Bitcoin Forum
May 27, 2024, 03:14:57 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 [505] 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 ... 612 »
  Print  
Author Topic: [SDC] ShadowCash | Welcome to the UMBRA  (Read 1289610 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
X1235
Hero Member
*****
Offline Offline

Activity: 671
Merit: 505



View Profile
February 11, 2016, 12:07:07 PM
 #10081


Good! Here is your bounty Grin

LiteBit
Legendary
*
Offline Offline

Activity: 1133
Merit: 1050


View Profile
February 11, 2016, 01:48:28 PM
 #10082

Warning to anyone that relied on supposedly-anonymous payments using shadowcash (in particular ring signatures): all such payments can be trivially deanonymised.

https://shnoe.wordpress.com/2016/02/11/de-anonymizing-shadowcash-and-oz-coin/

Would be great to see a verified de-anonymized transaction versus just a claim.
newb4now
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
February 11, 2016, 01:55:51 PM
 #10083

Warning to anyone that relied on supposedly-anonymous payments using shadowcash (in particular ring signatures): all such payments can be trivially deanonymised.

https://shnoe.wordpress.com/2016/02/11/de-anonymizing-shadowcash-and-oz-coin/

Would be great to see a verified de-anonymized transaction versus just a claim.

The proof is in the math equations he provided. Pay him the bounty or SDC will lose all credibility.

Maybe if you work hard you can find a fix in case you own him a big thank you!
LiteBit
Legendary
*
Offline Offline

Activity: 1133
Merit: 1050


View Profile
February 11, 2016, 02:08:55 PM
 #10084

Warning to anyone that relied on supposedly-anonymous payments using shadowcash (in particular ring signatures): all such payments can be trivially deanonymised.

https://shnoe.wordpress.com/2016/02/11/de-anonymizing-shadowcash-and-oz-coin/

Would be great to see a verified de-anonymized transaction versus just a claim.

The proof is in the math equations he provided. Pay him the bounty or SDC will lose all credibility.

Maybe if you work hard you can find a fix in case you own him a big thank you!

I didn't say he was wrong. Let's see an example of it working too.
binaryFate
Legendary
*
Offline Offline

Activity: 1484
Merit: 1003


Still wild and free


View Profile
February 11, 2016, 02:12:26 PM
 #10085

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!

Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. 
This makes Monero a better candidate to deserve the term "digital cash".
rutherford
Sr. Member
****
Offline Offline

Activity: 624
Merit: 250



View Profile
February 11, 2016, 02:43:31 PM
 #10086

code: We're looking into this issue as we speak. We want to take the time to thank Shen and the Monero Research Lab for the research they have conducted, if confirmed then they are indeed eligible for a bounty.

█████████████████████████████
██████▀ ▀███████████▀ ▀██████
████▀ ▄█▄ ▀███████▀ ▄█▄ ▀████
███▄ ▀████▄ ▀███▀ ▄████▀ ▄███
█████▄ ▀████▄ ▀ ▄████▀ ▄█████
███████▄ ▀████▄ ▀██▀ ▄███████
█████████  █████ ████████████
███████▀ ▄████▀ ▄██▄ ▀███████
█████▀ ▄████▀ ▄ ▀████▄ ▀█████
███▀ ▄████▀ ▄███▄ ▀████▄ ▀███
████▄ ▀█▀ ▄███████▄ ▀█▀ ▄████
██████▄ ▄███████████▄ ▄██████
█████████████████████████████
..XIRCUS..                       ▄████▄
    ▄███▄              ██████
    █████             ▀████▀
     ▀▀▀ ▀▄         ▄▀
           ▄█████▄
           █████████
           █████████
           ▀█████▀
         ▄▀    █    ▀▄ ▄▄
       ▄▀      █      ████
▄████▄     ▄█████▄   ▀██▀
██████      ███████
 ▀▀▀▀       ▀█████▀
||
▄▄████████▄▄
▄████████████████▄
▄████████████████████▄
███████████████▀▀  █████
████████████▀▀      ██████
▐████████▀▀   ▄▄     ██████▌
▐████▀▀    ▄█▀▀     ███████▌
▐████████ █▀        ███████▌
████████ █ ▄███▄   ███████
████████████████▄▄██████
▀████████████████████▀
▀████████████████▀
▀▀████████▀▀
▄▄████████▄▄
▄████████████████▄
▄████████████████████▄
███████████▀    ▐███████
███████████    ▄▄█████████
▐██████████▀    ▀▀█████████▌
▐█████████▌       █████████▌
▐███████████    ███████████▌
███████████    ███████████
██████████    ██████████
▀████████▄  ▄████████▀
▀████████████████▀
▀▀████████▀▀
Wheatclove
Hero Member
*****
Offline Offline

Activity: 606
Merit: 500


View Profile
February 11, 2016, 02:51:22 PM
 #10087

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!



I don't think this is the standard for handling security flaws in this industry.

The way you've both handled this has malicious intent written all over it.
binaryFate
Legendary
*
Offline Offline

Activity: 1484
Merit: 1003


Still wild and free


View Profile
February 11, 2016, 02:57:32 PM
 #10088

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!



I don't think this is the standard for handling security flaws in this industry.

The way you've both handled this has malicious intent written all over it.

Huh what? Care to explain what you think was wrong here? Or worse, malicious?

Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. 
This makes Monero a better candidate to deserve the term "digital cash".
Wheatclove
Hero Member
*****
Offline Offline

Activity: 606
Merit: 500


View Profile
February 11, 2016, 03:11:27 PM
 #10089

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!



I don't think this is the standard for handling security flaws in this industry.

The way you've both handled this has malicious intent written all over it.

Huh what? Care to explain what you think was wrong here? Or worse, malicious?


Releasing it publicly on a non-technical forum. Standard is to notify the developers and allow them to take action, notify the community, etc,..  If nothing results from that, then a public release is standard and acceptable.

You know where the trolls will take this. You know it will cause panic in those who don't have technical knowledge. The original blog post is written with sarcastic, demeaning tone.

Immediately after posting that, smooth posted this image:
 

Tell me how this wasn't a malicious attack on the developer's credibility and reputation?
ffmad
Legendary
*
Offline Offline

Activity: 868
Merit: 1006



View Profile WWW
February 11, 2016, 03:26:49 PM
 #10090

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!



I don't think this is the standard for handling security flaws in this industry.

The way you've both handled this has malicious intent written all over it.

Huh what? Care to explain what you think was wrong here? Or worse, malicious?


It means you could handle it in a more professional way, instead of using the patronizing tone we've seen here and in the post of shnoe.

The bounty will be paid if the deanonymization is verified, it's what it's settled for.

Where schnoe can be contacted ? Our slack is open if he wants to come and discuss.

▄▄████████████████████▄▄
██████▀▀▀▀▀▀▀▀▀▀▀▀▀▀██████
████▀                  ▀████
███▀   ▄████████████▄   ▀███
███    ██████████████    ███
███    ████      ████    ███
███    ████      ████    ███
███    ████      ████    ███
███    ██████████████    ███
███    █████████████▀   ▄███
███    ████            ▄████
██    ████▄▄▄▄▄▄▄▄▄▄██████
▀█▄  ▀████████████████▀▀
fparticlf█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█ ▀ ▀ ▀                    █
█                          █
█    ▀▀█▄                  █
█       █▀▀▀▀▀▀▀▀▀▀▀█      █
█        █▄       ▄█▀      █
█         █▄▄▄▄▄▄█▀        █
█          █▄▄▄▄▄▄▄▄▄      █
█      ▄▄▄▄▄▄▄▄▄▄▄▄▄█      █
█       █▀█      █▀█       █
█   ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀   █
█        ▄  ▄  ▄  ▄        █
█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█
.Infinite .
.Markets.
█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█  ████  ████  ████  ████  █
█  ████  ████  ████  ████  █
█                          █
█  ████  ████  ████  ████  █
█  ████  ████  ████  ████  █
█                          █
█  ████  ████  ████  ████  █
█  ████  ████  ████  ████  █
█                          █
█  ████  ████  ████  ████  █
█  ████  ████  ████  ████  █
█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█
.Public or..
.Private  ...
█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█ ▀▀▀▀         ▀▀▀ ▀▀▀ ▀▀▀ █
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
█                          █
█          ▄▄▄▄▄           █
█         █▀   ▀█          █
█        █▀     ▀█         █
█      ▄▄█▄▄▄▄▄▄▄█▄▄       █
█                          █
█       ▄▀▀▄   ▄▀▀▄        █
█       ▀▄▄▀▀▀▀▀▄▄▀        █
█                          █
█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█
.RingCT........
.Anonymity .
██████
██
██
██
██
██
██
██
██
██
██
██
██████
██████
██
██
██
██
██
██
██
██
██
██
██
██████
binaryFate
Legendary
*
Offline Offline

Activity: 1484
Merit: 1003


Still wild and free


View Profile
February 11, 2016, 03:31:16 PM
 #10091

This is not me who found the flaw. Shen Noether from the Monero Research Lab did, and as he explains at the end of his article, he already applied for the bounty.
I hope nobody was using "anonymous" payments for anything critical. Be safe!



I don't think this is the standard for handling security flaws in this industry.

The way you've both handled this has malicious intent written all over it.

Huh what? Care to explain what you think was wrong here? Or worse, malicious?


Releasing it publicly on a non-technical forum. Standard is to notify the developers and allow them to take action, notify the community, etc,..  If nothing results from that, then a public release is standard and acceptable.

You realize blockchain-based systems are not your usual security software, and your "standard practice" doesn't make sense in that context? Transactions are recorded in the blockchain and there is no possible fix for that flaw after the fact.
(For a flaw that wouldn't apply to past transactions, I agree it could be released to developpers first).


You know where the trolls will take this. You know it will cause panic in those who don't have technical knowledge. The original blog post is written with sarcastic, demeaning tone.
I don't care personally about trolls or possible panic. What I personally care about is for crypto users in general to know flaws that apply retrospectively to their past transactions, and to know that asap, because if they used the flawed feature for anything critical, they need to cover their ass quick. Thus they have the right to know it as soon as possible.


Immediately after posting that, smooth posted this image:
 

Tell me how this wasn't a malicious attack on the developer's credibility and reputation?
Smooth does what he wants. People in general do what they want. If you think Smooth, Shen, me and others all prepared some kind of conspiracy discredit, you're really paranoid and surely have some illusions of grandeur. Smiley
A flaw in the maths is pointed out in a neutral article; you better focus on this and thank for the research rather than whining about how you feel some people are mocking you.
I posted here with the best intentions. I'm leaving that dodgy conspiracy discussion anyway. Good luck.


[...]
It means you could handle it in a more professional way, instead of using the patronizing tone we've seen here and in the post of shnoe.
[...]
I have honestly no idea how you found any patronizing tone in my posts previous to this one. If you're not happy with Shen's tone, go complain to him. Stop considering a variety of actors as one entity.

Monero's privacy and therefore fungibility are MUCH stronger than Bitcoin's. 
This makes Monero a better candidate to deserve the term "digital cash".
sidhujag
Legendary
*
Offline Offline

Activity: 2044
Merit: 1005


View Profile
February 11, 2016, 04:04:06 PM
 #10092

Warning to anyone that relied on supposedly-anonymous payments using shadowcash (in particular ring signatures): all such payments can be trivially deanonymised.

https://shnoe.wordpress.com/2016/02/11/de-anonymizing-shadowcash-and-oz-coin/
+5% interesting.. I personally think that monero itself will be deannonymized soon enough aswell
smooth
Legendary
*
Offline Offline

Activity: 2968
Merit: 1198



View Profile
February 11, 2016, 04:50:15 PM
 #10093

I don't think this is the standard for handling security flaws in this industry.

You apparently don't understand the nature of the error.

The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance.

Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy.

I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence).

Quote
Immediately after posting that, smooth posted this image

I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto.

FWIW, I also thought X1235's omg post mocking the idea of paying a bounty to be somewhat funny if dismissive, and for whatever it wasn't deleted by the thread moderator as mine was.
sidhujag
Legendary
*
Offline Offline

Activity: 2044
Merit: 1005


View Profile
February 11, 2016, 04:53:34 PM
 #10094

I don't think this is the standard for handling security flaws in this industry.

You apparently don't understand the nature of the error.

The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance.

Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy.

I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence).

Quote
Immediately after posting that, smooth posted this image

I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto.


Apparently it works all the way up with this one, one look at the source should tell you more than you need to know... Howver i do believe the devs here have a little bit of merit and should they wish to work on real projects instead of ones based off of uneven mathematical footing then I would be willing to offer them work.. However they woukd have to put their egos aside. Gluck
SativaL.
Newbie
*
Offline Offline

Activity: 36
Merit: 0


View Profile
February 11, 2016, 04:59:21 PM
 #10095


Quote
Howver i do believe the devs here have a little bit of merit and should they wish to work on real projects instead

Can you Name a "real" proejct ?  Cheesy
erok
Hero Member
*****
Offline Offline

Activity: 896
Merit: 1000


Avatars are overrated.


View Profile
February 11, 2016, 05:17:38 PM
Last edit: February 11, 2016, 06:25:47 PM by erok
 #10096

I don't think this is the standard for handling security flaws in this industry.

You apparently don't understand the nature of the error.

The code can be fixed going forward, but you can't remove the broken ring signatures from the blockchain. Responsible disclosure has no benefit to users in this instance.

Given the lack of competence indicated by the nature of the mathematical error, users should also ask whether fixing the code is sufficient remedy.

I understand you would prefer to sugar-coat it, but there is really no way to prevent these sorts of flaws other than by having people who know what they are doing (and not just copying stuff without apparently understanding it, as I have pointed out here several times before is a frequent pattern, not a one-time occurrence).

Quote
Immediately after posting that, smooth posted this image

I thought it was funny, especially since I did mention ShadowMarket along with the shopping reference. You seem a bit thin-skinned for crypto.

FWIW, I also thought X1235's omg post mocking the idea of paying a bounty to be somewhat funny if dismissive, and for whatever it wasn't deleted by the thread moderator as mine was.
I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission) and now come back with this crap? LOL try harder kiddo. You seem a bit thick headed for actual innovation. Keep riding CH and flufy's nuts. Take your troll team back to homebase because you are about to get disproved and ridiculed because you don't even understand what you are trolling.

https://bitcointalk.org/index.php?topic=1200091.msg13259632#msg13259632


"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
child_harold
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1000



View Profile
February 11, 2016, 06:30:31 PM
 #10097

I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission)

If your gonna call my name out then at least let me respond.

I created the uncensored thread and did plenty of research and dug up lots of links. I am entitled to my opinions and you can respond over there.

What has happened here today is totally deserved after the SDC Team failed to get the Zeuner crytpo peer review completed (after the community paid for it well over one year ago).

I assume the market is on indefinite hold as a result.

erok
Hero Member
*****
Offline Offline

Activity: 896
Merit: 1000


Avatars are overrated.


View Profile
February 11, 2016, 06:42:29 PM
 #10098

I question your competence if you spend a month trolling with child_harold then finally realize SDC is legit after stating "I haven't looked at it recently" (troll admission)

If your gonna call my name out then at least let me respond.

I created the uncensored thread and did plenty of research and dug up lots of links. I am entitled to my opinions and you can respond over there.

What has happened here today is totally deserved after the SDC Team failed to get the Zeuner crytpo peer review completed (after the community paid for it well over one year ago).

I assume the market is on indefinite hold as a result.
Speak the devil's name and he shall appear? Tongue There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?"

BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat.

Code:
Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator.
Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.

Which should result in the usage of a random new point if the code strictly does what's described here:
Line 8: // - bn(hash(data)) * G


ShenNoether is now grasping at straws. rofl

"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
child_harold
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1000



View Profile
February 11, 2016, 06:51:22 PM
 #10099

Speak the devil's name and he shall appear? Tongue There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?"

BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat.

Code:
Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator.
Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.

Which should result in the usage of a random new point if the code strictly does what's described here:
Line 8: // - bn(hash(data)) * G


ShenNoether is now grasping at straws. rofl


Are you really rolling on the floor and laughing?
I doubt ShenNoether is grasping at straws, but we shall see.

Quoting peoples past posts is fun isnt it erok? Wink
My cameo appearance is at an end.

stupid things
I am happy to be grouped with educated gentleman such as DaSource and Child_Harold.

erok
Hero Member
*****
Offline Offline

Activity: 896
Merit: 1000


Avatars are overrated.


View Profile
February 11, 2016, 06:58:27 PM
 #10100

Speak the devil's name and he shall appear? Tongue There is nothing to respond to. More baseless assumptions and more of you saying "are we there yet?"

BTW trolls shenNoether, newb4now, Smooth, sidhujag, and nazi member X1235 have already been debunked by code! Legit Code! Good work! Subscribe to the SDC git to get a front row seat.

Code:
Line 42: if (!(hG = EC_POINT_new(ecGrp))) //generates new generator.
Line: 48: if (hashToEC(&publicKey[0], publicKey.size(), bnTmp, hG) != 0) //passes new hG to hashToEC.

Which should result in the usage of a random new point if the code strictly does what's described here:
Line 8: // - bn(hash(data)) * G


ShenNoether is now grasping at straws. rofl


Are you really rolling on the floor and laughing?
I doubt ShenNoether is grasping at straws, but we shall see.

Quoting peoples past posts is fun isnt it erok? Wink
My cameo appearance is at an end.

stupid things
I am happy to be grouped with educated gentleman such as DaSource and Child_Harold.
I never said you were of low intelligence (that i can remember). I still don't think you are stupid. Just misguided and prone to tantrums. I still think you could do cool things and great work if you chose to. And yes quoting people from A MONTH AGO is rather efficient to prove my point that Monero is trolling their competition hard. You are referencing a quote of mine that is more than 6 months old which is not applicable anymore unfortunately.

"the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else" -- Julian Assange
Pages: « 1 ... 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 [505] 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 ... 612 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!