|
|
Walsoraj
|
|
September 05, 2013, 08:35:28 PM |
|
this is the beginning of the end of the universe
|
|
|
|
telemaco
|
|
September 05, 2013, 08:39:06 PM |
|
Only a brainwallet and moving to south america can save us in these moments. We can also move to a pacific ocean island, just make sure it is big enough so the sea level does not cover it all in a few years. And don't eat fish there (fukushima). Coconuts are ok.
|
|
|
|
ChartBuddy
Legendary
Offline
Activity: 2324
Merit: 1802
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ
|
|
September 05, 2013, 09:02:02 PM |
|
|
|
|
|
rampantparanoia
|
|
September 05, 2013, 09:02:24 PM |
|
this is the beginning of the end of the universe you're so dramatic. the beginning of the end started a long time ago.
|
|
|
|
Walsoraj
|
|
September 05, 2013, 09:38:02 PM |
|
|
|
|
|
derpinheimer
Legendary
Offline
Activity: 896
Merit: 1000
|
|
September 05, 2013, 09:45:49 PM |
|
May the selloffs... Begin.
Gg bitcoin
Nore.
|
|
|
|
Walsoraj
|
|
September 05, 2013, 09:46:49 PM |
|
May the selloffs... Begin.
Gg bitcoin
Nore.
I like your attitude. 1fn1 until we hit single digits
|
|
|
|
Chalkbot
Legendary
Offline
Activity: 896
Merit: 1001
|
|
September 05, 2013, 09:51:47 PM |
|
US Gov can hack bitcoin?
And your proof is a series of articles documenting that they are actively making requests to major service providers for their encrpytion keys?
Let's think about this one for 2, maybe 3 seconds. If I was US Gov, and I could defeat encryption.... why am I going around asking for keys again?
I'm not quoting you in respect to all those that have you on ignore.
|
|
|
|
|
Walsoraj
|
|
September 05, 2013, 09:54:46 PM |
|
US Gov can hack bitcoin?
And your proof is a series of articles documenting that they are actively making requests to major service providers for their encrpytion keys?
Let's think about this one for 2, maybe 3 seconds. If I was US Gov, and I could defeat encryption.... why am I going around asking for keys again?
I'm not quoting you in respect to all those that have you on ignore.
Most of the ignores come from Rpetilia's alt accounts. He has dozens to converse with himself. It creates a social environment that makes him appear to others as a genuine character. Eventually, he will earn the trust of some rich sucker and run away with lots of money. When you point this out, Rpetilia typically goes into hiding and spam ignores you with all of his accounts. *edit* hey lucas, my friend. Nice to see you back in the thread.
|
|
|
|
lucas.sev
|
|
September 05, 2013, 09:59:23 PM |
|
Walsoraj, I come when panic starts to loom on the horizon
|
|
|
|
Walsoraj
|
|
September 05, 2013, 10:00:21 PM |
|
Walsoraj, I come when panic starts to loom on the horizon Read my recent posts. you will see I'm at least a week ahead of the horizon
|
|
|
|
ChartBuddy
Legendary
Offline
Activity: 2324
Merit: 1802
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ
|
|
September 05, 2013, 10:02:08 PM |
|
|
|
|
|
Chalkbot
Legendary
Offline
Activity: 896
Merit: 1001
|
|
September 05, 2013, 10:16:05 PM |
|
You're saying they can't break encryption, right? Just so we're clear. The fact that it's a "multi-pronged" effort, involving methods like intercepting the data before it's encrypted, inserting vulnerabilities into commercial encryption software, pressuring major organizations for backdoor keys, or permission to insert code into their systems, writing clauses into the Patriot act allowing them to hold on to encrypted data forever, etc. etc., to me, says that they in fact CAN'T break encryption. If you could break encryption, you would just do it. It would be a "single-pronged" effort. Why waste time with all that other crap? Now if you legitimately believe they are brute forcing the encryption open, what kind of timeframe would you put on that? 100 years? 10? 5? How long until they can do it in less time than the time between bitcoin blocks? Would that cost less than launching World War 3 and nuking everyone into slavery?
|
|
|
|
Walsoraj
|
|
September 05, 2013, 10:20:39 PM |
|
If you could break encryption, you wouldn't tell anybody.
Other info from the latest leaks indicate only a select few know exactly which forms of encryption are cracked. See the articles i posted.
|
|
|
|
derpinheimer
Legendary
Offline
Activity: 896
Merit: 1000
|
|
September 05, 2013, 10:21:51 PM |
|
it actually says in the article that brute forcing is part of the attack.
|
|
|
|
manfred
Legendary
Offline
Activity: 966
Merit: 1001
Energy is Wealth
|
|
September 05, 2013, 10:27:50 PM |
|
Well lets put it this way would any hostile country's military use a function (SHA-256) provided by the NSA as the agency has locked themselves out? Its a bit like building a house and give everyone a key put not keep one myself.
|
|
|
|
Walsoraj
|
|
September 05, 2013, 10:29:53 PM |
|
"The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of internet users in the US and worldwide." -http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
Some juicy details left out. I bet they omitted the specific protocols that can already be brute forced easily and much quicker than assumed.
|
|
|
|
|