manfred
Legendary
Offline
Activity: 966
Merit: 1001
Energy is Wealth
|
|
September 11, 2013, 05:08:03 PM |
|
|
|
|
|
ElectricMucus
Legendary
Offline
Activity: 1666
Merit: 1057
Marketing manager - GO MP
|
|
September 11, 2013, 08:13:32 PM |
|
3) Robotic mosquito flying behind your head
I'm living under constant fear that this happens day in and day out, how do I keep going?
|
|
|
|
MoneyMorpheus
|
|
September 11, 2013, 09:05:45 PM |
|
3) Robotic mosquito flying behind your head
I'm living under constant fear that this happens day in and day out, how do I keep going? Kill all the mosquitoes at sight and you should be safe
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 11, 2013, 11:45:23 PM |
|
Or, they were reading the email as you typed it using
1) Rootkit 2) Tempest 3) Robotic mosquito flying behind your head
1. Not likely. Email composed and encrypted offline. Also got tools for this, GMER, etc. 2. Not likely. Faraday cage and all that. 3. Not likely. All insects don't get past the door and air filters. Of course, it's still possible. Just not likely. @gmaxwell, nice post. I almost understood everything. hehehe.
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 11, 2013, 11:51:43 PM |
|
all their needs could be handled on 10 year old XP machines or even just a couple of smartphones. I know several companies that still work with 10 year old XP (SP3) machines. Get's the job done and still runs everything new out there, just a little bit slower.
|
|
|
|
illpoet
|
|
September 12, 2013, 04:06:38 AM |
|
Are you really that naive?
Do you underestimate the brightest minds in the world? Do you believe that the minds in the NSA are somehow brighter than those outside of it? So what evidence do you have that the brightest minds in the world are not in these government agencies? A friend of mine's son has studied maths at Cambridge in the UK, he is now doing a PHD over in the US at MIT. She had her son's friend stay with her over the holiday, and told me that this girl was also studying for a PHD also. This girl is apparently ridiculously intelligent, to the point of being autistic, she has no social skills. She has already been approached by GCHQ and has done a summer placement there. She has been offered a place after completing her PHD. That's what happens in the real world, these ultra bright kids will be snapped up by places like GCHQ and NSA before they are 21, but, this forum is just like a hollow box where you all like to shout about the positives of bitcoin without ever considering the real world, so I guess none of this matters. The real world has no relevance on the internet.
|
Tym's Get Rich Slow scheme: plse send .00001 to btc: 1DKRaNUnMQkeby6Dk1d8e6fRczSrTEhd8p ltc: LV4Udu7x9aLs28MoMCzsvVGKJbSmrHESnt thank you.
|
|
|
AndrewWilliams
Full Member
Offline
Activity: 182
Merit: 100
Fourth richest fictional character
|
|
September 12, 2013, 08:53:00 PM |
|
If you have to ask, you already know the answer.
|
|
|
|
hashman
Legendary
Offline
Activity: 1264
Merit: 1008
|
|
September 13, 2013, 01:49:05 PM |
|
If you have to ask, you already know the answer.
More like, if you have to ask, you are trying to divert us from looking at secp256k1.
|
|
|
|
marcus_of_augustus
Legendary
Offline
Activity: 3920
Merit: 2349
Eadem mutata resurgo
|
|
September 14, 2013, 03:50:38 AM |
|
If you have to ask, you already know the answer.
More like, if you have to ask, you are trying to divert us from looking at secp256k1. hehe
|
|
|
|
hashman
Legendary
Offline
Activity: 1264
Merit: 1008
|
|
September 14, 2013, 09:19:37 AM |
|
Or, they were reading the email as you typed it using
1) Rootkit 2) Tempest 3) Robotic mosquito flying behind your head
1. Not likely. Email composed and encrypted offline. Also got tools for this, GMER, etc. 2. Not likely. Faraday cage and all that. 3. Not likely. All insects don't get past the door and air filters. Of course, it's still possible. Just not likely. @gmaxwell, nice post. I almost understood everything. hehehe. You seem to have your systems quite in order sir Do you mind while we stray somewhat off topic if I ask, how you authenticate your recipients public key?
|
|
|
|
Abdussamad
Legendary
Offline
Activity: 3682
Merit: 1580
|
|
September 14, 2013, 10:32:48 AM |
|
Bitcoin is one big worry after another.
|
|
|
|
AndrewWilliams
Full Member
Offline
Activity: 182
Merit: 100
Fourth richest fictional character
|
|
September 14, 2013, 05:40:15 PM |
|
Bitcoin Pakistan... holy $hit.
Something tells me NSA's computers just went off the charts, LOL
|
|
|
|
Abdussamad
Legendary
Offline
Activity: 3682
Merit: 1580
|
|
September 14, 2013, 05:42:47 PM |
|
Bitcoin Pakistan... holy $hit.
Something tells me NSA's computers just went off the charts, LOL
Why just? I've been a member of this forum for months and my site has been up for most of that time. Also there's a dedicated thread for Pakistan in the other forum.
|
|
|
|
Maidak
Legendary
Offline
Activity: 1876
Merit: 1058
Vave.com - Crypto Casino
|
|
September 14, 2013, 05:51:33 PM |
|
What if satoshi nakamoto works at nsa
|
|
|
|
FTWbitcoinFTW
|
|
September 14, 2013, 07:12:39 PM |
|
What if satoshi nakamoto works at nsa Then the USA and a small group of shadow people would take control over the next standard currency by holding 1M BTCWait...! What ?
|
Lost coins only make everyone else's coins worth slightly more. Think of it as a donation to everyone. it has lots of buttery taste..
|
|
|
becoin
Legendary
Offline
Activity: 3431
Merit: 1233
|
|
September 14, 2013, 07:43:02 PM |
|
Also, the NSA themselves rely on this encryption, do they want their secrets revealed? How can you know that NSA use SHA-256 in their own communication channels?
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 15, 2013, 07:44:24 AM |
|
You seem to have your systems quite in order sir Do you mind while we stray somewhat off topic if I ask, how you authenticate your recipients public key? I'm supposed to get their GPG fingerprint from a more secure channel, such as voice or telephone (including SMS or text messages). But these days you can do VOIP, and some chats, some video conferencing, skype, yahoo with webcam, etc. The best method, of course, is in person. Also depends on how much you should trust the other party, if it's just casual conversation or he's trying to buy something from me, I don't even bother, I just accept his public key and check later (from somewhere else, another physical internet connection from another physical location) if I got the same public key. I try to check if it's from a keyserver or his own private web page or something. Would be very hard for some bad guy to compromise all of those unless the poor guy has already been a national security level target for some time and he's been replaced by a clone or something. I can probably accept the public keys of most of the bitcoin devs, for example, and use those to communicate with them and/or verify the latest bitcoin-qt releases.
|
|
|
|
GoldSilverBitcoin
Member
Offline
Activity: 80
Merit: 10
Gold Silver Bitcoin: It's your choice
|
|
September 15, 2013, 10:16:13 AM |
|
It is, after all, the "world wide web"
|
|
|
|
marketorder
|
|
September 15, 2013, 10:25:27 AM |
|
Sh*t I thought SHA-256 was designed by aliens!
|
|
|
|
dragonkid
Member
Offline
Activity: 84
Merit: 10
|
|
September 15, 2013, 04:54:35 PM |
|
You seem to have your systems quite in order sir Do you mind while we stray somewhat off topic if I ask, how you authenticate your recipients public key? I'm supposed to get their GPG fingerprint from a more secure channel, such as voice or telephone (including SMS or text messages). But these days you can do VOIP, and some chats, some video conferencing, skype, yahoo with webcam, etc. The best method, of course, is in person. Also depends on how much you should trust the other party, if it's just casual conversation or he's trying to buy something from me, I don't even bother, I just accept his public key and check later (from somewhere else, another physical internet connection from another physical location) if I got the same public key. I try to check if it's from a keyserver or his own private web page or something. Would be very hard for some bad guy to compromise all of those unless the poor guy has already been a national security level target for some time and he's been replaced by a clone or something. I can probably accept the public keys of most of the bitcoin devs, for example, and use those to communicate with them and/or verify the latest bitcoin-qt releases. Boy you know your stuff. I got a Master Degree in Information Security and Advance Cryptography. I can confirm you are spot on.
|
|
|
|
|