Pages:
Author

Topic: [neㄘcash, ᨇcash, net⚷eys, or viᖚes?] Name AnonyMint's vapor coin? - page 5. (Read 95279 times)

newbie
Activity: 28
Merit: 0
Note I am not referring to a price decline per se, my point is about the other ways a fiat can be used against the people, such as forcing all our transactions to be tracked with digital identification when we sign our transactions. Forcing us to pay a tax to the world government on each transaction we sign, etc.
...
Mining altcoins to exchange value for BTC, does not decentralize the protocol of the Bitcoin block chain. Only the Bitcoin miners control the policies of the protocol.

If 51% of them decide to change the protocol and the Bitcoiners are unable to mount a successful political campaign to organize a fork, then the oligarchy wins. And if they do fork, they would need to change the hash algorithm, otherwise the oligarchy could simply take over the fork as well. The delusion about forking is the the Bitcoiners can't agree on anything, so they certainly couldn't agree on a new proof-of-work hash algorithm. Besides, no one cares. Everybody only cares about profit and using what is already popular. No one here has a clue about how to organize to make something widely adopted and popular. The elite are in control. Now get down on your knees and pray to the elite, because they own you.



@sockpuppet1

If you happen to be TPTB_need_war please don't post out of the Meta section ASAP,
there is a forum rule concerning this!

One of the journey's towards being a man is learning to not be afraid.

Well gleb gamow and SebastianJu both got temp banned too for similar reasons not too long ago.   At least the forum rules are being enforced somewhat fairly.

Which similar reasons?

Tisk tisk. Keep your posts in Meta or ...

"Tsk. Tsk" are the words I expect to hear from your grandmother calling you to have your daily scolding. I don't cowtail to theymos' delusions, technical incompetence, and censorship.

If I may express some frustration w.r.t. to desire to troll and censor, "Fuck you and theymos too". TPTB_need_war doesn't care. He can always subvert any ban.

Any way, TPTB_need_war is too busy programming. He has provided a public service.

And yes he was banned for revealing a potential back door in Bitcoin[1]. Just goes to show how theymos and gmaxwell are protecting you.

And yourself, how about you grow up and learn to tolerate open dialogue.

P.S. permanently banning TPTB_need_war is perfect for his plans. I hope theymos has the balls and the technical knowledge to attempt it.

Also I didn't start this thread. I didn't ask for this thread. I wasn't intending to post in this subforum at this time. Blame the person who created this thread. I read so much misunderstanding and slander of TPTB_need_war that required clarification and correction.


[1] In the ban message and in theymos's private message which is quoted by TPTP_need_war, theymos indicated the reason for the ban in addition to his incorrect claim of spouting technical nonsense, he also alleged spamming of messages in several threads and the ad hominem attacks against others. Theymos appears to be protecting Foxpop who hurled ad hominemfirst, and CIYAM who also hurled ad hominem first. TPTB_need_war had stated that the reason for posting in numerous threads, is because the mods allowed people to make numerous duplicate threads on the same topic about Craig Wright claiming to be Satoshi Nakamoto. Do take note that at the time he was having the debate with CIYAM, he had thought that Craig's signature had matched the hash of the Sartre text because he was misled by sloppy reporting and sloppy writing of those who did the technical analysis. It was only later that he learned that was not the case. And after all, his alleged back door in Bitcoin remains potentially true. You don't ban people for these incorrect reasons and expect to remain respected and expect others to not want to overcome inappropriate use of influence. There is too much ignonymous influence in Bitcoin.



...absolutely petrifying.    Cry

You did it to yourselves. Now you will reap what you have sown.

I am an American who doesn't share your looney European Marxism. Last time it was a million in the gas chambers. Let's see how it goes this round.

Shut up and get back to work on building your copy-leftist clusterfuck.

I don't associate with scum like you. I compete and overcome. Bye. Unless that is you want to say those words about my kids to my face. Otherwise we have nothing more to discuss. Enjoy your life.
full member
Activity: 140
Merit: 100
@sockpuppet1

If you happen to be TPTB_need_war please don't post out of the Meta section ASAP,
there is a forum rule concerning this!
newbie
Activity: 28
Merit: 0
I am speaking on behalf of TPTB_need_war aka AnonyMint, who is quoted in the OP, because he is currently banned for 9 more days due to calling theymos and gmaxwell out on their censorship of a potential technical back door in Bitcoin. There is a simpler explanation of Satoshi's obviously intentional technical error. It is obviously intentional because it was quite well known by 2009 that the HMAC formulation is more secure yet Satoshi used the more suspect double hashing everywhere in BitCON.

I will be editing this post and adding answers and rebuttals to the various incorrect posts that litter this thread. Please check back and read this post, because I will not be posting again in this thread, and instead I will edit this post to add new information as others continue to make posts that need to be refuted.

