Pages:
Author

Topic: delete - page 95. (Read 165547 times)

sr. member
Activity: 336
Merit: 250
September 23, 2014, 01:01:25 PM
But it isn't stealing, because those wallets never exist in the new chain. It is simply following the protocol. Now if he sells those coins (if possible but apparently not likely), the new owners are not going to agree to rollback of the block chain.

I assume this is common knowledge right? That is what TW attacks do correct?

That's one way it works. ArtForz introduced it as "A very profitable 51% attack".

Though I don't know if it has been actually done in its full glory. Seems to me that
it would be more common if it were that easy.

I don't have the technical knowledge but isn't that how Luke-Jr was attacking and destroying alt chains back in the day?
legendary
Activity: 996
Merit: 1013
September 23, 2014, 01:00:45 PM

Why not more common?  TW takes significant resources to execute against a live chain or it will be simply discarded as insufficient difficulty.
Most folks are less keen to exhaust resources in an attempt to destroy things than they are to create them, but it takes all kinds.

Of course BCX has been boasting that he can warp the chain
with lot less than 51%. This assertion caused some debate
at the time when Auroracoin was under threat. Some believe
mere manipulation of timestamps makes it possible. I'm not really
sure about this.
legendary
Activity: 2268
Merit: 1141
September 23, 2014, 01:00:26 PM
would be fun if someone put up a bounty on BCX personal details.
If he isn't really attacking I can't see any benefit comming from that. Better leave him alone then.
sr. member
Activity: 434
Merit: 250
September 23, 2014, 12:55:44 PM
would be fun if someone put up a bounty on BCX personal details.

I do not want him to be hunted at this stage.
sr. member
Activity: 469
Merit: 250
English Motherfucker do you speak it ?
September 23, 2014, 12:54:15 PM
would be fun if someone put up a bounty on BCX personal details.
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
legendary
Activity: 1204
Merit: 1002
Gresham's Lawyer
September 23, 2014, 12:48:17 PM
But it isn't stealing, because those wallets never exist in the new chain. It is simply following the protocol. Now if he sells those coins (if possible but apparently not likely), the new owners are not going to agree to rollback of the block chain.

I assume this is common knowledge right? That is what TW attacks do correct?

That's one way it works. ArtForz introduced it as "A very profitable 51% attack".

Though I don't know if it has been actually done in its full glory. Seems to me that
it would be more common if it were that easy.

Why not more common?  TW takes significant resources to execute against a live chain or it will be simply discarded as insufficient difficulty.
Most folks are less keen to exhaust resources in an attempt to destroy things than they are to create them, but it takes all kinds.
This is especially true with the additional resilience added over the years to modern crypto code.

There are a variety of potential effects depending on the peculiarities of the code and network:
Difficulty adjustment manipulation
Network congestion
Coinbase wins and fostering 51% type effects are among these effects, and there may be others.

Forking during such an event compounds the problems, as it reduces the effective mining until they are unified on a good chain, and done spinning resources on verifying that effort.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
September 23, 2014, 12:46:38 PM
For the record, I've stated something upthread that I shouldn't have, but I can't rectify it without making the dominoes cascade more, so note I will have something to clarify later after this BCX affair is long done.

This?

Whether BCX publishes the known spenders of rings or not is irrelevant, because it can be calculated by anyone at any time in the future.

He (or anyone) can't publish known spenders because of stealth addresses. All addresses on the blockchain are one-time-use, so there is nothing on the blockchain to link your transactions with each other so as to create a virtual "identity." In effect this is a potential compromise to "untracability" in cryptonote, which would allow some transactions to link with with each other, but not "unlinkability".

How successful that is depends a lot on how probable these linkages are to be made, which we don't know. It also remains to be seen feasible the algorithm is to perform, and what steps can be used to control the impact. We don't know any of these yet.

In any case it is interesting work that will help improve the technology (all cryptonotes) going forward. Anonymint deserves credit for coming up with it.
 


Just wondering, couldn't you just extract the stealth addresses over time to link them?


As do the buyers in the last 10 hours.




BTW this thread has become one serious Cluster Fuck!



newbie
Activity: 42
Merit: 0
September 23, 2014, 12:46:19 PM
Your mathematicians didn't address that rs = qs - csx mod l is also known, where qs is unknown.
qs is unknown (and random) which makes the above equation more or less useless for solving for x, this will be addressed in a later memo.

So sure are we. Subtraction may play differently in modular arithematic. I will wait to see what your memo says.

A single modular linear equation with two unknowns can't be solved. You can't argue or troll with that, it's maths.

So I take it you know fuck all about number theory.

So I take it you know fuck all every mathematical relationship in the universe known and to be found.

And now we have 3 equations with 3 variables with one employing multiplication 'bxG' and another subtraction 'qs - csx'. Let's think about how subtraction and multiplication interact in the simultaneous solution space and see if it doesn't narrow the solution space.

I just realized there is an additional simultaneous equation. I will PM the devs about it. Don't know if it makes a vulnerability any more likely. Probably not.
newbie
Activity: 22
Merit: 0
September 23, 2014, 12:43:42 PM
The poloniex website is very slow for following price live so I created a service: http://moneromarkets.com
legendary
Activity: 996
Merit: 1013
September 23, 2014, 12:33:24 PM
But it isn't stealing, because those wallets never exist in the new chain. It is simply following the protocol. Now if he sells those coins (if possible but apparently not likely), the new owners are not going to agree to rollback of the block chain.

I assume this is common knowledge right? That is what TW attacks do correct?

That's one way it works. ArtForz introduced it as "A very profitable 51% attack".

Though I don't know if it has been actually done in its full glory. Seems to me that
it would be more common if it were that easy.
full member
Activity: 135
Merit: 100
September 23, 2014, 12:25:30 PM


Saw that in the past when I was too tired. Still tired, but it causes me wonder if someone can do a TW attack, can't they steal all the coins that were created by mining rewards (coinbase tx) in all the blocks in their chain?

Thus isn't that a form of stealing wallets in the current live chain that are derived from those coinbase outputs?

But it isn't stealing, because those wallets never exist in the new chain. It is simply following the protocol. Now if he sells those coins, the new owners are not going to agree to rollback of the block chain.

I assume this is common knowledge right? That is what TW attacks do correct?


And that is why he may have alluded to the necessity of an Exchange for this to fully work.

Poloniex freeze in 1 . .. 2...
newbie
Activity: 56
Merit: 0
September 23, 2014, 12:25:18 PM
Formal response from core team forthcoming.

legendary
Activity: 1484
Merit: 1005
September 23, 2014, 12:22:50 PM
Formal response from core team forthcoming.
sr. member
Activity: 462
Merit: 250
September 23, 2014, 12:16:53 PM
Could someone please post an update on where the technical discussion of BCX's claim and related thoughts stands, so I don't have to shovel through all this drama?
newbie
Activity: 42
Merit: 0
September 23, 2014, 12:12:54 PM
Quote
Why is a troll trolling Anonymint?

i'm less of a troll than most of the posts in this thread dumbass  Roll Eyes

I'm cool with it. No worries.


Can someone please point me to a resource which explains the TW attack in more detail? I've seen ArtForz's post showing how the timestamps can be backed up in time for coins which don't overlap the retarget of difficulty. Is there still a TW vulnerability for coins that overlap their difficulty retarget windows?


The last timewarp discussion was during the AUR debacle
https://bitcointalksearch.org/topic/regarding-auroracoin-tw-exploit-fix-included-552895

Saw that in the past when I was too tired. Still tired, but it causes me wonder if someone can do a TW attack, can't they steal all the coins that were created by mining rewards (coinbase tx) in all the blocks in their chain?

Thus isn't that a form of stealing wallets in the current live chain that are derived from those coinbase outputs?

But it isn't stealing, because those wallets never exist in the new chain. It is simply following the protocol. Now if he sells those coins (if possible but apparently not likely), the new owners are not going to agree to rollback of the block chain.

I assume this is common knowledge right? That is what TW attacks do correct?
full member
Activity: 660
Merit: 101
Colletrix - Bridging the Physical and Virtual Worl
September 23, 2014, 12:12:17 PM
even thinking we exert any control at all in how people act towards a coin without controlling it thru technology / blockchain to me is a result of a lagging worldview.
indeed. it is to be expected that, if a coin can be hacked, eventually it will. on the other hand, withstanding sustained attacks is a precondition for viability.

of course, first movers bear the risk of being wrong in their assessment that the probability of a coin-killing attack is nil. naturally, they are rewarded by standing to reap more rewards than those who let time separate the wheat from the chaff. using open or veiled threats to dissuade attacks is a waste of time and can only provide a feeble sense of security.  it shows lack of confidence in diligence done prior to investment.
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
September 23, 2014, 12:10:50 PM

Yes, truffle salt popcorn is amazing with bubbly and not bad with Chard either.

Sriracha requires a hearty red, so I'll save it for after the whites.  My 2009 Cab Franc needs a while to breathe.

I wonder, are TacoTime and BCX getting pumped up in their respective montages right now?   Cheesy

legendary
Activity: 1176
Merit: 1015
September 23, 2014, 11:54:43 AM
This is going to be exciting, please don't disappoint BCX!
hero member
Activity: 910
Merit: 1003
September 23, 2014, 11:51:15 AM
crypto currency and anonymity  is a "do not trust" system but come to think of it rpietila is the only person with a name, picture and info about him on this thread..i'm not saying that we follow him, maybe we can learn something from him.

Actually there are a few people in this forum who are open about their identities.  Methinks they tend to be the best ones.  Wink
Pages:
Jump to: