with a few parameters. You try something relevant from my life, when all that fails you start trying random numbers.
How exactly is someone going to guess my private key if they know my birthday?

Some people use brainwallets that are derived from their birthday or other data that they find easy to remember.
455  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 24, 2014, 06:44:40 PM
And yet, they got ~1.8 BTC in donations.
456  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 24, 2014, 01:33:10 PM
We are so far away from a working quantum computer. The best that was done was with 4 qubits. You'll need thousands to break ECC 256. But the research is ongoing so maybe one day it will be feasible.
The computer from dwave is highly suspicious. It hasn't demonstrated anything that can't be done on a classical computer with the same speed. It doesn't show state superposition which is the fundamental part of any quantum algorithm.
It may solve some problems faster than classical computers but we don't know which ones.
Unfortunately, there is a lot of fubar associated with quantum computers because they sound very cool...

In any case, there are drop-in crypto methods that are quantum computer resistant. The worst case is that a hard fork will happen and bitcoin will continue with a new algo.
457  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 24, 2014, 09:34:36 AM
Actually the transaction only shows the public key of the address you are sending the coins from. That's why some coins are likely lost forever because they were sent to an address which is unlikely to be associated with a public/private key pair.
They are named something like "1DontSendBitCoinsHere"...
458  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 24, 2014, 07:49:16 AM
Quote
The biggest number factored
so far was "143", so elliptic curve cryptography
used in Bitcoin is secure.

Factoring is RSA, not elliptic curves.

Shor's algorithm has two parts. The quantum part finds the period and would run much faster than on a regular computer.

http://en.wikipedia.org/wiki/Shor%27s_algorithm#Discrete_logarithms

Edit: Adding reference to wikipedia.
459  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 24, 2014, 07:34:44 AM


I'm unsure who made this image but I always like it to help illustrate the security of a 256 bit private key.


Aaaaand Topic closed! Cheesy
Thanks for sharing that info!
As soon as I've read the title and topic, I've waited for someone to link this image.
What more do you people need? Whoever made this was certainly a small fellow.
In other words, no matter what advancement is made in technology in the next 100 years, there is no way for anyone to brute force 256bit keys.

This drawing is misleading because it applies to brute forcing a key. If you have a safe with 6 digits, a thief would not try to try every combination. He will use your birthday, your wife's birth day, etc first. If that doesn't work, he would drill a hole and peek through the lock tumblers. Basically, no one questions the breadth of the key space - but there might be backdoors to ECC or bugs in its implementation.
460  Bitcoin / Bitcoin Discussion / Re: How long until bots can profitably guess private keys? on: July 23, 2014, 10:34:56 PM
All jokes set aside, these calculations assume that the only viable algorithm is brute force. One of the primary advantage of elliptic curve
cryptography is the relative short key size. A 256 bit EC key is roughly equivalent to a 3000 bit RSA key because there aren't very good
algorithms for solving the discrete log problem whereas prime factorization has much better algorithms.
However, bit coins addresses are protected by a few cryptos. If one never reuses an address, the only occurrences of it in the block chain will be when it receives coins and when it is drained. Once it's drained, there is nothing to steal. Before it is used, the block chain only has the address and not the public key. The address is a hash of the public key. So to steal the coins, one has to reverse the RIPEMD-160 hash function to get the SHA-256 of the public key. Then reverse the SHA-256 to get the public key and then crack the ECC to get the private key.

If the address is reused, the public key will appear in the block chain because when coins are spent from an address, the transaction shows the public key and a signature. It eliminates the need to reverse RIPEMD and SHA. The 'only' problem remains the ECDSA.

ECDSA has a weakness if it is poorly implemented. To sign a message, a random number should be chosen and it should not be reused  otherwise it is very easy to get the private key. Sony PS3 was hacked because the developers used a constant and a few earlier bitcoin clients had bugs and were also reusing that number. It led to the theft of a lot of bitcoins.

Finally, there is the risk of using a not really random key. If the key is the SHA of "I love cheesecake" it will probably be found quickly by bots that try simple sentences.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!