Bitcoin Forum
July 03, 2024, 10:38:03 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 [617] 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 ... 2557 »
  Print  
Author Topic: NXT :: descendant of Bitcoin - Updated Information  (Read 2761544 times)
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 08:52:57 AM
 #12321

Regarding the unclaimed coins: Tomorrow is the very last day when legit owners can claim them! Hurry up!
Could you please clarify, does it have something to do with ppl who sent their BTC to 1BCN1ugdKdWd9pQ8Am9hMhtHZfmbXzxE8a after the fundraiser closed?



Such bitcoins will be sent back to original addresses.
wesleyh
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 02, 2014, 08:53:23 AM
 #12322

I already unzipped it (and the zip was deleted, can anyone give the sha256 of the file that was supposedly modified)?  (start.jar?)

You can also check the code directly in nxt/webapps/root/WEB-INF/classes/Nxt$Crypto.class

https://bitcointalk.org/index.php?topic=345619.msg4263175;topicseen#msg4263175

Can you just give the sha256 of that file?

My sha256 checksum of Nxt$Crypto.class from 0.4.8. is: 899C74705D1016435B80473BB3C12699C5A36D466E826B334FA3A2F9D58EEC3C



Thanks, it Nxt$Crypto.class in the NxtMac.app is the same. It should be safe. Is this the only file known to be modified?
swartzfeger
Full Member
***
Offline Offline

Activity: 350
Merit: 100


View Profile
January 02, 2014, 08:54:53 AM
 #12323

Can someone address this troll over on reddit? I don't know enough of the technicals to dispute his claim that aliases are going to bloat the blockchain into terabyte territory:

NXT aliases could destroy NXT adoption

Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 08:55:38 AM
 #12324

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 08:58:09 AM
 #12325

Can someone address this troll over on reddit? I don't know enough of the technicals to dispute his claim that aliases are going to bloat the blockchain into terabyte territory:

NXT aliases could destroy NXT adoption

Maybe he is not a troll, just a guy who doesn't understands crypto?
wesleyh
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 02, 2014, 09:01:05 AM
 #12326

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?

It doesn't look like the site is still functioning (even the fake download seems to time out). The same when you try to access port 3000.
Buratino
Legendary
*
Offline Offline

Activity: 1151
Merit: 1003


View Profile
January 02, 2014, 09:04:50 AM
 #12327

Regarding the unclaimed coins: Tomorrow is the very last day when legit owners can claim them! Hurry up!

Please clarify, what does it mean? Am I concerned this, if I bought Nxt on exchange?

Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 09:05:12 AM
 #12328

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?

It doesn't look like the site is still functioning (even the fake download seems to time out). The same when you try to access port 3000.

It doesn't matter. The hoster knows who paid for the hosting.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 09:05:56 AM
 #12329

Regarding the unclaimed coins: Tomorrow is the very last day when legit owners can claim them! Hurry up!

Please clarify, what does it mean? Am I concerned this, if I bought Nxt on exchange?

No. It's only for the founders who didn't claim their coins.
LiQio
Legendary
*
Offline Offline

Activity: 1181
Merit: 1002



View Profile
January 02, 2014, 09:06:32 AM
 #12330

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?

It doesn't look like the site is still functioning (even the fake download seems to time out). The same when you try to access port 3000.

I believe it's just overloaded, been issuing requests for the last couple of hours, every once in a while I get a response - believe DOS is the best we can do until Come-from-Beyond get's hitmans police ready  Wink
allwelder
Legendary
*
Offline Offline

Activity: 1512
Merit: 1004



View Profile
January 02, 2014, 09:07:15 AM
 #12331

We should check the hash of nxt.zip file or Nxt$Crypto.class file,or both?
What is the difference ?
Thanks.

 
                                . ██████████.
                              .████████████████.
                           .██████████████████████.
                        -█████████████████████████████
                     .██████████████████████████████████.
                  -█████████████████████████████████████████
               -███████████████████████████████████████████████
           .-█████████████████████████████████████████████████████.
        .████████████████████████████████████████████████████████████
       .██████████████████████████████████████████████████████████████.
       .██████████████████████████████████████████████████████████████.
       ..████████████████████████████████████████████████████████████..
       .   .██████████████████████████████████████████████████████.
       .      .████████████████████████████████████████████████.

       .       .██████████████████████████████████████████████
       .    ██████████████████████████████████████████████████████
       .█████████████████████████████████████████████████████████████.
        .███████████████████████████████████████████████████████████
           .█████████████████████████████████████████████████████
              .████████████████████████████████████████████████
                   ████████████████████████████████████████
                      ██████████████████████████████████
                          ██████████████████████████
                             ████████████████████
                               ████████████████
                                   █████████
.CryptoTalk.org.|.MAKE POSTS AND EARN BTC!.🏆
bitcoinpaul
Hero Member
*****
Offline Offline

Activity: 910
Merit: 1000



View Profile
January 02, 2014, 09:08:45 AM
 #12332

You could check both, if you want. Right now, we believe only the .class file was changed. So checking the hash on this file should be sufficient.
wesleyh
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 02, 2014, 09:09:34 AM
 #12333

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?

It doesn't look like the site is still functioning (even the fake download seems to time out). The same when you try to access port 3000.

I believe it's just overloaded, been issuing requests for the last couple of hours, every once in a while I get a response - believe DOS is the best we can do until Come-from-Beyond get's hitmans police ready  Wink

Smart thinking!
wesleyh
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 02, 2014, 09:10:30 AM
 #12334

If stolen keys were sent to 162.243.246.223, can't we just contact the hoster to know real identity of the thief and send hitmans police to him? That's not fair of coz, we r in the world of cryptoanarchy. But still?

It doesn't look like the site is still functioning (even the fake download seems to time out). The same when you try to access port 3000.

It doesn't matter. The hoster knows who paid for the hosting.

I've sent them an email, perhaps others can do the same.
jl777
Legendary
*
Offline Offline

Activity: 1176
Merit: 1132


View Profile WWW
January 02, 2014, 09:12:13 AM
 #12335

CfB

Architecture question.

All nodes run the same software, each maintaining synchronized copy of blockchain
Your reflex objection to any secondary authentication is that it can only be implemented using some sort of centralized method, defeating the robustness gained from the distributed nature.

I have been thinking about this at a high level this afternoon, so I am sure not all the details are right, but conceptually if we can implement a "centralized" type of action when all the nodes are running the same software and replicating the same dataset, then authentication could be implemented in a distributed context.

Correct or incorrect?

James

Maybe. Do u have an example of an authentication flow? The description is quite vague.

"Maybe"!!! There is hope, I am glad it wasn't the usual "impossible" response.

Forgive me if I am getting the details wrong as I have not studied the source code yet, but presumably we can guard sending of NXT with an optional authentication step. This would have to be made at the core level as hackers wouldn't be using the secure clients. Each account that wants to enable authentication would need to have an alias that relates <acct#> and <public key>, this way all nodes can do public private key so whichever node forges a block, would have access to all public keys.

There would be many possibilities if we can have a "centralized" processing done by the forging node to implement authentication. One way would be for the transaction details to be signed using a client generated private key independent from the account's passphrase and submitting the blob of bits and account# as the method for sending NXT.

The forging node would process all the encrypted blobs by retrieving the public key alias and decrypting the encrypted blob of bits

Using this approach, only a single change needs to be made to the core, namely support for accepting the  authentication encrypted send NXT commands. Also some client changes, but mostly just generating high entropy private keys. A hacker could stumble upon the passphrase for a NXT account but all he gets then is a chance to crack a public/private key that is unique to each account. Since parallel mining goes out the door and the odds of cracking two independent keys for a single account would make it so nobody would even bother.

I also think we could then make the bold (but true) claim that NXT is the most secure crypto (by far). If something, anything, like this can be done, it would go straight to the top of the requested features list. By far. I know it is probably overkill, but that is what people will want. Overkill amount of security.

Crazy or not so crazy?

James

P.S. For the truly paranoid, they can dynamically change their public key alias (say to match google authenticator) within the client software before submitting sending NXT. After sending, they can change their alias to an invalid key so no sending is possible. Of course this now opens the door for requiring securely updating aliases, but I haven't had my coffee yet and about to go offline.

http://www.digitalcatallaxy.com/report2015.html
100+ page annual report for SuperNET
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
January 02, 2014, 09:12:50 AM
 #12336

I've sent them an email, perhaps others can do the same.

I believe the hoster won't tell u the name of the guy. The victims could report this case to the police, just to see what the result will be.
CoinBuzz
Sr. Member
****
Offline Offline

Activity: 490
Merit: 250



View Profile
January 02, 2014, 09:13:24 AM
 #12337

Guys, i was away from NXT for some times.

What did happened?

Should i do something to my coins or account ?

Any news?

Join ASAP: FREE BITCOIN
BitThink
Legendary
*
Offline Offline

Activity: 882
Merit: 1000



View Profile
January 02, 2014, 09:14:22 AM
 #12338

After installing 0.4.8, there's no block except the block 0, no peer list. What's happened? There's no even bootstrap peer list? The two well know peers both went to blacklist even after I moved them to known peers.

Previous versions have correct block files included, but it seems 0.4.8 is empty.
bitcoinpaul
Hero Member
*****
Offline Offline

Activity: 910
Merit: 1000



View Profile
January 02, 2014, 09:17:02 AM
 #12339

Guys, i was away from NXT for some times.

What did happened?

Should i do something to my coins or account ?

Any news?

Get the right (!) client 0.4.8 zip file (compare with hash) and transfer your coins to a newly generated account asap.
bitcoinpaul
Hero Member
*****
Offline Offline

Activity: 910
Merit: 1000



View Profile
January 02, 2014, 09:18:36 AM
 #12340

After installing 0.4.8, there's no block except the block 0, no peer list. What's happened? There's no even bootstrap peer list?

You should/could(?) post some extra nodes into the web.xml file. You could generate a node list at: http://nxtra.org/nodes/
Pages: « 1 ... 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 [617] 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 ... 2557 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!