Bitcoin Forum
May 05, 2024, 03:08:24 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 [74] 75 76 77 78 79 80 »
1461  Bitcoin / Bitcoin Discussion / Re: ! 5 Bitcoin Independence Day Raffle ! on: July 01, 2013, 06:32:11 AM
Cubic Earth

I hope this turns out different than anyroll's 10 BTC giveaway. Grin
1462  Bitcoin / Bitcoin Discussion / Re: BitCoins for Edward Snowden. on: June 19, 2013, 08:43:41 AM
I just don't get it, why HongKong? what the fuck, he's going to get extradited.
why didn't he just go to HongKong, out of reach of the Americans, THEN go to Iceland, THEN TELL YOUR STORY.
balls.

edit: I don't buy the 'i couldn't reach iceland in the short time'.
earning $120k a year and your telling me he couldn't sit at HKG, pay in cash/credit for the first flight out to KEF?


He was worried that he would have been captured in Iceland before he had a chance to go public.  Iceland is small and the US can exert enormous pressure and maybe even have its agents operated directly there.  Hong Kong, under China's umbrella, would not suffer from those same risks.  Did you see that Snowden said he would have had to give the NSA 30-days of notice before he left the country?  He was worried he might not have even made it to Hong Kong without being nabbed right off the airplane.
1463  Other / Off-topic / Re: Data diode for high security on: June 19, 2013, 08:03:18 AM
A firmware hack couldn't remap the pins?
You mean, on your own hardware? If you can't trust your own hardware, you can't trust anything. Game over. You lose.

Not so fast, bud, you don't have to lose! Compromised hardware, via firmware or bios attacks, or even malicious chip design is soon going to be a reality to contend with.  The digital arms race is just gearing up - especially as the recent surveillance disclosures have revealed - and bitcoin is in the heat of the battle.  As was said during the conference in San Jose, the state of our computer security systems, generally speaking, are barely ready to handle something as potent as bitcoin.  I know your right, that traditionally hardware has been assumed to be safe, and that that concept forms a basic tenet of security thinking.  Foreseeing the coming onslaught of compromised hardware though, I am trying to think of vulnerabilities and their solutions.

Having different pieces of hardware doing the same job in the security system, and then comparing the results with a third system, or having two or three different models of data diodes in a row are a few examples of how to protect against hardware attack.  It wouldn't matter if one element was compromised in such situations.

If bitcoin gets big, the security systems surrounding multi-billion dollar wallets will have to be as robust as the stuff that protects the nuclear launch system (or at least hopefully does).  If one can design a system that mitigates the risk of compromised hardware, that can help to shrink what is currently large attack surface.

I was trying to design a crypto communications system where the private key would reside on a computer behind a data diode or two.  You would read the emails, chat, voice or video on that computers monitor.  All of your outgoing communications would be sent from a another computer, which of course would not have the private key on it.
You're talking about red/black separation. Ideally, your red box (the one you're accessing sensitive data on and which stores your keys) won't have any kind of network connection at all, instead using sneakernet to transfer encrypted data to and from your black box (which has a network connection, but never touches unencrypted data). It's the only way to be sure.
[/quote]

That is what I am talking about. The data diode would serve the same function as sneakernet, although the diode would obviously allow for the real-time and continuous transfer of data to the red system.  As I mentioned, several diodes could be placed in serial to multiply the chances of preserving security.
1464  Other / Off-topic / Re: Data diode for high security on: June 18, 2013, 12:28:54 PM
The only such hack is Auto-MDIX (which swaps the transmit and receive pairs if you used a patch cable where a crossover cable was required or vice versa), which won't work if only the receive pairs are connected.
A firmware hack couldn't remap the pins?

If you're worried about "determined adversaries" (just who do you expect to be pissing off, exactly?)
Jeeze, the only friend who I called about this basically asked me the same thing.  I don't want to get on anyone's bad side, clearly there are lots of benign situations that demand super security and privacy.  I am interested in going through the theoretical exercise to see if I can devise a hack-proof system.  My main assumption is that my computers would be physically secured.

