zorgberg
Member
Offline
Activity: 62
Merit: 10
|
|
September 28, 2012, 05:19:03 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
|
|
|
|
Sitarow
Legendary
Offline
Activity: 1792
Merit: 1047
|
|
September 28, 2012, 05:21:40 PM |
|
So they have around 9% network hashing power...
How massive of a supercomputer would they have to use to get 2 TH/s? And does anyone know if they HAVE a supercomputer at that university?
4 more weeks and their efforts are in vain.
|
|
|
|
RodeoX
Legendary
Offline
Activity: 3066
Merit: 1147
The revolution will be monetized!
|
|
September 28, 2012, 05:22:22 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
That's what I was wondering. The guy's expertise is in selfishness and cheating in P2P networks, and he is into bitcoins. That is a bad combination. lol
|
|
|
|
niko
|
|
September 28, 2012, 05:27:59 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
If this were the case, there should be an increase in orphaned blocks, right?
|
They're there, in their room. Your mining rig is on fire, yet you're very calm.
|
|
|
DeepBit
Donator
Hero Member
Offline
Activity: 532
Merit: 501
We have cookies
|
|
September 28, 2012, 05:35:59 PM |
|
How do you know it's not just relaying someone's blocks ? How do you know it's not just mining some blocks ? Well, 1) I suspect that you still don't believe us about how the block relaying and blockchaininfo's IP detection works. 2) Some of those blocks were mined by Deepbit and other pools. So I think that this is just a well-connected node.
|
Welcome to my bitcoin mining pool: https://deepbit.net ~ 3600 GH/s, Both payment schemes, instant payout, no invalid blocks ! Coming soon: ICBIT Trading platform
|
|
|
cedivad
Legendary
Offline
Activity: 1176
Merit: 1001
|
|
September 28, 2012, 05:43:25 PM |
|
This is time to study the protocol.
|
My anger against what is wrong in the Bitcoin community is productive: Bitcointa.lk - Replace "Bitcointalk.org" with "Bitcointa.lk" in this url to see how this page looks like on a proper forum (Announcement Thread)Hashfast.org - Wiki for screwed customers
|
|
|
Fjordbit
|
|
September 28, 2012, 05:48:32 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
On the question of is it possible, yes it is theoretically possible to see a block submitted to the network and then publish that block quickly from a highly connected node and it will look like it came from you. So maybe that's what they are doing here. To be clear, though, the coins still go to the address in the generation transaction, so they can't steal your coins. It just makes it look like the block came from a different IP. I still don't think that applies here.
|
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 05:48:47 PM |
|
How do you know it's not just relaying someone's blocks ? How do you know it's not just mining some blocks ? Well, 1) I suspect that you still don't believe us about how the block relaying and blockchaininfo's IP detection works. 2) Some of those blocks were mined by Deepbit and other pools. So I think that this is just a well-connected node. you are free to proof what you say. not a personal thing but without any proof of what you did say you did say nothing.
|
|
|
|
niko
|
|
September 28, 2012, 05:51:18 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
On the question of is it possible, yes it is theoretically possible to see a block submitted to the network and then publish that block quickly from a highly connected node and it will look like it came from you. So maybe that's what they are doing here. To be clear, though, the coins still go to the address in the generation transaction, so they can't steal your coins. It just makes it look like the block came from a different IP. I still don't think that applies here. How would this attacker get the private key to spend block reward?
|
They're there, in their room. Your mining rig is on fire, yet you're very calm.
|
|
|
RodeoX
Legendary
Offline
Activity: 3066
Merit: 1147
The revolution will be monetized!
|
|
September 28, 2012, 05:52:09 PM |
|
The BitThief exploit allows someone to 'leech' from the BitTorrent network without actually contributing resources yourself.
Is it possible that they are using a similar exploit to leach block discoveries from the bitcoin network without actually doing any mining on their own?
That could explain how they are getting so much hashpower (i.e. they don't really have it).
On the question of is it possible, yes it is theoretically possible to see a block submitted to the network and then publish that block quickly from a highly connected node and it will look like it came from you. So maybe that's what they are doing here. To be clear, though, the coins still go to the address in the generation transaction, so they can't steal your coins. It just makes it look like the block came from a different IP. I still don't think that applies here. What if I did this as a member of a mining pool? Could I then claim that I contributed to the network and deserve a share of the reward? Any one checking the facts would see that the block originated from my IP, right?
|
|
|
|
apetersson
|
|
September 28, 2012, 06:05:15 PM |
|
so there is some "proof" that ETHZ is not doing the mining but only acting as a relay and is being detected as the "origin" take a look at this address: http://blockchain.info/address/13XgASZP7N6pTMeyS5Sq8JeuCAkNzefnT7some blocks relayed by this host 82.130.102.160 generate output to this address. other blocks are more often reported as 50BTC so for me the conclusion is that this is just a very well-connected node, relaying block from regular nodes fast enough that they get them attributed. which makes sense from an academic point of view. propably they are trying to gather some metrics or maybe they are trying to do hashtable pollution of some sort which seems to be on their list of hobbies. so nothing to worry about.
|
|
|
|
Yolocoin
Member
Offline
Activity: 70
Merit: 10
|
|
September 28, 2012, 06:19:13 PM |
|
You guys do realize that what they're doing is just the free market at work...
|
|
|
|
|
symbot
Member
Offline
Activity: 118
Merit: 10
Nobody accepts bitcoin on the moon.
|
|
September 28, 2012, 06:31:42 PM |
|
Up until a little over 2 years ago I worked at ETH in Zurich. I was in engineering and not computer science or informatics, so I don't know anything specific about what might be going on, but this is what came to my mind while reading this thread...
1) All students and staff at ETHZ can readily get free access to supercomputing resources for research purposes. There is a lot of computing power there that sits idle most of the time.
2) The University also has a very fast internet connection that can be exploited by p2p applications. The example I have of this is that we were allowed to use Skype on our computers, but we were told to always shut it down and exit completely when we weren't using it. If we left it running on our computers it wouldn't be long before our fast internet connection and computer were being used by Skype's network as a "supernode" which would generate unnecessary traffic.
So, 1) implies it is possible that they are actually mining, but 2) means it could also be the case that somebody left their bitcoin client open on an ETHZ computer and it has become a supernode.
This post does not actually contain any useful new information.
|
|
|
|
makomk
|
|
September 28, 2012, 06:43:05 PM |
|
On the question of is it possible, yes it is theoretically possible to see a block submitted to the network and then publish that block quickly from a highly connected node and it will look like it came from you. So maybe that's what they are doing here.
Almost certainly. I've decompiled the Python code in snoopy.tar.bz2 from that web server and that appears to be exactly what it's doing.
|
Quad XC6SLX150 Board: 860 MHash/s or so. SIGS ABOUT BUTTERFLY LABS ARE PAID ADS
|
|
|
Gyrsur (OP)
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
|
September 28, 2012, 06:48:40 PM |
|
On the question of is it possible, yes it is theoretically possible to see a block submitted to the network and then publish that block quickly from a highly connected node and it will look like it came from you. So maybe that's what they are doing here.
Almost certainly. I've decompiled the Python code in snoopy.tar.bz2 from that web server and that appears to be exactly what it's doing. but why?
|
|
|
|
SgtSpike
Legendary
Offline
Activity: 1400
Merit: 1005
|
|
September 28, 2012, 06:51:33 PM |
|
So out of the list of blocks relayed by that IP, how many were generated by known mining pools?
|
|
|
|
mc_lovin
Legendary
Offline
Activity: 1190
Merit: 1000
www.bitcointrading.com
|
|
September 28, 2012, 06:51:47 PM |
|
You'd think they would make more bitcoin simply by mining.
It's an interesting experiment, but IMHO they must be stopped at all costs.
Now, if a person orders twenty of the 1TH/s BFL rigs, could they not do the same thing?
|
|
|
|
phillipsjk
Legendary
Offline
Activity: 1008
Merit: 1001
Let the chips fall where they may.
|
|
September 28, 2012, 06:56:57 PM |
|
You'd think they would make more bitcoin simply by mining.
It's an interesting experiment, but IMHO they must be stopped at all costs.
Now, if a person orders twenty of the 1TH/s BFL rigs, could they not do the same thing?
I believe those cost $30,000x20=$600,000. I brought up a temporary CPU miner, but it has yet to catch up to the block-chain.
|
James' OpenPGP public key fingerprint: EB14 9E5B F80C 1F2D 3EBE 0A2F B3DE 81FF 7B9D 5160
|
|
|
gmaxwell
Moderator
Legendary
Offline
Activity: 4270
Merit: 8805
|
|
September 28, 2012, 06:58:17 PM |
|
So out of the list of blocks relayed by that IP, how many were generated by known mining pools?
There are several BTC guild blocks in there, also 50btc. Jesus. Why does everyone freak out stupidly every time someone notices an instance of a bunch of misreported blocks on blockchain.info. The blockchain.info relayed from fields are frequently wrong and if you understand how it works you won't be surprised by this. I've locked this thread. The relaying activity of 82.130.102.160 is interesting; but it's almost certainly not mining blocks at all. Start a new thread that doesn't begin with the erroneous assumption that the blockchain.info relayed by field means anything reliable please.
|
|
|
|
|