Bitcoin Forum
May 03, 2024, 10:33:11 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: .  (Read 1268 times)
fabrizziop (OP)
Hero Member
*****
Offline Offline

Activity: 506
Merit: 500



View Profile
.
May 31, 2016, 04:14:59 PM
Last edit: October 12, 2017, 01:44:09 AM by fabrizziop
 #1

.
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
Bitcoin mining is now a specialized and very risky industry, just like gold mining. Amateur miners are unlikely to make much money, and may even lose money. Bitcoin is much more than just mining, though!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
1714775591
Hero Member
*
Offline Offline

Posts: 1714775591

View Profile Personal Message (Offline)

Ignore
1714775591
Reply with quote  #2

1714775591
Report to moderator
Holliday
Legendary
*
Offline Offline

Activity: 1120
Merit: 1009



View Profile
May 31, 2016, 04:43:13 PM
 #2

How did you determine that Armory under etotheipi was "trusted"?

Either you read the code or you trusted the community to read the code for you or you trusted etotheipi.

You have the same options with Armory under goatpig.

If you aren't the sole controller of your private keys, you don't have any bitcoins.
achow101
Staff
Legendary
*
Offline Offline

Activity: 3388
Merit: 6578


Just writing some code


View Profile WWW
June 02, 2016, 04:08:24 PM
 #3

How did you determine that Armory under etotheipi was "trusted"?

Either you read the code or you trusted the community to read the code for you or you trusted etotheipi.

You have the same options with Armory under goatpig.

I didn't know. But as I used the software for a long time without issues I assumed I can trust him. Going from one dev to another is an extra risk.
Goatpig was one of the developers when ATI was still working on Armory. There isn't any "extra risk". You can check that it is trustworthy the same way that you would check any other open source software: examine the source code and build the software yourself.

achow101
Staff
Legendary
*
Offline Offline

Activity: 3388
Merit: 6578


Just writing some code


View Profile WWW
June 03, 2016, 11:36:25 PM
 #4

To answer your question, OP, nobody really knows.  It's basically a one-man operation at this point.
Please stop spreading misinformation. We know that you didn't get your question answered and are now butthurt. Your posts aren't doing you any favors as you are spreading misinformation and acting like an immature troll.

Armory is not a one-man operation. There are still multiple people who are actively contributing to armory, myself included.

I certainly wouldn't go rushing into downloading any new versions of Armory.
And neither would I. I follow the advised security practice of verifying the source code myself and building from source. You should do this too.

When I brought up the same topic in another thread, I eventually got a response from Mr. Goatpig himself:

https://bitcointalk.org/index.php?topic=1494369.msg15056227#msg15056227

All I can suggest it, when goatpig puts out his tip cup and says "pls" don't be surprised if he doesn't get the money he desires, says "fuck this shit" and releases a malicious Armory in the future

Good luck.
Maybe you missed the first part of his statement when he addresses the security:

Don't trust me, review the code and build it yourself. This is open source, you've got that opportunity, don't let it go to waste.

If you can't read code, find someone you trust that did it for you.

If you can't do either, you are at my mercy. Deal with it.

If you can't follow that advice where he EXPLICITLY says "Don't trust me" and you don't do anything else to verify that nothing is malicious, then that is your own fault. If he were to release a malicious Armory version, then the other people who work on armory such as myself, droark, josephbisch, fanquake, etc, would notice that he inserted malicious code into the software. If he did it in the binary and not the git source, then simply following the advice of "review the code and build it yourself ... [or] find someone you trust that did it for you" would protect you from such actions.

We are also working on a system similar to Bitcoin Core's gitian builds which will ensure that the binaries are built from the source code that it is supposed to be built from.

Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
June 03, 2016, 11:50:00 PM
 #5

We are also working on a system similar to Bitcoin Core's gitian builds which will ensure that the binaries are built from the source code that it is supposed to be built from.

I'm looking forward to this feature; Bitcoin broke new ground with using deterministic builds, and so it's only right that Armory would take up the mantle similarly. I build Armory from the source code myself also, and so don't really need the feature as such (although I'd be happy to contribute my own signatures to help confirm the veracity of official builds to the wider userbase). Another approach might be to try to get Gentoo or ArchLinux interested in packaging Armory for use with their automated client-side compilation, but likely too niche as OS's to cater to if it involved alot of work. Getting Armory into sw repos in general should be an aim IMO, but that's another conversation.

Vires in numeris
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1345

Armory Developer


View Profile
June 04, 2016, 08:00:33 PM
 #6

To answer your question, OP, nobody really knows.  It's basically a one-man operation at this point.

I certainly wouldn't go rushing into downloading any new versions of Armory.

When I brought up the same topic in another thread, I eventually got a response from Mr. Goatpig himself:

https://bitcointalk.org/index.php?topic=1494369.msg15056227#msg15056227

All I can suggest it, when goatpig puts out his tip cup and says "pls" don't be surprised if he doesn't get the money he desires, says "fuck this shit" and releases a malicious Armory in the future

Good luck.

I'm not sure where you come from or why you think you have a leg to stand on in this matter.

If you've run Armory 0.92 or later, you have run my code. I've contributed over 2/3rd of the public code changes since 0.92.

0.93 is essentially my solo work, the other 5 devs were busy with closed source enterprise code. I was the defacto open source maintainer for over a year before ATI shut down development. If you had participated to the 0.93 and 0.94 testing phases you would have known that.

Quote
I mean, I didn't see any signed messages from etotheipi handing over the project to goatpig.

https://bitcointalk.org/index.php?topic=1351792 (https://bitcointalk.org/index.php?topic=1351792) doesn't have any signatures.

I can't upgrade to a new version if I can't figure this out.

As for this question. Again, this is an open source project, (now 100%) community managed, so your best alternative is to read the code and build it yourself, or at least find a member of the community you trust that does that for you.

For what it's worth, I have yet to submit a commit that touches crypto or wallets in a significant way. You can verify this by checking the commit history on PyBtcWallet.py, PyBtcAddress.py, MultisigUtils.py and Transaction.py in the armoryengine folder (https://github.com/goatpig/BitcoinArmory/tree/master/armoryengine)

The EncryptionUtils.h/cpp files and the entire cryptopp folder are untouched as well. You could hash these and verify them against the code in 0.93 if you don't like to go through commits.

As for the new wallets, I'll keep them in separate code files and let both the old and the new format coexist in Armory for quite a while. I have no need to force users onto the wallet format I'll write for BIP32/44 support, nor do I want to blur the change history in the code base.

While it's fairly easy to verify by yourself that I haven't touched any of the crypto sensitive code in 0.94 and upcoming 0.95 (most of the changes are performance and paradigm changes around the DB, the blockchain parser code), you should review or get someone to review 0.96, which will introduce the new wallet format.

This version will have significant amount of new code dealing with crypto. However it will coexist for a while with the untouched 0.93 wallet format, so you can choose to ignore those for a while as long as you don't create a wallet with the new format (I don't intent to remove any of the old format functionality for a while, rather slowly deprecate them).

I'm looking forward to this feature; Bitcoin broke new ground with using deterministic builds, and so it's only right that Armory would take up the mantle similarly. I build Armory from the source code myself also, and so don't really need the feature as such (although I'd be happy to contribute my own signatures to help confirm the veracity of official builds to the wider userbase). Another approach might be to try to get Gentoo or ArchLinux interested in packaging Armory for use with their automated client-side compilation, but likely too niche as OS's to cater to if it involved alot of work. Getting Armory into sw repos in general should be an aim IMO, but that's another conversation.

My preferred route is to split Armory into a set of stand alone libraries. I will start with the crypto code, i.e. isolate cryptopp and EncryptionUtils.h/cpp in its own repo, move to cmake for makefiles/msvs projects and dynamically link to it.

Since that will be all C++ with no need for C++11 support, it will be the first candidate for deterministic build. The new wallet code will be delivered that way too, in its own repo with its own fresh code files and dynamically linking to the crypto lib.

With deterministically built shared libraries, I'm thinking of signing the hash and hardcoding both hash and sig into the code base (i.e. have binaries hash and check the sig for the shared libs before loading them), but that's an egg and chicken problem with the crypto lib (you need the crypto methods to hash and check sigs) so I'm still wondering if that's possible/desirable.

RoadStress
Legendary
*
Offline Offline

Activity: 1904
Merit: 1007


View Profile
June 05, 2016, 01:33:19 PM
 #7

Very mature and decent way of approaching things. Thank you very much for everything!

Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
June 05, 2016, 08:01:45 PM
 #8

I'm looking forward to this feature; Bitcoin broke new ground with using deterministic builds, and so it's only right that Armory would take up the mantle similarly. I build Armory from the source code myself also, and so don't really need the feature as such (although I'd be happy to contribute my own signatures to help confirm the veracity of official builds to the wider userbase). Another approach might be to try to get Gentoo or ArchLinux interested in packaging Armory for use with their automated client-side compilation, but likely too niche as OS's to cater to if it involved alot of work. Getting Armory into sw repos in general should be an aim IMO, but that's another conversation.

My preferred route is to split Armory into a set of stand alone libraries. I will start with the crypto code, i.e. isolate cryptopp and EncryptionUtils.h/cpp in its own repo, move to cmake for makefiles/msvs projects and dynamically link to it.

Since that will be all C++ with no need for C++11 support, it will be the first candidate for deterministic build. The new wallet code will be delivered that way too, in its own repo with its own fresh code files and dynamically linking to the crypto lib.

With deterministically built shared libraries, I'm thinking of signing the hash and hardcoding both hash and sig into the code base (i.e. have binaries hash and check the sig for the shared libs before loading them), but that's an egg and chicken problem with the crypto lib (you need the crypto methods to hash and check sigs) so I'm still wondering if that's possible/desirable.

An Armory repo would be a valid route too, and as for the chicken and egg issue, it's not like I'm using a separate non-openssl-calling command to check Armory package signatures/hashes today, so using the sys default crypto lib would become a case of choosing your OS responsibly (ever the case, I would argue).

Vires in numeris
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
June 06, 2016, 08:36:52 AM
 #9

Complete this sentence: Don't feed...      Cool

Vires in numeris
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!