Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 12:16:40 PM Last edit: September 28, 2012, 07:00:13 PM by gmaxwell |
|
|
|
|
|
DeepBit
Donator
Hero Member
Offline
Activity: 532
Merit: 501
We have cookies
|
|
September 28, 2012, 12:17:46 PM |
|
How do you know it's not just relaying someone's blocks ?
|
Welcome to my bitcoin mining pool: https://deepbit.net ~ 3600 GH/s, Both payment schemes, instant payout, no invalid blocks ! Coming soon: ICBIT Trading platform
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 12:20:11 PM |
|
How do you know it's not just relaying someone's blocks ?
How do you know it's not just mining some blocks ?
|
|
|
|
hamdi
|
|
September 28, 2012, 12:38:06 PM |
|
looks nice for them. they catch almost every block
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 12:43:04 PM Last edit: September 28, 2012, 12:58:38 PM by Gyrsur |
|
the article mentioned the "Institute of Information Security". we will not hope they have an 51% attack in mind! EDIT: i guess now they have an 51% attack in mind because the article talks about a so called "securitity gap" and they want to prove their research work. let the show begin! decision time!
|
|
|
|
elux
Legendary
Offline
Activity: 1458
Merit: 1006
|
|
September 28, 2012, 01:14:12 PM Last edit: September 28, 2012, 01:52:31 PM by elux |
|
they wrote a paper about Bitcoin some days ago
Where do i find this paper? Are the bitcoin core developers in communication with ETH Zürich? (Capkun, Androulaki, Karami.)
Aiee! ETH Zürich has indeed mined 7 blocks in the last 70 minutes: http://blockchain.info/blocks/82.130.102.160 | http://bgp.he.net/ip/82.130.102.160What is going on? Testing 51% attack capability? ETH Zürich rolling out ASICs? They do have the brains, the brawns, and the bucks needed, and then some.
|
|
|
|
|
elux
Legendary
Offline
Activity: 1458
Merit: 1006
|
|
September 28, 2012, 01:58:07 PM |
|
http://www.syssec.ethz.ch/research/BitcoinDouble-Spending Fast Payments in Bitcoin This site is under construction. Update 1:CCS 2012 19th ACM Conference on Computer and Communications Security Oct. 16-18, 2012, Sheraton Raleigh Hotel, Raleigh, NC, USA http://www.sigsac.org/ccs/CCS2012/techprogram.shtml Double-Spending Fast Payments in Bitcoin Ghassan O. Karame (NEC Laboratories Europe), Elli Androulaki (ETH Zurich), Srdjan Capkun (ETH Zurich) Update 2: Found it! http://eprint.iacr.org/2012/248.pdfReading the paper now. Update 3: Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses are starting to accept Bitcoin transactions. An example case of the growing use of Bitcoin was recently reported in the media; here, Bitcoins were used as a form of fast payment in a local fast-food restaurant.
In this paper, we analyze the security of using Bitcoin for fast payments, where the time between the exchange of currency and goods is short (i.e., in the order of few seconds). We focus on doublespending attacks on fast payments and demonstrate that these attacks can be mounted at low cost on currently deployed versions of Bitcoin. We further show that the measures recommended by Bitcoin developers for the use of Bitcoin in fast transactions are not always effective in resisting double-spending; we show that if those recommendations are integrated in future Bitcoin implementations, double-spending attacks on Bitcoin will still be possible. Finally, we leverage on our findings and propose a lightweight countermeasure that enables the detection of doublespending attacks in fast transactions.
|
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 02:01:28 PM |
|
so now we have the proof: their aim is to establish an attack!
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 02:03:26 PM |
|
so their blocks have to be rejected if it was an 51% attack!
|
|
|
|
Technomage
Legendary
Offline
Activity: 2184
Merit: 1056
Affordable Physical Bitcoins - Denarium.com
|
|
September 28, 2012, 02:05:11 PM |
|
This is not a bad thing. That is a legitimate organization, they are not doing it with hostile intent. Very interesting though!
|
Denarium closing sale discounts now up to 43%! Check out our products from here!
|
|
|
dunand
|
|
September 28, 2012, 02:05:56 PM |
|
I don't understand what in the translated paper. Do they have great hashing power or discovered a flaw in the bitcoin protocol?
|
|
|
|
server
Legendary
Offline
Activity: 892
Merit: 1002
1 BTC =1 BTC
|
|
September 28, 2012, 02:06:25 PM |
|
Swiss... they have something to defend
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 02:07:55 PM |
|
This is not a bad thing. That is a legitimate organization, they are not doing it with hostile intent. Very interesting though!
it doesn't matter if the party is "good" or "bad". every party has to be rejected if they have more than 50% of the network if it was the case.
|
|
|
|
Technomage
Legendary
Offline
Activity: 2184
Merit: 1056
Affordable Physical Bitcoins - Denarium.com
|
|
September 28, 2012, 02:08:56 PM |
|
it doesn't matter if the party is "good" or "bad". every party has to be rejected if they have more than 50% of the network if it was the case. That is true, of course. I'm just saying this might actually benefit Bitcoin because we would learn better how to handle a situation like a 51% attack.
|
Denarium closing sale discounts now up to 43%! Check out our products from here!
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 02:14:00 PM |
|
Swiss... they have something to defend yes, the relationships of the involved scientists are hidden. so the party is not "good" nor "bad".
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 02:15:07 PM |
|
I don't understand what in the translated paper. Do they have great hashing power or discovered a flaw in the bitcoin protocol?
i guess both.
|
|
|
|
Spekulatius
Legendary
Offline
Activity: 1022
Merit: 1000
|
|
September 28, 2012, 02:16:26 PM |
|
I dont know whether they mine with full power yet, but its not 51%, its 8.547% actually.
Number of Blocks relayed by 82.130.102.160: 20 First block relayed at Blockheight: 200691 Current Blockheight: 200925 dBlockheight=200925-200691=234 -> they have competed for 234 blocks yet
20/234*100%= 8.547%
They have currently relayed 8.547% of all blocks they have competed for.
|
|
|
|
elux
Legendary
Offline
Activity: 1458
Merit: 1006
|
|
September 28, 2012, 02:17:52 PM |
|
... Until now, double-spending attacks on fast pay- ments in Bitcoin or mechanisms for their prevention have not been studied. In this work, we analyze double spending attacks in detail and we demon- strate that double-spending attacks can be mounted on currently deployed version of Bitcoin, when used in fast payments. We further show that the measures recommended by Bitcoin developers for fast trans- actions are not always effective in resisting double- spending; we argue that if those recommendations are followed, double-spending attacks on Bitcoin are still possible. Finally, we propose a lightweight countermeasure to detect double-spending attacks in fast transactions.
More specifically, our contributions in this paper can be summarized as follows:
We measure and analyze the time required to con- firm transactions in Bitcoin. Our analysis shows that transaction confirmation in Bitcoin can be modeled with a shifted geometric distribution and that, although the average time to confirm transac- tions is almost 10 minutes, its standard deviation is approximately 15 minutes. We argue that this hin- ders the reliance of transaction confirmation when dealing with fast payment scenarios.
We thoroughly analyze the conditions for perform- ing successful double-spending attacks against fast payments in Bitcoin. We then present the first comprehensive double-spending measurements in Bitcoin. Our experiments were conducted us- ing modified Bitcoin clients running on a hand- ful of hosts located around the globe. Our results demonstrate the feasibility and easy realization of double-spending attacks in current Bitcoin client implementations.
We explore and evaluate empirically a number of solutions for preventing double-spending attacks against fast payments in Bitcoin. We show that the recommendations of Bitcoin developers on how to counter double-spending are not always effective. Leveraging on our results, we propose a lightweight countermeasure that enables the secure verification of fast payments. ...
|
|
|
|
|