Bitcoin Forum
May 06, 2024, 08:35:06 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Bitcoins: the evil currency of the new century!  (Read 2105 times)
CryptoFreak33 (OP)
Newbie
*
Offline Offline

Activity: 57
Merit: 0



View Profile WWW
September 19, 2012, 04:33:38 AM
 #1

Found this online, thought it was interesting. Thoughts?

http://www.thedailybell.com/4311/The-Pure-Fiat-Con-Every-Transaction-Available-for-Official-Scrutiny-and-Thats-Just-the-Point

1715027706
Hero Member
*
Offline Offline

Posts: 1715027706

View Profile Personal Message (Offline)

Ignore
1715027706
Reply with quote  #2

1715027706
Report to moderator
1715027706
Hero Member
*
Offline Offline

Posts: 1715027706

View Profile Personal Message (Offline)

Ignore
1715027706
Reply with quote  #2

1715027706
Report to moderator
"In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715027706
Hero Member
*
Offline Offline

Posts: 1715027706

View Profile Personal Message (Offline)

Ignore
1715027706
Reply with quote  #2

1715027706
Report to moderator
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1024



View Profile
September 19, 2012, 04:49:08 AM
 #2

Sadly, this guy is missing a dictionary.  It is hard to take someone seriously when they use a word like "fiat" so often, and get it wrong nearly every time.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
benjamindees
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


View Profile
September 19, 2012, 05:03:18 AM
 #3

Bitcoin is a psy-op to get you to use a currency that tracks all your transactions, and is somehow connected to LETS and the UN and socialism and anti-semitism.  Bitcoin promoters are "evil people" who are forcing our choice of currency on others using "government power".  And, apparently, the better alternative is gold.

This reeks of desperation.  I wonder why.  Hmm let's see...

Quote
Another reason why the Daily Bell, itself an ardent promoter of privately gold-backed currencies, is enraptured with Paul’s unremitting advocacy of the gold standard could be that the directors of the Bell have a vested interest in a return to a gold standard, and more generally a larger role for gold and silver as circulating currencies. Indeed, as Diana Zoppa, an advisor to the Daily Bell, acknowledged in an interview with Kerry Lutz of the Financial Survival Network, Zoppa’s hiring by the Daily Bell was facilitated by the existence of a business partnership between the directors of the Bell and Zoppa’s husband, Shawn Perger, owner of a gold-mining company called Dicon Gold Inc., whose main assets are found in Colombia.

This partnership seems to have been a very close one...

http://realcurrencies.wordpress.com/2012/09/16/the-daily-bell-hoax/

Civil Liberty Through Complex Mathematics
Stephen Gornick
Legendary
*
Offline Offline

Activity: 2506
Merit: 1010


View Profile
September 19, 2012, 05:04:20 AM
Last edit: September 19, 2012, 05:15:45 AM by Stephen Gornick
 #4


There's more discussion on it here:

Bitcoin Could Be An NWO's Conspiracy
 - http://bitcointalk.org/index.php?topic=110432.0


[Edited: Corrected title and link to the right article.]

Unichange.me

            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █


CryptoFreak33 (OP)
Newbie
*
Offline Offline

Activity: 57
Merit: 0



View Profile WWW
September 19, 2012, 09:40:25 AM
 #5

You know, I was this close to becoming a reader of the Daily Bell. Until this.
ralree
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Manateeeeeeees


View Profile
September 19, 2012, 07:50:01 PM
 #6

Quote
We doubt it. Here's something recently posted at Reddit:

Anything in Tor is completely traceable. This is an important point, so I'll reiterate it in big scary letters:

TOR IS COMPLETELY TRACEABLE

Any low-latency mixnet is. There's no two ways about it. Anyone who can observe a sufficiently large part of the internet over time can correlate your traffic to that of the server and get a pretty good idea that it's you.

I'll observe your IP connecting to an entry node and sending 13981 bytes to it. Then I'll observe an exit node sending exactly 13981 bytes to a server a second later. That's you, with an overwhelming probability. It's a bit of a simplification, but it's really that easy. I just have to be powerful enough to be able to observe large parts of the internet, since Tor nodes are spread around the globe.

I love how they quote "something posted at Reddit."  That's such a credible source of information!

This oversimplified quote basically discredits the entire article since they think this is correct.  Tor is NOT traceable this way.  This is an important point, so I'll reiterate it in big scary letters:

TOR IS NOT COMPLETELY TRACEABLE IN THE WAY PORTRAYED ABOVE

You can't observe the first node in an onion routing network "sending 13981 bytes to it."  These plaintext bytes would be wrapped in 2 layers of encryption (hence, onion), so you might be able to guess with some sort of margin of error how big the decrypted payload might be, and maybe observe it somewhere else in the world and do some timing analysis, but all of that is REALLY hard to do.  The "a second later" part is particularly silly - how do you know it's only going to take 1 second?  What if that exit node is sending out packets ever millisecond (which most are)?  

1MANaTeEZoH4YkgMYz61E5y4s9BYhAuUjG
Etlase2
Hero Member
*****
Offline Offline

Activity: 798
Merit: 1000


View Profile
September 19, 2012, 08:02:36 PM
 #7

I am totally out of my element when it comes to Tor, but symmetric encryption does not affect the size of the payload, so unless Tor uses some kind of padding scheme (which it certainly might), that is not protection to just say "it's encrypted." However, I believe if someone happens to be watching both ends they can make some very educated guesses about where data is going to and from. But unless it's a honeypot site, they won't know what that data is. However, since most bitcoin data is very similar in bandwidth, I don't think they will ever be able to make a strong correlation in this scenario. Again, I am not a Tor expert, take it with a grain of salt. Some of this may depend on whether or not it's an onion site or in the clearnet, but I think we're talking about onion sites here.

kokojie
Legendary
*
Offline Offline

Activity: 1806
Merit: 1003



View Profile
September 19, 2012, 11:51:26 PM
 #8

I am totally out of my element when it comes to Tor, but symmetric encryption does not affect the size of the payload, so unless Tor uses some kind of padding scheme (which it certainly might), that is not protection to just say "it's encrypted." However, I believe if someone happens to be watching both ends they can make some very educated guesses about where data is going to and from. But unless it's a honeypot site, they won't know what that data is. However, since most bitcoin data is very similar in bandwidth, I don't think they will ever be able to make a strong correlation in this scenario. Again, I am not a Tor expert, take it with a grain of salt. Some of this may depend on whether or not it's an onion site or in the clearnet, but I think we're talking about onion sites here.

What about in my case, I use a SSH tunnel to a server that serves hundreds of other SSH tunnel users, and my SSH tunnel is what I use to connect to TOR, I think this set up is 100% untraceable, as even if somehow the government cracked TOR and traced to my SSH server, they still have to determine who am I among hundreds of users.

btc: 15sFnThw58hiGHYXyUAasgfauifTEB1ZF6
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1024



View Profile
September 20, 2012, 12:20:26 AM
 #9

I am totally out of my element when it comes to Tor, but symmetric encryption does not affect the size of the payload, so unless Tor uses some kind of padding scheme (which it certainly might), that is not protection to just say "it's encrypted." However, I believe if someone happens to be watching both ends they can make some very educated guesses about where data is going to and from. But unless it's a honeypot site, they won't know what that data is. However, since most bitcoin data is very similar in bandwidth, I don't think they will ever be able to make a strong correlation in this scenario. Again, I am not a Tor expert, take it with a grain of salt. Some of this may depend on whether or not it's an onion site or in the clearnet, but I think we're talking about onion sites here.

What about in my case, I use a SSH tunnel to a server that serves hundreds of other SSH tunnel users, and my SSH tunnel is what I use to connect to TOR, I think this set up is 100% untraceable, as even if somehow the government cracked TOR and traced to my SSH server, they still have to determine who am I among hundreds of users.

Is TCP port 113 open on that shell box?  Are there logs?

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
September 20, 2012, 11:34:59 AM
 #10

Quote
We doubt it. Here's something recently posted at Reddit:

Anything in Tor is completely traceable. This is an important point, so I'll reiterate it in big scary letters:

TOR IS COMPLETELY TRACEABLE

Any low-latency mixnet is. There's no two ways about it. Anyone who can observe a sufficiently large part of the internet over time can correlate your traffic to that of the server and get a pretty good idea that it's you.

I'll observe your IP connecting to an entry node and sending 13981 bytes to it. Then I'll observe an exit node sending exactly 13981 bytes to a server a second later. That's you, with an overwhelming probability. It's a bit of a simplification, but it's really that easy. I just have to be powerful enough to be able to observe large parts of the internet, since Tor nodes are spread around the globe.

I love how they quote "something posted at Reddit."  That's such a credible source of information!

This oversimplified quote basically discredits the entire article since they think this is correct.  Tor is NOT traceable this way.  This is an important point, so I'll reiterate it in big scary letters:

TOR IS NOT COMPLETELY TRACEABLE IN THE WAY PORTRAYED ABOVE

You can't observe the first node in an onion routing network "sending 13981 bytes to it."  These plaintext bytes would be wrapped in 2 layers of encryption (hence, onion), so you might be able to guess with some sort of margin of error how big the decrypted payload might be, and maybe observe it somewhere else in the world and do some timing analysis, but all of that is REALLY hard to do.  The "a second later" part is particularly silly - how do you know it's only going to take 1 second?  What if that exit node is sending out packets ever millisecond (which most are)?  

Care to explain this:
http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf (page #13)
Huh
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!