TheFascistMind
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 20, 2014, 08:42:35 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely. Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth.
|
|
|
|
5w00p
|
|
September 20, 2014, 08:51:32 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely. Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth. You do that, Boss. Here is my public XMR addy so that you can test it and take all my XMR when you get it amplified. 47EApNcKagpN29JgcHh8RgV9odHzzdwMTYuwiE9kPxD7cPy4LWAMCTyhrRXKYxphGaaXSaqfmpZKPgH R3W9xn5HCLPgJb3b I'm real worried.
|
|
|
|
TheFascistMind
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 20, 2014, 08:57:27 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely. Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth. You do that, Boss. Here is my public XMR addy so that you can test it and take all my XMR when you get it amplified. 47EApNcKagpN29JgcHh8RgV9odHzzdwMTYuwiE9kPxD7cPy4LWAMCTyhrRXKYxphGaaXSaqfmpZKPgH R3W9xn5HCLPgJb3b I'm real worried. Cocky please note that discrete log factorization of two simultaneous equations may be subexponentional. I am not well versed on the literature though. The fact that you don't realize the amplification has nothing to with whether the private keys can be factored isn't helping your bravado.
|
|
|
|
5w00p
|
|
September 20, 2014, 08:58:26 PM |
|
Wow.
Shouldn't you log off here and get busy on your exploit?
You are the one that types of amplification. I'm not saying it has anything to do with the price of rice in China. I'm just saying you better get amplifying soon, because you type of amplification.
|
|
|
|
AdamWhite
|
|
September 20, 2014, 09:08:16 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Might as well post under the AnonyMint account and put the issue to rest.
|
|
|
|
smooth
Legendary
Offline
Activity: 2968
Merit: 1198
|
|
September 20, 2014, 09:09:06 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Might as well post under the AnonyMint account and put the issue to rest. He closed it. Give it rest already, its the same guy.
|
|
|
|
papa_lazzarou
|
|
September 20, 2014, 09:12:50 PM |
|
Wow.
Shouldn't you log off here and get busy on your exploit?
The guy is helping. Stop it.
|
|
|
|
5w00p
|
|
September 20, 2014, 09:18:20 PM |
|
Wow.
Shouldn't you log off here and get busy on your exploit?
The guy is helping. Stop it. Really, is he? Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything. My prerogative.
|
|
|
|
sugarboy321
|
|
September 20, 2014, 09:19:09 PM |
|
FWIW, I am pretty entertained. Good quote, I imagine the arena full of altcoins. And we are the plebs on the stadium watching, looking for any kind of weakness.
|
|
|
|
rdnkjdi
Legendary
Offline
Activity: 1256
Merit: 1009
|
|
September 20, 2014, 09:23:02 PM |
|
Wow.
Shouldn't you log off here and get busy on your exploit?
The guy is helping. Stop it. Really, is he? Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything. My prerogative. so you'd rather leave it vulnerable ... he's doing a helluva a lot more than you o.O
|
|
|
|
AdamWhite
|
|
September 20, 2014, 09:24:03 PM |
|
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect. I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive. I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification. Might as well post under the AnonyMint account and put the issue to rest. He closed it. Give it rest already, its the same guy. Not trying to be disrespectful, since i've clearly missed something somewhere please enlighten me
|
|
|
|
Kuriso
|
|
September 20, 2014, 09:25:14 PM |
|
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"
Will the devs be ready?
|
|
|
|
blaaaaacksuit
Sr. Member
Offline
Activity: 280
Merit: 250
Who cares?
|
|
September 20, 2014, 09:26:47 PM |
|
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"
Will the devs be ready?
I liked how he chose the trollbox on the largest XMR exchange to announce this publicly.
|
|
|
|
TheFascistMind
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 20, 2014, 09:28:00 PM |
|
First rough draft attempt at a simple amplification algorithm has been sent to smooth. I am awaiting him to return. He stepped out for a short while.
|
|
|
|
Kuriso
|
|
September 20, 2014, 09:28:28 PM |
|
BitcoinEXpress: I propose that rpietilla and I each move 500 BTC into a trusted escrow, winner take all. If I successfully deploy the attack I win, if I do not, XMT gets 500 BT BitcoinEXpress: 500 BTC
Risto, will you take him up on the offer?
|
|
|
|
TheFascistMind
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 20, 2014, 09:32:00 PM |
|
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"
Will the devs be ready?
I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread? Or is it because of my actions? I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping? I stand only to win 10 BTC at most.
|
|
|
|
rdnkjdi
Legendary
Offline
Activity: 1256
Merit: 1009
|
|
September 20, 2014, 09:33:58 PM |
|
BitcoinEXpress: If you are holding XMR post 72 hours and lose, you have been warned. Later guys BCX
|
|
|
|
tacotime
Legendary
Offline
Activity: 1484
Merit: 1005
|
|
September 20, 2014, 09:34:51 PM |
|
Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?
Or is it because of my actions?
I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?
I'm a little perplexed by what BCX is saying... I'm not sure how timewarp bugs are relevant to the attacks we're talking about at all.
|
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
|
|
|
papa_lazzarou
|
|
September 20, 2014, 09:35:34 PM |
|
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"
Will the devs be ready?
I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread? Or is it because of my actions? I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping? Yes he did. Don't know why.
|
|
|
|
rdnkjdi
Legendary
Offline
Activity: 1256
Merit: 1009
|
|
September 20, 2014, 09:36:09 PM |
|
I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?
I think the people being rude to you and BCX aren't really XMR supporters FWIW
|
|
|
|
|