X1235
|
|
February 11, 2016, 12:07:07 PM |
|
Good! Here is your bounty
|
|
|
|
LiteBit
Legendary
Offline
Activity: 1133
Merit: 1050
|
|
February 11, 2016, 01:48:28 PM |
|
Would be great to see a verified de-anonymized transaction versus just a claim.
|
|
|
|
newb4now
|
|
February 11, 2016, 01:55:51 PM |
|
Would be great to see a verified de-anonymized transaction versus just a claim. The proof is in the math equations he provided. Pay him the bounty or SDC will lose all credibility. Maybe if you work hard you can find a fix in case you own him a big thank you!
|
|
|
|
LiteBit
Legendary
Offline
Activity: 1133
Merit: 1050
|
|
February 11, 2016, 02:08:55 PM |
|
Would be great to see a verified de-anonymized transaction versus just a claim. The proof is in the math equations he provided. Pay him the bounty or SDC will lose all credibility. Maybe if you work hard you can find a fix in case you own him a big thank you! I didn't say he was wrong. Let's see an example of it working too.
|
|
|
|
binaryFate
Legendary
Offline
Activity: 1512
Merit: 1012
Still wild and free
|
|
February 11, 2016, 02:12:26 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
|
Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. This makes Monero a better candidate to deserve the term "digital cash".
|
|
|
rutherford
|
|
February 11, 2016, 02:43:31 PM |
|
code: We're looking into this issue as we speak. We want to take the time to thank Shen and the Monero Research Lab for the research they have conducted, if confirmed then they are indeed eligible for a bounty.
|
|
|
|
Wheatclove
|
|
February 11, 2016, 02:51:22 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
I don't think this is the standard for handling security flaws in this industry. The way you've both handled this has malicious intent written all over it.
|
|
|
|
binaryFate
Legendary
Offline
Activity: 1512
Merit: 1012
Still wild and free
|
|
February 11, 2016, 02:57:32 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
I don't think this is the standard for handling security flaws in this industry. The way you've both handled this has malicious intent written all over it. Huh what? Care to explain what you think was wrong here? Or worse, malicious?
|
Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. This makes Monero a better candidate to deserve the term "digital cash".
|
|
|
Wheatclove
|
|
February 11, 2016, 03:11:27 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
I don't think this is the standard for handling security flaws in this industry. The way you've both handled this has malicious intent written all over it. Huh what? Care to explain what you think was wrong here? Or worse, malicious? Releasing it publicly on a non-technical forum. Standard is to notify the developers and allow them to take action, notify the community, etc,.. If nothing results from that, then a public release is standard and acceptable. You know where the trolls will take this. You know it will cause panic in those who don't have technical knowledge. The original blog post is written with sarcastic, demeaning tone. Immediately after posting that, smooth posted this image: Tell me how this wasn't a malicious attack on the developer's credibility and reputation?
|
|
|
|
ffmad
Legendary
Offline
Activity: 868
Merit: 1006
|
|
February 11, 2016, 03:26:49 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
I don't think this is the standard for handling security flaws in this industry. The way you've both handled this has malicious intent written all over it. Huh what? Care to explain what you think was wrong here? Or worse, malicious? It means you could handle it in a more professional way, instead of using the patronizing tone we've seen here and in the post of shnoe. The bounty will be paid if the deanonymization is verified, it's what it's settled for. Where schnoe can be contacted ? Our slack is open if he wants to come and discuss.
|
| | fparticl●f | █▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█ █ ▀ ▀ ▀ █ █ █ █ ▀▀█▄ █ █ █▀▀▀▀▀▀▀▀▀▀▀█ █ █ █▄ ▄█▀ █ █ █▄▄▄▄▄▄█▀ █ █ █▄▄▄▄▄▄▄▄▄ █ █ ▄▄▄▄▄▄▄▄▄▄▄▄▄█ █ █ █▀█ █▀█ █ █ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ █ █ ▄ ▄ ▄ ▄ █ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█ | .Infinite . .Markets. | █▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█ █ ████ ████ ████ ████ █ █ ████ ████ ████ ████ █ █ █ █ ████ ████ ████ ████ █ █ ████ ████ ████ ████ █ █ █ █ ████ ████ ████ ████ █ █ ████ ████ ████ ████ █ █ █ █ ████ ████ ████ ████ █ █ ████ ████ ████ ████ █ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█ | .Public or.. .Private ... | █▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█ █ ▀▀▀▀ ▀▀▀ ▀▀▀ ▀▀▀ █ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ █ █ █ ▄▄▄▄▄ █ █ █▀ ▀█ █ █ █▀ ▀█ █ █ ▄▄█▄▄▄▄▄▄▄█▄▄ █ █ █ █ ▄▀▀▄ ▄▀▀▄ █ █ ▀▄▄▀▀▀▀▀▄▄▀ █ █ █ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█ | .RingCT........ .Anonymity . | ██████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██████ | | | | ██████ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██████ |
|
|
|
binaryFate
Legendary
Offline
Activity: 1512
Merit: 1012
Still wild and free
|
|
February 11, 2016, 03:31:16 PM |
|
This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty. I hope nobody was using "anonymous" payments for anything critical. Be safe!
I don't think this is the standard for handling security flaws in this industry. The way you've both handled this has malicious intent written all over it. Huh what? Care to explain what you think was wrong here? Or worse, malicious? Releasing it publicly on a non-technical forum. Standard is to notify the developers and allow them to take action, notify the community, etc,.. If nothing results from that, then a public release is standard and acceptable. You realize blockchain-based systems are not your usual security software, and your "standard practice" doesn't make sense in that context? Transactions are recorded in the blockchain and there is no possible fix for that flaw after the fact. (For a flaw that wouldn't apply to past transactions, I agree it could be released to developpers first). You know where the trolls will take this. You know it will cause panic in those who don't have technical knowledge. The original blog post is written with sarcastic, demeaning tone.
I don't care personally about trolls or possible panic. What I personally care about is for crypto users in general to know flaws that apply retrospectively to their past transactions, and to know that asap, because if they used the flawed feature for anything critical, they need to cover their ass quick. Thus they have the right to know it as soon as possible. Immediately after posting that, smooth posted this image: Tell me how this wasn't a malicious attack on the developer's credibility and reputation? Smooth does what he wants. People in general do what they want. If you think Smooth, Shen, me and others all prepared some kind of conspiracy discredit, you're really paranoid and surely have some illusions of grandeur. A flaw in the maths is pointed out in a neutral article; you better focus on this and thank for the research rather than whining about how you feel some people are mocking you. I posted here with the best intentions. I'm leaving that dodgy conspiracy discussion anyway. Good luck. [...] It means you could handle it in a more professional way, instead of using the patronizing tone we've seen here and in the post of shnoe. [...]
I have honestly no idea how you found any patronizing tone in my posts previous to this one. If you're not happy with Shen's tone, go complain to him. Stop considering a variety of actors as one entity.
|
Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. This makes Monero a better candidate to deserve the term "digital cash".
|
|
|
sidhujag
Legendary
Offline
Activity: 2044
Merit: 1005
|
|
February 11, 2016, 04:04:06 PM |
|
+5% interesting.. I personally think that monero itself will be deannonymized soon enough aswell
|
|
|
|
smooth
Legendary
Offline
Activity: 2968
Merit: 1198
|
|
February 11, 2016, 04:50:15 PM |
|
I don't think this is the standard for handling security flaws in this industry.
You apparently don't understand the nature of the error. The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance. Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy. I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence). Immediately after posting that, smooth posted this image I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto. FWIW, I also thought X1235's omg post mocking the idea of paying a bounty to be somewhat funny if dismissive, and for whatever it wasn't deleted by the thread moderator as mine was.
|
|
|
|
sidhujag
Legendary
Offline
Activity: 2044
Merit: 1005
|
|
February 11, 2016, 04:53:34 PM |
|
I don't think this is the standard for handling security flaws in this industry.
You apparently don't understand the nature of the error. The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance. Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy. I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence). Immediately after posting that, smooth posted this image I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto. Apparently it works all the way up with this one, one look at the source should tell you more than you need to know... Howver i do believe the devs here have a little bit of merit and should they wish to work on real projects instead of ones based off of uneven mathematical footing then I would be willing to offer them work.. However they woukd have to put their egos aside. Gluck
|
|
|
|
SativaL.
Newbie
Offline
Activity: 36
Merit: 0
|
|
February 11, 2016, 04:59:21 PM |
|
Howver i do believe the devs here have a little bit of merit and should they wish to work on real projects instead Can you Name a "real" proejct ?
|
|
|
|
erok
|
|
February 11, 2016, 05:17:38 PM Last edit: February 11, 2016, 06:25:47 PM by erok |
|
I don't think this is the standard for handling security flaws in this industry.
You apparently don't understand the nature of the error. The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance. Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy. I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence). Immediately after posting that, smooth posted this image I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto. FWIW, I also thought X1235's omg post mocking the idea of paying a bounty to be somewhat funny if dismissive, and for whatever it wasn't deleted by the thread moderator as mine was. I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission) and now come back with this crap? LOL try harder kiddo. You seem a bit thick headed for actual innovation. Keep riding CH and flufy's nuts. Take your troll team back to homebase because you are about to get disproved and ridiculed because you don't even understand what you are trolling. https://bitcointalk.org/index.php?topic=1200091.msg13259632#msg13259632
|
"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
|
|
|
child_harold
|
|
February 11, 2016, 06:30:31 PM |
|
I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission)
If your gonna call my name out then at least let me respond. I created the uncensored thread and did plenty of research and dug up lots of links. I am entitled to my opinions and you can respond over there. What has happened here today is totally deserved after the SDC Team failed to get the Zeuner crytpo peer review completed (after the community paid for it well over one year ago). I assume the market is on indefinite hold as a result.
|
|
|
|
erok
|
|
February 11, 2016, 06:42:29 PM |
|
I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission)
If your gonna call my name out then at least let me respond. I created the uncensored thread and did plenty of research and dug up lots of links. I am entitled to my opinions and you can respond over there. What has happened here today is totally deserved after the SDC Team failed to get the Zeuner crytpo peer review completed (after the community paid for it well over one year ago). I assume the market is on indefinite hold as a result. Speak the devil's name and he shall appear? There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?" BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat. Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator. Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.
Which should result in the usage of a random new point if the code strictly does what's described here: Line 8: // - bn(hash(data)) * G ShenNoether is now grasping at straws. rofl
|
"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
|
|
|
child_harold
|
|
February 11, 2016, 06:51:22 PM |
|
Speak the devil's name and he shall appear? There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?" BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat. Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator. Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.
Which should result in the usage of a random new point if the code strictly does what's described here: Line 8: // - bn(hash(data)) * G ShenNoether is now grasping at straws. rofl Are you really rolling on the floor and laughing? I doubt ShenNoether is grasping at straws, but we shall see. Quoting peoples past posts is fun isnt it erok? My cameo appearance is at an end. stupid things
I am happy to be grouped with educated gentleman such as DaSource and Child_Harold.
|
|
|
|
erok
|
|
February 11, 2016, 06:58:27 PM |
|
Speak the devil's name and he shall appear? There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?" BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat. Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator. Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.
Which should result in the usage of a random new point if the code strictly does what's described here: Line 8: // - bn(hash(data)) * G ShenNoether is now grasping at straws. rofl Are you really rolling on the floor and laughing? I doubt ShenNoether is grasping at straws, but we shall see. Quoting peoples past posts is fun isnt it erok? My cameo appearance is at an end. stupid things
I am happy to be grouped with educated gentleman such as DaSource and Child_Harold. I never said you were of low intelligence (that i can remember). I still don't think you are stupid. Just misguided and prone to tantrums. I still think you could do cool things and great work if you chose to. And yes quoting people from A MONTH AGO is rather efficient to prove my point that Monero is trolling their competition hard. You are referencing a quote of mine that is more than 6 months old which is not applicable anymore unfortunately.
|
"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
|
|
|
|