Can this tool be used without the escrow part? Just 2 people: payer sends the BTC to some address and they can only be released when payer and payee agree on it.
Of course - just have either of the two people be the escrow agent. The only drawback is if the payer and payee fail to agree, the only alternative is nobody gets the funds. That advantage could be used by the payer to extort something from the payee beyond the goods he has already received. If either of the 2 people is the escrow agent, then he will have both Invitation codes and can claim the BTC for himself? Go to Tools >> Two-Factor Bitcoin Tools >> Key Combiner. You'll need a fresh empty bitcoin address that you don't care about, as will your trading partner. You give them your hex public key (found via the address utility), and they give you their hex public key. You put your hex PRIVATE key in "Input Key 1" and their PUBLIC hex key in Input 2. Make sure EC Multiplication is checked, which it is by default, and hit combine. This will generate a bitcoin address at the bottom. When they put *their private hex key* and *your PUBLIC hex key* in the respective inputs on their software, they will arrive at the same bitcoin address as you did. You can both verify that the same address was generated. Then to get the private key of that address you two created, you simple need to enter the private hex key of both your and your partner's address. So either they give their private key to you, or you give your private key to them. Voila! No escrow, but you can both verify the faux-escrow address and know for sure the other party cannot access it.
|
|
|
so could there be a possible collision? If you use a password to create a private key it is very easy for computers to generate the private keys and check the balance. You need to create the private keys randomly and not from a password. In other words, no brain wallets. people can run large supercomputers and check passwords all day long so don't even try it. the best way to go is use a deterministic wallet like armory or electrum. that was you have one long key you have to save and back up. Then all your addresses are created from that. you really need a very strong password something like "1bH7Dt62Hu82" should be good enough no? Actually, I like that password. If nobody is using it, can I have it? 16GsPwhmfrTLEqp9kVbtMXEuHztCsbYL19 Sure, there it is! Also, KeePass has a nice plugin called "readable passphrase generator" that spits out things like "that repentant bragger wondered the stunted one sorely will dignify amidst the cloaked tackle" and "Capetown announced her 241 softest emissions stackly might unhinge via the cruel intruder" Now I don't know how much entropy those have, since they follow speakable format, but it's not nothing, and I think you can actually set it to just randomly spit out words from its dictionary in random non-phrase format. https://readablepassphrase.codeplex.com/
|
|
|
I have never tried Quebes OS but I went went Manjaro for personal use, dual booted with Win7. Elmentary OS and Zorin OS are very intuitive . I give Zorin the edge, in that you can make your UI like Windows, Mac or the OS of your choice with a single click. Thanks for the advice! I'll give Zorin a look!
|
|
|
Yes, and it fucking boggles my mind that things like p2pool have as little volume as they have. Fractional pay-per-share (or at least close, currently share is like 150K or something) and still decentralized... best of both worlds. Why the hell doesn't everybody use it!?
|
|
|
I cannot find the number on 8673. Can somebody point it out to me?
|
|
|
Yup this is just tor or mixmaster or whatever you want to call it, the kind of thing where you wrap it up in layers. This physical version is easy to implement if people are willing to participate. You just put boxes inside each other. The trouble is, with the physical implementation, it would get costly quick, because people generally don't work for free, and to do layers, you're effectively mailing it multiple times, so for example to make it worth while to have a 3 node circuit, you have to pay 3 people.
|
|
|
I've decided to switch over to Linux next time I buy/build my next comp or next time I format.
My reasons are to support open source, but primarily for privacy/security. I'm not a programmer, but I'm reasonable knowledgeable, and have become a privacy nut the past year or two. I was thinking of Quebes OS for obvious reasons, but then I was thinking there might be more options on more mainstream/compatible distros. (I got the impression that many distros are different enough that software often is not compatible.)
Privacy and security and network and access/permission control is my number one priority, followed by stability. And though not a programmer, I consider myself really good with computers and am confident in my ability to google and fix my own problems-- that being said, I do want something that is kind of intuitive for people who think like programmers. I like things that "just work" and are intuitive to troubleshoot when they don't.
What Linux distro would you guys recommend? Right now, I'm thinking of: Quebes, Ubuntu, Elementary, Mint, Manjaro, or just stock Arch that I spend a lot of time on at the beginning.
|
|
|
2/10 would not read again
|
|
|
I am not going to respond to this since it is way off topic but if you want to believe the community had a hand in choosing go ahead, nothing will stop you from believing that. First of all, every single one of my beliefs can change with logic and/or new information. Secondly, I never said the community had a giant role in making that change. All I said was that the devs recognized that the community must be able to decide, and they made sure to leave it as an OPTION so that if the users really did hate the change, they had the power to undo it. The whole ROLE of developers is to improve the software and think about the long term. Gavin made a change he thought did that. That's his job. If you disagree, then go rally users to implement the config changes I listed. It's really easy.
|
|
|
I'm not sure why you think it's somehow bad that he claims that the punishment for and our cultural view of crimes should be related to the damage they do. All he said was he was molested as a child and that it didn't cause him any terrible lasting damage.
Crimes should be judged by the pain and suffering they cause. That's a reasonable thing to say.
That could easily be Dawkin's minimising the problem in his own mind because no-one protected him, and probably no-one believed him or validated his experience or something like that. He claims it has had no lasting effect but I bet if a psychologist were to diagnose him they would find negative consequences in his life, because it is obvious he hasn't dealt with it if he is saying things like that. Or maybe.... it just didn't have much of an effect. Kids don't know what sex is, they don't know what's appropriate or not. If he was molested, he may have not even known about it and just chalked it up to weird tickling. It may truly have been a completely innocuous experience as far as he was concerned. I'm not saying it WAS innocuous, I'm just saying that it's an entirely reasonable possibility that nobody seems to be admitting... that it actually isn't that harmful to the child is some situations.
|
|
|
Suppose someone accidentally the whole dev team? Or suppose it is infiltrated? Or suppose they are bought off?
How should we as a community react? Probably fork right, but what fork? It is easy to imagine a dozen forks springing up before things stabilize. In a worst case they could be so weak, the original, comprised chain becomes the favored one, simply because it is easier to stick with the status quo.
Maybe we could benefit from a chain of command or something?
This has already happened, forcing the transactions to be over a certain amount of coins. Nothing you can do, just take it, as we have seen. Sigh, no it hasn't. Actually, exactly the opposite of that has happened. Gavin made a change to the DEFAULT configuration options so that dust spam wouldn't propogate. HOWEVER, you can change that yourself in your configuration file, and mine yourself, and connect to miners that accept dust spam. Dust is still a valid transaction, and if you mine yourself and happen to find a block, other people will accept that block. Currently, most users and miners simply drop and don't relay dust transactions, BUT if you want that to change, all you have to do is rally support. The devs made this OPTIONAL, so that if the COMMUNITY decides it's best, they can still relay all the dust they want. Just add this to your config file: mintxfee=0.00000001 mintxrelayfee=0.00000000 addnode=173.242.112.53 addnode=184.152.8.228
mintxfee must be 1 satoshi, because if you put zero it gets confused, because it already has a way to deal with 0 mintxfee.. they're called no-fee transactions. So mintxfee is the minimum amount for a transaction fee that is non-zero, which of course is 1 satoshi. The addnodes are the only two nodes I know of that mine and relay dust tx's.
|
|
|
self issued SSL certificates, some sites are already doing this ya any privacy conscious site should just have a self signed cert, with the cert fingerprint pgp clear-signed by the site admin or something.
|
|
|
I'm not sure why you think it's somehow bad that he claims that the punishment for and our cultural view of crimes should be related to the damage they do. All he said was he was molested as a child and that it didn't cause him any terrible lasting damage. Crimes should be judged by the pain and suffering they cause. That's a reasonable thing to say.
|
|
|
No worries, I already previously made sure that it would be preserved on imgur, in as high a quality as possible, all original documents and readable.
|
|
|
Your avatar makes me happy
Haha, thanks
|
|
|
. ok I encrypted some zip bombs, some rick astley pics, some random data, and just fired off an e-mail to Virus Share asking for an invite... if I get it, then the fun begins!.... . PS: Your plan is flawed because the NSA is not stupid enough to run potential malware in an unprotected environment, especially after you've written "there is malware attached". Also, malware is illegal, if you're doing illegal things. Well it's more a form of protest, and also I'm assuming a lot of the process might be automated. I don't really expect them to fall for it though, it's more a "fuck you" than anything else. Also, I think they'd have an interesting time trying to show to a court that me sending an encrypted attachment to a MY friends via MY e-mail account counts as "doing something malicious" with malware.
|
|
|
I have started adding flagged words to the signature of my e-mails, as a form of protest of the topical NSA scandal. I would also like to start attaching small viruses, encrypted with passwords like "Password1" and "correct horse battery staple" so that the recipients don't get infected (because it's encrypted) but any snoops that steal the e-mail and attempt to decrypt the attachment will 1) definitely be able to decrypt it, and 2) will get a nasty surprise. (I also have in my signature an warning/alert to the e-mail recipients NOT to attempt to decrypt the attachment, because it's a virus.)
Does anybody have some torrents or other links to something best suited for this purpose.
|
|
|
xkcd 936 IIRC, and 538 is the wrench attach
|
|
|
|