Author

Topic: delete - page 135. (Read 165547 times)

newbie
Activity: 42
Merit: 0
September 20, 2014, 04:36:57 PM
#82
Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I'm a little perplexed by what BCX is saying... I'm not sure how timewarp bugs are relevant to the attacks we're talking about at all.

I better tell that only to smooth over secure channel, then you ask him.
hero member
Activity: 532
Merit: 500
September 20, 2014, 04:36:45 PM
#81
Proof of identity for Poloniex chat

~BCX~


Good enough for you irmeli?
https://bitcointalksearch.org/topic/delete-789978

It was him
legendary
Activity: 1256
Merit: 1009
September 20, 2014, 04:36:09 PM
#80
Quote
I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I think the people being rude to you and BCX aren't really XMR supporters FWIW
hero member
Activity: 649
Merit: 500
September 20, 2014, 04:35:34 PM
#79
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. 

Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

Yes he did. Don't know why.
legendary
Activity: 1484
Merit: 1005
September 20, 2014, 04:34:51 PM
#78
Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I'm a little perplexed by what BCX is saying... I'm not sure how timewarp bugs are relevant to the attacks we're talking about at all.
legendary
Activity: 1256
Merit: 1009
September 20, 2014, 04:33:58 PM
#77
Quote
BitcoinEXpress: If you are holding XMR post 72 hours and lose, you have been warned. Later guys BCX
newbie
Activity: 42
Merit: 0
September 20, 2014, 04:32:00 PM
#76
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly.  

Please enlighten me. Has BCX promised this? If yes, why? Is it because of that one cocky idiot in this thread?

Or is it because of my actions?

I can tell you how to protect your private keys if you stop being arseholes to me. Is that not helping?

I stand only to win 10 BTC at most.
hero member
Activity: 532
Merit: 500
September 20, 2014, 04:28:28 PM
#75
BitcoinEXpress: I propose that rpietilla and I each move 500 BTC into a trusted escrow, winner take all. If I successfully deploy the attack I win, if I do not, XMT gets 500 BT
BitcoinEXpress: 500 BTC


Risto, will you take him up on the offer?
newbie
Activity: 42
Merit: 0
September 20, 2014, 04:28:00 PM
#74
First rough draft attempt at a simple amplification algorithm has been sent to smooth. I am awaiting him to return. He stepped out for a short while.
sr. member
Activity: 280
Merit: 250
Who cares?
September 20, 2014, 04:26:47 PM
#73
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?

I liked how he chose the trollbox on the largest XMR exchange to announce this publicly. 
hero member
Activity: 532
Merit: 500
September 20, 2014, 04:25:14 PM
#72
"BitcoinEXpress: In 72 hours I will launch out a full blown XMR coin killing attack. I suggest they have it fixed by then"

Will the devs be ready?
hero member
Activity: 605
Merit: 500
September 20, 2014, 04:24:03 PM
#71
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.

He closed it. Give it rest already, its the same guy.



Not trying to be disrespectful, since i've clearly missed something somewhere please enlighten me
legendary
Activity: 1256
Merit: 1009
September 20, 2014, 04:23:02 PM
#70
Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.

Really, is he?

Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything.
My prerogative.

so you'd rather leave it vulnerable ... he's doing a helluva a lot more than you o.O
sr. member
Activity: 361
Merit: 250
September 20, 2014, 04:19:09 PM
#69


FWIW, I am pretty entertained.  Grin

Good quote, I imagine the arena full of altcoins. And we are the plebs on the stadium watching, looking for any kind of weakness.
hero member
Activity: 644
Merit: 502
September 20, 2014, 04:18:20 PM
#68
Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.

Really, is he?

Because all I read is that he is trying to profit from a supposed exploit. I don't believe him. I do not think he is helping anyone or anything.
My prerogative.
hero member
Activity: 649
Merit: 500
September 20, 2014, 04:12:50 PM
#67
Wow.

Shouldn't you log off here and get busy on your exploit?

The guy is helping. Stop it.
legendary
Activity: 2968
Merit: 1198
September 20, 2014, 04:09:06 PM
#66
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.

He closed it. Give it rest already, its the same guy.

hero member
Activity: 605
Merit: 500
September 20, 2014, 04:08:16 PM
#65
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.



Might as well post under the AnonyMint account and put the issue to rest.
hero member
Activity: 644
Merit: 502
September 20, 2014, 03:58:26 PM
#64
Wow.

Shouldn't you log off here and get busy on your exploit?

You are the one that types of amplification. I'm not saying it has anything to do with the price of rice in China. I'm just saying you better get amplifying soon, because you type of amplification.
newbie
Activity: 42
Merit: 0
September 20, 2014, 03:57:27 PM
#63
Geez I was so worried about how I would be anonymous in the future and it seems I have the opposite problem and can't even convince people who I am. Perfect.  Kiss

I am 60% sure I have an amplification to their paper which makes the attack much more plausible and pervasive.

I need to go eat, then I need to write some code for an algorithm for smooth to document more precisely what I mean by the amplification.

Okay. My guess though is that you'll came to the same conclusions we did independently too -- assuming that Hp is a cryptographically secure hash function that acts as a random oracle perfectly and that q values are generated totally randomly, that recovery of x (private key) is impossible so long as your PRNG isn't compromised. And, if your PRNG is, then you can't even generate non-ring signatures securely.

Let's get to that point (of whether the private keys can be discovered...which I also have my doubts but do note you have two modular equations P = xG and I = xH(P) once you know i == s when the anonymity is broken) after establishing whether or not my amplification concept radically reduces the anonymity as compared to the calculations in your paper. I am not sure yet, because takes some time to digest your paper. First I will write some code for an algorithm for my amplification idea. Doing that now. Will send via secure channel to smooth.

You do that, Boss.

Here is my public XMR addy so that you can test it and take all my XMR when you get it amplified.
47EApNcKagpN29JgcHh8RgV9odHzzdwMTYuwiE9kPxD7cPy4LWAMCTyhrRXKYxphGaaXSaqfmpZKPgH R3W9xn5HCLPgJb3b

I'm real worried. Shocked

Cocky please note that discrete log factorization of two simultaneous equations may be subexponentional. I am not well versed on the literature though.

The fact that you don't realize the amplification has nothing to with whether the private keys can be factored isn't helping your bravado.
Jump to: