dsp (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
July 27, 2011, 09:50:13 PM |
|
1. Use vanity gen to create 1TB of addresses. 2. Use Sipa's Import feature load em into the wallet. 3. Throttle bandwidth on router or install old 10baseT card.
|
|
|
|
bitlotto
|
|
July 27, 2011, 10:19:26 PM |
|
LOL, I always thought it would go: 1. Buy a cheap new still in the box computer from a store far away (in case someone is expecting you to buy one locally and rigs them all to spy on you) 2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen 3. Memorize address and private key 4. Destroy computer 5. 6. Profit!
|
*Next Draw Feb 1* BitLotto: monthly raffle (0.25 BTC per ticket) Completely transparent and impossible to manipulate who wins. TOR TOR2WEB Donations to: 1JQdiQsjhV2uJ4Y8HFtdqteJsZhv835a8J are appreciated.
|
|
|
julz
Legendary
Offline
Activity: 1092
Merit: 1001
|
|
July 28, 2011, 01:22:25 AM |
|
That's all you need Its called limited bandwidth security. (LBS)
Otherwise known as - lame and ineffective. (quite how a 10baseT NIC, which at 10Mbps is faster than most people's available upload bandwidth anyway is 'limited' I don't know) You do realize that an attacker doesn't need to suck down the entire 1TB of noise you've generated to steal money don't you? I guess it might stop a basic attack which simply tries to grab the entire wallet... but if anyone actually believed this was 'most secure' - a script which was smarter about grabbing only the private keys which correspond to some coinage would soon evolve.
|
@electricwings BM-GtyD5exuDJ2kvEbr41XchkC8x9hPxdFd
|
|
|
grue
Legendary
Offline
Activity: 2058
Merit: 1434
|
|
July 28, 2011, 02:54:51 AM |
|
2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
lol, what if the cd was tampered with? what if the cd burning software was tampered with? better idea: 1. go to github via https with triple AES 512 2. download source code 3. look at how the private/public keys are generated 4. use Schrödinger's cat to generate random data for keys (THE DICES ARE INFECTED!11!1) 5. execute the code in your head (WHAT IF INTEL/AMD RIGGED THE CHIPS?!?!?!)
|
|
|
|
Vod
Legendary
Offline
Activity: 3836
Merit: 3124
Licking my boob since 1970
|
|
July 29, 2011, 12:37:34 AM |
|
LOL, I always thought it would go: 1. Buy a cheap new still in the box computer from a store far away (in case someone is expecting you to buy one locally and rigs them all to spy on you) 2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen 3. Memorize address and private key 4. Destroy computer 5. 6. Profit! The tent needs to be lined with tinfoil, or satellites could read the data by measuring the magnetic fields emitted by the hard drives.
|
I post for interest - not signature spam. https://vod.fan - fast/free image sharing - coming Oct! Will Theymos finish his $100,000,000 forum before this one shuts down?
|
|
|
Vod
Legendary
Offline
Activity: 3836
Merit: 3124
Licking my boob since 1970
|
|
July 29, 2011, 12:41:36 AM |
|
That's all you need Its called limited bandwidth security. (LBS)
I sure wish installing a 10 Meg card limited my bandwidth. Maybe I could find a .10 meg card somewhere. You can get an older token ring card, and set up a LAN with 253 other slaves, and one proxy to the internet. Set all the other computers to generate random bit images of smurf porn and transfer via bittorrent. That would slow your network right down.
|
I post for interest - not signature spam. https://vod.fan - fast/free image sharing - coming Oct! Will Theymos finish his $100,000,000 forum before this one shuts down?
|
|
|
ctoon6
|
|
July 29, 2011, 12:53:55 AM |
|
why are we slowing down the network connection?
|
|
|
|
Sukrim
Legendary
Offline
Activity: 2618
Merit: 1007
|
|
July 29, 2011, 01:03:08 AM |
|
To make it harder/longer for an attacker to upload the wallet.dat.
|
|
|
|
ctoon6
|
|
July 29, 2011, 01:05:22 AM |
|
To make it harder/longer for an attacker to upload the wallet.dat.
would it not be easier to just not have a NIC then? might as well come up with a system where you plug a USB drive in with packets to and from 2 computers and accept or deny any packets you don't want.
|
|
|
|
Vod
Legendary
Offline
Activity: 3836
Merit: 3124
Licking my boob since 1970
|
|
July 29, 2011, 01:10:41 AM |
|
To make it harder/longer for an attacker to upload the wallet.dat.
would it not be easier to just not have a NIC then? might as well come up with a system where you plug a USB drive in with packets to and from 2 computers and accept or deny any packets you don't want. Come on, that's just STUPID.
|
I post for interest - not signature spam. https://vod.fan - fast/free image sharing - coming Oct! Will Theymos finish his $100,000,000 forum before this one shuts down?
|
|
|
Sukrim
Legendary
Offline
Activity: 2618
Merit: 1007
|
|
July 29, 2011, 01:18:06 AM |
|
"Portable transactions" though would be really nice...
Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.
|
|
|
|
ctoon6
|
|
July 29, 2011, 01:28:18 AM |
|
"Portable transactions" though would be really nice...
Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.
the client is opensource, make it happen
|
|
|
|
Sukrim
Legendary
Offline
Activity: 2618
Merit: 1007
|
|
July 29, 2011, 02:30:43 AM |
|
"Portable transactions" though would be really nice...
Just get a copy of the blockchain + allow exporting transactions in a txt file or so. Then use an online client to send this transaction(s) off.
the client is opensource, make it happen Pay me for my efforts and I'll try.
|
|
|
|
IlbiStarz
|
|
July 29, 2011, 06:06:02 AM |
|
2. Inside a tent (to prevent spys with fancy camera, spy satellites, etc) in a large field boot Live CD and run vanitygen
lol, what if the cd was tampered with? what if the cd burning software was tampered with? better idea: 1. go to github via https with triple AES 512 2. download source code 3. look at how the private/public keys are generated 4. use Schrödinger's cat to generate random data for keys (THE DICES ARE INFECTED!11!1) 5. execute the code in your head (WHAT IF INTEL/AMD RIGGED THE CHIPS?!?!?!)AHAHA THIS.
|
|
|
|
|