Pages:
Author

Topic: black hat crypto currency DDOScoin and white hat VPNcoin - page 2. (Read 630 times)

sr. member
Activity: 490
Merit: 250
Not every crypto currency is trustless... ethereum is totally trust based on the community regulating which types of algorithms are run so their mining doesn't get exploited.  I can't hate on Ethereum anymore tho without sounding butthurt.  I just don't like the way crypto currency went where trust based assets and trust based mining is being touted as the next form of currency.  
sr. member
Activity: 490
Merit: 250

the proof is per connection not for multiple connections to a single server that why you need block tree architecture with side chains (similar to the form of Bitcoin / Mastercoin) to create a verification that is 1 to N rather than 1 to 1.  

In their slideshow they don't even understand its not about bandwidth.  A proof of bandwidth is about bandwidth. This is POW
sr. member
Activity: 490
Merit: 250
this is a hack of proof of retrieval I posted on this forum around September 2014
sr. member
Activity: 490
Merit: 250
a bunch of leftist Euro devs think V was an innocent victim but we know the truth now. 
sr. member
Activity: 490
Merit: 250
I'll do a quick write up of how it works here:

SSL or https automatically signs all requests.  By requesting and https website the web server has to sign a document known as a certificate.  This allows the following proof, which is a chain of 2 signatures:


Algorithmic Notation:

1.  sign by the website
2.  sign by the miner
3.  verifier verifies both miner and website signatures



Mathematical Notation:

Verify Victim's Sig ( Verify Miner's Sig ( Sign Miner ( Sign Victim ( message certificate ) ) ) )


The DDOScoin paper uses a slightly different algorithm where instead of signing a second time the prover hashes the certificate with his public key, so in pseudocode:


hash ( "public address" + "victim signed certificate" )
// where (+) means concatenate //
sr. member
Activity: 490
Merit: 250
this whitepaper is probably stolen from me during an enhanced interrogation in my car circa july 2016... Vitalik wasn't such a good partner.  Him and Neal Koblitz put me in enhanced interrogation every night for a week and then it all went down.  now you know.  

still a good paper but nearly the exact design for the ddos coin I had in mind at the time.  

https://www.usenix.org/system/files/conference/woot16/woot16-paper-wustrow.pdf

inb4 paranoid about stolen work
sr. member
Activity: 490
Merit: 389
Do not trust the government
I agree windows has more back doors than anything and is CIA spyware but i am very good with both inbound and outbound firewall rules on
the router and also keep an eye on process running and i am in a much better position than you to put a finger in the air and say where this virus
came from not that i can ever be 100% certain it was not something running inside Srvhost , Conhost , Taskhost and ten other windows programs
that are designed to make our machine to operate more like a remote terminal than a "Personal PC"

Infection was nothing to do with DDOS and I run a program to read sys-logs from the router and it's programmed
to kick back when i care to run it but it get boring in the end

Tor i tell you, don't make excuses for them, i loved it as much as you do today before this happened

"But updating your Windows would have helped in this particular scenario."

You mean download more MS back doors as the previous doors that have become public knowledge becomes locked

Windows is shit but it's too late for me to jump ship to Linux Mint or something

In order not to stray away from the topic I will just make a quick response.
I have no idea about your firewall, I can just tell you what I read about WannaCry and how it works.
It could very well be some other ransomware however, who knows.
If your firewall didn't block the SMB port (445 I think) then that is almost certainly where it came from.
If it did, then it might be from inside the network (maybe WannaCry stays dormant on some computers).

As for the updates, do as you wish. I can just tell you that you are defenseless without updates.
Not saying that they don't also add new vulnerabilities, they do, but at least they patch old well known ones.
You just can't win using Windows...
member
Activity: 392
Merit: 41
This text is irrelevant
according to this research...  ddos coin would be both trustless and p2p.  that's all I'm going to say

Yeah, just like any other coin out there. trustless and p2p...
sr. member
Activity: 490
Merit: 250
according to this research...  ddos coin would be both trustless and p2p.  that's all I'm going to say
sr. member
Activity: 490
Merit: 250
it wouldn't be illegal to make this, its only illegal to participate in a ddos or run the software.  

but then technically it could be considered export of munitions under cryptographic controls and running a 3rd party currency.  Satoshi is probably dead!!  some people make sacrifices for a tech enabled future they believe in. 
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
its illegal to run a 3rd party currency in every country in the world!!

Okay, wiseacre.  I cede to your superior knowledge of the world.  But then, I have a question for you:  Praytell, how do the Bitcoin developers get away with it?  Satoshi “always used Tor”, as do I; but most current Bitcoin developers have their legal names, photos, and physical locations easily discoverable by the police.  Please explain to me their elite capture-avoidance techniques which they use to stay out of prison whilst developing illegal currency.  They have nowhere to run, if it’s “illegal in every country in the world!!”

Somebody should also tip off the Winkevoss brothers so they can stay one step ahead of the heat.

OK Im not going to develop this now I see the community has decided this is a bad idea and I agree.

Glad to hear it.

Im glad to see some of the people here are still demanding trustless technology as opposed to "crypto currency 3.0" which is all going towards trust based (while patting themselves on the back as geniuses). 

If it’s not decentralized, trustless, and permissionless, then it’s Paypal 2.0 (but so much slower and more expensive than the real Paypal).
sr. member
Activity: 490
Merit: 250
wow someone else knows the algorithm. I thought I was unique... although I first conceived of this algorithm years ago I see now that someone else knows about it.  

https://thehackernews.com/2016/08/ddoscoin-cryptocurrency.html

maybe Eric and Benjamin hit financial markets instead of showing up in p2p??
sr. member
Activity: 490
Merit: 250
ya the idea for a ddos coin has been kicked around on here since 2014 but nobody ever made one.  I'm obviously not Fed or NSA.  Don't lie you can't beat DDOS if the DOSers assign a random IP for each new ping.  

please refrain from quoting as the topic is sensitive and I often edit my posts in case I post inappropriately. 
sr. member
Activity: 490
Merit: 250
its illegal to run a 3rd party currency in every country in the world!!

The algorithm is 100% cryptographically secure and verifiable because of the use of a signing key in SSL.  Meaning its a form of POW not proof of bandwidth. 

Im glad to see some of the people here are still demanding trustless technology as opposed to "crypto currency 3.0" which is all going towards trust based (while patting themselves on the back as geniuses).  
member
Activity: 210
Merit: 26
High fees = low BTC price
So your main issue here was using Windows, of course, instead of a well developed open source operating system like many Linux distributions.


I agree windows has more back doors than anything and is CIA spyware but i am very good with both inbound and outbound firewall rules on
the router and also keep an eye on process running and i am in a much better position than you to put a finger in the air and say where this virus
came from not that i can ever be 100% certain it was not something running inside Srvhost , Conhost , Taskhost and ten other windows programs
that are designed to make our machine to operate more like a remote terminal than a "Personal PC"

Infection was nothing to do with DDOS and I run a program to read sys-logs from the router and it's programmed
to kick back when i care to run it but it get boring in the end

Tor i tell you, don't make excuses for them, i loved it as much as you do today before this happened

"But updating your Windows would have helped in this particular scenario."

You mean download more MS back doors as the previous doors that have become public knowledge becomes locked

Windows is shit but it's too late for me to jump ship to Linux Mint or something

 
sr. member
Activity: 490
Merit: 389
Do not trust the government
You should create DDoS prevention coin instead. 

I read the little advert in the footer of your post and was using Tor for years, loved it and even ran exit nodes at times
and even added code to a proxy server that would speed Tor up by sending some requests direct and some via Tor
because as you know it's dead slow.

