Bitcoin Forum
April 30, 2024, 03:43:46 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 49 50 51 »
  Print  
Author Topic: Algorithmically placed FPGA miner: 255MH/s/chip, supports all known boards  (Read 119415 times)
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 09, 2012, 07:31:31 AM
 #801

The problem was when things changed, he didn't.
...
From an ASIC point of view, it will soon be moot anyway.

Or perhaps I just don't show my hand?  (except for the occasional joke).

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
1714491826
Hero Member
*
Offline Offline

Posts: 1714491826

View Profile Personal Message (Offline)

Ignore
1714491826
Reply with quote  #2

1714491826
Report to moderator
1714491826
Hero Member
*
Offline Offline

Posts: 1714491826

View Profile Personal Message (Offline)

Ignore
1714491826
Reply with quote  #2

1714491826
Report to moderator
Every time a block is mined, a certain amount of BTC (called the subsidy) is created out of thin air and given to the miner. The subsidy halves every four years and will reach 0 in about 130 years.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714491826
Hero Member
*
Offline Offline

Posts: 1714491826

View Profile Personal Message (Offline)

Ignore
1714491826
Reply with quote  #2

1714491826
Report to moderator
1714491826
Hero Member
*
Offline Offline

Posts: 1714491826

View Profile Personal Message (Offline)

Ignore
1714491826
Reply with quote  #2

1714491826
Report to moderator
1714491826
Hero Member
*
Offline Offline

Posts: 1714491826

View Profile Personal Message (Offline)

Ignore
1714491826
Reply with quote  #2

1714491826
Report to moderator
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 09, 2012, 07:32:27 AM
Last edit: October 09, 2012, 08:15:40 AM by eldentyrell
 #802

I really shouldn't encourage this tinfoil asshattery, but...


The core uses code that would violate copyrights if revealed - This is probably the most likely.

No.  And there have been offers for unrestricted-but-not-open-source bistreams, which conflicts with your theory.  However it isn't written in an existing/public HDL, so it's not going to be much use to people without the compiler.  But none of this is really the main point.


Quote
The core does things in addition to what is advertised - It is entirely possible

This is exactly why 100% of the software on the host computer is (at minimum) "visible source".  Much of it is public domain.  You send the work-to-be-signed to the server in cleartext and the encrypted nonces you send for decryption are exactly 32 bits -- no room for leaking information; you'd notice a mismatch between the number of encrypted nonces sent and valid nonces received.  Remember, the client-side software is completely under your control.  Go ahead, read the code.  Experiment with it if you like.


Quote
I'm going to have to go out on a limb here and just say that I feel there is something shady going on with this whole operation.

Ask the numerous third parties who have verified performance on several different boards (click the "confirmed" links).


Quote
the logical thing to do would be to accept the bounties

Well, I'll admit, there is one totally illogical motive: the "bitstream that processes only signcrypted work" is, as far as I can tell (and I've researched this pretty extensively) a completely novel mechanism for making a profit off of something that is easy to copy.  Some people throw around the term "DRM", but nothing here really enforces any "rights" -- the bitstream does exactly what I advertise it does: search for hash collisions in signcrypted jobs and I can't limit/revoke/etc your ability to use it for that purpose (or any other, but that's the only useful purpose it has).  This is different from DRM, which seeks to limit your ability to use or copy some work.  Combined with the fact that bitcoin mining provides a way to turn compute cycles into money in a more direct way than ever before, it's pretty new.  Seeing how it plays out and having a working example of this scheme in operation to point to is something I get enjoyment from.  Totally illogical enjoyment.

Casascius (dammit, I'm sure I'm misspelling his name, is there a mnemonic for it?) can surely make a lot more money doing something other than putting physical bitcoins into circulation, but I'd hazard a guess that seeing them float around brings him some illogical enjoyment.


obviously there is some hidden reason we don't know about that is preventing ET from open sourcing this bit stream.

Nope.  But any halfway-sane businessperson should immediately understand why I will not engage in public, multilateral bargaining on a web forum.  Come on, man, this is negotiations 101.  You know this stuff.

Last of all I am immensely skeptical of the timetable people are assuming for custom mining ICs.  Yeah, sure, things might unravel on schedule -- but the odds are against it.  I also doubt that this will play out the way people think it will, although make no mistake it will play out eventually.

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
kano
Legendary
*
Offline Offline

Activity: 4480
Merit: 1800


Linux since 1997 RedHat 4


View Profile
October 09, 2012, 09:48:31 AM
 #803

...
As for all companies: You have to trust them or just don't use their software ....
Incorrect Tongue
All the software I use on my desktop except for the nVidia driver is open source.
No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue.

Pool: https://kano.is - low 0.5% fee PPLNS 3 Days - Most reliable Solo with ONLY 0.5% fee   Bitcointalk thread: Forum
Discord support invite at https://kano.is/ Majority developer of the ckpool code - k for kano
The ONLY active original developer of cgminer. Original master git: https://github.com/kanoi/cgminer
BR0KK
Hero Member
*****
Offline Offline

Activity: 784
Merit: 500



View Profile
October 09, 2012, 01:09:27 PM
 #804

Quote
Incorrect
All the software I use on my desktop except for the nVidia driver is open source.
No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue.

then you have to trust the open source programers not to code bullshit into it Smiley


Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
October 09, 2012, 01:18:47 PM
 #805

Quote
Incorrect
All the software I use on my desktop except for the nVidia driver is open source.
No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue.
then you have to trust the open source programers not to code bullshit into it Smiley
Or, more likely, trust that the number of other third-party developers who have reviewed the code would have caught anything stupid. My main system is 100% open source, except for BIOS and firmware. Yay for Intel APUs. My Radeon GPUs can be locked down nicely inside KVM. Wink

wizkid057
Legendary
*
Offline Offline

Activity: 1223
Merit: 1006


View Profile
October 09, 2012, 07:52:14 PM
 #806

*snip*
Quote
The core does things in addition to what is advertised - It is entirely possible

This is exactly why 100% of the software on the host computer is (at minimum) "visible source".  Much of it is public domain.  You send the work-to-be-signed to the server in cleartext and the encrypted nonces you send for decryption are exactly 32 bits -- no room for leaking information; you'd notice a mismatch between the number of encrypted nonces sent and valid nonces received.  Remember, the client-side software is completely under your control.  Go ahead, read the code.  Experiment with it if you like.
*snip*

Well, because the work itself is encrypted before the FPGA sees it, you can obviously shift in any data to the FPGA.  And you're pretty clever.  I personally can think of at least a couple of ways to sneak bits out through the encrypted nonces almost every time, at the expense of minor amounts of processing on the server side. We all know that the average nonce found is below the half-way point (mainly due to discarded work), and that should give a hint.

Hell, I'll give you one of my possible ways, just so you can't say it can't be done. Each time the FPGA finds a nonce, if there are two or more leading 0's, the first is set to 1 indicating sneaky work. The remaining are set to the bits to be sneaked out.  The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits.  At most a few dozen hashes.  Even at the rate a full nonce could be sneaked out this way, its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc.

I estimate that this specific method could be used to get at most about 5-10MH per LX150 if done fully.  Far more if done partially (ie: reducing the nonce search window by a factor of 2^16 or so for your own hardware... which could make a normal CPU able to mine at profitable speeds with enough LX150s sneaking out partial nonces.) In addition to the commission work planned, this could be almost profitable.

There are better methods, and I didn't say a lot of data could be sneaked out, but, you can't say it can't be done.  And unless the source is available, you can't prove that it isn't being done.

-wk

Tips: 1LDQrLr6dPVqNJmpZm82eZVKqDFRk7ERW8
Operator of the Eligius Mining Pool - 0% Fee, SAPPLNS, GBT, Stratum, IRC+Phone Support, Share Market (coming soon), Generation payouts, and more.
Don't feed the trolls. Science Confirms: Internet Trolls Really Are Narcissistic, Psychopathic, and Sadistic (1)
cablepair
Hero Member
*****
Offline Offline

Activity: 896
Merit: 1000


Buy this account on March-2019. New Owner here!!


View Profile WWW
October 14, 2012, 02:11:02 AM
 #807

Elden,

I hope you are doing well, I just heard this amazing story about open source hardware on NPR, I really think you should listen to the NPR story and then watch the TED talk.

http://www.npr.org/2012/05/18/152872160/can-we-open-source-hardware


This guy has who happens to have a PHD in fusion physics engineered and designed open source hardware to build a self sustaining village with locally sourced and even recycled materials - he not only released the schematics but also has a wiki with full instructions - at any rate in the NPR story he gives some excellent points on why open source is so important.


Feel free to respond privately or publicly after you listen to it.


thanks!

Tom
Keninishna
Hero Member
*****
Offline Offline

Activity: 556
Merit: 500



View Profile
October 14, 2012, 03:33:39 AM
 #808

ET plz release bitstream for cairnsmore1 boards, ty.
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 16, 2012, 05:37:49 PM
 #809

My Radeon GPUs can be locked down nicely inside KVM. Wink

And you've audited the KVM firmware?

That would be the more appropriate analogy.

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 16, 2012, 05:38:23 PM
Last edit: October 16, 2012, 05:48:41 PM by eldentyrell
 #810

ET plz release bitstream for cairnsmore1 boards, ty.

The bitstream for enterpoint boards was released months ago.

The only issue is the software drivers.  Ask Enterpoint for those.  The ModMiner manufacturer wrote a driver for their board; Enterpoint is dragging their feet.

I have a partially-completed but non-working driver written by ChrisP.  If they want that code as a starting point I'll send it to them.  ChrisP has not responded to my emails for more than two weeks now, so my offer to share commissions -- which was clearly and explicitly conditional on his code working -- does not apply yet, although I hasten to add that if he reappears and finishes the job I'll be happy to reinstate it.  If we wind up with some solution that is a hybrid of his code and somebody else's I'll figure out some commission-sharing arrangement based on how much work it took to finish the job.

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 16, 2012, 05:44:44 PM
 #811

The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits.
...
its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc.

No.

This is the double compression fallacy.  The only way this works is by my servers doing part of the hashing work, in which case… what the heck is the point?

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
October 16, 2012, 05:48:37 PM
 #812

My Radeon GPUs can be locked down nicely inside KVM. Wink
And you've audited the KVM firmware?

That would be the more appropriate analogy.
KVM is open source software.

eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 16, 2012, 05:49:11 PM
 #813

My Radeon GPUs can be locked down nicely inside KVM. Wink
And you've audited the KVM firmware?

That would be the more appropriate analogy.
KVM is open source software.

And your hard drive's firmware?

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
eldentyrell (OP)
Donator
Legendary
*
Offline Offline

Activity: 980
Merit: 1004


felonious vagrancy, personified


View Profile WWW
October 16, 2012, 06:02:19 PM
 #814

By the way, wizkid, if you're worried about your hardware's firmware spying on you, you'd better not read Ken Thompson's lecture about self-infecting compilers.  You won't be able to sleep at night Smiley

The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators.  So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
wizkid057
Legendary
*
Offline Offline

Activity: 1223
Merit: 1006


View Profile
October 16, 2012, 08:32:58 PM
 #815

The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits.
...
its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc.

No.

This is the double compression fallacy.  The only way this works is by my servers doing part of the hashing work, in which case… what the heck is the point?


First, this isn't a compression fallacy.  You have the bulk of the data already (the work) and you're matching up a hash based varying a small portion of that data.  This is no different, really, than some forms of advanced memory correction.  Please examine what I write before passing summary judgement on it in an effort to devalue my post.  I have significant experience with hardware development, embedded systems cryptography, and other related fields.  I wouldn't bother posting something that didn't make sense or could be so easily discredited.

Now, for example, using my method in my previous post, to get a nonce decrypted server side, you would hash the work with the decrypted nonce in place to determine if it is:
  • a) a valid share that achieves difficulty 1 or better, if so send that back to the client (no sneaky data gained) or
  • b) if it isn't a valid share, that means that there is probably sneaky data bits starting at the MSB, so strip bits starting with the most significant bit and hash (up to a max of 32 times) to find the nonce that the client actually wanted which meets the share target, which will also tell you how many bits of data were sneaked out.

So, in case "b" lets say you strip off 4 bits before you find the nonce that meets the client's target for their work.  Well, you now have 4 bits of data from the chip that you didn't have before ((decryptednonce & 0xF0000000)>>28), and the client has their valid nonce (decryptednonce & 0x0FFFFFFF).  Repeat this for additional encrypted nonces from the same chip and eventually you'll get the data you desire back from the chip.  The data could really be any length, as long as time isn't an issue.

Now, assuming the data desired is a bitcoin mining nonce for a work of your own, you'll have a time frame in which that needs to be returned, generally about two minutes.  Now, its entirely possible that you'll get the full 32-bit nonce back in that time frame. However, it's possible that you may not get it quickly enough to be useful.  So, here's what you do.  Lets say its 75 seconds to the deadline and you have only 8-bits of the nonce.  Well, now you've dropped the nonce search range from 32-bits to 24-bits. 2^24 is only ~16M remaining possibilities.  Well, a single CPU can scan that in less than the remaining 45 seconds left on the work.  And you've basically taken a CPU miner by a factor of 256.  So, a 1MH/sec CPU can mine that share at the equivalent of 256MH/sec thanks to the chunk of data gleamed from the remote chip.  Do this with enough 3rd party boards feeding data, and you've got yourself a decent pay stream.

And my example above is only based on sneaking 8 bits of the 32-bits out of the chip before getting the share with a CPU... lets say you get 10-bits out. (Its actually quite possible to get far past the half way points on average.)  At 10-bits your 1MH/sec could mine that share at the equivalent of 1GH/sec.  1024x normal speed. On a CPU.  Again, with enough end users you could potentially get some pretty decent returns, on avg.

If any more clarification is needed on this, I'll provide a step by step example, but I'd hope that I got the concept across this time.
But suffice it to say, this is definitely possible.  And since we have no way to verify that this is not what's going on, then it is possible that this is what is going on in the TML bitstreams.

Sure, there are plenty of other closed-source firmwares in commercial hardware.  However, it must be noted that there is so much more potential for sneakiness here in particular because of the potential for direct profit. To cite your particular example of a hard drive's firmware, this wouldn't really work because the hard drive's firmware doesn't have an internet connection.  Perhaps if the designer hid a Wifi chip on the board, then maybe, but that would be a blatant and obvious violation there.  There is also a difference in hardware/firmware from a trusted commercial entity and the TML bitstream.  If Western Digital hides something detrimental in my hard drive's firmware, they can be held accountable for that.  This bitstream on the other hand...

So, while I personally don't care if you open source the bitstream or not.  It's obvious you're not, so, I'm not concerned.  Especially with alternatives right around the corner.
I'm just making sure that everyone who uses this bitstream does so with the understanding that they may be utilizing and wearing their hardware more than they're bargaining for, and only because of the signcryption/closed source/etc.  And we all have to admit, there is a lot of shadiness that goes on in the Bitcoin community.

-wk

Tips: 1LDQrLr6dPVqNJmpZm82eZVKqDFRk7ERW8
Operator of the Eligius Mining Pool - 0% Fee, SAPPLNS, GBT, Stratum, IRC+Phone Support, Share Market (coming soon), Generation payouts, and more.
Don't feed the trolls. Science Confirms: Internet Trolls Really Are Narcissistic, Psychopathic, and Sadistic (1)
Keninishna
Hero Member
*****
Offline Offline

Activity: 556
Merit: 500



View Profile
October 16, 2012, 11:05:09 PM
 #816

ET plz release bitstream for cairnsmore1 boards, ty.

The bitstream for enterpoint boards was released months ago.

The only issue is the software drivers.  Ask Enterpoint for those.  The ModMiner manufacturer wrote a driver for their board; Enterpoint is dragging their feet.

I have a partially-completed but non-working driver written by ChrisP.  If they want that code as a starting point I'll send it to them.  ChrisP has not responded to my emails for more than two weeks now, so my offer to share commissions -- which was clearly and explicitly conditional on his code working -- does not apply yet, although I hasten to add that if he reappears and finishes the job I'll be happy to reinstate it.  If we wind up with some solution that is a hybrid of his code and somebody else's I'll figure out some commission-sharing arrangement based on how much work it took to finish the job.

From what I remember the reason chrisp stopped development was because the DCM was failing to lock which is an inherent hardware flaw and the current working enterpoint bitstreams either implement another clock source or a watchdog.
Borzoi
Newbie
*
Offline Offline

Activity: 54
Merit: 0



View Profile
October 17, 2012, 04:11:04 PM
 #817

Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation.  That is less than week of consulting income.  How many hours spent developing?  How much mining does Tyrell do with bitstream?

Dr. Tyrell may have to rely on Zhou to make eyes, but he has assembled his own hardware that uses bitstream.  He has healthy advantage that mob needs to understand before price of open-sourcing software is smart move on his part.

Want is different than deserve or earn.
ShadesOfMarble
Donator
Hero Member
*
Offline Offline

Activity: 543
Merit: 500



View Profile
October 17, 2012, 07:39:21 PM
Last edit: October 17, 2012, 07:54:20 PM by ShadesOfMarble
 #818

Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation.  
Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?)

Do you know what's not adequate for sure? Calling us "mob". Looking at your signature it seems like you need to brag about things - just FYI, I'm currently making a master degree in physics.

Review of the Spondoolies-Tech SP10 „Dawson“ Bitcoin miner (1.4 TH/s)

[22:35] <Vinnie_win> Did anyone get paid yet? | [22:36] <Isokivi> pirate did!
RicRock
Sr. Member
****
Offline Offline

Activity: 290
Merit: 250



View Profile
October 17, 2012, 07:50:17 PM
 #819

Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation. 
Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?)

+1
Borzoi
Newbie
*
Offline Offline

Activity: 54
Merit: 0



View Profile
October 17, 2012, 09:51:07 PM
 #820

Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation.  
Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?)

Do you know what's not adequate for sure? Calling us "mob". Looking at your signature it seems like you need to brag about things - just FYI, I'm currently making a master degree in physics.

I am not good at discerning some humor in English, so I do not know if you are making joke about bragging.  My joking is my drop-out of law school.  Point is, don't take self so seriously.  If you are not joke, then apologies for confusing you.

The imperfect information is exactly and precisely demonstrated by primary statement.  Is commission Dr. Tyrell's means of making money from bitstream?  That is big assumption.  We know he is working on project, and he has said he devotes time to project at expense of miner.  If project uses bitstream IP and makes more than 700btc, then no point to open source at this time.

At least two sides to every issue.  I am trying to think of Dr. Tyrell's motivation for not release open source.  Seems most obvious case.

I claim mob because much anger directed by many people who have no claim to Dr. Tyrell.  Other word better, is fine.  It is appropriate to my eyes.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 49 50 51 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!