BTCurious
|
|
November 30, 2011, 06:59:59 PM |
|
Bwagner: I was just going to post that! That page is part of a very good introduction to the EC math. The start of that intro is here: http://www.certicom.com/index.php/10-introductionnetrin: An analogy with "baby numbers" would go somewhat like this. I have to abstract some cryptography properties though. Person A comes up with a number, say 13, and calls this private key 1. He then calculates the public key, which is (for example) "accb". This public key has the property that it can be easily calculated from the private key, but it also has the property that if you only know "accb", then there is no way to find out the private key was 13, unless you bruteforce all numbers by calculating the public key to all of them. Person B comes up with a number, say 41, and calls this private key 2. He then calculates the public key, which is (for example) "bbbb". Person A gets the public key from Person B, and adds it to his own: "accb" + "bbbb" = "cddd" Person B gets the public key from Person A, and adds it to his own: "bbbb" + "accb" = "cddd" Now they both have the public key "cddd", so they can send money to that public key. To retrieve the money, however, you need to have the private key. The private key to "cddd" is 13 + 41 = 54. But no one knows this! That's roughly how you create a private key that no one knows. I would like to note that this is NOT diffie-hellman secret generation, as far as I know! Neither party knows the private key here, and in fact, any attacker listening to the network could know the private key too. This doesn't matter too much though, since the private key is what you need to get the money. EC diffie-hellman looks similar but is slightly different. In fact it's more like what ByteCoin described early on in the thread. In order not to confuse the thread/topic, I'll just link to the wikipedia page: http://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
|
|
|
|
|
|
In order to get the maximum amount of activity points possible, you just need to post once per day on average. Skipping days is OK as long as you maintain the average.
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 07:10:11 PM |
|
Bwagner: I was just going to post that! That page is part of a very good introduction to the EC math. The start of that intro is here: http://www.certicom.com/index.php/10-introductionnetrin: An analogy with "baby numbers" would go somewhat like this. I have to abstract some cryptography properties though. Person A comes up with a number, say 13, and calls this private key 1. He then calculates the public key, which is (for example) "accb". This public key has the property that it can be easily calculated from the private key, but it also has the property that if you only know "accb", then there is no way to find out the private key was 13, unless you bruteforce all numbers by calculating the public key to all of them. Person B comes up with a number, say 41, and calls this private key 2. He then calculates the public key, which is (for example) "bbbb". Person A gets the public key from Person B, and adds it to his own: "accb" + "bbbb" = "cddd" Person B gets the public key from Person A, and adds it to his own: "bbbb" + "accb" = "cddd" Now they both have the public key "cddd", so they can send money to that public key. To retrieve the money, however, you need to have the private key. The private key to "cddd" is 13 + 41 = 54. But no one knows this! That's roughly how you create a private key that no one knows. I would like to note that this is NOT diffie-hellman secret generation, as far as I know! Neither party knows the private key here, and in fact, any attacker listening to the network could know the private key too. This doesn't matter too much though, since the private key is what you need to get the money. EC diffie-hellman looks similar but is slightly different. In fact it's more like what ByteCoin described early on in the thread. In order not to confuse the thread/topic, I'll just link to the wikipedia page: http://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93HellmanWrong thread?
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 07:10:31 PM |
|
Not really.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 07:18:46 PM |
|
Oh, ok.
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 07:24:23 PM |
|
Yeah, you see, you're not so easily fooled, I guess.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 07:26:07 PM |
|
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 07:38:37 PM |
|
Been nice talking to you though.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 07:40:44 PM |
|
You take care now.
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 07:42:36 PM |
|
Will do!
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 07:55:20 PM |
|
Okay, talk to you soon!
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 07:58:10 PM |
|
I hope not…
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 08:30:01 PM |
|
Ok. Enough is enough.
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 08:44:04 PM |
|
Sorry, what?
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 08:50:18 PM |
|
I meant to imply I wasn't going to post here any more.... But I guess that didn't work.
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 09:12:03 PM |
|
That's up to you, though.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 09:28:32 PM |
|
You're absolutely right.
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 09:50:34 PM |
|
Duh.
|
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 09:55:21 PM |
|
Well, now why didn't I think of that?
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
btc_artist
Full Member
Offline
Activity: 154
Merit: 101
Bitcoin!
|
|
November 30, 2011, 09:57:07 PM |
|
Let's sing:
Come they told me, pa rum pum pum pum
|
BTC: 1CDCLDBHbAzHyYUkk1wYHPYmrtDZNhk8zf LTC: LMS7SqZJnqzxo76iDSEua33WCyYZdjaQoE
|
|
|
BTCurious
|
|
November 30, 2011, 09:57:26 PM |
|
Another question-- is this, or will it be, open-sourced?
Didn't read the thread, eh? Yes, the source will be released soon. I skimmed it, but I must have missed that. Thanks. That would be nice, but sadly a standard way of getting battery level information in Java doesn't seem to exist. You may be able to get it on some phones, but I don't think an unsigned applet can get that kind of information when running on a laptop. I'm not a Java expert, but it would appear to be possible by interfacing with native OS APIs. For example, on Windows, use JNI or JNA to call native Windows API functions to monitor battery status. Native calls could also be investigated for Linux and OSX. Calling OS API functions from Java: JNA http://stackoverflow.com/questions/2389156/calling-win32-api-method-from-javaJNI http://www.atwistedweb.com/java/jni.htmlWindows Battery API functions: http://stackoverflow.com/questions/3154554/how-do-i-get-battery-information-in-windowshttp://stackoverflow.com/questions/233446/monitor-battery-charge-with-win32-apiI'm not saying it's easy or even possible at this point, but I think it warrants a bit more investigation. You also wouldn't want to mine if someone visits on a smartphone or some other low-powered device, but I guess the 2-core threshold will take care of that.
Not completely: dual-core mobile phones already exist. I will investigate, thank you for the suggestion! You're welcome.
|
|
|
|
|