eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 09, 2012, 07:31:31 AM |
|
The problem was when things changed, he didn't. ... From an ASIC point of view, it will soon be moot anyway.
Or perhaps I just don't show my hand? (except for the occasional joke).
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 09, 2012, 07:32:27 AM Last edit: October 09, 2012, 08:15:40 AM by eldentyrell |
|
I really shouldn't encourage this tinfoil asshattery, but... The core uses code that would violate copyrights if revealed - This is probably the most likely.
No. And there have been offers for unrestricted-but-not-open-source bistreams, which conflicts with your theory. However it isn't written in an existing/public HDL, so it's not going to be much use to people without the compiler. But none of this is really the main point. The core does things in addition to what is advertised - It is entirely possible
This is exactly why 100% of the software on the host computer is (at minimum) "visible source". Much of it is public domain. You send the work-to-be-signed to the server in cleartext and the encrypted nonces you send for decryption are exactly 32 bits -- no room for leaking information; you'd notice a mismatch between the number of encrypted nonces sent and valid nonces received. Remember, the client-side software is completely under your control. Go ahead, read the code. Experiment with it if you like. I'm going to have to go out on a limb here and just say that I feel there is something shady going on with this whole operation.
Ask the numerous third parties who have verified performance on several different boards (click the "confirmed" links). the logical thing to do would be to accept the bounties
Well, I'll admit, there is one totally illogical motive: the "bitstream that processes only signcrypted work" is, as far as I can tell (and I've researched this pretty extensively) a completely novel mechanism for making a profit off of something that is easy to copy. Some people throw around the term "DRM", but nothing here really enforces any "rights" -- the bitstream does exactly what I advertise it does: search for hash collisions in signcrypted jobs and I can't limit/revoke/etc your ability to use it for that purpose (or any other, but that's the only useful purpose it has). This is different from DRM, which seeks to limit your ability to use or copy some work. Combined with the fact that bitcoin mining provides a way to turn compute cycles into money in a more direct way than ever before, it's pretty new. Seeing how it plays out and having a working example of this scheme in operation to point to is something I get enjoyment from. Totally illogical enjoyment. Casascius (dammit, I'm sure I'm misspelling his name, is there a mnemonic for it?) can surely make a lot more money doing something other than putting physical bitcoins into circulation, but I'd hazard a guess that seeing them float around brings him some illogical enjoyment. obviously there is some hidden reason we don't know about that is preventing ET from open sourcing this bit stream.
Nope. But any halfway-sane businessperson should immediately understand why I will not engage in public, multilateral bargaining on a web forum. Come on, man, this is negotiations 101. You know this stuff. Last of all I am immensely skeptical of the timetable people are assuming for custom mining ICs. Yeah, sure, things might unravel on schedule -- but the odds are against it. I also doubt that this will play out the way people think it will, although make no mistake it will play out eventually.
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
kano
Legendary
Offline
Activity: 4620
Merit: 1851
Linux since 1997 RedHat 4
|
|
October 09, 2012, 09:48:31 AM |
|
... As for all companies: You have to trust them or just don't use their software ....
Incorrect All the software I use on my desktop except for the nVidia driver is open source. No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue.
|
|
|
|
BR0KK
|
|
October 09, 2012, 01:09:27 PM |
|
Incorrect All the software I use on my desktop except for the nVidia driver is open source. No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue. then you have to trust the open source programers not to code bullshit into it
|
|
|
|
Luke-Jr
Legendary
Offline
Activity: 2576
Merit: 1186
|
|
October 09, 2012, 01:18:47 PM |
|
Incorrect All the software I use on my desktop except for the nVidia driver is open source. No trust issue with anything I use - just a 'lazy' or 'not lazy' (to read the code) issue. then you have to trust the open source programers not to code bullshit into it Or, more likely, trust that the number of other third-party developers who have reviewed the code would have caught anything stupid. My main system is 100% open source, except for BIOS and firmware. Yay for Intel APUs. My Radeon GPUs can be locked down nicely inside KVM.
|
|
|
|
wizkid057
Legendary
Offline
Activity: 1223
Merit: 1006
|
|
October 09, 2012, 07:52:14 PM |
|
*snip* The core does things in addition to what is advertised - It is entirely possible
This is exactly why 100% of the software on the host computer is (at minimum) "visible source". Much of it is public domain. You send the work-to-be-signed to the server in cleartext and the encrypted nonces you send for decryption are exactly 32 bits -- no room for leaking information; you'd notice a mismatch between the number of encrypted nonces sent and valid nonces received. Remember, the client-side software is completely under your control. Go ahead, read the code. Experiment with it if you like. *snip* Well, because the work itself is encrypted before the FPGA sees it, you can obviously shift in any data to the FPGA. And you're pretty clever. I personally can think of at least a couple of ways to sneak bits out through the encrypted nonces almost every time, at the expense of minor amounts of processing on the server side. We all know that the average nonce found is below the half-way point (mainly due to discarded work), and that should give a hint. Hell, I'll give you one of my possible ways, just so you can't say it can't be done. Each time the FPGA finds a nonce, if there are two or more leading 0's, the first is set to 1 indicating sneaky work. The remaining are set to the bits to be sneaked out. The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits. At most a few dozen hashes. Even at the rate a full nonce could be sneaked out this way, its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc. I estimate that this specific method could be used to get at most about 5-10MH per LX150 if done fully. Far more if done partially (ie: reducing the nonce search window by a factor of 2^16 or so for your own hardware... which could make a normal CPU able to mine at profitable speeds with enough LX150s sneaking out partial nonces.) In addition to the commission work planned, this could be almost profitable. There are better methods, and I didn't say a lot of data could be sneaked out, but, you can't say it can't be done. And unless the source is available, you can't prove that it isn't being done. -wk
|
|
|
|
cablepair
|
|
October 14, 2012, 02:11:02 AM |
|
Elden, I hope you are doing well, I just heard this amazing story about open source hardware on NPR, I really think you should listen to the NPR story and then watch the TED talk. http://www.npr.org/2012/05/18/152872160/can-we-open-source-hardwareThis guy has who happens to have a PHD in fusion physics engineered and designed open source hardware to build a self sustaining village with locally sourced and even recycled materials - he not only released the schematics but also has a wiki with full instructions - at any rate in the NPR story he gives some excellent points on why open source is so important. Feel free to respond privately or publicly after you listen to it. thanks! Tom
|
|
|
|
Keninishna
|
|
October 14, 2012, 03:33:39 AM |
|
ET plz release bitstream for cairnsmore1 boards, ty.
|
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 16, 2012, 05:37:49 PM |
|
My Radeon GPUs can be locked down nicely inside KVM. And you've audited the KVM firmware? That would be the more appropriate analogy.
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 16, 2012, 05:38:23 PM Last edit: October 16, 2012, 05:48:41 PM by eldentyrell |
|
ET plz release bitstream for cairnsmore1 boards, ty.
The bitstream for enterpoint boards was released months ago. The only issue is the software drivers. Ask Enterpoint for those. The ModMiner manufacturer wrote a driver for their board; Enterpoint is dragging their feet. I have a partially-completed but non-working driver written by ChrisP. If they want that code as a starting point I'll send it to them. ChrisP has not responded to my emails for more than two weeks now, so my offer to share commissions -- which was clearly and explicitly conditional on his code working -- does not apply yet, although I hasten to add that if he reappears and finishes the job I'll be happy to reinstate it. If we wind up with some solution that is a hybrid of his code and somebody else's I'll figure out some commission-sharing arrangement based on how much work it took to finish the job.
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 16, 2012, 05:44:44 PM |
|
The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits. ... its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc.
No. This is the double compression fallacy. The only way this works is by my servers doing part of the hashing work, in which case… what the heck is the point?
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
Luke-Jr
Legendary
Offline
Activity: 2576
Merit: 1186
|
|
October 16, 2012, 05:48:37 PM |
|
My Radeon GPUs can be locked down nicely inside KVM. And you've audited the KVM firmware? That would be the more appropriate analogy. KVM is open source software.
|
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 16, 2012, 05:49:11 PM |
|
My Radeon GPUs can be locked down nicely inside KVM. And you've audited the KVM firmware? That would be the more appropriate analogy. KVM is open source software.And your hard drive's firmware?
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
eldentyrell (OP)
Donator
Legendary
Offline
Activity: 980
Merit: 1004
felonious vagrancy, personified
|
|
October 16, 2012, 06:02:19 PM |
|
By the way, wizkid, if you're worried about your hardware's firmware spying on you, you'd better not read Ken Thompson's lecture about self-infecting compilers. You won't be able to sleep at night
|
The printing press heralded the end of the Dark Ages and made the Enlightenment possible, but it took another three centuries before any country managed to put freedom of the press beyond the reach of legislators. So it may take a while before cryptocurrencies are free of the AML-NSA-KYC surveillance plague.
|
|
|
wizkid057
Legendary
Offline
Activity: 1223
Merit: 1006
|
|
October 16, 2012, 08:32:58 PM |
|
The server performs the needed hashes to determine which bits of the nonce are the correct bits to be sent back to the user and keeps the sneaky bits. ... its still quick enough for a share or so per minute of normal mining, OR it could be used for a speed boost for your own setup finding a valid nonce through other means by eliminating work exponentially, then the next encrypted work abort that sneak, etc etc.
No. This is the double compression fallacy. The only way this works is by my servers doing part of the hashing work, in which case… what the heck is the point? First, this isn't a compression fallacy. You have the bulk of the data already (the work) and you're matching up a hash based varying a small portion of that data. This is no different, really, than some forms of advanced memory correction. Please examine what I write before passing summary judgement on it in an effort to devalue my post. I have significant experience with hardware development, embedded systems cryptography, and other related fields. I wouldn't bother posting something that didn't make sense or could be so easily discredited. Now, for example, using my method in my previous post, to get a nonce decrypted server side, you would hash the work with the decrypted nonce in place to determine if it is: - a) a valid share that achieves difficulty 1 or better, if so send that back to the client (no sneaky data gained) or
- b) if it isn't a valid share, that means that there is probably sneaky data bits starting at the MSB, so strip bits starting with the most significant bit and hash (up to a max of 32 times) to find the nonce that the client actually wanted which meets the share target, which will also tell you how many bits of data were sneaked out.
So, in case "b" lets say you strip off 4 bits before you find the nonce that meets the client's target for their work. Well, you now have 4 bits of data from the chip that you didn't have before ((decryptednonce & 0xF0000000)>>28), and the client has their valid nonce (decryptednonce & 0x0FFFFFFF). Repeat this for additional encrypted nonces from the same chip and eventually you'll get the data you desire back from the chip. The data could really be any length, as long as time isn't an issue. Now, assuming the data desired is a bitcoin mining nonce for a work of your own, you'll have a time frame in which that needs to be returned, generally about two minutes. Now, its entirely possible that you'll get the full 32-bit nonce back in that time frame. However, it's possible that you may not get it quickly enough to be useful. So, here's what you do. Lets say its 75 seconds to the deadline and you have only 8-bits of the nonce. Well, now you've dropped the nonce search range from 32-bits to 24-bits. 2^24 is only ~16M remaining possibilities. Well, a single CPU can scan that in less than the remaining 45 seconds left on the work. And you've basically taken a CPU miner by a factor of 256. So, a 1MH/sec CPU can mine that share at the equivalent of 256MH/sec thanks to the chunk of data gleamed from the remote chip. Do this with enough 3rd party boards feeding data, and you've got yourself a decent pay stream. And my example above is only based on sneaking 8 bits of the 32-bits out of the chip before getting the share with a CPU... lets say you get 10-bits out. (Its actually quite possible to get far past the half way points on average.) At 10-bits your 1MH/sec could mine that share at the equivalent of 1GH/sec. 1024x normal speed. On a CPU. Again, with enough end users you could potentially get some pretty decent returns, on avg. If any more clarification is needed on this, I'll provide a step by step example, but I'd hope that I got the concept across this time. But suffice it to say, this is definitely possible. And since we have no way to verify that this is not what's going on, then it is possible that this is what is going on in the TML bitstreams. Sure, there are plenty of other closed-source firmwares in commercial hardware. However, it must be noted that there is so much more potential for sneakiness here in particular because of the potential for direct profit. To cite your particular example of a hard drive's firmware, this wouldn't really work because the hard drive's firmware doesn't have an internet connection. Perhaps if the designer hid a Wifi chip on the board, then maybe, but that would be a blatant and obvious violation there. There is also a difference in hardware/firmware from a trusted commercial entity and the TML bitstream. If Western Digital hides something detrimental in my hard drive's firmware, they can be held accountable for that. This bitstream on the other hand... So, while I personally don't care if you open source the bitstream or not. It's obvious you're not, so, I'm not concerned. Especially with alternatives right around the corner. I'm just making sure that everyone who uses this bitstream does so with the understanding that they may be utilizing and wearing their hardware more than they're bargaining for, and only because of the signcryption/closed source/etc. And we all have to admit, there is a lot of shadiness that goes on in the Bitcoin community. -wk
|
|
|
|
Keninishna
|
|
October 16, 2012, 11:05:09 PM |
|
ET plz release bitstream for cairnsmore1 boards, ty.
The bitstream for enterpoint boards was released months ago. The only issue is the software drivers. Ask Enterpoint for those. The ModMiner manufacturer wrote a driver for their board; Enterpoint is dragging their feet. I have a partially-completed but non-working driver written by ChrisP. If they want that code as a starting point I'll send it to them. ChrisP has not responded to my emails for more than two weeks now, so my offer to share commissions -- which was clearly and explicitly conditional on his code working -- does not apply yet, although I hasten to add that if he reappears and finishes the job I'll be happy to reinstate it. If we wind up with some solution that is a hybrid of his code and somebody else's I'll figure out some commission-sharing arrangement based on how much work it took to finish the job. From what I remember the reason chrisp stopped development was because the DCM was failing to lock which is an inherent hardware flaw and the current working enterpoint bitstreams either implement another clock source or a watchdog.
|
|
|
|
Borzoi
Newbie
Offline
Activity: 54
Merit: 0
|
|
October 17, 2012, 04:11:04 PM |
|
Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation. That is less than week of consulting income. How many hours spent developing? How much mining does Tyrell do with bitstream?
Dr. Tyrell may have to rely on Zhou to make eyes, but he has assembled his own hardware that uses bitstream. He has healthy advantage that mob needs to understand before price of open-sourcing software is smart move on his part.
Want is different than deserve or earn.
|
|
|
|
ShadesOfMarble
Donator
Hero Member
Offline
Activity: 543
Merit: 500
|
|
October 17, 2012, 07:39:21 PM Last edit: October 17, 2012, 07:54:20 PM by ShadesOfMarble |
|
Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation. Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?) Do you know what's not adequate for sure? Calling us "mob". Looking at your signature it seems like you need to brag about things - just FYI, I'm currently making a master degree in physics.
|
|
|
|
RicRock
|
|
October 17, 2012, 07:50:17 PM |
|
Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation. Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?) +1
|
|
|
|
Borzoi
Newbie
Offline
Activity: 54
Merit: 0
|
|
October 17, 2012, 09:51:07 PM |
|
Is interesting, with such imperfect information, that angry mob assumes 700btc (7700 dollars?) is adequate compensation for Dr. Tyrell's time and creation. Well, 700 BTC may not be adequate, but it's more than getting almost nothing from commissions. (Are commissions actually enabled currently?) Do you know what's not adequate for sure? Calling us "mob". Looking at your signature it seems like you need to brag about things - just FYI, I'm currently making a master degree in physics. I am not good at discerning some humor in English, so I do not know if you are making joke about bragging. My joking is my drop-out of law school. Point is, don't take self so seriously. If you are not joke, then apologies for confusing you. The imperfect information is exactly and precisely demonstrated by primary statement. Is commission Dr. Tyrell's means of making money from bitstream? That is big assumption. We know he is working on project, and he has said he devotes time to project at expense of miner. If project uses bitstream IP and makes more than 700btc, then no point to open source at this time. At least two sides to every issue. I am trying to think of Dr. Tyrell's motivation for not release open source. Seems most obvious case. I claim mob because much anger directed by many people who have no claim to Dr. Tyrell. Other word better, is fine. It is appropriate to my eyes.
|
|
|
|
|