Electricity doesn't work the way you think it does. The direction of current flow has absolutely nothing to do with whether you're transmitting or receiving a signal. You seem to think that signals are transmitted by "pushing" electrons down a wire, where they are somehow "collected" by the receiver.

Your right Foxpup, there is no pushing signals down a wire when it comes to electricity, but I think this would be the case with fiber optics and light.

I was trying to design a crypto communications system where the private key would reside on a computer behind a data diode or two.  You would read the emails, chat, voice or video on that computers monitor.  All of your outgoing communications would be sent from a another computer, which of course would not have the private key on it.  The main stumbling block I have come to is how to verify that the outgoing packets, leaving the computer you are typing on, have truly been encrypted with the intended public key.  I am trying to anticipate software and hardware backdoors.  It would be really nice to have a way to sniff all outgoing traffic and verify that only properly encrypted packets were leaving the network, but without your friend's private key, you can't do the verification.  More thinking ahead!
1465  Bitcoin / Bitcoin Discussion / Re: Get credit, purchase Bitcoin, declare bankruptcy, profit?? on: June 18, 2013, 04:01:05 AM
The system is aware of maneuvers like that, and you don't need bitcoin to hide your assets.  Your strategy has been possible with gold forever.  They are not going to discharge your debts, however, it they determine that you assumed those debts with no intent to pay them back.  So if you sell you car, sell your house and take out a loan, put $100k on your credit cards and funnel it all into gold, and then declare bankruptcy, you'll probably just end up in jail.  Be prepared to flee to Mexico.
1466  Other / Off-topic / Re: Data diode for high security on: June 14, 2013, 05:28:21 PM
With 10/100BASE-T over Cat-5 (but not 1000BASE-T, which uses all four pairs), just disconnect the transmit pair (pins 1 and 2, either green and green/white (T568A) or orange and orange/white (T568B)), and you will no longer be capable of transmitting. Then put your card in promiscuous mode (since you obviously won't be able to establish a connection), fire up your favourite packet sniffer and you're done. Note that you may experience unavoidable data loss, as you will be unable to request that dropped packets be retransmitted.

I thought about that technique, but I was wondering if some hack could remap the pins?  I know it would be really hard to pull of, but there are some very determined adversaries out there.  So I wondering if I do as you described, but also spice some actual diodes into whatever pairs, either the tx or rx, that are hooked up.  Then even if the pins were remapped the electricity could not flow backward.

I can see fiber being more secure though.  Even with diodes in copper, just because the electricity wasn't flowing backwards wouldn't stop information from leaking out.  You could always vary the electrical load in a specific way and the sending side could detect the difference.
1467  Bitcoin / Bitcoin Discussion / Re: Will a shorter block time be helpful or harmful to Bitcoin and its future? on: June 14, 2013, 02:21:09 AM
its already been explained why faster blocks dont increase security. if the blocks come every 2 minutes then they are 4/5ths easier to make. that means 1/5th as secure. So rather then 6 confirmations youd need 30 to have the same security. Plus orphaned blocks would go up as a result. They would be 5 times more likely to happen. 10 minutes was chosen for a reason. It doesnt need to be smaller, its serves no purpose.

I'm not sure I agree.  Wouldn't it be harder for an attacker to issue 5 2-minute blocks in a row than it would be for them to generate a single 10 minute one?  I can see it being easier to make 5 2-minute blocks in a row than 5 10-minute ones, but I think what matters is expected security after x amount of time.  After 30 minutes (approx. 15 blocks) with 2-min blocks you would be safer than 30 minutes with 10-minute blocks.

Its like a serial dilution when you are rinsing something.  Given a soapy jug and a one jug full of rinse water, if you just poured the rinse water into the soapy jug and then dumped it out there would be plenty of soap residue left (this being the 10 minute block).  If you take the rinse water and add a pint at a time to the soapy jug, slosh it around, and dump it out, and then repeat that 8 times, the soapy jug will be very, very clean (this being the 1.125 minute block).  The water is like our hashing power.  There are more and less efficient ways to use its properties for our ends.
1468  Other / Off-topic / Data diode for high security on: June 14, 2013, 01:48:41 AM
I've been thinking about how I could construct my own data diode.  I know there is a lot to consider, but right now I am just curious about the physical layer.

Does anyone know if it would be possible to splice into some cat-5 cable a few actual diodes and still have the signal pass?  Or would they mess up the impedance, or something like that.  I know there are transmit and receive pairs, but perhaps they could be remapped somehow.  I would be cool if you could actually just buy some diodes and make your own one way cable.
1469  Bitcoin / Bitcoin Discussion / Re: BitCoins for Edward Snowden. on: June 12, 2013, 11:09:30 PM
You're a complete idiot if you think it is about reducing the chances of "getting your legs blown off" ... and besides from 20 million to 1 down to 20.1 million to 1 ... worth it?

You don't have to assume they are intercepting your 'fone' calls ... they ARE ... everyone one of them and they are storing them in a massive database for all time. It is not that there is some snivelly little NSA Stasi guy with headphones listening to your porn calls they just store them all up and data-mine the whole lot of them for when someone decides it is your turn to be gone after ....

+1
1470  Bitcoin / Bitcoin Discussion / Re: 51% attack, proof of… what? on: June 06, 2013, 07:58:48 PM
The solution is more informal; those that disagree with what the system-gaming "powerful computer" is doing will agree to hard-fork to a different alg. If that's the vast majority of bitcoin users (ie, everyone except that powerful-computer), then bitcoin shifts and the powerful attacker is left with huge power on an effectively unused network.

I would think they would just 51% the new algorithm as soon as it was agreed upon.  That is one of bitcoin's major advantages, it has by far the most invested in supporting hardware.  If they could muster the money and technological ability to compete with all the ASIC's it would probably be pretty easy to take down something else.  And you can bet they would have already planned for it.
1471  Bitcoin / Bitcoin Discussion / 51% attack, proof of… what? on: June 06, 2013, 07:31:37 PM
We all acknowledge that a 51% attack is possible.  Maybe not likely, maybe not profitable, maybe stupid, but these reasons are not enough, not even when taken together, to stop an attack from happening.

Maybe this idea is already out there, but I am thinking of an approach that uses a web of trust to validate peoples identities.  In addition to finding a very rare hash, you would also need to sign the block with your private key.  And that private key would need to have been signed by some number of other private keys to be valid.  The rule would be that no two blocks in a row can be signed by the same private key, or even keys directly adjacent on the web of trust.

I know what I have described is not presented in enough detail to be workable, but I think with a little bit of though engineering we can make it into something workable.

I can already anticipate one critique, which is that such a concept would be too easy to manipulate, or game.  But what is our goal, as a community?  Hint: It is not to bow down and pay respect to the most powerful computer.  Too powerful a collection of computing power would or could game the system.

I get that one appeal of the SHA-256 hashing is that anyone can run the hardware totally independent and support the network with out any sort of authentication.  Perhaps blocks could be allowed that didn't have a private key attached, but then at least the next two blocks would have to be singed.

The web of trust would be maintained in the blockchain itself.  It would have to start somewhere, but I think our community is small enough still that we can get this going.

tl,dr
• Web of trust to supplement SHA-256
• Successive blocks would have to be signed by different private keys
• This idea is not yet fully developed
1472  Bitcoin / Bitcoin Discussion / Re: What's the largest number of transactions that have been in a block so far? on: June 06, 2013, 04:56:29 AM
I agree with your example, but I don't think it addresses my point.  When I said 'function of total hashes performed', I was not referring to the set of hashes that solved blocks and are available for inspection in the blockchain.  I was speaking of all hashes performed on mining equipment thus far.

Lets say that 500 hashes have been performed in the last 3 months, and 500 in 3 years prior.  Every time the hash function is performed, it is equally likely to result in a value below 0x000000000000000000000000000000000000000000000000000000000000000F.  Such a hash would be included in the blockchain unless the difficulty was absurdly high.

Now that you have searched back 11 months, I'll guess that accounts for over 90% of hashes performed thus far.  So I'll give there being a 10% of finding a lower hash if you keep going.  Clearly this won't be proved nor disproved by what you find.

Also, my argument is not based on the particular hash value you found.  If you had found 0x000000000000000000000000000000000000000000000000000000000000000F in the first 90 days, the chances of finding a lower value would of course be essentially zero even if you looked back very far.  Mine is a very general argument.
1473  Bitcoin / Bitcoin Discussion / Re: What's the largest number of transactions that have been in a block so far? on: June 06, 2013, 01:37:52 AM
The chance of finding a lower hash earlier in the blockchain would just be proportional to the area under the hash rate graph.  It is a function of the total number of hashes performed.  So, 50% of all hashes have been performed in the last 90 days, then there would be a 50% chance of finding a lower hash in all previous days had their blocks examined.

And that hash you found was about 1000x 'rarer' than was necessary to be in included.
1474  Bitcoin / Bitcoin Discussion / Re: What's the largest number of transactions that have been in a block so far? on: June 06, 2013, 12:15:15 AM
Well I'll just tack this question on here:  Anyone know what block has the smallest hash, or how small that hash was?
1475  Bitcoin / Press / Re: 2013-06-03 CJIL: Bringing Bitcoin within the Reach of the IMF on: June 05, 2013, 08:43:52 PM
I suspect that most active BTC sellers on LocalBitcoins act as a passthrough to the exchanges. They sell above spot at a price that allows them to rebuy on the exchange to replenish what they sell for cash.

That does happens a lot, but there are plenty of other routes.  Miners and early adopters (who probably mined in the past) maybe be looking to sell lots and lots of coins with minimal records being created, while preserving their anonymity and not dumping the coins on Gox which would have an adverse effect on price.  I wouldn't be surprised if more than 50% of the USD/BTC exchanging was done OTC.
1476  Bitcoin / Press / Re: 2013-06-03 CJIL: Bringing Bitcoin within the Reach of the IMF on: June 05, 2013, 06:14:36 PM
You can't be serious. We will have some information because we'll see some significant improvements on the infrastructure. I don't believe tens of billions of dollars will flow into Gox to buy bitcoins, at least not in its current incarnation.

They wouldn't just be sending money to Gox.  That would be the fastest way to raise the price, and they would have every incentive to try to hide the fact they were accumulating BTC.  They would use a bunch of different techniques, starting with the purchase of several million dollars worth of ASIC hardware.  Next they should hit up local bitcoins and buy as many coins there as possible, no worrying about losing 20% to fraud.  That action would affect the Gox price, as some people would be using Gox to hedge and otherwise enable the trades, but that strategy would drive up the price far more slowly than buying the coins directly on Gox.  They may even dump coins on Gox and buy them back OTC.
1477  Other / Off-topic / Re: My Summer Reading List on: June 05, 2013, 07:40:37 AM



Should be arriving tomorrow.
1478  Bitcoin / Legal / Re: Tax Havens on: June 04, 2013, 10:48:42 PM
No kidding, who buys an asset expecting to lose value? ...

Most people.  Cars, boats, clothes, computers, etc.
1479  Bitcoin / Bitcoin Discussion / Re: bitaddress generated existing address? how to spend [1 BTC BOUNTY] on: June 04, 2013, 10:14:13 AM
Some day, you'll lose your private keys. Some random exploit, virus, perhaps somebody ripping you off; whatever the case, you'll come back to this forum demanding justice and doing everything you can to find the robber, completely outraged. How dare they stealing my coins you'll think. When that happens, I'll link you to this thread and remind you how you once were the robber who stole 50 BTC. Have a good day Wink

Well I think we would all like to see them steal at least one satoshi, just to prove that they can.
1480  Bitcoin / Bitcoin Discussion / Re: bitaddress generated existing address? how to spend [1 BTC BOUNTY] on: June 04, 2013, 10:08:26 AM
There is no such thing as a bug on bitaddress. You could have found an address collision or simply mined the coins yourself in 2009, I find the later more credible.

It's more likely there was a 'collision' in the pseudo-random number generation that bitaddress.org relies on than and actual address collision.  I would guess 1,000,000's of times more likely.  That may even be considered a bug.  I modify every generated private key by hand to guard against such issues.
Pages: « 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 [74] 75 76 77 78 79 80 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!