Johnny Mnemonic
|
|
September 27, 2014, 12:18:34 AM |
|
AM: You mentioned previously that you were experimenting with anti-inflamatory/paleo dieting. If you're not already aware, ketogenic diets have been shown to be very effective against brain cancers when combined with other therapies.
|
|
|
|
iCEBREAKER
Legendary
Offline
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
|
|
September 27, 2014, 12:23:55 AM |
|
AM: You mentioned previously that you were experimenting with anti-inflamatory/paleo dieting. If you're not already aware, ketogenic diets have been shown to be very effective against brain cancers when combined with other therapies.
Yes, avoid white flour/sugar like the plague. Don't forget fasting. A good fast starves the cancer while focusing your immune system.
|
██████████ ██████████████████ ██████████████████████ ██████████████████████████ ████████████████████████████ ██████████████████████████████ ████████████████████████████████ ████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ██████████████████████████████████ ████████████████████████████████ ██████████████ ██████████████ ████████████████████████████ ██████████████████████████ ██████████████████████ ██████████████████ ██████████ Monero
|
| "The difference between bad and well-developed digital cash will determine whether we have a dictatorship or a real democracy." David Chaum 1996 "Fungibility provides privacy as a side effect." Adam Back 2014
|
| | |
|
|
|
Magic8Ball
Legendary
Offline
Activity: 1050
Merit: 1000
|
|
September 27, 2014, 01:23:19 AM |
|
The exploit makes the anonymity redundant. Yet it suddenly can kill the coin, by forking I assume. Apparently with 20% hashrate too.
Somehow I have a feeling they are just trying a plain old 51% attack, with a good amount of DDoS involved.
This is my assumption. BCX has only a few tricks up his sleeve when to comes to things of this nature. Either outcome will be beneficial to XMR. Nothing he has done. Once interest fades he might DDoS a few pools, do a limited 51% which will be rolled back and claim success.
|
|
|
|
infofront
Legendary
Offline
Activity: 2646
Merit: 2793
Shitcoin Minimalist
|
|
September 27, 2014, 01:41:15 AM |
|
robinwilliams, I guarantee you there is no connection between BCX and myself, even though he claims he was from the Philippines where I am currently living. I was worried at the start I would get dragged into some conspiracy theory.
That is why I am perplexed as to how he knew about what I found (after BCX incited me to dig). And no he didn't mention many vulnerabilities. He mentioned this specific one in conjunction with the TW attack which is necessary to rewind the blockchain to complete it.
He couldn't have guessed that. He had expert advice or insight himself.
And notice he never said the attack was taking place. He said TW attacks take days to develop, but he never said it was ongoing. Check his words carefully.
And he said from the beginning that forced evolution was the objective.
He achieved his objective, he knew the (potential) vulnerability, and he got paid with cheap coins and got revenge on Moneroman88. Perhaps he is sitting smug waiting for you all to figure it out.
But I think Moneroman88 was a sock puppet of BCX.
Where are you, out of curiosity? I just got back from the Philippines recently. Also, have you ever tried Low Dose Naltrexone for your autoimmunity issues?
|
|
|
|
JorgeStolfi
|
|
September 27, 2014, 02:37:52 AM |
|
Size of the solution space isn't the right word. I mean the function of the size changes from exponential ( nk) to polynomial ( nO(1)). If it is possible to convert the computation time (resource cost) from an exponential function of to a polynomial function of the inputs of the algorithm, then the complexity has been reduced from NP to P. I cited a link which I believe demonstrated this, although I may be mistaken. The search space for brute force inversion of SHA256 is 2bits, e.g. a 128-bit hash has 2128 possible outputs. All known methods for inverting SHA256 are NP relative to bits, and often cryptanalysis attacks remain in NP and only reduce the exponent by a factor that makes them practical solve for certain n. For example for finding collisions, the birthday attack is 2bits/2. However, some attacks may reduce the complexity to P, e.g. a quantum computer (Shor's algorithm) on RSA reduces integer factorization from sub-exponential to polynomial. NP requires that the solution can be verified in polynomial time. For example, the verification that the input to a hash produces a certain output. Please feel free to correct me if I am still wrong. It is not an error of fact, but only the use of a theory that is not really relevant to the problem. All you wrote is correct, but, as you note, NP and P (and the O() notation) are meaningful only if the number of bits n is considered variable, and they describe how the cost grows ultimately as n goes to infinity (informally, "just before n reaches infinity"). The theory has nothing to say if one considers a specific n (say, 256), or any n less than some fixed bound, (say, n up to 1 million bits). In that case, the complexity classes cannot be distinguished: every function with a finite domain can be computed in polynomial time, indeed in O(1) operations. This is a trivial observation that follows directly from the definitions. So, even if inverting a generalized n-bit version of SHA were to be proved to be superpolynomial with respect to n, that would not say anything about the difficulty of inverting SHA256 for 128 or 256 bits -- which is what matters. There may even be an algorithm, out there in the vast unexplored depths of the algorithm jungle, that can be implemented in practice and solves the Bitcoin Mining Puzzle -- for n = 256, specifically -- with less operations than it takes to compute the two rounds of SHA256. (Needless to say, most cryptographers are betting their careers that there is no algorithm that is fast enough to be of practical use, much less one that fast.) It is unfortunate that complexity theorists still teach computer science students that their theory has practical relevance, to the point of using the word "efficient" as synonym of "polynomial time". In fact, that theory is as relevant to software development as the Banach-Tarsky paradox is to manufacturing.
|
Academic interest in bitcoin only. Not owner, not trader, very skeptical of its longterm success.
|
|
|
cbeast
Donator
Legendary
Offline
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
|
|
September 27, 2014, 03:15:00 AM |
|
Laws are to enslave you. They are not your friend. You filipinos think we have better organization and better quality lives. So you want to be just like us. You don't know we are already slaves? We work for 9 months every year just to pay our taxes. Then we work the other 3 months just to pay for all the inflated prices. And we have left over, in many cases women who hate men and don't fall deeply in love. Welcome to the lie of feminism (note the women are not contented either and this is confirmed by studies). Luckily we have our Starbucks and other addictions to keep us numb so we won't realize how much we've lost.
Philippines has a unique cultural soul. Yes they are Westernizing, but tradition is fighting back. They may pass questionable laws, but lawmakers still care about their constituents. It's not like the Beltway where nothing else exists.
|
Any significantly advanced cryptocurrency is indistinguishable from Ponzi Tulips.
|
|
|
nutildah
Legendary
Offline
Activity: 3164
Merit: 8557
Happy 10th Birthday to Dogeparty!
|
|
September 27, 2014, 03:43:26 AM |
|
Game back on!!!
|
|
|
|
Hilux74
Legendary
Offline
Activity: 912
Merit: 1000
|
|
September 27, 2014, 03:44:21 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
|
|
|
|
Cryptobro
Member
Offline
Activity: 84
Merit: 10
|
|
September 27, 2014, 03:46:30 AM |
|
Over you say? I wouldn't be so sure. Seems like dejavu with Auroracoin to me. I do believe documented right here in this forum is the fact I made the Auroracoin team well aware of an exploit three weeks prior to the Founder Balduro and the Lead Developer Nite69 publicly acknowledging a full fledged TW was underway and they were powerless to fend it off. I somehow do not think this is how they envisioned that standoff ending. Ya know, the part where they had to say "Ok BCX, we get it, we were wrong, so please don't kill our coin." This of course was after the AUR Dev team reassured all that AUR was safe when the deadline I set to *START* the TW had passed and the "switch" was not instantly turned off on AUR. I am not sure why anyone thought that it would be instant especially since myself as well as several other technically inclined people explained that a TW is a slow build patience driven attack and would take a few days to become noticeable. A few days later several miners starting noticing some oddities happening in the block times. They noticed that there seemed to be a developing pattern of where two blocks would be generated within seconds of each other, followed by a series of normal blocks then two more quick gens, repeat...until it eventually became two fast generated blocks followed by ever erratic block times with eventually the block generation started to destabilize slowing down to a crawl of hours between blocks and there was no denying what was happening, even after the supposed TW fix. So before any of you jump up and start talking some straight up XMR fanboy shid, I am going to again offer rpietila the chance to earn an easy 500 BTC and take the BCX challenge. I also predict a repeat of this thread https://bitcointalk.org/index.php?topic=538085.0~BCX~ I thought your goal was 'forced evolution' and you doing it for the good of the community and crypto in general? Is that not the case now? certainly seems like you're just being a fucken douchebag for the sake of it.
|
|
|
|
robinwilliams
Member
Offline
Activity: 112
Merit: 10
|
|
September 27, 2014, 03:52:38 AM |
|
You gotta be a douch to force evolution man ... HUGE fan BCX. How long u think? Also can u change it to "FREE FALL" thread instead of free for all
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
September 27, 2014, 03:55:16 AM |
|
So before any of you jump up and start talking some straight up XMR fanboy shid, I am going to again offer rpietila the chance to earn an easy 500 BTC and take the BCX challenge.
You need escrow?
|
|
|
|
CoinHoarder
Legendary
Offline
Activity: 1484
Merit: 1026
In Cryptocoins I Trust
|
|
September 27, 2014, 04:16:57 AM |
|
"Official dev team statement coming" statement coming in 3....... 2...... 1.......... .75............. .7........... .69........ etc
|
|
|
|
nioc
Legendary
Offline
Activity: 1624
Merit: 1008
|
|
September 27, 2014, 04:20:21 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ My miner for months has shown blocks detected very close together and sometimes 4 in a minute.
|
|
|
|
Hueristic
Legendary
Offline
Activity: 3990
Merit: 5427
Doomed to see the future and unable to prevent it
|
|
September 27, 2014, 04:22:37 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ My miner for months has shown blocks detected very close together and sometimes 4 in a minute. Well that's good news. Gonna crash now, Hope I don't wake up to the price crashed. :|
|
“Bad men need nothing more to compass their ends, than that good men should look on and do nothing.”
|
|
|
Karl Hungus
|
|
September 27, 2014, 04:24:42 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ boring ... just do it, or piss off
|
|
|
|
Viper1
|
|
September 27, 2014, 04:38:27 AM |
|
Thanks for the update. I asked the other day how long it would take for a TW attack to start to show symptoms but no one gave me an answer.
|
BTC: 1F8yJqgjeFyX1SX6KJmqYtHiHXJA89ENNT LTC: LYAEPQeDDM7Y4jbUH2AwhBmkzThAGecNBV DOGE: DSUsCCdt98PcNgUkFHLDFdQXmPrQBEqXu9
|
|
|
black_jesus
Newbie
Offline
Activity: 28
Merit: 0
|
|
September 27, 2014, 04:39:11 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ And (192298, 192299), (192326,192327), (192357, 192358) ... diabolical ... you've been at this for weeks!! Edit: Months even! (122604, 122605), (122614, 122615) - what's up with THAT? You sneaky devil.
|
|
|
|
nioc
Legendary
Offline
Activity: 1624
Merit: 1008
|
|
September 27, 2014, 04:42:14 AM |
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ boring ... just do it, or piss off What part of 22 day process do you not understand? Multiple people have explained it. ~BCX~ The following person seemed to indicate sweet chaos starting in a couple of days. Maybe he was mistaken.Yawn.. this isn't nearly as entertaining as I thought it would be.
Is Monero being attacked or not? If someone is performing a TW attack is there any way to tell?
From my experience with time warps attacks it takes a couple of days before the symptoms start to occur, but when they do....the chaos is sweet. ~BCX~
|
|
|
|
BitcoinDN.com
Member
Offline
Activity: 97
Merit: 10
|
|
September 27, 2014, 04:44:19 AM |
|
And (192298, 192299), (192326,192327), (192357, 192358) ... diabolical ... you've been at this for weeks!!
Another post from Hawaiian Islands. Interesting. ~BCX~ Why are you doing this? You say forced evolution, but can't you just relay the exploit information to the devs? You are trying to kill a project that many people care about, and has only good intentions for all, (private, instantaneous transactions). I make a plea to you to stop your TW and play the good fight.
|
|
|
|
black_jesus
Newbie
Offline
Activity: 28
Merit: 0
|
|
September 27, 2014, 04:50:27 AM |
|
And (192298, 192299), (192326,192327), (192357, 192358) ... diabolical ... you've been at this for weeks!!
Another post from Hawaiian Islands. Interesting. ~BCX~ Miami, FL, actually. Maybe people would take you more seriously if you didn't act like a 7 year old having a temper tantrum in the middle of a supermarket. If you actually know of an exploit, stop being an idiot about it. You can do some good, and probably benefit yourself as well. Or maybe this is just fun to you, if so, I'm sorry.
|
|
|
|
|