Bitcoin Forum
November 11, 2024, 10:57:30 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 139 »
  Print  
Author Topic: delete  (Read 165543 times)
TheFascistMind
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
September 20, 2014, 08:42:35 PM
 #61

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.

Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely.

Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth.
5w00p
Hero Member
*****
Offline Offline

Activity: 644
Merit: 502



View Profile
September 20, 2014, 08:51:32 PM
 #62

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.

Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely.

Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth.

You do that, Boss.

Here is my public XMR addy so that you can test it and take all my XMR when you get it amplified.
47EApNcKagpN29JgcHh8RgV9odHzzdwMTYuwiE9kPxD7cPy4LWAMCTyhrRXKYxphGaaXSaqfmpZKPgH R3W9xn5HCLPgJb3b

I'm real worried. Shocked
TheFascistMind
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
September 20, 2014, 08:57:27 PM
 #63

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.

Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely.

Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth.

You do that, Boss.

Here is my public XMR addy so that you can test it and take all my XMR when you get it amplified.
47EApNcKagpN29JgcHh8RgV9odHzzdwMTYuwiE9kPxD7cPy4LWAMCTyhrRXKYxphGaaXSaqfmpZKPgH R3W9xn5HCLPgJb3b

I'm real worried. Shocked

Cocky please note that discrete log factorization of two simultaneous equations may be subexponentional. I am not well versed on the literature though.

The fact that you don't realize the amplification has nothing to with whether the private keys can be factored isn't helping your bravado.
5w00p
Hero Member
*****
Offline Offline

Activity: 644
Merit: 502



View Profile
September 20, 2014, 08:58:26 PM
 #64

Wow.

Shouldn't you log off here and get busy on your exploit?

You are the one that types of amplification. I'm not saying it has anything to do with the price of rice in China. I'm just saying you better get amplifying soon, because you type of amplification.
AdamWhite
Hero Member
*****
Offline Offline

Activity: 605
Merit: 500



View Profile
September 20, 2014, 09:08:16 PM
 #65

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.
smooth
Legendary
*
Offline Offline

Activity: 2968
Merit: 1198



View Profile
September 20, 2014, 09:09:06 PM
 #66

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.

He closed it. Give it rest already, its the same guy.

papa_lazzarou
Hero Member
*****
Offline Offline

Activity: 649
Merit: 500



View Profile
September 20, 2014, 09:12:50 PM
 #67

Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.
5w00p
Hero Member
*****
Offline Offline

Activity: 644
Merit: 502



View Profile
September 20, 2014, 09:18:20 PM
 #68

Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.

Really, is he?

Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything.
My prerogative.
sugarboy321
Sr. Member
****
Offline Offline

Activity: 361
Merit: 250


View Profile
September 20, 2014, 09:19:09 PM
 #69


Good quote, I imagine the arena full of altcoins. And we are the plebs on the stadium watching, looking for any kind of weakness.
rdnkjdi
Legendary
*
Offline Offline

Activity: 1256
Merit: 1009


View Profile
September 20, 2014, 09:23:02 PM
 #70

Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.

Really, is he?

Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything.
My prerogative.

so you'd rather leave it vulnerable ... he's doing a helluva a lot more than you o.O
AdamWhite
Hero Member
*****
Offline Offline

Activity: 605
Merit: 500



View Profile
September 20, 2014, 09:24:03 PM
 #71

Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.

He closed it. Give it rest already, its the same guy.



Not trying to be disrespectful, since i've clearly missed something somewhere please enlighten me
Kuriso
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500


View Profile
September 20, 2014, 09:25:14 PM
 #72

"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?
blaaaaacksuit
Sr. Member
****
Offline Offline

Activity: 280
Merit: 250

Who cares?


View Profile
September 20, 2014, 09:26:47 PM
 #73

"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. 
TheFascistMind
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
September 20, 2014, 09:28:00 PM
 #74

First rough draft attempt at a simple amplification algorithm has been sent to smooth. I am awaiting him to return. He stepped out for a short while.
Kuriso
Hero Member
*****
Offline Offline

Activity: 532
Merit: 500


View Profile
September 20, 2014, 09:28:28 PM
 #75

BitcoinEXpress: I propose that rpietilla and I each move 500 BTC into a trusted escrow, winner take all. If I successfully deploy the attack I win, if I do not, XMT gets 500 BT
BitcoinEXpress: 500 BTC


Risto, will you take him up on the offer?
TheFascistMind
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
September 20, 2014, 09:32:00 PM
 #76

"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly.  

Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I stand only to win 10 BTC at most.
rdnkjdi
Legendary
*
Offline Offline

Activity: 1256
Merit: 1009


View Profile
September 20, 2014, 09:33:58 PM
 #77

Quote
BitcoinEXpress: If you are holding XMR post 72 hours and lose, you have been warned. Later guys BCX
tacotime
Legendary
*
Offline Offline

Activity: 1484
Merit: 1005



View Profile
September 20, 2014, 09:34:51 PM
 #78

Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I'm a little perplexed by what BCX is saying... I'm not sure how timewarp bugs are relevant to the attacks we're talking about at all.

Code:
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
papa_lazzarou
Hero Member
*****
Offline Offline

Activity: 649
Merit: 500



View Profile
September 20, 2014, 09:35:34 PM
 #79

"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. 

Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

Yes he did. Don't know why.
rdnkjdi
Legendary
*
Offline Offline

Activity: 1256
Merit: 1009


View Profile
September 20, 2014, 09:36:09 PM
 #80

Quote
I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I think the people being rude to you and BCX aren't really XMR supporters FWIW
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 139 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!