That was until the day that a dedicated machine I was using to screen scrape a web-site via Tor picked up
a WannaCry virus that then encrypted all my files just about and left ransom notes all over the place asking
for payment via Bitcoin.

I used a remote terminal to monitor the machine from time to time and was not browsing or automating
a browser on the machine so can you guess where i think I picked the virus up from ?

My firewall blocks the DDOS but this attack got past me and now you know as much as i know but it's
very rare that i use Tor these days

I am no expert on WannaCry worm, but I can tell you some things about it as far as I know.

First of all, infections by viruses and worms almost always have nothing to do with DoS attacks (even more so with DDoS attacks).

WanaCry's main (I can't even find info on any other) propagation technique was over the network (this is why it is a worm, not a virus) using a SMB port.
It exploited a vulnerability in Windows initially discovered by NSA and kept secret for years until someone hacked and published it with many other fully developed exploits and hacking tools on the Internet. They called themselves The Shadow Brokers, as they tried selling some of them.

So your main issue here was using Windows, of course, instead of a well developed open source operating system like many Linux distributions.
But updating your Windows would have helped in this particular scenario.
member
Activity: 210
Merit: 26
High fees = low BTC price
You should create DDoS prevention coin instead. 

I read the little advert in the footer of your post and was using Tor for years, loved it and even ran exit nodes at times
and even added code to a proxy server that would speed Tor up by sending some requests direct and some via Tor
because as you know it's dead slow.

That was until the day that a dedicated machine I was using to screen scrape a web-site via Tor picked up
a WannaCry virus that then encrypted all my files just about and left ransom notes all over the place asking
for payment via Bitcoin.

I used a remote terminal to monitor the machine from time to time and was not browsing or automating
a browser on the machine so can you guess where i think I picked the virus up from ?

My firewall blocks the DDOS but this attack got past me and now you know as much as i know but it's
very rare that i use Tor these days
member
Activity: 210
Merit: 26
High fees = low BTC price
Well i wanted to build contracts for ETH and charge people gas for using the contract much like I could
write using .Net web-services that could be deployed on ETH nodes that would fit the bill just fine but i was thinking
more like a service that could make calls out to HTTP web servers to validate credit card details or something

I am not sure but i don't think this is possible and ETH contracts are more about just storing strings or numbers
in a distributed system and charging "Gas" for doing so which makes it more like a global abacus in my book even if it used locks and ledgers
that is designed to make more profit for the miners/nodes

Please someone step in if you believe that i am wrong and put me right

What i would like to see is a type of contract/program that can be deployed and then used as a type of VPN or proxy-server
that uses credits or gas to ensure people using the service can only get free resources on the network if they are also
providing services to the network which could be anything from hosting a database to allowing others to share their
internet connection of even earned by helping other networks with mining coins.

if someone has not built this type of thing already then they soon will me thinks but it might well need a number
of centralized coordinators much like Bit-Torrent to work because trying to store even a small amount of data for
7.5bn people on 50,000 distributed machines all replicating each others is something that has already been tried out
and it does not scale, wastes resources but web-sites held on such a system like I have outlined here would be almost
impossible to DDOS. Throw in a few fall-over servers that charge extra gas in an emergency and you start to get a stable system.

This is the reason BTC can only process 7 transactions a second and VISA-Card can do 25,000 a second but the
penny is not dropping yet with the Bitcoin community 
Ucy
sr. member
Activity: 2674
Merit: 403
Compare rates on different exchanges & swap.
This will add no value to the Internet, honestly.
You should create DDoS prevention coin instead.

Seems you don't like crypto by the way.
sr. member
Activity: 490
Merit: 389
Do not trust the government
How are you going to be able to prove that you are DDoS'ing a website in order to get paid in "DDOS coins"? Is that something you can prove at all, or is proof not a necessity here?

It is a necessity of course. Here is more info about it: https://thehackernews.com/2016/08/ddoscoin-cryptocurrency.html
Pages:
Jump to: