Pages:
Author

Topic: The Problem With Altcoins - page 3. (Read 16528 times)

hero member
Activity: 798
Merit: 1000
November 08, 2013, 11:25:28 PM
I guess you want us to read your mind.

I think I know what you are thinking, and you are incorrect in your assessment.

Is Bitmessage a waste of time?

Over and over and over and over and over again. If you would stop for one second and drop the megalomania, we could possibly go somewhere. But nothing ever works for you but you. I try to pry you open, but you shut tighter, so there is no point and I am just wasting my time yet again. I guess I don't learn either.
legendary
Activity: 1456
Merit: 1002
November 08, 2013, 11:14:48 PM
The real problem with altcoins is they can go up really fast and they can died all of sudden. Its risk vs reward...

Isnt this how bitcoin started? or am I wrong..
hero member
Activity: 518
Merit: 521
November 08, 2013, 11:02:11 PM
Etlase2, you try win arguments by talking endlessly without ever saying anything, i.e. filibuster.

If you have something concrete to say instead of talking around the topic and in circles, then I will be willing to listen.

Some other use cases of Tor are not threatened by such a global entity. Our use case is.

If done correctly, it is precisely the opposite. The common man Tor use case will make it magnitudes more effective.

I guess you want us to read your mind.

I think I know what you are thinking, and you are incorrect in your assessment.

Quote
Defeatist. I would prefer to defend myself against the coming SHTF.

Rationalize all you want, hose beats crypto. So does surveillance.

Orthogonal threats. I want my crypto anonymity.

Quote
The key to achieving this is not use a general purpose web browsing anonymizer like Tor, and instead build-in a special purpose design for the coin.

Tor is not a web browsing anonymizer. Belittling it in such a way means that either your understanding of it is poor, or it is an attempt to manufacture a reason for your case, again. Neither choice leaves me impressed.

It is low-latency because it is designed to support the general purpose interactive things such as web browsing as one example.

It is not optimal anonymity for our use case.

Quote
Agreed. So I don't know why you are against improving the anonymity. I guess you assume it will be slow, expensive, and not scalable.

I am against you wasting your time on pursuits that are not that useful.

Is Bitmessage a waste of time?

If not, then please shut up or be very specific, because you are wasting my time with this nonsense.

P.S. I suppose you entirely missed the point that coin mixers are useless unless everyone is using IP anonymity, i.e. it is built-in. That is one reason it is useful. The other reason is Bitmessage is more surely and reliably anonymous than Tor is.
hero member
Activity: 798
Merit: 1000
November 08, 2013, 10:51:18 PM
I already explained the lack of anonymity with Tor against a global entity.

No, you didn't, you regurgitated what someone else said.

Quote
Some other use cases of Tor are not threatened by such a global entity. Our use case is.

If done correctly, it is precisely the opposite. The common man Tor use case will make it magnitudes more effective.

Quote
Defeatist. I would prefer to defend myself against the coming SHTF.

Rationalize all you want, hose beats crypto. So does surveillance.

Quote
The key to achieving this is not use a general purpose web browsing anonymizer like Tor, and instead build-in a special purpose design for the coin.

Tor is not a web browsing anonymizer. Belittling it in such a way means that either your understanding of it is poor, or it is an attempt to manufacture a reason for your case, again. Neither choice leaves me impressed.

Quote
Agreed. So I don't know why you are against improving the anonymity. I guess you assume it will be slow, expensive, and not scalable.

I am against you wasting your time on pursuits that are not that useful.
legendary
Activity: 840
Merit: 1000
November 08, 2013, 10:37:41 PM
The real problem with altcoins is they can go up really fast and they can died all of sudden. Its risk vs reward...
hero member
Activity: 518
Merit: 521
November 08, 2013, 10:20:04 PM
A P2P transaction network interfacing with tor is *not* the same as your typical (lol what?) tor user scenario. No, I'm not going to hold your hand until you understand the implications of this.

I already explained the lack of anonymity with Tor against a global entity. Which both Tor and Tails admit in their warnings. Some other use cases of Tor are not threatened by such a global entity. Our use case is.

Quote
Even if you don't believe there is much risk, why not protect yourself and be sure?

... it doesn't matter what gidget you come up with to anonymize the network, shit is going to hit the mother f***ing fan. There is no winning here.

I would prefer to defend myself against the coming SHTF.

If you sacrifice liberty for security... (do I need to finish this sentence or is the ellipsis enough?) Liberty being very loosely defined as the utility and accessibility of the network.

I don't need the properties of the network to degrade in order to get strong IP anonymity. The key to achieving this is not use a general purpose web browsing anonymizer like Tor, and instead build-in a special purpose design for the coin.

Cheap, fast, scalable are properties that are of paramount importance to anonymity. And IF you can find a way to increase anonymity via increasing difficulty/cost with little affect on those who do not want it or need it, then you allow a happy medium between both needs and, imo, have the best chance of achieving what I think is roughly the same goal between us.

Agreed. So I don't know why you are against improving the anonymity. I guess you assume it will be slow, expensive, and not scalable.
hero member
Activity: 798
Merit: 1000
November 08, 2013, 08:52:18 PM
The timing attacks research has been done by numerous different researchers from numerous prestigious universities and numerous confirmations. It is all peer reviewed. Go read the research papers so you are not ignorant on this.

AnonyMint, I am not going to write a whitepaper whenever I need to make an argument for you. This has already taken up way too much time. First you imply that there is some ulterior motive behind disliking your anonymizing design with your loaded question, then jump to the conclusion that I am uneducated about timing attacks based on a jab at your resort to appealing to authority.

A P2P transaction network interfacing with tor is *not* the same as your typical (lol what?) tor user scenario. No, I'm not going to hold your hand until you understand the implications of this.

Quote
Even if you don't believe there is much risk, why not protect yourself and be sure?

Because *I* have a much more idealistic outlook on life-after-cryptocurrency (NB: It is insanely unfortunate that the first had to be designed like Bitcoin). You can think the way you do, but the problem with that is that it doesn't matter what gidget you come up with to anonymize the network, shit is going to hit the mother f***ing fan. There is no winning here.

If you sacrifice liberty for security... (do I need to finish this sentence or is the ellipsis enough?) Liberty being very loosely defined as the utility and accessibility of the network. Cheap, fast, scalable are properties that are of paramount importance to anonymity. And IF you can find a way to increase anonymity via increasing difficulty/cost with little affect on those who do not want it or need it, then you allow a happy medium between both needs and, imo, have the best chance of achieving what I think is roughly the same goal between us.
hero member
Activity: 518
Merit: 521
November 08, 2013, 07:48:28 PM
Any idea how much drug trading is going on with Bitcoins? And money laundering?

I will say it again. I wouldn't own large holdings of Bitcoin if you paid me to do so! These large Bitcoin holders even if they dispose of their Bitcoins are potentially screwed for life, unless they were virgin mined and they never dispose of them (that would be safe).

With strong IP anonymity built-in to the altcoin, I would buy it like hotcakes. And I am hoping I will be able to soon.

I hoping someone will implement my ideas. I have algorithms if any one is serious to implement, contact me in PM.
hero member
Activity: 518
Merit: 521
November 08, 2013, 07:43:32 PM
That is not acceptable in technical debate. Refute with technical argument.

You mean like "well bruce schneier sez!!!"?

The timing attacks research has been done by numerous different researchers from numerous prestigious universities and numerous confirmations. It is all peer reviewed. Go read the research papers so you are not ignorant on this.

Quote
Did you fail to read what I wrote upthread? That I don't want to have to prove that some criminal who used my coin before or after I held it, was not me or not involved with me somehow

Sorry, but this fails the smell test. It is a manufactured argument for pushing an agenda.

An agenda of strong IP anonymity which is only going to help us. Manufactured from reality only. Even if you don't believe there is much risk, why not protect yourself and be sure?

Sounds to me like you have some agenda to prevent us from being sure. Why?

Crypto accounts can't be frozen, and they are difficult and sometimes impossible to confiscate (lol let's raid EVERYBODY!!), let alone prove that you are in possession of them.

If they've identified the current holder of the coin, they can compel you to give your password or throw you in maximum security prison (hell on earth) for contempt of court until you do (as they did for 7 years to Martin Armstrong in the USA).

Also because of the MF Global precedent of "clawbacks", they don't need to confiscate the coin, they can confiscate everything else you have as a replacement, even if you already disposed of the original holding that is involved.
hero member
Activity: 798
Merit: 1000
November 08, 2013, 07:39:01 PM
That is not acceptable in technical debate. Refute with technical argument.

You mean like "well bruce schneier sez!!!"?

Quote
Did you fail to read what I wrote upthread? That I don't want to have to prove that some criminal who used my coin before or after I held it, was not me or not involved with me somehow

Sorry, but this fails the smell test. It is a manufactured argument for pushing an agenda. Crypto accounts can't be frozen, and they are difficult and sometimes impossible to confiscate (lol let's raid EVERYBODY!!), let alone prove that you are in possession of them.
hero member
Activity: 518
Merit: 521
November 08, 2013, 07:20:48 PM
Why are you accusing me of being a criminal?!!! Damn it that almost deserves reporting you to the moderator!

Did you fail to read what I wrote upthread? That I don't want to have to prove that some criminal who used my coin before or after I held it, was not me or not involved with me somehow (i.e. me as his financier)! Because that is not going to be easy in every case.

Also because of the Admiralty laws, governments can confiscate all money that was involved with a crime, even if you prove you were not involved.

http://www.nestmann.com/civil-forfeiture-of-cash-it-could-happen-to-you

Quote
Proving that your cash is connected to a crime is surprisingly easy to demonstrate. That's because 97% or more of cash circulating today contains tiny concentrations of narcotics residues—primarily cocaine. All police need to do is to bring in a drug-sniffing dog to inspect the cash.  If the dog alerts, police seize the cash. And, under civil forfeiture rules, it's up to you to prove that the cash has a legitimate origin.

Consider the case of Emiliano Gomez Gonzolez. During a traffic stop, Nebraska state troopers asked Gonzolez for permission to search his vehicle. During the search, the troopers found bundles of currency totaling $124,700. Based on a dog sniff, police seized all the money.

Gonzolez contested the forfeiture in court. Prosecutors neither convicted nor accused Gomez or any of the other owners of the seized cash of any crime. Nor did police find any drugs, drug paraphernalia, or drug records connected to the cash. Despite these facts, a federal appeals court upheld the confiscation of every dollar found in the vehicle.

In thousands of cases across the United States each year, police follow the same pattern. In a search of someone's home or vehicle, they discover a significant quantity of cash. They then bring in a dog to sniff the cash for the presence of drug residues. The dog alerts virtually 100% of the time. This supposedly gives police probable cause to seize the cash under state or federal civil forfeiture laws.

Owners of property subject to civil forfeiture find themselves in an Alice-in-Wonderland legal landscape where the property seized is accused of a crime, rather than the owner. The owners must follow obscure rules that originate in Admiralty law, with which most attorneys aren't familiar. Under these rules, the seized property is presumed guilty, and it's up to its owner to demonstrate that the property is innocent. (Yes, it's bizarre, but it's the law!) Since obtaining legal representation in a civil forfeiture case typically requires a legal retainer of $10,000 or more, most victims of this vicious procedure never contest the seizure.

In an era of across-the-board cutbacks in public spending, civil forfeitures are a lucrative funding source for cash-strapped agencies and states. Last year, the federal government seized more than $4 billion under civil forfeiture laws, more than twice the take in 2011.

And don't forget the lesson learned from MF Global, i.e. clawbacks they can go back and get money from you that you are already disposed of.
hero member
Activity: 518
Merit: 521
November 08, 2013, 07:12:24 PM
Incorrect. For a timing attack, they only need to see the traffic passing between each node in the Tor network.

You do not have a grasp on the situation here. I'll leave it at that.

That is not acceptable in technical debate. Refute with technical argument.

I do understand very well. You have not shown yet that you understand the technical issue.

Hmmm. Etlase2 why are you are arguing against improvement of the anonymity?

Hmmm. AnonyMint, why are you so scared? May I imply that you are a criminal in various ways?

Why are you accusing me of being a criminal?!!! Damn it that almost deserves reporting you to the moderator!

Did you fail to read what I wrote upthread? That I don't want to have to prove that some criminal who used my coin before or after I held it, was not me or not involved with me somehow (i.e. me as his financier)! Because that is not going to be easy in every case.

Also because of the Admiralty laws, governments can confiscate all money that was involved with a crime, even if you prove you were not involved.

And because the governments are going to taxing left and right, including wealth taxes and capital gains taxes. You will not retain your savings past 2020. You will be wiped out. This is the plan and the way global bankruptcy is always resolved in history.

PS - For crying out loud, stop editing your posts.

You know very well with me to wait 5 minutes or so, because I think of edits until I am satisfied with what I wrote.
hero member
Activity: 798
Merit: 1000
November 08, 2013, 07:07:03 PM
Incorrect. For a timing attack, they only need to see the traffic passing between each node in the Tor network.

You do not have a grasp on the situation here. I'll leave it at that.

Hmmm. Etlase2 why are you are arguing against improvement of the anonymity?

Hmmm. AnonyMint, why are you so scared? May I imply that you are a criminal in various ways?

PS - For crying out loud, stop editing your posts.
hero member
Activity: 518
Merit: 521
November 08, 2013, 07:02:16 PM
It should be noted that if for some reason bitcoin fails, we would need an alt currency to take its place.  Bitcoin 2.0 or something which corrects the flaws created by the currency and brings the cryptocurrency to a whole new level.  Of course I would never want bitcoin to fail, but just as the most secure systems in the world are eventually cracked, bitcoin may fall as well.

Agreed.

And the NSA doesn't tell you when they've cracked. We went through the entire 1980s when they had cracked all encryption using differential cryptography analysis methods, and nobody knew it!!!

So why would these two guys be arguing here against having a more securely anonymous coin then? Hmmm. Etlase2 why are you are arguing against improvement of the anonymity?
sr. member
Activity: 462
Merit: 250
November 08, 2013, 07:00:26 PM
It should be noted that if for some reason bitcoin fails, we would need an alt currency to take its place.  Bitcoin 2.0 or something which corrects the flaws created by the currency and brings the cryptocurrency to a whole new level.  Of course I would never want bitcoin to fail, but just as the most secure systems in the world are eventually cracked, bitcoin may fall as well.
hero member
Activity: 518
Merit: 521
November 08, 2013, 06:56:16 PM
The data goes on a public ledger. It is decrypted.

And the gigantic point that you miss is that the originator of the transaction is lost in the noise. With basic protocol encryption, the NSA would have to not only be watching your connection, but they would have to BE every peer you are connected to on the "clear net" so that they can isolate the incoming tx that you see and retransmit, then they would have to control a vast majority of every bridge or relay in the tor network to ensure that they control each hop you use (which is astronomically unlikely if the client acts as a tor bridge--unless the NSA is the only one using it, you're fairly safe).

Incorrect. For a timing attack, they only need to see the traffic passing between each node in the Tor network. And I asserted already, the governments tap all the traffic on the internet that passes over trunk lines (which is most of it). And you can be sure they are extra diligent to tap all traffic between Tor nodes.

They don't need to BE every peer. Not at all. You apparently don't understand how the timing attack works. Read the research if you doubt my assertion.

What in the ever loving fuck are they going to do? Control every bit of data, crunch all the numbers and put it in a tidy box for the IRS to examine and send a tax bill?

Yes. Especially those liberty loving 350,000 of us who have now clearly identified ourselves. That is only a very small percentage of the world's population. We will be tagged as "tax evaders" especially at the time the governments are going bankrupt and need revenues to pay the welfare checks and free healthcare for the rest of the masses who won't be targeted by this surveillance.

What happens if people start opening up their wireless connections for transactions?

You can't get a SIMM card in most countries without giving ID.

If you mean Ham radio, that is not going to happen. All radio operators are licensed.

The NSA does not have the ability to suppress this or do whatever it is you've gotten into your mind that they can do. Not without destroying the internet, the tool they have fallen so deeply in love with.

Yes they do. You are denying the facts.

Sorry to bring a dose of reality-check to your fantasy world. Better you wake up now.

You must have missed the links to the videos I provided upthread. Here is that post again:

https://bitcointalksearch.org/topic/m.3497509
hero member
Activity: 798
Merit: 1000
November 08, 2013, 06:43:11 PM
The data goes on a public ledger. It is decrypted.

And the gigantic point that you miss is that the originator of the transaction is lost in the noise. With basic protocol encryption, the NSA would have to not only be watching your connection, but they would have to BE every peer you are connected to on the "clear net" so that they can isolate the incoming tx that you see and retransmit, then they would have to control a vast majority of every bridge or relay in the tor network to ensure that they control each hop you use (which is astronomically unlikely if the client acts as a tor bridge--unless the NSA is the only one using it, you're fairly safe).

What in the ever loving fuck are they going to do? Control every bit of data, crunch all the numbers and put it in a tidy box for the IRS to examine and send a tax bill? What happens if people start opening up their wireless connections for transactions? What happens if KimDotCom (or insert random person with wealth and anti-establishment values) creates a tor hidden service and says "send me your tx, I will forward them on"? They will now need to control every piece of tor infrastructure and his service.

The NSA does not have the ability to suppress this or do whatever it is you've gotten into your mind that they can do. Not without destroying the internet, the tool they have fallen so deeply in love with.
hero member
Activity: 518
Merit: 521
November 08, 2013, 06:26:16 PM
You don't understand that all low-latency networks are vulnerable to timing attacks if the attacker can see the traffic between each peer on the network. They don't need to decrypt the traffic, they just need to see the timing. This is well proven in research papers that have analyzed Tor. Tor even admits this.

And this is completely irrelevant in the case of a distributed shared file. No one is trying to hide anything except for a tiny little portion that they do not want attributed to them. They DO need to be able to decrypt the traffic if they want to know what transaction originated from where.

Tor is perfectly acceptable for anonymizing transactions. Why you don't see this is beyond me. And the trade-off for high latency is an unusable network for commerce, at least of the face to face variety. In that case, only criminals are likely to use such a system making the target much juicier.

No Tor is not acceptable. See below.

There is another option that is not high-latency that eliminates timing attacks. It is a Bitmessage way of mixing, but that can't work for Tor's general application to web browsing. It can work for an altcoin.

Also some people has thought the Tor relays are honeypots. How can you prove they are not! You can't. Who is paying to give away all those free servers and bandwidth?

SO WHAT? The relays do not know what the data is!

The data goes on a public ledger. It is decrypted. Even if you send it over SSL to the mining peer or pool, then you have the problem of trusting that peer or pool is not a honeypot. And currently I don't believe Bitcoin uses SSL for that any way.

If you can correlate via timing analysis, then you know which data that is going on the public ledger correlated to which IP address that originally sent into the first relay.

With only 3 hops, if all 3 are honeypotted, they don't even need timing analysis.

You really haven't thought this through.

Now what you say?
hero member
Activity: 518
Merit: 521
November 08, 2013, 06:23:02 PM
My apologies, I did not realize that you were a crazy person. Cary on.

Character assassination is what losers revert too when they can't present a cogent argument. Your prior comment was weak logic which I refuted, so then come back and character assassinate to get revenge. You take advantage of where I decided to shift from pure logic to speculation.

You decided not to quote where I wrote "Speculation follows". Speculation is not a statement of fact.

You clearly are biased for Bitcoin and will say anything to protect Bitcoin, while ignoring reality.
legendary
Activity: 1680
Merit: 1035
November 08, 2013, 06:19:20 PM
Don't you see the media pushing Bitcoin? This doesn't happen without the permission of the ruling elite. It is my speculation, "they" (rockefeller/rothschilds/kissinger) created Bitcoin. Not the underlings such a Obama and Geithner. Compartmentalization of the underlings.

The government will continue to pretend to be somewhat against it, well for one thing the underlings don't know it is intended to be the next one-world digital currency. The elite don't want us to wake up too soon and realize we've unknowingly handed them the 666 control they want. They are hoping for the "there can only be one" outcome. That is why this thread is so important to me.

My apologies, I did not realize that you were a crazy person. Cary on.
Pages:
Jump to: