Pages:
Author

Topic: New research proves: MtGox bitcoins NOT stolen using transaction malleability - page 2. (Read 25229 times)

legendary
Activity: 1582
Merit: 1000
Well hello there!
"Honestly...I completely forgot about that old BTC wallet I swear!!" -MK :p
hero member
Activity: 798
Merit: 500
Time is on our side, yes it is!
sounds like somebody took the cookie from the cookie jar eh?  Maybe time for a proper spanking for all to see hmmm  Huh
full member
Activity: 150
Merit: 100
Let's see, so if I owned one of the largest bitcoin exchanges, I might be tempted to shut down as well; claiming that most of coins were stolen while I was secretly funneling them into multiple personal anonymous accounts. Then eventually when I had enough coins stored up, I would let the shit hit the fan by saying the coins are stolen, and then proceed to file for bankruptcy. Lastly, I'd sneak off and buy my own little island where nobody would find me.
sr. member
Activity: 308
Merit: 251
I like big BITS and I cannot lie.
Well, this is just another proof to something we already know. Mark Karpeles is a thief.

How long before a lynch mob hunts him down? How many people lost $10+?
legendary
Activity: 2674
Merit: 2965
Terminated.
As such, barely 386 bitcoins could
have been stolen using malleability attacks from MtGox or from other
businesses. Even if all of these attacks were targeted against MtGox,
MtGox needs to explain the whereabouts of 849,600 bitcoins.

No surprise here.

Gox/Mark is proved to be lying scum, yet again.
It hasn't really been proved yet. Although Mark was possibly trying to scam everyone.
legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
Gox/Mark is proved to be lying scum, yet again.
And the "researchers" demonstrated their incompetence by completely failing to understand the issue.

The argument goes like this:
- This animal is a giraffe.
- No, you are lying, because the fruit over there is a bicycle.

They are proving something else by a method which is flawed, and come to a worthless conclusion.
full member
Activity: 224
Merit: 104
WHy not send to authorities, in Japan and US, and lawyers involved in bankruptcy proceedings?  Seems easy enough to do, if you have any stake in the matter.
hero member
Activity: 504
Merit: 500
eidoo wallet
As such, barely 386 bitcoins could
have been stolen using malleability attacks from MtGox or from other
businesses. Even if all of these attacks were targeted against MtGox,
MtGox needs to explain the whereabouts of 849,600 bitcoins.

No surprise here.

Gox/Mark is proved to be lying scum, yet again.
legendary
Activity: 2674
Merit: 2965
Terminated.
My question is, if only 1,811 bitcoins were attacks on Mt Gox, where are the 300,189 others stolen from?
Who said that they were stolen?
soy
legendary
Activity: 1428
Merit: 1013
Darn, I shouldn't have posted that when he answers the subpoena in NY, he'd better check into South Oaks Hospital and hopefully avoid remand to Nassau County jail because:

http://www.cryptocoinsnews.com/2014/03/27/mtgox-ceo-karpeles-refuses-travel-to-u-s-for-questioning/

There were a few shows on bounty hunters not long ago.  Tough guys with a cameraman following them around as they took some felons into custody to turn over to the authorities.  Could you picture them taking Karpeles with all the fanfare!  Biker types with mullets and him in his nicely tailored suit.

legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
The problematic transactions weren't accepted by normal nodes, or relayed, because the signature was on a non-standard format.
I seem to recall that this was first enforced on some recent version of bitcoin (0.8.6?), which is precisely what precipitated the gox demise.
Version 0.8.  Version 0.7 isn't even working any more without special configuration to get around a database issue.  (Since last autumn.)
b!z
legendary
Activity: 1582
Merit: 1010
Very interesting. Thank you for sharing.
legendary
Activity: 1344
Merit: 1001
All of these China bans and unbans also MtGox stolen, then possibly found GoxCoins etc. looks like one big market manipulation before next bitcoin boom Tongue
I now, conspiracy theory but who knows, the truth can be shocking like history has proven many times.
global moderator
Activity: 3794
Merit: 2615
Join the world-leading crypto sportsbook NOW!
Thank you, looks like TM was just a convenient excuse for MK.

I thought pretty much everybody assumed this was most likely the case.
legendary
Activity: 1974
Merit: 1029
The problematic transactions weren't accepted by normal nodes, or relayed, because the signature was on a non-standard format.

I seem to recall that this was first enforced on some recent version of bitcoin (0.8.6?), which is precisely what precipitated the gox demise.
kjj
legendary
Activity: 1302
Merit: 1025
http://arxiv.org/abs/1403.6676  <--  non-obscured link

While I suspect that their conclusion is correct, I really take exception to their methodology and assumptions.  Mostly, they assume that a mutation will be visible as a double spend.  However, the reference client's behavior regarding relaying transactions with degenerate signatures changed, so a sparse sensor network would likely only see the mutated transaction instead of a pair.

I think that given bitcoin's 10 minute timeframe for rounds, and their decent connection of nodes, it is reasonable to assume that they customised clients logged the majority of such transactions.

A bit difficult to log something that you can't see because no one will relay, don't you think?
legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
Still not sure about this - if for example Gox had a private arrangement with a certain mining pool, that would not re-broadcast it's transactions outside of this pool, could not someone take said transactions and broadcast a malleable form to the rest of the Network?
The data collection method in the article would not seem to account for such a possibility.
The problematic transactions weren't accepted by normal nodes, or relayed, because the signature was on a non-standard format.  The transactions were only available through MtGox's API, where an attacker could change the signature into a standard format, mutating it and making it relayable.  To me this entire paper seems seriously flawed.  The authors haven't understood the issue specific to MtGox.
full member
Activity: 214
Merit: 101
Still not sure about this - if for example Gox had a private arrangement with a certain mining pool, that would not re-broadcast it's transactions outside of this pool, could not someone take said transactions and broadcast a malleable form to the rest of the Network?
The data collection method in the article would not seem to account for such a possibility.
legendary
Activity: 1106
Merit: 1004
My question is, if only 1,811 bitcoins were attacks on Mt Gox, where are the 300,189 others stolen from?

IIRC, once the malleability issue was revealed, some assholes started a DoS with it. They were mutating every transaction that went through them, only to fuck the network. That's probably what accounts for these +300kBTC. They were not stolen.
newbie
Activity: 6
Merit: 0
1. The data started in January 2013, so it's possible Gox was hit much harder in previous years. Although that would also mean the amount of time they spent oblivious to the problem increases.

Who said they were oblivious to the problem? They may have been operating as a fractional reserve since before 2013.
Pages:
Jump to: