jwcastle (OP)
|
|
February 20, 2015, 07:41:02 PM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
|
|
|
|
pedrog
Legendary
Offline
Activity: 2786
Merit: 1031
|
|
February 20, 2015, 07:52:21 PM Last edit: February 20, 2015, 08:53:00 PM by pedrog |
|
Bitcoin hashing is not multipurpose, it only does that, nothing more.
|
|
|
|
cheekychap
|
|
February 20, 2015, 07:55:04 PM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
How would it be a bruteforce into systems like that ?
|
|
|
|
kolloh
Legendary
Offline
Activity: 1736
Merit: 1023
|
|
February 20, 2015, 08:01:57 PM |
|
It would be interesting if the hashing was also used for brute forcing but it is quite unlikely as bitcoin hashing isn't used for other purposes.
|
|
|
|
R2D221
|
|
February 20, 2015, 08:04:47 PM |
|
It's actually calculating the answer to life, the universe, and everything.
|
An economy based on endless growth is unsustainable.
|
|
|
koelen3
Legendary
Offline
Activity: 1022
Merit: 1007
Sooner or later, a man who wears two faces forgets
|
|
February 20, 2015, 08:20:24 PM |
|
What Like really? Hash decrypt to a secret brute force hacking trick ?
|
|
|
|
RodeoX
Legendary
Offline
Activity: 3066
Merit: 1147
The revolution will be monetized!
|
|
February 20, 2015, 08:27:43 PM |
|
Your homework today is to Google "open source".
|
|
|
|
DannyHamilton
Legendary
Offline
Activity: 3472
Merit: 4801
|
|
February 20, 2015, 08:30:28 PM |
|
- snip - what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
I can't figure out which of the following is true: - You are trying to make a joke?
- You are a troll, trying to stir up an emotional response that will lead to lots of people "arguing" with you with facts that have already been discussed hundreds of times in the past?
- You truly don't understand what bitcoin hashing does, and rather than taking the time to learn, you decided to just making things up in your own imagination and then believe your own imagination over reality?
|
|
|
|
arvindr
|
|
February 20, 2015, 08:34:15 PM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
A hidden code ? How ? Its not a code on every system just if you get bitcoins.
|
|
|
|
teukon
Legendary
Offline
Activity: 1246
Merit: 1011
|
|
February 20, 2015, 09:36:40 PM |
|
It's actually calculating the answer to life, the universe, and everything.
Are you suggesting that satoshi is a mouse?
|
|
|
|
pedrog
Legendary
Offline
Activity: 2786
Merit: 1031
|
|
February 20, 2015, 09:38:56 PM |
|
It's actually calculating the answer to life, the universe, and everything.
Already done, it's 42.
|
|
|
|
ajareselde
Legendary
Offline
Activity: 1722
Merit: 1000
Satoshi is rolling in his grave. #bitcoin
|
|
February 20, 2015, 09:42:15 PM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
Bitcoin is open source, and anyone can take a close look inside every line of the code, so im guessing no, it is not being used as a medium of bruteforce attacks. Dont you think someone would find that theres something wrong with it until now? While im trying to understand was there something else u were trying to say with this, i cant help but to think youre trying to troll :] cheers
|
|
|
|
R2D221
|
|
February 20, 2015, 10:27:33 PM |
|
It's actually calculating the answer to life, the universe, and everything.
Already done, it's 42. You're right. What we are actually calculating is the question, not the answer.
|
An economy based on endless growth is unsustainable.
|
|
|
slaveforanunnak1
|
|
February 20, 2015, 11:22:47 PM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
I don't think you know what a SIM does or what a hash function is for that matter.
|
|
|
|
trendax
|
|
February 20, 2015, 11:57:35 PM |
|
Bitcoin a front for hacking... A story as old as time itself
|
|
|
|
jonald_fyookball
Legendary
Offline
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
|
|
February 21, 2015, 12:10:13 AM |
|
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.
I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?
I don't think you know what a SIM does or what a hash function is for that matter. or how 'hacking' works
|
|
|
|
unamis76
Legendary
Offline
Activity: 1512
Merit: 1012
|
|
February 21, 2015, 12:13:48 AM |
|
Appling the same logic as OP... One could ask if fiat is a way to hack, lol
|
|
|
|
Mikestang
Legendary
Offline
Activity: 1274
Merit: 1000
|
|
February 21, 2015, 12:25:25 AM |
|
or how 'hacking' works
I've seen it on tv, you sit at a computer and type frantically on the keyboard and *BOOM*, you're a hacker. 133t
|
|
|
|
pedrog
Legendary
Offline
Activity: 2786
Merit: 1031
|
|
February 21, 2015, 12:26:10 AM |
|
Plus, in the article from The Intercept it says the keys were stolen, not brute-forced. According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
|
|
|
|
|