Bitcoin Forum
May 17, 2024, 03:32:26 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 [595] 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 ... 2557 »
  Print  
Author Topic: NXT :: descendant of Bitcoin - Updated Information  (Read 2761532 times)
timmyd
Hero Member
*****
Offline Offline

Activity: 714
Merit: 500


View Profile
January 01, 2014, 06:25:44 PM
 #11881

Even if it is a client issue. Wouldnt the hacker just continue to use nrs? Instead of targeting accounts thru a new client with extra security?
Will nrs always be able to connect u to ur account even if a new client comes out

New clients r supposed to generate keys with higher entropy (all 256 bits). All successful attacks were on low-entropy keys only.
Ok so when a new client arises is it reccomended that all users create new accounts? All current nrs accounts are currently at risk?
Some of these horror storys have me spooked a bit. I have a 50+ random password but still dont feel secure if im honest

Monthly profits from Www.Banxcapital.com
The safest Exchange around Www.Banx.io Fiat 2 BTC Www.Banxtrade.com
Latest Crypto News Www.Digitalmoneytimes.com

<a href="http://8857bcobvnw90aez2kvoq2wn8w.hop.clickbank.net/?tid=BB" target="_top"><img src="http://www.bonusbagging.co.uk/Banners/728x90_2.jpg" width="728" height="90" alt="Make thousands RISK FREE" border="0"/></a>
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 01, 2014, 06:27:29 PM
 #11882

Ok so when a new client arises is it reccomended that all users create new accounts? All current nrs accounts are currently at risk?
Some of these horror storys have me spooked a bit. I have a 50+ random password but still dont feel secure if im honest

If u use truly random password then u r ok. Recent horror stories r just black PR tricks.
rickyjames
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
January 01, 2014, 06:28:03 PM
 #11883

As long as I'm wishing for a shiny new security add-on that allows frozen accounts that would take NXT out of circulation, I would also note that tabulating from the blockchain just how much NXT was indeed frozen and OUT of circulation helps the market know just how much is IN circulation - and would be an upward pressure on NXT prices.
rickyjames
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
January 01, 2014, 06:31:45 PM
 #11884

Ok so when a new client arises is it reccomended that all users create new accounts? All current nrs accounts are currently at risk?
Some of these horror storys have me spooked a bit. I have a 50+ random password but still dont feel secure if im honest

If u use truly random password then u r ok. Recent horror stories r just black PR tricks.

You are probably right - but you can't be sure.   And this difference between "probably right / probably safe" and "sure / certain" is the shadow of doubt that the public mind will seize upon that will hinder widespread adaptation of NXT.  Bitcoin will always be able to claim an air gap option that we will not.  Getting ahead of this with some form of account freeze blockchain option / two step authentication scheme is the right thing to do.
laowai80
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
January 01, 2014, 06:34:22 PM
 #11885


New clients r supposed to generate keys with higher entropy (all 256 bits). All successful attacks were on low-entropy keys only.

oh wait, since which version is it all 256 bits? )
xyzzyx
Sr. Member
****
Offline Offline

Activity: 490
Merit: 250


I don't really come from outer space.


View Profile
January 01, 2014, 06:34:49 PM
 #11886

Why can't the client deal with email verification, google authenticator or even cellphone SMS
Aren't all verifications just software that runs somewhere? Why can't that somewhere be the client?

The problem with using an authenticator, in their current forms, is that they rely on a centralized point -- google, a SMS gateway, whatever.  

That, and it'd need multisig implemented.

Except the multisig, this is something that a NXT service provider could solve, I think.  I imagine it would work like this:

A group of nodes would run a parallel blockchain for the NXT2SMS functions.  These nodes would use transparent forging between themselves to maintain their N2S blockchain.  When you need to send a SMS, you would pay a fee and have a payload as an arbitrary message on the main blockchain.  The N2S nodes would notice the payload and decide who on their blockchain gets to collect the fee and transmit whatever is represented in the payload over SMS.  The one who generates the SMS is also the one who does the other side of the multisig to release the funds.

There's lots of hand-waving in the above paragraph because I don't know exactly how the core NXT functions that this is build upon will operate as they're yet to be released, but it's the general idea.

The hardware for the SMS transmission is the simple part as that already exists as an off-the-shelf solution: a smartphone or, for the more hardware hacker oriented, a GSM/GPRS module and an Arduio/RPi/etc to interface to it.

I might have overlooked something, however.

"An awful lot of code is being written ... in languages that aren't very good by people who don't know what they're doing." -- Barbara Liskov
Anon136
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
January 01, 2014, 06:36:02 PM
 #11887

I think this is the wrong way. what we need are clients that fore seamlessly, so even though the chance of winning will be minuscule, there will no no cost to forging, no barrier to entry so people will do it anyway. People pay to play the lottery now don't they? This lottery would be free to play, i think there is definitely some appeal there for users.

BCNext was forced to offer such the way coz small stakeholders won't bother with forging due to very high variation. Less coins forge - cheaper attacks.

if you just reduce the cost of forging down to ~0 than the low incentive wont matter. thats the point im trying to make. of course this can only come with time as third party developers make better client applications but this is what we should be focusing on. not pooled mining.

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
Damelon
Legendary
*
Offline Offline

Activity: 1092
Merit: 1010



View Profile
January 01, 2014, 06:36:19 PM
 #11888

Ok so when a new client arises is it reccomended that all users create new accounts? All current nrs accounts are currently at risk?
Some of these horror storys have me spooked a bit. I have a 50+ random password but still dont feel secure if im honest

If u use truly random password then u r ok. Recent horror stories r just black PR tricks.

You are probably right - but you can't be sure.   And this difference between "probably right / probably safe" and "sure / certain" is the shadow of doubt that the public mind will seize upon that will hinder widespread adaptation of NXT.  Bitcoin will always be able to claim an air gap option that we will not.  Getting ahead of this with some form of account freeze blockchain option / two step authentication scheme is the right thing to do.

Not only that. Íf there is some bad mediacoverage, we can point out that these issues have been debated amongst the stakeholders before launch and prove that we take security seriously and are also thinking beyond the scope of advanced users. I'm trying to think long term about these things as much as possible.

Member of the Nxt Foundation | Donations: NXT-D6K7-MLY6-98FM-FLL5T
Join Nxt Slack! https://nxtchat.herokuapp.com/
Founder of Blockchain Workspace | Personal Site & Blog
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
January 01, 2014, 06:36:54 PM
 #11889

CfB

all the nodes would have to cryptographically store all the seeds for all accounts in a way that each node can reconstruct the desired output, without knowing the actual seed. Probably close to impossible, but not actually provably impossible. Maybe even a nice challenge for BCNext?

We don't need to use google authenticator, we just need some system that is distributed that achieves the desired result. That's a pretty open requirement and I doubt you can prove it is impossible. If it is not impossible, then it can be done.

I would like better minds than mine to figure out how to do this. I know mathematically it is probably the same odds of being hacked, but requiring an orthogonal step even after finding an account whose password you stumbled into would make everybody feel much safer.

As it is now a monkey typing random keys on the keyboard can stumble into an acct.

James

P.S. I understand why the current localhost will disappear, it has to so clients can add the new layer of security. Enforcing passwords that are strong enough is a good first step, but longer term please open your mind to the possibility of the "impossible", it will make a huge difference in NXT valuation

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 01, 2014, 06:38:52 PM
 #11890


New clients r supposed to generate keys with higher entropy (all 256 bits). All successful attacks were on low-entropy keys only.

oh wait, since which version is it all 256 bits? )

It has been always been 256 bits.
laowai80
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
January 01, 2014, 06:39:48 PM
 #11891


New clients r supposed to generate keys with higher entropy (all 256 bits). All successful attacks were on low-entropy keys only.

oh wait, since which version is it all 256 bits? )

It has been always been 256 bits.

ok, then I guess I misunderstood.
EvilDave
Hero Member
*****
Offline Offline

Activity: 854
Merit: 1001



View Profile
January 01, 2014, 06:40:42 PM
 #11892

Quick question on the theft issue:

If someone is just running a brute force attack on the whole NXT network attempting to hit the jackpot, wont this activity be very visible in the blockchain?
Way I see it, every password generated by the brute force attack will create an account.
Can anyone (with more skillz than me) have a look at the account creation (possibly vs IP address) stats and see if something wierd is showing up?

Nulli Dei, nulli Reges, solum NXT
Love your money: www.nxt.org  www.ardorplatform.org
www.nxter.org  www.nxtfoundation.org
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 01, 2014, 06:41:06 PM
 #11893

if you just reduce the cost of forging down to ~0 than the low incentive wont matter. thats the point im trying to make. of course this can only come with time as third party developers make better client applications but this is what we should be focusing on. not pooled mining.

Good idea. As I wrote on Twitter, Pooled Forging may be added, not is being added.
EpicThomas
Newbie
*
Offline Offline

Activity: 19
Merit: 0


View Profile
January 01, 2014, 06:42:04 PM
 #11894

Quick question on the theft issue:

If someone is just running a brute force attack on the whole NXT network attempting to hit the jackpot, wont this activity be very visible in the blockchain?
Way I see it, every password generated by the brute force attack will create an account.
Can anyone (with more skillz than me) have a look at the account creation (possibly vs IP address) stats and see if something wierd is showing up?

The account will not show up in the blockchain before a transaction is made.
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
January 01, 2014, 06:44:10 PM
 #11895

Can someone test potential passwords locally without going out to the network if he has the latest blockchain?

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 01, 2014, 06:44:17 PM
 #11896

Quick question on the theft issue:

If someone is just running a brute force attack on the whole NXT network attempting to hit the jackpot, wont this activity be very visible in the blockchain?
Way I see it, every password generated by the brute force attack will create an account.
Can anyone (with more skillz than me) have a look at the account creation (possibly vs IP address) stats and see if something wierd is showing up?

Brute force attack is completely offline.
rickyjames
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
January 01, 2014, 06:44:34 PM
 #11897

CfB

requiring an orthogonal step even after finding an account whose password you stumbled into would make everybody feel much safer.

As it is now a monkey typing random keys on the keyboard can stumble into an acct.

James

P.S. I understand why the current localhost will disappear, it has to so clients can add the new layer of security. Enforcing passwords that are strong enough is a good first step, but longer term please open your mind to the possibility of the "impossible", it will make a huge difference in NXT valuation

Jl777 and I absolutely see eye to eye on all of this.
BitAddict
Legendary
*
Offline Offline

Activity: 1190
Merit: 1001



View Profile
January 01, 2014, 06:44:59 PM
 #11898

I think this is the wrong way. what we need are clients that fore seamlessly, so even though the chance of winning will be minuscule, there will no no cost to forging, no barrier to entry so people will do it anyway. People pay to play the lottery now don't they? This lottery would be free to play, i think there is definitely some appeal there for users.

BCNext was forced to offer such the way coz small stakeholders won't bother with forging due to very high variation. Less coins forge - cheaper attacks.

I don't really like pools for forging. This is like one step back to centralized system.

I know we need to do something to allow small stakeholders to forge and get fee's everyday, but not this way.
Damelon
Legendary
*
Offline Offline

Activity: 1092
Merit: 1010



View Profile
January 01, 2014, 06:45:08 PM
 #11899

CfB

requiring an orthogonal step even after finding an account whose password you stumbled into would make everybody feel much safer.

As it is now a monkey typing random keys on the keyboard can stumble into an acct.

James

P.S. I understand why the current localhost will disappear, it has to so clients can add the new layer of security. Enforcing passwords that are strong enough is a good first step, but longer term please open your mind to the possibility of the "impossible", it will make a huge difference in NXT valuation

Jl777 and I absolutely see eye to eye on all of this.

Thirded

Edit: joe also added a security page to the wiki: http://wiki.nxtcrypto.org/wiki/Account_Security

Let's hope that filters out a lot of weaker passes.

Member of the Nxt Foundation | Donations: NXT-D6K7-MLY6-98FM-FLL5T
Join Nxt Slack! https://nxtchat.herokuapp.com/
Founder of Blockchain Workspace | Personal Site & Blog
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
January 01, 2014, 06:48:29 PM
 #11900

offline mining of all NXT accounts in parallel
problem gets worse the more NXT accounts there are
this attracts more hackers the more NXT is worth
This will create an equilibrium effect like a boat anchor to a hot air balloon. The more NXT succeeds, the more it will be hacked.

CfB, tell me there is a solution that is more effective than the user needs to not be unlucky

James

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Pages: « 1 ... 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 [595] 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 ... 2557 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!