Author

Topic: Bitcoin a front for hacking? (Read 1962 times)

legendary
Activity: 2786
Merit: 1031
February 20, 2015, 07:26:10 PM
#19
Plus, in the article from The Intercept it says the keys were stolen, not brute-forced.

Quote
According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.

https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
legendary
Activity: 1274
Merit: 1000
February 20, 2015, 07:25:25 PM
#18

or how 'hacking' works

I've seen it on tv, you sit at a computer and type frantically on the keyboard and *BOOM*, you're a hacker.  133t
legendary
Activity: 1512
Merit: 1012
February 20, 2015, 07:13:48 PM
#17
Appling the same logic as OP... One could ask if fiat is a way to hack, lol
legendary
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
February 20, 2015, 07:10:13 PM
#16
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?



I don't think you know what a SIM does or what a hash function is for that matter.


or how 'hacking' works
full member
Activity: 124
Merit: 100
February 20, 2015, 06:57:35 PM
#15
Bitcoin a front for hacking... Grin A story as old as time itself Roll Eyes
hero member
Activity: 743
Merit: 502
February 20, 2015, 06:22:47 PM
#14
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?



I don't think you know what a SIM does or what a hash function is for that matter.
hero member
Activity: 658
Merit: 500
February 20, 2015, 05:27:33 PM
#13
It's actually calculating the answer to life, the universe, and everything.

Already done, it's 42.

You're right. What we are actually calculating is the question, not the answer.
legendary
Activity: 1722
Merit: 1000
Satoshi is rolling in his grave. #bitcoin
February 20, 2015, 04:42:15 PM
#12
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?



Bitcoin is open source, and anyone can take a close look inside every line of the code, so im guessing no, it is not being used as a medium of bruteforce attacks. Dont you think someone would find
that theres something wrong with it until now?
While im trying to understand was there something else u were trying to say with this, i cant help but to think youre trying to troll :]

cheers
legendary
Activity: 2786
Merit: 1031
February 20, 2015, 04:38:56 PM
#11
It's actually calculating the answer to life, the universe, and everything.

Already done, it's 42.
legendary
Activity: 1246
Merit: 1011
February 20, 2015, 04:36:40 PM
#10
It's actually calculating the answer to life, the universe, and everything.

Are you suggesting that satoshi is a mouse?
full member
Activity: 182
Merit: 100
February 20, 2015, 03:34:15 PM
#9
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?




A hidden code ? How ? Its not a code on every system just if you get bitcoins.
legendary
Activity: 3472
Merit: 4801
February 20, 2015, 03:30:28 PM
#8
- snip -
what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?

I can't figure out which of the following is true:

  • You are trying to make a joke?
  • You are a troll, trying to stir up an emotional response that will lead to lots of people "arguing" with you with facts that have already been discussed hundreds of times in the past?
  • You truly don't understand what bitcoin hashing does, and rather than taking the time to learn, you decided to just making things up in your own imagination and then believe your own imagination over reality?
legendary
Activity: 3066
Merit: 1147
The revolution will be monetized!
February 20, 2015, 03:27:43 PM
#7
Your homework today is to Google "open source".  Wink
legendary
Activity: 1022
Merit: 1007
Sooner or later, a man who wears two faces forgets
February 20, 2015, 03:20:24 PM
#6
What Like really?
Hash decrypt to a secret brute force hacking trick ?  Roll Eyes Cheesy
hero member
Activity: 658
Merit: 500
February 20, 2015, 03:04:47 PM
#5
It's actually calculating the answer to life, the universe, and everything.
legendary
Activity: 1736
Merit: 1023
February 20, 2015, 03:01:57 PM
#4
It would be interesting if the hashing was also used for brute forcing but it is quite unlikely as bitcoin hashing isn't used for other purposes.
full member
Activity: 182
Merit: 100
February 20, 2015, 02:55:04 PM
#3
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?



How would it be a bruteforce into systems like that ?
legendary
Activity: 2786
Merit: 1031
February 20, 2015, 02:52:21 PM
#2
Bitcoin hashing is not multipurpose, it only does that, nothing more.
member
Activity: 117
Merit: 10
February 20, 2015, 02:41:02 PM
#1
Today's news said that the NSA and British intelligence were able to successfully hack into a Dutch company that makes cell phone SIM cards.

I'm thinking, what if Bitcoin hashing was actually a front to do a brute force attack into systems like this? A hidden code breaking hack?

Jump to: