Bitcoin Forum
May 09, 2024, 11:21:16 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4]  All
  Print  
Author Topic: Bitcoin core developers attack BU?  (Read 3106 times)
Quickseller
Copper Member
Legendary
*
Offline Offline

Activity: 2870
Merit: 2300


View Profile
March 16, 2017, 12:37:36 AM
 #61

2 - The allegation is the blockstream core devs were behind the malicious attacks against the BU nodes this afternoon. There is also no question that Peter Todd (a blockstream core dev) did not responsibly disclose the bug that he was made aware of in the BU code.

This is not true. The bug was discovered and patched by BU devs first. Todd simply tweeted about it.
It still violates responsible disclosure principals and was very unethical.

No it doesn't because nothing was disclosed that wasn't already public. The BU devs committed a fix for that bug an hour before Todd decided to tweet about it. It was public info!
A bug/exploit by definition is public information. The fix was not yet implemented and therefore pointing to the exploit very publicly and drawing attention to the exploit was unethical.

If Peter Todd worked for any half reputable company, he would have been fired for doing this.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715253676
Hero Member
*
Offline Offline

Posts: 1715253676

View Profile Personal Message (Offline)

Ignore
1715253676
Reply with quote  #2

1715253676
Report to moderator
1715253676
Hero Member
*
Offline Offline

Posts: 1715253676

View Profile Personal Message (Offline)

Ignore
1715253676
Reply with quote  #2

1715253676
Report to moderator
Abdussamad
Legendary
*
Offline Offline

Activity: 3612
Merit: 1564



View Profile
March 16, 2017, 01:36:34 AM
 #62

2 - The allegation is the blockstream core devs were behind the malicious attacks against the BU nodes this afternoon. There is also no question that Peter Todd (a blockstream core dev) did not responsibly disclose the bug that he was made aware of in the BU code.

This is not true. The bug was discovered and patched by BU devs first. Todd simply tweeted about it.
It still violates responsible disclosure principals and was very unethical.

No it doesn't because nothing was disclosed that wasn't already public. The BU devs committed a fix for that bug an hour before Todd decided to tweet about it. It was public info!

if it was public info, it wasn't fixed because...?

They posted a fix on their git repo and that's how Todd got wind of it. So it was fixed but people hadn't downloaded the fix yet. You can't really blame Todd for this. Once a vulnerability is made public people have to scramble to get it fixed. People looking to exploit will also scramble to exploit it. It is the nature of the beast.

In other opensource projects the fix is pushed out first and later the vulnerability is spelled out to the public. In this case the vulnerability was so obvious that they couldn't hide it.

I was wrong that the BU devs found the vulnerability. It was an independent security researcher who found it and disclosed it to them privately. This is what the researcher who found the vulnerability had to say:

Quote
The problem is, the bugs are so glaringly obvious that when fixing it, it will be easy to notice for anyone watching their development process,” she said.

https://bitcoinmagazine.com/articles/security-researcher-found-bug-knocked-out-bitcoin-unlimited/?utm_content=buffer6e884&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
jonald_fyookball (OP)
Legendary
*
Offline Offline

Activity: 1302
Merit: 1004


Core dev leaves me neg feedback #abuse #political


View Profile
March 16, 2017, 01:37:56 AM
 #63

i never blamed Peter Todd.

AngryDwarf
Sr. Member
****
Offline Offline

Activity: 476
Merit: 501


View Profile
March 16, 2017, 01:59:14 AM
 #64

I was wrong that the BU devs found the vulnerability. It was an independent security researcher who found it and disclosed it to them privately. This is what the researcher who found the vulnerability had to say:

Quote
The problem is, the bugs are so glaringly obvious that when fixing it, it will be easy to notice for anyone watching their development process,” she said.

https://bitcoinmagazine.com/articles/security-researcher-found-bug-knocked-out-bitcoin-unlimited/?utm_content=buffer6e884&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

This is actually quite a good article.

But as BU is gaining traction, the BU code will come under closer and closer scrutiny, and these issues will be resolved. Those who prefer the BU future vision to the core future vision are more likely to get involved. Perhaps the article doesn't explore this possibility.

Scaling and transaction rate: https://bitcointalk.org/index.php?topic=532.msg6306#msg6306
Do not allow demand to exceed capacity. Do not allow mempools to forget transactions. Relay all transactions. Eventually confirm all transactions.
Vaskiy
Legendary
*
Offline Offline

Activity: 2618
Merit: 1105


Tontogether | Save Smart & Win Big


View Profile
March 16, 2017, 02:20:29 AM
 #65

BU doesn't have good blockchain developers team to fix it. A bug has been used to collapse the entire network. When it took around 40% support in a 24 hours time. Soon after the bug it dropped to 32% and continues. Several statements were made funny in the social Media regarding the collapse of BU.

Sadlife
Sr. Member
****
Offline Offline

Activity: 1400
Merit: 269



View Profile
March 16, 2017, 02:44:46 AM
 #66

Dont jump to conclusions man we dont actually know the exact truth Peter todd posted in his twitter account that he did not do it.
Well, if it was bitcoin core dev or some hacker sooner or later the Bug will be discovered and exploited.
I do hope that no more major flaw will be found in BU's code or if there is better fixed it already before some attacker tries to bring down the network again.
prevention is always better than cure.

         ▄▄▄▀█▀▀▀█▀▄▄▄
       ▀▀   █     █
    ▀      █       █
  █      ▄█▄       ▐▌
 █▀▀▀▀▀▀█   █▀▀▀▀▀▀▀█
█        ▀█▀        █
█         █         █
█         █        ▄█▄
 █▄▄▄▄▄▄▄▄█▄▄▄▄▄▄▄█   █
  █       ▐▌       ▀█▀
  █▀▀▀▄    █       █
  ▀▄▄▄█▄▄   █     █
         ▀▀▀▄█▄▄▄█▄▀▀▀
.
CRYPTO CASINO
FOR WEB 3.0
.
▄▄▄█▀▀▀
▄▄████▀████
▄████████████
█▀▀    ▀█▄▄▄▄▄
█        ▄█████
█        ▄██████
██▄     ▄███████
████▄▄█▀▀▀██████
████       ▀▀██
███          █
▀█          █
▀▀▄▄ ▄▄▄█▀▀
▀▀▀▄▄▄▄
  ▄ ▄█ ▄
▄▄        ▄████▀       ▄▄
▐█
███▄▄█████████████▄▄████▌
██
██▀▀▀▀▀▀▀████▀▀▀▀▀▀████
▐█▀    ▄▄▄▄ ▀▀        ▀█▌
     █▄████   ▄▀█▄     ▌

     ██████   ▀██▀     █
████▄    ▀▀▀▀           ▄████
█████████████████████████████
████████████████████████████
█████████████████████████
▀███████████████████████▀
██████▌█▌█▌██████▐█▐█▐███████
.
OWL GAMES
|.
Metamask
WalletConnect
Phantom
▄▄▄███ ███▄▄▄
▄▄████▀▀▀▀ ▀▀▀▀████▄▄
▄  ▀▀▀▄▄▀▀▀▀▀▀▀▀▀▄▄▀▀▀  ▄
██▀ ▄▀▀             ▀▀▄ ▀██
██▀ █ ▄     ▄█▄▀      ▄ █ ▀██
██▀ █  ███▄▄███████▄▄███  █ ▀██
█  ▐█▀    ▀█▀    ▀█▌  █
██▄ █ ▐█▌  ▄██   ▄██  ▐█▌ █ ▄██
██▄ ████▄    ▄▄▄    ▄████ ▄██
██▄ ▀████████████████▀ ▄██
▀  ▄▄▄▀▀█████████▀▀▄▄▄  ▀
▀▀████▄▄▄▄ ▄▄▄▄████▀▀
▀▀▀███ ███▀▀▀
.
DICE
SLOTS
BACCARAT
BLACKJACK
.
GAME SHOWS
POKER
ROULETTE
CASUAL GAMES
▄███████████████████▄
██▄▀▄█████████████████████▄▄
███▀█████████████████████████
████████████████████████████▌
█████████▄█▄████████████████
███████▄█████▄█████████████▌
███████▀█████▀█████████████
█████████▄█▄██████████████▌
██████████████████████████
█████████████████▄███████▌
████████████████▀▄▀██████
▀███████████████████▄███▌
              ▀▀▀▀█████▀
Paashaas
Legendary
*
Offline Offline

Activity: 3428
Merit: 4349



View Profile
March 16, 2017, 03:00:33 AM
 #67


Quote
the main problem for Bitcoin Unlimited, as pointed out by information security expert Andreas Antonopoulos, is that it lacks a significant development community to perform proper quality analysis. The number of developers working on Bitcoin Unlimited and Bitcoin Classic is relatively small, and the code that included the exploited vulnerability was merged after being reviewed by only one person — not a lot for security-critical code protecting people’s money

Quote
the vulnerabilities are so glaringly obvious, it is clear no one has audited their code because these stick out like a sore thumb,” she said. “I’m astounded the mining industry are running this software. But since they are, and a lot of people could get harmed, the best I can do, other than recommending they don’t use Bitcoin Unlimited, is to disclose the issues and hope they are competent enough to fix it.”

This guy knows it how BU is in deep shit, thx for sharing this article. All as expected but BU supporters are to stubborn to accept that.
Wind_FURY
Legendary
*
Offline Offline

Activity: 2912
Merit: 1825



View Profile
March 16, 2017, 01:27:23 PM
 #68

Well, maybe Ciphera is not really Eric Lombrozo? 

But his statements couldn't be more clear.

don't you think you're going a little far off the deep end with this? i don't get how anyone could treat this article as anything other than squealing.

if they have a point to make then make it in a dignified manner. if they believe core is out to 'get them' then be better people and rise above it.

Yes, you have to ask them "really? this?". There is a concentrated effort to FUD Core, divide the community and then conquer. It began with XT vs. QT. That is where the Core vs. the big blockers argument started. I am all for competition but not the dirty tricks being done from both sides.

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
hv_
Legendary
*
Offline Offline

Activity: 2506
Merit: 1055

Clean Code and Scale


View Profile WWW
March 16, 2017, 02:00:37 PM
 #69

Well, maybe Ciphera is not really Eric Lombrozo? 

But his statements couldn't be more clear.

don't you think you're going a little far off the deep end with this? i don't get how anyone could treat this article as anything other than squealing.

if they have a point to make then make it in a dignified manner. if they believe core is out to 'get them' then be better people and rise above it.

Yes, you have to ask them "really? this?". There is a concentrated effort to FUD Core, divide the community and then conquer. It began with XT vs. QT. That is where the Core vs. the big blockers argument started. I am all for competition but not the dirty tricks being done from both sides.

Who next to Bullockstream is more responsible for

 'divide the community and then conquer'

??

Carpe diem  -  understand the White Paper and mine honest.
Fix real world issues: Check out b-vote.com
The simple way is the genius way - Satoshi's Rules: humana veris _
Pages: « 1 2 3 [4]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!