Please quote my post because the mods will probably delete it and ban me again.

"Blockstream implementing their SegWit soft fork Trojan Horse"

Lmao this guy is losing it. The blockstream FUDsters know no limits on their nonsense. The trojan horse was the Bitcoin XT, then Bitcoin Classic hard fork attempts, not segregated witness, segwit is actual advance in scaling Bitcoin. Whatever, it's a waste of time dealing with this shit.

Segregrated Witness is not the problem. The problem is that Blockstream is sneaking in a new soft fork versioning protocol at the same time. This new versioning protocol when combined with collusion with China's oligarchy control over mining, will insure together the elite can change the protocol of Bitcoin at-will any time. Why do you think Blockstream has received $70+ million in investor funding from the financial community. Blockstream has no viable way to make a profit. The company exists as a way to take control over Bitcoin. Note that Classic and XT didn't really solve the centralization problem either, but at least they didn't hand soft fork versioning control to the devil.

They will send their propaganda machine here to discredit me. They always do that. Then they ban me. They don't want you to know the truth. I don't care anymore. You fools are doomed. This is my last post on this matter. I have other programming work to do. It is up to you fools to get organized and stop being useless eaters and cattle for the elite. I can lead you to water, but I can't teach your dumb asses to drink. I tried to teach, but I get drowned out by the trolls and propaganda who are hired to keep the truth from you.

Instead of a tinfoil hat, I swear the guy has an entire tinfoil skull.  The sky is perpetually falling every day and it's always Armageddon forever.  A healthy dose of skepticism is fair enough, but don't take it to extreme, bordeline-crackpot, levels.

Bitcoin is just fine.

First they came for the Socialists, and I did not speak out—
Because I was not a Socialist.

Then they came for the Trade Unionists, and I did not speak out—
Because I was not a Trade Unionist.

Then they came for the Jews, and I did not speak out—
Because I was not a Jew.

Then they came for me—and there was no one left to speak for me.

So how many years from now china will own 98 % of mining power HuhHuh??

Here is a link to the cryptocoinnews.com article and also an estimate follows in the linked thread. Realize that is just one former cattle farmer who currently mines 50 of the 1200 BTC per day and he plans to increase that to 200 BTC of the 600 mined per day after the halving. Just one cattle farmer will be mining 30% of Bitcoin.

Why would they do anything detrimental to Bitcoin? It would hurt them more than anyone financially.

With an oligarchy in control of the mining, they can choose to increase transaction fees to the maximum the market can bear, not the competitive rate for transaction fees. They could also work together with Blockstream to increase the 21 million coin limit, so they can earn more coins. None of this would hurt Bitcoin, because obviously none of you care. You will suck BitCon's cock because you think it is a "better gold" as Satoshi advertised it to you in the white paper.

Additionally these mega mining farms in China don't attain their loans and nearly free electricity without returning favors to the elite who are in charge. In effect, this means Bitcoin has become just another fiat system. They can KYC identification requirements on it the future and pretty much do what ever they want. And you will lick their balls because you have no other choice. Don't tell me you will switch coins, because no other coin will have the adoption and mining security.

I find it really hilarious how you think you are supporting something that will change the world in a better way, yet it is just more of the same oligarch controlled BS that we've always had.

how is that centralised? there's over a billion chinese  Huh

It is rather good for Bitcoin, if a lot of people in China have some bitcoins

A billion aren't mining, only a few very well connected few. An oligarchy is taking form. The coins are only going to a few oligarchs

why they should destroy their own business? 51% will never happen, with their cheap electricity they are earning a shitload of money...

They want to maximize their profit and be in control of their destiny.

Most of these Chinese mining firms are pools, so like most pools that are extremely big, if they get too big, miners will hop to a different one.

It isn't just the pools that are the problem, but that the mining farms are large and concentrating the 51+% amongst a few oligarchs. This will only grow more centralized over time, because TPTB_need_war explained in his technical analysis, that profitable proof-of-work always accrues over time to maximum economies-of-scale. There are several reasons for that including propagation advantages of being the first to win more blocks, so don't waste hashrate mining on the wrong fork for a short period, which over time gradually depletes the other miners of relative profits. It is more complex than that. You need to read his entire analysis to understand.

I don't care if China controls most of the mining market, if people do care about that, they can purchase the mining power and start mining.

That is an incorrect understanding. As I explained above, the mining hashrate economically accrues to those miners with the greatest economies-of-scale. No one can buy mining equipment to offset that, because the miners in China are ostensibly getting nearly free electricity and nearly 0% interest loans. It is a corruption charged to the collective. Don't you understand how Communism works? We have this system now in the West too. Capitalism is dead. Long live Marxism!

I really don't care because I agree with you and many of us still don't sell our Bitcoins because if it goes mainstream in China or even a little popular, we'll be all rich/millionaires. The whole idealistic anarco utopia many still think Bitcoin is long dead, that's why Ethereum and other cool projects are emerging (even if they end up having the same fate eventually).

Look to be straightforward BTC hasn't been destroyed yet. It is very much living. I would suggest you to not worry about China and mining and focus on making profit with this system now.  Wink

Exactly. You guys don't care whether Bitcoin ends up as a totalitarian digital hell. You only care about making a profit hell or highwater, come what may.

So if China owns a large portion of the system, we're doomed? But what if bitcoins are centralized in America or in Europe? It's going to be an entire story, right? I mean, once again western power has an influence to this point.

Why are you building a strawman argument to deflect the debate away from the important issue. Obviously it doesn't matter where the oligarchy on mining is located. The only thing that matters is that profitable proof-of-work will always end up entirely centralized. TPTB_need_war has explained why this is the case because he an expert on the economics and technology, despite what some trolls might want to mislead you to believe.

BTC will do right when there will be decentralized exchangers.

And that will only happen because of my work to fix the jamming problem that plagued all DE designs. The trolls want to ridicule me, and I don't yet get the recognition. But that is okay. I just want you to know the truth.

.... with their cheap electricity they are earning a shitload of money...

What you mean is they're stealing a shitload of money. 

Taxpayer money converted into electricity by government-owned power utility.

Electricity converted into bitcoin and bitcoin into privatized money by miners.

In China bitcoin mining is essentially just a channel to steal tax money.  The fact that it hasn't been forced to shut down or use non-subsidized electricity by now is probably evidence that someone is taking bribes.  (What a surprise!  That NEVER happens in China!   Cheesy)

Finally someone with a brain stem! Congrats!

Yeah it is more of charging the expenses to the collective and keeping the profits for themselves. Same as the banksters did with the bailouts.

$1 million of your investor money every day going to those fat cats. And circulating back around as $70 million in grease money for Blockstream to rape you with.

Like the Capitalist West have been doing for years? The Chinese took a opportunity when they saw it and they used it... How can you blame them?

Yeah why care if the banksters keep the profits and charge the bailouts to the people. Love that Communist/Fascism, don't you?

well good for them if they are able to steal unfair and legal scam from government, called tax

Yeah it was great when the banksters stole the bailouts from the government! Excellent logic.  Roll Eyes

Good to see you want BitCON to be all about stealing. Nice world you want to promote.

Personally I'd be more worried if the hashrate was under NSA's jurisdiction.

Chinese miners have acted OK so far

You haven't studied the history of oligarchies. They can only act one way. Give it a little time. The collusion is taking form. By the time, you realize it, it will be too late to do anything about it or to change. Bitcoin will be too well established by that time, just like fiat is now. You will bend over and take in your ass, because you didn't think it was a problem when I told you and then when you realize you will have no more choice nor options to pursue.
sr. member
Activity: 420
Merit: 262
FYI truce, I will cease & desist:

Quote from: myself in a private message
I also don't believe CW is Satoshi. But that isn't my point. I explained the salient point more concisely here which is really about ridicule, censorship, and manipulation of public opinion instead of rational, well elucidated, and amicable/patient/unencumbered reasoned discussion (i.e. acadamics versus corporate fiefdoms):

https://bitcointalksearch.org/topic/m.14766475

Please also read the subsequent to the above linked post as I broad stroked some of my theoretical concerns about the double-hashing in Bitcoin.

Theymos is allowing me to continue so I think it is possible that Theymos is helpless due to not being capable himself of leading technologically. So appears he may be trying to appease Greg while also allowing for the minute possibility that someone else could accomplish in code and in reality something as relevant. I think I respect Theymos if this is the case. But we don't really know what is going on behind the scenes. I am at the point now where I really want to ignore everything on BCT and Reddit. My discussions about programming language theory are going very well at the Rust forum. Did you see I solved the age old computer science problem known as the Expression Problem articulated by Philip Wadler in 1999:

https://bitcointalksearch.org/topic/m.14757751
(click the sublink in item #6)

Did you see how I REKTed Greg's logic on the Ogg streaming index which was hilarious given he is co-inventor of the Ogg orbis codec:

https://bitcointalksearch.org/topic/m.14035614
(search for the phrase "Also I don't understand how you calculate 20% increase" within that post)

I don't claim he isn't smart in his cryptography and math fields of expertise. And generally a very smart guy. But that is not the problem we are apparently agreeing on.
sr. member
Activity: 420
Merit: 262
TPTB_need_war, you cannot prove nor disprove that the Sartre text Craig Wright supposedly hashed is a collision for SHA256.

I asked you to not do what you just did above:

Don't cherry pick my context to make inane non-rebuttals which side-step my holistic set of points.



You also pointed out that he supposedly has access to a supercomputer. Even with access to a supercomputer, he would not be able to find a collision as other researchers have already tried. Simply having a lot of computing power does not mean that he can find a collision.

Alternatively, Craig could have found a vulnerability in sha256, in which case a lot more things than just Bitcoin is screwed. If Craig did not responsibly disclose such a vulnerability and instead exploited it, this would be incredibly sketchy and dishonest behavior.

The point is that with a supercomputer together with a new cryptoanalysis break, the two together might be required to accomplish the attack. I want you to know that if China's pools see nearly all the mining shares, then they are viewing about 268 of SHA-256 hashing power per annum which may or may not be fulcrum. Don't presume you know all the theoretical attacks that are possible.

The theory that the sha256 double hash is weaker than sha256 is false. It has been proven that performing multiple iterations of a hash is more secure than just one iteration. Specifically, many websites will store users passwords in the form of a multiple iteration hash.

You've made at least two mathematically illiterate errors in that quoted text:

1. Testing that double-hashing fulfills some criteria you have prechosen, says nothing about security against cryptoanalysis which your criteria has not considered.
2. Securing a password by iterated hashing (because it requires the dictionary attacker to perform the iteration cost on each dictionary trial) says nothing about the increased vulnerability of collision cryptanalysis. You are conflating two separate issues of security.  Roll Eyes

I am done speaking to these amateurs. Waste of my time.
sr. member
Activity: 420
Merit: 262
I will proceed to explain once you confirm that do not understand why Merkle–Damgård construction is relevant? Either explain or admit you don't know. So I can proceed to teach you something. You are wasting my scarce time with your stalling/deception tactics and trolling.

No, you're the one wasting my time. I don't have to explain anything. You do. And you're not. I can only assume by your lack of explanation that you can't produce one.

Next time you will realize not to fuck with me, because I know a lot more than you assume.

I assume you know nothing, so knowing more than that isn't much of an accomplishment. But please go ahead and demonstrate your accomplishment. We're all waiting.

I'll interpret your reply as an ostensibly intentional veiled admission that you could not answer the question. So I will proceed to explain the sort of theoretical analysis that I was interested in discussing in the thread that the "forum-Hitler" Gmaxwell nuked.


Tangentially note the disclaimer that I wrote in the OP of the thread which was nuked:

Does anyone know what black hole Bitcoin core (Blockstream) developer Gmaxwell moved the quoted thread to?

[...]

I urge immediately peer review of my statements by other experts. I have not really thought deeply about this. This is just written very quickly off the top of my head. I am busy working on other things and can't put much time into this.

I had written in that nuked and vaporized thread a post (my last or nearly last post in that nuked thread) which explained that at the moment I wrote that quoted OP, I had been mislead by sloppy writing on the news sites (and also the linked sites of the protagonists) into thinking that the hash of the Sartre text was already confirmed. For example, I provided this quote:

Craig Wright’s chosen source material (an article in which Jean-Paul Sartre explains his refusal of the Nobel Prize), surprisingly, generates the exact same signature as can be found in a bitcoin transaction associated with Satoshi Nakamoto.

Being at is was by that time late in the evening for my timezone and I had been awake roughly 18 hours already, and I was skimming in an attempt to make some quick feedback on this potentially important event, so I could return to my work asap. In the nuked thread, I quickly realized that the Sartre text hadn't been verified to match the hash, so I actually stopped posting in the nuked thread for a few hours. Then when I came back to thread, it didn't exist so I could no longer follow up or read what had been elucidated. Thus note my original focus was on how the hell could Craig have achieved that match, so he must have broken the hash. I had recalled that I had theoretically doubts about the double hashing which I had never bothered to discuss with anyone. It had been 2+ years since I did that research on cryptographic hash functions, so I had to decide if I was going to go dig back into that research or not. I figured I'd sleep on it and then be able to think with a clearer, rested mind about the implications of the revelation (to me) that the hash had not been verified to match the text because the portion of the text had not been sufficiently specified (again the "undisclosed" term didn't make sense to me in quick skimming because I had read on the blog that the Sartre text was referred to).

But instead of being able to sleep on it and then decide whether to let it go or dig back into my past research, my thread was nuked and I was under attack. Remember I don't back down from anyone when I think I am justified. When I think I am wrong, I mea culpa.



So now back to the subject matter of whether double hashing could theoretically lead to any weakening of the second preimage and/or collision security of the SHA-256 cryptographic hash function.

Afaik, there is no research on this question. If anyone is aware of any, please kindly inform me.

First I will note the Merkle–Damgård construction (which SHA-256 employs) is subject to numerous generic attacks and even though afaik none of these are currently known to be a practical threat against a single hash of SHA-256, we can perhaps look to those generic attacks for potential clues as to what a double-hashing might enable which a single-hash application perhaps might not.

Note in the pseudo-code for SHA-256 that what distinguishes a double-hashing from doubling rounds (i.e. "Compression function main loop:") or repeating the input text in double the block chunks (i.e. "Process the message in successive 512-bit chunks:"), is that the h0 - h8 compression function state which is normally orthogonal to the input block chunks instead gets transmitted as input to a block chunk in the second hash application (i.e. "Produce the final hash value (big-endian):") after being added to the output of the compression function (i.e. "Add the compressed chunk to the current hash value:"). And the h0 - h8 compression function state is reset to a constant (i.e. "Initialize hash values:").

The reason I think this might be theoretically significant is because we should note that the way cryptographic hash functions are typically broken is by applying differential cryptanalysis. Differential cryptanalysis is attempting to find some occurrence of (even higher order) differences between inputs that occurs with more frequent probability than a perfectly uniform distribution. In essence, differential cryptanalysis is leveraging some recurrent structure of the confusion and diffusion and avalanche effect of the algorithm.

Not only does the double-hashing introduce a constant  h0 - h8 midstream thus introducing a known recurrent structure into the middle of the unified algorithm of a double-hashing, but it shifts the normally orthogonal compression function state to the input that it is designed supposed to be orthogonal to. On top of that, the additions of the h0 - h8 state at the midpoint, can possibly mean the starting state of the midpoint is known to have a higher probability of zeros in the least significant bits (LSBs). This last sentence observation comes from some research I did when I created a much higher bandwidth design variant of Berstein's ChaCha by fully exploiting AVX2 SIMD, that was for a specific purpose of creating a faster memory hard proof-of-work function. In that research, I had noted the following quote of an excerpt in my unfinished, rough draft, unpublished white paper written in late 2013 or early 2014 (and kindly note that the following might have errors because it was not reviewed for publishing and was merely notes for myself on my research understanding at that time 2+ years ago):

Quote from: shazam.rtf
Security

Addition and multiplication modulo (2^n - 1) diffuse through high bits but set low bits to 0. Without shuffles or rotation permutation to diffuse changes from high to low bits, addition and multiplication modulo (2^n - 1) can be broken with low complexity working from the low to the high bits [5].

The overflow carry bit, i.e. addition modulo minus addition modulo (2^n - 1), obtains the value 0 or 1 with equal probability, thus addition modulo (2^n - 1) is discontinuous i.e. defeats linearity over the ring Z/(2^n) [6] because the carry is 1 in half of the instances [7] and defeats linearity over the ring Z/2 [8] because the low bit of both operands is 1 in one-fourth of the instances.

The number of overflow high bits in multiplication modulo ∞ minus multiplication modulo (2^n - 1) depends on the highest set bits of the operands, thus multiplication modulo (2^n - 1) defeats linearity over the range of rings Z/2 to Z/(2^n).

Logical exclusive-or defeats linearity over the ring Z/(2^n) always [8] because it is not a linear function operator.

Each multiplication modulo ∞ amplifies the amount diffusion and confusion provided by each addition. For example, multiplying any number by 23 is equivalent to the number multiplied by 16 added to the number multiplied by 4 added to the number multiplied by 2 added to the number. This is recursive since multiplying the number by 4 is equivalent to the number multiplied by 2 added to the number multiplied by 2. Addition of a number with itself is equivalent to a 1 bit left shift or multiplication by 2. Multiplying any variable number by another variable number creates additional confusion.

Multiplication defeats rotational cryptoanalysis [9] because unlike for addition, rotation of the multiplication of two operands never distributes over the operands i.e. is not equal to the multiplication of the rotated operands. A proof is that rotation is equivalent to the exclusive-or of left and right shifts. Left and right shifts are equivalent to multiplication and division by a factor of 2, which don't distribute over multiplication e.g. (8 × 8 ) × 2 ≠ (8 × 2) × (8 × 2) and (8 × 8 ) ÷ 2 ≠ (8 ÷ 2) × (8 ÷ 2). Addition modulo ∞ is always distributive over rotation [9] because addition distributes over multiplication and division e.g. (8 + 8 ) ÷ 2 = (8 ÷ 2) + (8 ÷ 2). Due to the aforementioned non-linearity over Z/(2^n) due to carry, addition modulo (2^n - 1) is only distributive over rotation with a probability 1/4 up to 3/8 depending on the relative number of bits of rotation [9][10].

However, multiplication modulo (2^n - 1) sets all low bits to 0 orders-of-magnitude more frequently than addition modulo (2^n - 1)—a degenerate result that squashes diffusion and confusion.

[5] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX. 2 Related Work.
[6] Daum. Cryptanalysis of Hash Functions of the MD4-Family.
     4.1 Links between Different Kinds of Operations.
[7] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX.
     6 Cryptanalysis of generic AR systems.
[8] Berstein. Salsa20 design. 2 Operations.
[9] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX.
     3 Review of Rotational Cryptanalysis.
[10] Daum. Cryptanalysis of Hash Functions of the MD4-Family.
    4.1.3 Modular Additions and Bit Rotations. Corollary 4.12.

So now put those aforementioned insights about potential recurrent structure at the midpoint of the double-hashing, together with the reality that a Boomerang attack is a differential cryptoanalysis that employs a midpoint in a cipher to form new attacks that weren't plausible on the full cipher. Bingo!

I'll refrain from providing my further insights on specifics beyond this initial sharing. Why? Because I've been treated like shit by Gmaxwell and you all here grant him too much Hitler-esque control over the Bitcoin Technical Discussion subforum where these sort of discussions are supposed to occur, so I will take my toys else where. Enjoy your echo chamber.

Do I have an attack against Bitcoin's double-hashing? I leave that for you to ponder.
sr. member
Activity: 420
Merit: 262
Does anyone know what black hole Bitcoin core (Blockstream) developer Gmaxwell moved the quoted thread to?

I can't find it any more and I have no deleted messages from that thread in my PM box.


Wholly shit! I am contemplating the possibility that Craig has revealed that who ever created Bitcoin put a backdoor in it!

As I already explained, the signature Craig has provided proves either he has cracked something about the way Bitcoin uses SHA256 or he has Satoshi's private key. Afaics, there are no other mathematical possibilities.

But note this small detail:

You'll note that Bitcoin, for reasons known only to Satoshi, takes the signature of hash of a hash to generate the scriptSig. Quoting Ryan:

Well that isn't so insignificant of a detail when you think more about it in this context.

A cryptographic hash function has a property named collision resistance. Collision resistance is related to preimage resistance in that if we have a way to quickly find collisions, then if the preimage is collision then we also break the preimage resistance for that particular hash value.

Collision resistance is normally stated as the number of hash attempts required to find a collision or the number of rounds to break collision resistance with reasonable hardware. Normally this is exponentially less than computing the SHA256 hash function 2256 times. For SHA256, there are collision resistance attacks up to 46 of the 64 rounds of SHA256 (and 52 of 64 rounds for preimage attack).

So what happens to collision (and preimage in this context) resistance when we hash the hash? Well all the collisions from the first application of hash become collisions in the second hash, plus the new collisions in the second application of the hash thus increasing the number of rounds that can be attacked.

It seems likely that Craig has identified the back door that was placed in Bitcoin as explained above, and used his supercomputer access to find a preimage of SHA256.

If am correct, this is major news and Bitcoin could crash.

I urge immediately peer review of my statements by other experts. I have not really thought deeply about this. This is just written very quickly off the top of my head. I am busy working on other things and can't put much time into this.
sr. member
Activity: 420
Merit: 262
Lol. I doubt that.

Your whole argument is based on something that hasn't even been performed publicly yet.
Your theory is based on a few pieces of code on CSW's blog and other people's word.
We still have to wait to see how CSW will actually sign the keys.

Your theory is based purely on speculation of what we think happened, instead of what we know.
If we know the signature (in theory) and the address (according to BBC), then what was the message?

Quoted as documentation of your ignorance of the technical details.

Eventually you trolls will learn not to fuck with me.

Yes, you were the first to discover that CSW discovered a "backdoor" in Bitcoin.
Your understanding of the technical details here is greatest over all others.  Roll Eyes

And the first to:

1. Explain to Gmaxwell (in his CoinJoin thread from 2013) that he couldn't use a blacklist to fix jamming of CoinJoin
2. Solve the jamming problem of decentralized exchange.
3. Design a technical solution to the inherent centralization in Satoshi's proof-of-work.
4. Which included being the first to explain technically why Satoshi didn't solve the Byzantine Generals Problem.
5. The first to explain why Z.cash's Equihash is likely not ASIC resistant.
6. First to solve a  decades old unsolved fundamental problem of computer science programming language theory.

Get off my lawn you jealous troll. You are wasting my and the readers' time.
sr. member
Activity: 420
Merit: 262
The utility of Rust's complex resource lifetimes compile-time checking, versus garbage collection:

https://users.rust-lang.org/t/rust-as-a-high-level-language/4644/73
legendary
Activity: 1708
Merit: 1049
sr. member
Activity: 420
Merit: 262
AlexGR, remember upthread we were discussing why my use of 100+ tabs on the browser was causing memory exhaustion:

How to write low garbage real-time Javascript  <--- the horrid details

A peer-reviewed paper came to the conclusion that GC needs five times the memory to compensate for this overhead and to perform as fast as explicit memory management.

According to Williams, Android’s garbage collectors work best when Android apps have 4 to 8 times as much memory as is actually needed in order to perform the garbage collection process. Once you stop having that amount of free memory available, performance starts suffering.

This is why Android devices need to have twice as much RAM to run apps as your iPhone does.

Note the article of that last quote has some misinformation as follows:

As it turns out, an iPhone 6 with 1GB of RAM runs much faster than a similarly specced Android smartphone with 2GB of RAM. And it all has to do with the fundamental difference in the way iOS and Android handle apps.

The fact is that automatic reference counting is slower (but less pauses):

Here are the numbers I got on my dual proc PIII-600:

ref_gc:         531ms
ref_rm:         3563ms
ref_rs:         844ms
sr. member
Activity: 420
Merit: 262
sr. member
Activity: 420
Merit: 262
sr. member
Activity: 420
Merit: 262
TPTB_need_war I find it quite hard to order/structure what you're planning to achieve.

That is intentional.

lol this is Shelby's coin project

That's what I was wondering: if it's Shelby's project, then what's Moneroman88 doing posting the PRE-ANN?  Huh

This is not an official thread for JAMBOX. JAMBOX has no relationship in any form with Moneroman88.


Not enough information and specifications.  Can you post more details regarding this JAMBOX project?

No. There is no announcement. This thread does not represent the JAMBOX project. And I am not marketing JAMBOX to cryptocurrency investors. JAMBOX is not a crypto-currency and doesn't have a block chain. JAMBOX is vaporware. It does not exist. No code has been written.

This is going to be a giant

Correct. So please close this thread. Nothing to get excited about here.
sr. member
Activity: 497
Merit: 251
TPTB_need_war I find it quite hard to order/structure what you're planning to achieve.
It's so much content, so many interesting thoughts and ideas, but not a clear roadmap.
Can you make one? It would help a lot
sr. member
Activity: 420
Merit: 262
2. One of the most important goals I want to achieve for JAMBOX is that apps can be written in a language that can be loaded over the network and JIT compiled and run instantly on the mobile device or computer. The entire point is to replace the web browser with a better app engine and to abstract away the native APIs for iOS and Android, so that people can write apps once and have them run every where without any installation procedure. In short, the WWW on steriods.

Right about now, your latest generation Octacore ARM-based device has roughly ⅓ the CPU performance of the Intel i7 3770 with much lower power consumption and price. As ChromeOS and Android fulfill more of the apps that people want to do, with less tsuris for the n00b user, there is less reason to buy a computer with Windows or Mac OS X. High-end users increasingly opt for OS X because it is Unix-based. But the more salient point is that even OS X is being eaten from below by entirely open source options such as Android and ChromeOS which are popular amongst the masses. Even Intel is being eaten below by ARM and China.

But there is a problem which is a huge market opportunity which I am attempting to tackle. Users will increasingly want to have compatibility and seamless use of the same apps and/or data both on a small mobile screen (e.g. smartphone and tablets) and when plugging that device or a mini PC into a larger monitor with a Bluetooth keyboard and mouse. But Android apps don't work that well at such large screen sizes and with a mouse, installing Linux on an Android device breaks the security model of Android and/or is slow plus kludgy, and ChromeOS apps are not so numerous yet  as well being disunified with Android apps. There are others attempting to do a better ChromeOS, but not unifying mobile and desktop.

There are other problems I'd like to solve such as the tsuris of installing Android apps (installing shouldn't be necessary!), managing cloud backup differently for each app, etc..

Also no one has built a decentralize protocol for social networking interoption between these apps.

Btw, the hardware advance of ARM is impressive. For example, arguably the best high-end mini PC available is the Intel NUC which at $500 with 16GB RAM and 250GB SSD, it has roughly ⅓ the CPU performance of the Intel i7 3770.

But for < $100, an ARM Rockchip RK3368 has roughly ⅕ the CPU performance of the Intel i7 3770. And the RK3399 is coming Q2 2016 which will have roughly ⅓ the CPU performance of the Intel i7 3770. For $150, the Intel Atom with Windows 10 has roughly ⅙ the CPU performance of the Intel i7 3770. Even DIY kits with 8" screens are coming.
sr. member
Activity: 420
Merit: 262
Apologies to bump my thread, but where else to put this and this has an important point that I don't wish to lose:

Interest rates may or may not matter to Venture Capitalists , but it does matter to individuals that can think and want a profit while keeping their principle intact.  Smiley

Only an idiot would believe a checking/savings account is a safe place to keep money right now.

Those so-called idiots outnumber your VCs and they are risk averse.
They will trust their cash in a mattress before BTC.
And they will determine if BTC ever reaches true Utility.  Smiley
BTC has still got years of Public Relations efforts to go thru before the majority of the public trusts them.


 Cool

And the governments can clamp down on BTC at any time using capital controls on the exchanges, because if the most of the world doesn't accept BTC unless they can immediately convert it to fiat as has been explained upthread by smooth (e.g. Bitpay, etc), then BTC becomes an illiquid asset once the government issues capital controls. BTC is not immune to government action (especially G20 coordinated action) because BTC is not a widespread unit-of-account.

However, BTC has apparently become the unit-of-account of crypto-gambling, but it is not yet certain if the demand for that will remain if people no longer believe they can cash out to fiat unfettered when they want to, and the risk of CC failure due to centralization is a big factor that would cause speculators to be hesitant about thinking they could HODL/gamble in BTC long-term until capital controls cease.

This is my goal is to fix the centralization problem with my CC design and also I am going to make CC a very popular unit-of-account for social network payments. But first I am creating a new programming language, then I have to create the social network, and then finally the CC, so hell may freeze over before I am done.  Undecided

Note I also contributed the key technical insight[1] into how to make decentralized exchange work so it can't be jammed.

[1] Find my posts in this thread and note that TierNolan is one of the original inventors of the DE protocol, but it had a jamming flaw until I fixed it: https://bitcointalksearch.org/topic/atomic-swaps-using-cut-and-choose-1364951
sr. member
Activity: 420
Merit: 262
sr. member
Activity: 420
Merit: 262
Someone asked me why not choose for JAMBOX, C# or Erik Meijer's influenced F# within the open source Xamarin (formerly Mono open source .Net clone)?

1. The .Net CLR virtual machine model does not support higher-kinded types (HKT), thus neither do C# and F#.

So HKT for iterators are only necessary because of Rust's default resource lifetime tracking. I think @keean had also pointed that out.

A Contains trait doesn't bind the collection type to the Contains methodology. The choices of which traits a collection implements is open to extension in the Expression Problem. And this is why we need HKT in general (not just for my proposal), because we need to not throw away data types and subsume them to trait types as I explained in the thread for my proposal.

HKT are fundamental. We must have them.


2. One of the most important goals I want to achieve for JAMBOX is that apps can be written in a language that can be loaded over the network and JIT compiled and run instantly on the mobile device or computer. The entire point is to replace the web browser with a better app engine and to abstract away the native APIs for iOS and Android, so that people can write apps once and have them run every where without any installation procedure. In short, the WWW on steriods.

Thus the .Net CLR virtual machine (even though open sourced now in the Mono platform) is not the appropriate infrastructure because it is too heavyweight. We need a light and easy to JIT virtual machine and that is Javascript, which is supported every where a web browser is. With ASM.js we can reach about half the speed of native C code, although I'll also look to support some form of assembly language FFI support or portable assembly[1].

So JAMBOX needs a programming language that compiles to Javascript and meets my other goals for extensibility in a statically checked (by the compiler) type system and latency networks (e.g. internet) require asynchronous programming (async/await/yield). Also concurrency via asynchronous programming is more robust than multi-threaded concurrency. Unfortunately there is no language on the planet that can do this.

Another goal is to have the language match the compiled Javascript version as closely as possible, so that debugging in a JS debugger is plausible. Not only does this reduce the need to create an IDE and tools immediately, it also means people can still develop with a text editor as we could do for HTML + JS.


3. I have explained at the Rust forum why subclassing sucks ("is an anti-pattern") and proposed some extension to the type classes (of Rust, Haskell, and Scala) in order to solve the extension and composability problem simultaneously in both directions of Wadler's famous Expression Problem. My proposal is very important for attaining the following attributes in software development:

a) Compile-time checking of more invariants
b) Modularity
c) Code reuse, reduction of boilerplate redundant code, DRY (Don't Repeat Yourself)
d) Composability of code
e) Extensibility of code without forcing global refactoring of code bases
f) Decentralized open source development by factoring out dependencies into #a, b, c, d, e.
g) Less need to ever throw code away and/or rewrite code.

F# doesn't have type classes and can fugly approximate some use cases of HKT, but not the general cases. C# can't do type classes.

[1]http://stackoverflow.com/questions/3040276/when-did-people-first-start-thinking-c-is-portable-assembler
https://cr.yp.to/qhasm/20050129-portable.txt
sr. member
Activity: 420
Merit: 262
Note for comparison, the last time I posted in the Monero thread (a very rare event indeed), it was to offer them a helpful suggestion on how to be sure the anonymity can not be combinatorially unmasked and also I think it enables pruning of the block chain. That was a carry over from what we learned from the Moneroman88/BCX incident where I had gotten involved to try to analyze potential attack vectors that BCX was alleging/threatening.

I also provided about a week of my time for free recently contributing the highly detailed peer review to Monero Shen's new anonymity white paper.

I never post in their BTT forum threads to attack them (well at least not in recent memory). I was posting some negative or balancing opinions in rpietila's threads in 2014 when he used to tell everyone his opinion of the only two coins (Bitcoin and XMR) worth investing in and I felt he was acting like King Whale over crypto (both of which have declined in exchange price to the dollar for the HODLers that followed his proclamations).

Readers note he is quoting me above (former AnonyMint post).
Pages:
Jump to: