Author

Topic: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion - page 32707. (Read 26720777 times)

sr. member
Activity: 371
Merit: 250
I'm one of the "select few" and I'll tell you. With the help of Sherlock Holmes, we've assembled a crack team who can break substitution cyphers in a matter of days, sometimes hours!

Think twice before encrypting your critical data with your secret decoder ring.


I really can't tell if you guys actually believe the FUD you are posting or if you are legitimately confused about how encryption, and more specifically, bitcoin work.

Anything that relies on AES encryption is compromised. Don't give me "yea but 256 takes so much longer to brute force than 128 bit" blah blah. If the US Gov has an unprecedented method to speed up brute force of 128 bit, they can surely use it on 256 bit.

*edit* re encrypting wallets ^

As soon as you are using a computer now a days there is a big chance that they can easily track you or get anything they want from you.

- Intel new chips can be controlled remotely
- Windows (high percent of computer installed OS) is absolutely infiltrated by NSA. They even have an office in the NSA building
- IOs & Android and now Microsoft wants to buy Nokia. They know everything they need about you and more (usage, pictures, messages, phone talks, whatsapp)
- Watches is the next step, just in case you forget to take your mobile with you. If you don't use watches, in the near future there will be glasses everywhere. What are you going to do wear a mask in your neighbourhood?.
- Password software like lastpass is located in US. They say in their forums that they have not been requested by the US goverment to install anything "strange" on their software but based on US law, they cannot say anything in case they were infiltrated. They say everything is encrypted on your machine, but just a rogue patch from them and they can change it in 5 minutes (if they haven't already).
- Data in the cloud: Dropbox, Google Drive, Sugarsync, Box.net.  Online backup: crashplan and many others. Maybe only wuala in switzerland is encrypted and a couple other open source software.
- Even if it is open source there might be a possibility that it is infiltrated. Look at tor where their code had a leak and even knowing it. It took days to decipher the open code due to it's complexity.
- If you are printing a paper wallet, think about it. Do you have one of those wifi printers with cloud printing? Do you think they won't get what you have just printed. Sure they will.
- Android encryption codes bugged (scandal about wallets/android from a couple of weeks ago). I would bet they did it knowingly.
- They scan every single snail mail through united states.
- They are even asking the webmasters to disclose users passwords to their webpages for security reasons.
- In top of that huge huge brute force power, mathematicians and infinite budget.
- Most security methods also rely on certification companies around the world. Using those you can prepare attacks in the middle. Who controls them?


So if you are using a computer, it is highly unlikely that you are not vulnerable multiple times. There is an interesting book from Assange -> Cypherpunks if interested on this.


http://prism-break.org/
legendary
Activity: 1904
Merit: 1038
Trusted Bitcoiner
wow the FUD is everywhere
hero member
Activity: 686
Merit: 500
Ultranode
I'm one of the "select few" and I'll tell you. With the help of Sherlock Holmes, we've assembled a crack team who can break substitution cyphers in a matter of days, sometimes hours!

Think twice before encrypting your critical data with your secret decoder ring.


I really can't tell if you guys actually believe the FUD you are posting or if you are legitimately confused about how encryption, and more specifically, bitcoin work.

Anything that relies on AES encryption is compromised. Don't give me "yea but 256 takes so much longer to brute force than 128 bit" blah blah. If the US Gov has an unprecedented method to speed up brute force of 128 bit, they can surely use it on 256 bit.

*edit* re encrypting wallets ^
hero member
Activity: 824
Merit: 712
SHA 256 was developed by the NSA and the article says they developed encryption they could break.  Why would they develop encryption they couldn't break?  So, if they can hack it or have a back-door, someone else may figure out a way.

http://en.wikipedia.org/wiki/Secure_Hash_Algorithm
http://en.wikipedia.org/wiki/SHA-2
http://en.wikipedia.org/wiki/National_Security_Agency
legendary
Activity: 896
Merit: 1001
I'm one of the "select few" and I'll tell you. With the help of Sherlock Holmes, we've assembled a crack team who can break substitution cyphers in a matter of days, sometimes hours!

Think twice before encrypting your critical data with your secret decoder ring.


I really can't tell if you guys actually believe the FUD you are posting or if you are legitimately confused about how encryption, and more specifically, bitcoin work.
hero member
Activity: 686
Merit: 500
Ultranode
"The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of internet users in the US and worldwide."  -http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Some juicy details left out. I bet they omitted the specific protocols that can already be brute forced easily and much quicker than assumed.
legendary
Activity: 966
Merit: 1001
Energy is Wealth
Well lets put it this way would any hostile country's military use a function (SHA-256) provided by the NSA as the agency has locked themselves out? Its a bit like building a house and give everyone a key put not keep one myself.
legendary
Activity: 896
Merit: 1000
  it actually says in the article that brute forcing is part of the attack.
hero member
Activity: 686
Merit: 500
Ultranode
If you could break encryption, you wouldn't tell anybody.

Other info from the latest leaks indicate only a select few know exactly which forms of encryption are cracked. See the articles i posted.
legendary
Activity: 896
Merit: 1001

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

I like how there is really no room for interpretation here

You're saying they can't break encryption, right? Just so we're clear.

The fact that it's a "multi-pronged" effort, involving methods like intercepting the data before it's encrypted, inserting vulnerabilities into commercial encryption software, pressuring major organizations for backdoor keys, or permission to insert code into their systems, writing clauses into the Patriot act allowing them to hold on to encrypted data forever, etc. etc., to me, says that they in fact CAN'T break encryption. If you could break encryption, you would just do it. It would be a "single-pronged" effort. Why waste time with all that other crap?

Now if you legitimately believe they are brute forcing the encryption open, what kind of timeframe would you put on that? 100 years? 10? 5? How long until they can do it in less time than the time between bitcoin blocks? Would that cost less than launching World War 3 and nuking everyone into slavery?
legendary
Activity: 2380
Merit: 1823
1CBuddyxy4FerT3hzMmi1Jz48ESzRw1ZzZ
hero member
Activity: 686
Merit: 500
Ultranode
Walsoraj, I come when panic starts to loom on the horizon Smiley

Read my recent posts. you will see I'm at least a week ahead of the horizon
sr. member
Activity: 252
Merit: 250
Walsoraj, I come when panic starts to loom on the horizon Smiley
hero member
Activity: 686
Merit: 500
Ultranode
US Gov can hack bitcoin?

And your proof is a series of articles documenting that they are actively making requests to major service providers for their encrpytion keys?


Let's think about this one for 2, maybe 3 seconds. If I was US Gov, and I could defeat encryption.... why am I going around asking for keys again?


I'm not quoting you in respect to all those that have you on ignore.

Most of the ignores come from Rpetilia's alt accounts. He has dozens to converse with himself. It creates a social environment that makes him appear to others as a genuine character. Eventually, he will earn the trust of some rich sucker and run away with lots of money. When you point this out, Rpetilia typically goes into hiding and spam ignores you with all of his accounts.

*edit*

hey lucas, my friend. Nice to see you back in the thread.
sr. member
Activity: 252
Merit: 250
legendary
Activity: 896
Merit: 1001
US Gov can hack bitcoin?

And your proof is a series of articles documenting that they are actively making requests to major service providers for their encrpytion keys?


Let's think about this one for 2, maybe 3 seconds. If I was US Gov, and I could defeat encryption.... why am I going around asking for keys again?


I'm not quoting you in respect to all those that have you on ignore.
hero member
Activity: 686
Merit: 500
Ultranode
May the selloffs... Begin.

Gg  bitcoin

Nore.

I like your attitude.1





fn1 until we hit single digits
legendary
Activity: 896
Merit: 1000
 May the selloffs... Begin.

Gg  bitcoin

Nore.
sr. member
Activity: 516
Merit: 283
10 year bonds closed at hit 3% @ 4:27 EST http://www.marketwatch.com/investing/bond/10_year

this is the beginning of the end of the universe

you're so dramatic.

the beginning of the end started a long time ago.
Jump to: