Bitcoin Forum
April 23, 2024, 09:25:49 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 [104] 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 »
  Print  
Author Topic: Economic Totalitarianism  (Read 345711 times)
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 19, 2016, 09:24:37 PM
 #2061

Call me naive

Familiarize yourself with 21 Inc.

Familiarize yourself with the Ethereum scam and who funded its inception (Peter Thiel gave Vitalik $100,000).

Etc....

The grue lurks in the darkest places of the earth. Its favorite diet is adventurers, but its insatiable appetite is tempered by its fear of light. No grue has ever been seen by the light of day, and few have survived its fearsome jaws to tell the tale.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713864349
Hero Member
*
Offline Offline

Posts: 1713864349

View Profile Personal Message (Offline)

Ignore
1713864349
Reply with quote  #2

1713864349
Report to moderator
1713864349
Hero Member
*
Offline Offline

Posts: 1713864349

View Profile Personal Message (Offline)

Ignore
1713864349
Reply with quote  #2

1713864349
Report to moderator
trollercoaster
Legendary
*
Offline Offline

Activity: 1050
Merit: 1001



View Profile
March 21, 2016, 03:35:33 AM
 #2062

http://www.coindesk.com/elliptic-bitcoin-surveillance-tools
miscreanity
Legendary
*
Offline Offline

Activity: 1316
Merit: 1005


View Profile
March 22, 2016, 03:47:54 AM
 #2063

... One of the fundamental design errors for PoW mining has been the simultaneity requirement that leads to orphans. It is essentially an aliasing error on consensus. That will give you a big hint as to what the big breakthrough in my design solution is. And it turns out I can retrofit it to a non-PoW algorithm that doesn't suffer from PoS's weaknesses...

...

PoW is now a dead-end (due to the 21 Inc economics) except it has value in attaining the widest spread initial distribution for a coin.

We can't escape from proof-of-work (PoW) and maintain decentralized consensus. Period.

I missed your progress on this, and a cursory search didn't find much. Was there headway, or was your latter declaration final after testing different concepts?

I am preparing to go silent. Any questions or comments?

Yes, when? Still waiting Smiley

Familiarize yourself with 21 Inc.

Relevant:

Larry Summers to Speak about Bitcoin at Consensus 2016
explorer
Legendary
*
Offline Offline

Activity: 2016
Merit: 1259



View Profile
March 22, 2016, 04:31:56 AM
 #2064


Quite the list of criminals they've got in queue.
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 23, 2016, 07:39:33 PM
Last edit: March 23, 2016, 09:15:40 PM by TPTB_need_war
 #2065

Yeah, that's why I said 2032 is possibly the date we will see socialism finally go extinct.

There's strong divides appearing now with people beginning to realize the problem is socialism, it's suffocating the life out of the middle class.

The delusional youth supporting it have yet to feel that suffocation, but they will.

MA believes socialism will be 90% extinct by 2032.95, I agree with him on this.

Politics is stuck in the economic collapse of liberal socialism until the boomers stop vomiting

OROBTC (OP)
Legendary
*
Offline Offline

Activity: 2912
Merit: 1851



View Profile
March 23, 2016, 08:43:24 PM
 #2066

...

Edging into a new topic for the moment, I read recently that one way PEOPLE may get to be better able to secure their iPhones (and others) would be for someone to write cunning little apps to do that.  I can think of one or two possibilities already (one would be to mimic the iPhone being off and then require a new password, perhaps another to hide info that a user would want hidden if an FBI were to break into the phone, I am sure other ideas would come along...).

Perhaps the apps writers would have to be outside the USA.  And I suppose Apple might have its own requirements (burdens) on such apps to make them accessible to AAPL itself or the FBI/NSA.

What's say TPTB?  That might be a fairly quick way to make a buck...
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 23, 2016, 08:47:24 PM
 #2067

...

Edging into a new topic for the moment, I read recently that one way PEOPLE may get to be better able to secure their iPhones (and others) would be for someone to write cunning little apps to do that.  I can think of one or two possibilities already (one would be to mimic the iPhone being off and then require a new password, perhaps another to hide info that a user would want hidden if an FBI were to break into the phone, I am sure other ideas would come along...).

Perhaps the apps writers would have to be outside the USA.  And I suppose Apple might have its own requirements (burdens) on such apps to make them accessible to AAPL itself or the FBI/NSA.

What's say TPTB?  That might be a fairly quick way to make a buck...

The operating system and hardware vendor can undermine any security programmed into an App.

We need to move to completely open sourced OSes and hardware, but even Android is not that.

Sorry you won't be able to hide from the backdoor if Apple loses their case.

OROBTC (OP)
Legendary
*
Offline Offline

Activity: 2912
Merit: 1851



View Profile
March 23, 2016, 09:18:37 PM
 #2068

...

Thanks, TPTB for the explanation.

Still, there ARE ways for a clever community to find ways of protecting their personal info.  Maybe Apple indeed has constructed their OS so that there is nothing that can really prevent the phone from having its password hacked (etc.), which would then allow unimpeded access to phone call records (etc.) to LE.

Based on the extremely limited contacts I have w/ cryptographers (and limited reading), it is my opinion that a large group of concerned folks like us can make it VERY HARD for LE to get some information, even on cellphones.  (Not including phone call info of course)

What a pity that cryptography is still so difficult to use "for the masses".  I cannot even find friends to use PGP with by email, and my friends are likely pretty well educated Americans vs. the average.  Though most are sheep.......

Baa-aah!  Baaah!  Baaa-aa-aaah!
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 23, 2016, 10:49:07 PM
 #2069

Based on the extremely limited contacts I have w/ cryptographers (and limited reading), it is my opinion that a large group of concerned folks like us can make it VERY HARD for LE to get some information, even on cellphones.  (Not including phone call info of course)

That is incorrect. The OS and hardware can be designed to leak everything. Although perhaps the encryption could be done on a USB dongle mini-computer (plugged into the user's computing device) that is running custom open source OS and hardware.

What is very hard is to hide that the OS and hardware has that capability. Easier to hide if closed-sourced. But knowing it has that capability won't help us prevent it from leaking the data. Well I guess it could if we refuse to connect our device to any network. But who the hell is going to use a mobile device that is never connected to any network.

The only technical solution is to open source all the OS and the hardware. But we can't open source the hardware because the foundries can be subjected to a national security gag order.

The only non-technical solution is political. And the politics won't be improving until the boomers are gone. If Apple loses the case and the government mandates a backdoor on encryption, then computing is fucked. Because any backdoor can be hacked. The tech giants are all fighting the government on this. It would lead to a computing Dark Age. If they explain it properly hopefully the political support exists to stop the government.

But that might not even stop the NSA from handing out national security gag orders and finding some way to put a backdoor in the hardware.

generalizethis
Legendary
*
Offline Offline

Activity: 1750
Merit: 1036


Facts are more efficient than fud


View Profile WWW
March 24, 2016, 07:11:27 AM
 #2070

Based on the extremely limited contacts I have w/ cryptographers (and limited reading), it is my opinion that a large group of concerned folks like us can make it VERY HARD for LE to get some information, even on cellphones.  (Not including phone call info of course)

That is incorrect. The OS and hardware can be designed to leak everything. Although perhaps the encryption could be done on a USB dongle mini-computer (plugged into the user's computing device) that is running custom open source OS and hardware.

What is very hard is to hide that the OS and hardware has that capability. Easier to hide if closed-sourced. But knowing it has that capability won't help us prevent it from leaking the data. Well I guess it could if we refuse to connect our device to any network. But who the hell is going to use a mobile device that is never connected to any network.

The only technical solution is to open source all the OS and the hardware. But we can't open source the hardware because the foundries can be subjected to a national security gag order.

The only non-technical solution is political. And the politics won't be improving until the boomers are gone. If Apple loses the case and the government mandates a backdoor on encryption, then computing is fucked. Because any backdoor can be hacked. The tech giants are all fighting the government on this. It would lead to a computing Dark Age. If they explain it properly hopefully the political support exists to stop the government.

But that might not even stop the NSA from handing out national security gag orders and finding some way to put a backdoor in the hardware.

Or start a hardware company that bugs every office and video tapes everything going into their facilities and leaving (up until the point it reaches your door). Their motto could be, "You're watching us, so nobody can watch you."

Or just find a way to manufacture hardware using 3d printers (though I don't believe the technology has evolved to that sophistication yet).

aminorex
Legendary
*
Offline Offline

Activity: 1596
Merit: 1029


Sine secretum non libertas


View Profile
March 25, 2016, 11:06:33 PM
 #2071

Foundries getting gag orders is not a realistic problem.  It is difficult to enforce a U.S. court order on a Taiwan company.  If you have their cooperation, it doesn't matter anyhow because it's easy to read the chip, and see if it contains deviations from the masks.  It is very open to review.

We do need open source 4g baseband hardware.  For GSM there is osmocom, but I know of no phone for it.  A secure phone would sell millions.  Even if it were just 3g GSM.

Give a man a fish and he eats for a day.  Give a man a Poisson distribution and he eats at random times independent of one another, at a constant known rate.
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 26, 2016, 12:56:03 AM
Last edit: March 26, 2016, 04:06:28 PM by TPTB_need_war
 #2072

Foundries getting gag orders is not a realistic problem.  It is difficult to enforce a U.S. court order on a Taiwan company.

Nothing is difficult when they control the global monetary system. I think you've been sleeping under a rock since China announced a mandatory social network where its citizens are required to report their friends who speak out against the Communist Party.

Asians are very pragmatic. They will do what is best to "get their loans", etc..

If you have their cooperation, it doesn't matter anyhow because it's easy to read the chip, and see if it contains deviations from the masks.  It is very open to review.

And you can inspect every one of the chips that is sold into the market? And what do you do when every foundry you contract delivers you chips which have "defects"?

And are you entirely sure that hardware logic can't be obscured with 3D layering and other obfuscation methods (including those yet to be published)? Do you think the national security agencies and intelligence agencies with their $100+ billion in funding have not looked into developing the necessary technology?

There are other ways the governments could sabotage your business plans.

Be realistic. You don't defeat collectivism with collectivist action.

Edit: Enabling individuals defeats collectivism.

THX 1138
Full Member
***
Offline Offline

Activity: 208
Merit: 103



View Profile
March 26, 2016, 02:40:43 PM
 #2073

Stepping aside from the conversation for a moment:

New Tech Shows Why You Can't Trust Anything You See on the News

https://www.youtube.com/watch?v=YKkuWX406q4&feature=youtu.be

"...Our goal is to animate the facial expressions of the target video by a source actor and re-render the manipulated output video in a photo-realistic fashion..."
http://www.graphics.stanford.edu/~niessner/thies2016face.html

TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 27, 2016, 02:08:56 AM
 #2074


smfuser
Member
**
Offline Offline

Activity: 82
Merit: 10


View Profile
March 27, 2016, 05:39:45 AM
 #2075

Foundries getting gag orders is not a realistic problem.  It is difficult to enforce a U.S. court order on a Taiwan company.  If you have their cooperation, it doesn't matter anyhow because it's easy to read the chip, and see if it contains deviations from the masks.  It is very open to review.
Any thoughts about this?

From https://www.schneier.com/blog/archives/2013/09/surreptitiously.html
Quote
Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by changing the doping of one transistor. This sort of sabotage is undetectable by functional testing or optical inspection. And it can be done at mask generation -- very late in the design process -- since it does not require adding circuits, changing the circuit layout, or anything else. All this makes it really hard to detect.
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 27, 2016, 07:13:13 PM
 #2076

TPTB will shut down this joke of a coin network in one hour if they think Bitcoin a threat.

TPTB created Bitcoin. Have you not seen what Larry Summers is up to:


They won't kill their masterplan to undermine existing financial systems with Bitcoin to drive the world towards eliminating physical cash.

TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
March 30, 2016, 06:00:00 AM
Last edit: March 30, 2016, 06:34:51 AM by TPTB_need_war
 #2077

...

Armstrong comes out with a piece getting a LOT of notice:

https://www.armstrongeconomics.com/international-news/north_america/when-will-trump-be-assassinated/

It is typical of The-Powers-That-Be to assassinate serious threats to their power.  This one is getting a lot of notice, especially at Zero Hedge.

Should Trump be taken out, we ought not be surprised if there is a lot of violence thereafter...  

Astroturf is their modus operandi. See the Tedx talk YouTube by Sharyl Attkisson:

http://www.zerohedge.com/news/2016-03-28/top-german-journalist-admits-mainstream-media-completely-fake-we-all-lie-cia

Snowden Sums Up The Presidential Campaign With Just One Tweet

OROBTC (OP)
Legendary
*
Offline Offline

Activity: 2912
Merit: 1851



View Profile
March 30, 2016, 04:37:28 PM
 #2078

...

I heard on CNBS [sic] today that Apple is trying to find out how the FBI cracked its way into the infamous San Bernardino iPhone (used by the terrorist).  And then plug that security hole.

Apparently Apple is going to up the stakes by strengthening their encryption even more.  They are also looking at stronger cyber-defenses of their iCloud.

If (and a "Big If") the above is true, AAPL is beginning to look more like a country (or an independent multinational taht at least under some circumstances can act as it so chooses).  Which in the case of privacy is OK with me.
galdur
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500



View Profile
March 30, 2016, 07:47:01 PM
 #2079

2007 All Over Again, Part 4: “We Are Outsourcing Our Monetary Policy”

by John Rubino on March 30, 2016

In that deservedly-famous 2006 CNBC debate between Peter Schiff and economist Arthur Laffer (in which the latter manages to be both arrogant and wrong about literally everything), Laffer celebrates the fact that “we are outsourcing our monetary policy to China” (minute 5:17). much more...

http://dollarcollapse.com/monetary-policy-2/2007-all-over-again-part-4-we-are-outsourcing-our-monetary-policy/

galdur
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500



View Profile
March 30, 2016, 07:49:12 PM
 #2080

Yellen Outsources U.S. Monetary Policy to the Financial Markets

The Federal Reserve looks to have outsourced monetary policy to the financial markets -- and that may not necessarily be bad.
Fed Chair Janet Yellen told the Economic Club of New York on Tuesday that policy makers had scaled back the number of interest rate increases they expect to carry out this year after investors did the same.
She argued that the downgrading of rate expectations in the market had led to lower bond yields, providing the economy with needed support in the face of weaker growth overseas. The Fed then followed suit this month by reducing its anticipated rate hikes in 2016 to two from four quarter-percentage point moves projected in December.....more

http://www.bloomberg.com/news/articles/2016-03-30/yellen-outsources-u-s-monetary-policy-to-the-financial-markets

Pages: « 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 [104] 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!