Pages:
Author

Topic: What skill sets should non-professional BTC-ers try to acquire? (Read 1861 times)

legendary
Activity: 2968
Merit: 1895
...

Thanks, own123.  I'll be looking into TOR soon.  It's no business of anyone else's where we go online.  Privacy is important.

And I suspect that terist [sic], money laundering, drug buying, etc. on the dark web is just a big Red Herring anyway.  Just more ammo for the STATISTS to impose their views.

Viva Bitcoin.  Viva encryption.  Viva TOR.
sr. member
Activity: 392
Merit: 250
Regarding the government snooping, TOR is quite slow for your everyday use. You may want to consider a high speed VPN instead.

If you pick one that does not log anything from its costumers (including real IP, DNS, websites visited, etc), you are already very difficult to find.


Yes totally agree.
There are several good VPN providers out there who offer really a great service.
And often you can pay them with Bitcoin!

This link can be helpful to get some informations.
https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/

I dont fully agree. It depends what you are using tor for. I use tor almost all the time. Even writhing this is through tor. So its fully usable, unless your everyday use includes lots of youtube or downloading stuff.

And with VPNs I would be careful, especially on the list you provided:
http://txti.es/2015-vpn-providers-and-paying-using-bitcoin



OK, let's switch focus to TOR vs. VPNs then.  I have never used TOR before, and it looks complicated for a beginner.  I am aware of it's website ( https://www.torproject.org/ ), but still it looks more complicated than email encryption.

Do you three (owm123, Denker and NorrisK) have other comments for a non-pro like me?  How hard is it to learn?


What do some others btctalk members have to say about TOR?


Disclosure: I am not into illegal things nor have any desire to go there.  I just want to know how to be private as I may so choose.


Tor browser is the easiest way to use Tor. It just works out of the box. And there is not really any learning to do, when using tor.

If you more conscious about your privacy when using internet, there are many guides explaining "good practices" of using tor, such as this one:  https://www.whonix.org/wiki/DoNot  . But if you just want to avoid your ISP or employer spying on what you are browsing from home or work, just using tor as you would normally use a browser is fine.

hero member
Activity: 728
Merit: 500
TOR, as a browser, is very easy to use for beginners. They have it all listed out and it is easy to connect to the normal internet. I use it here and there to browse some (legal) sites.

I have never used any TOR services beyond just the modified browser, so I can't speak any more.
Tor is actually a network. The Tor browser is a modified version of Mozilla Firefox to work with the Tor network and better secure your privacy.

The difference between the Tor network and VPNs is that Tor is generally more private.

Tor uses essentially three (or more) proxy servers which act as layers, which is why it is called The Onion Router since it routes your data through layers like an onion. There are several thousand relays (proxy servers) which relay your data. One relay is the guard relay, and it is the one you connect directly to. It forwards your data to the next relay, which forwards it to the last one, the exit relay. The exit relay knows the website you are browsing. An important thing is that all of the connections between you and the exit relay are encrypted. It is up to you to use HTTPS for after the exit relay to keep your data secure. One of the most important aspects of Tor is that none of the relay's know everything about you (assuming they are all run by different people). If the relays were to log things, only the guard relay would know your IP address and only the Exit relay would know where you are trying to get to. But neither know the full story thus protecting your anonymity.

VPNs on the other hand are typically only one proxy server. The connection to the VPN may or may not be encrypted, but like exit relays, you still need HTTPS to encrypt further traffic. Using a VPN service run by someone else means that you are trusting them to not log your information. The VPN would know your IP address and what you are browsing, so it compromises your anonymity. The VPN provider would know everything, whereas in Tor no one knows everything.
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
There's a video of ... .. here,

https://www.youtube.com/watch?v=xUNGFZDO8mM

It's a senate hearing on bitcoin with Andreas Antonopoulos. You could grab his book too.

https://www.torproject.org/download/download-easy.html.en
TOR for Windows, easy to use download.
legendary
Activity: 2968
Merit: 1895
...

Thanks, Yakamoto!

Once I finish learning enough about email encryption, TOR may very well be the next technology I try to learn about.  Learn enough to use it, I have no interest (nor ability) to dig down deep into it...

*   *   *

I am already in the process of setting up my new website (ameru.io) which I now own, but it has no content.  I have asked three website designers/builders to quote on about a 10 page site.  A fourth may quote if my computer guy puts my proposed website into the hands of someone here in town who knows about building websites...

This would be informational, with stuff I am interested in (BTC, gold, ball bearings (our business down in Peru), etc.).  I have various "virtual friends" into one or more of those subjects.  My goal would be to have all the stuff that I refer to in one nice handy place.  Others could come and take a look.  Non-commercial.
legendary
Activity: 1218
Merit: 1007
Regarding the government snooping, TOR is quite slow for your everyday use. You may want to consider a high speed VPN instead.

If you pick one that does not log anything from its costumers (including real IP, DNS, websites visited, etc), you are already very difficult to find.


Yes totally agree.
There are several good VPN providers out there who offer really a great service.
And often you can pay them with Bitcoin!

This link can be helpful to get some informations.
https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/

I dont fully agree. It depends what you are using tor for. I use tor almost all the time. Even writhing this is through tor. So its fully usable, unless your everyday use includes lots of youtube or downloading stuff.

And with VPNs I would be careful, especially on the list you provided:
http://txti.es/2015-vpn-providers-and-paying-using-bitcoin



OK, let's switch focus to TOR vs. VPNs then.  I have never used TOR before, and it looks complicated for a beginner.  I am aware of it's website ( https://www.torproject.org/ ), but still it looks more complicated than email encryption.

Do you three (owm123, Denker and NorrisK) have other comments for a non-pro like me?  How hard is it to learn?


What do some others btctalk members have to say about TOR?


Disclosure: I am not into illegal things nor have any desire to go there.  I just want to know how to be private as I may so choose.
TOR, as a browser, is very easy to use for beginners. They have it all listed out and it is easy to connect to the normal internet. I use it here and there to browse some (legal) sites.

I have never used any TOR services beyond just the modified browser, so I can't speak any more.
legendary
Activity: 2968
Merit: 1895
Regarding the government snooping, TOR is quite slow for your everyday use. You may want to consider a high speed VPN instead.

If you pick one that does not log anything from its costumers (including real IP, DNS, websites visited, etc), you are already very difficult to find.


Yes totally agree.
There are several good VPN providers out there who offer really a great service.
And often you can pay them with Bitcoin!

This link can be helpful to get some informations.
https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/

I dont fully agree. It depends what you are using tor for. I use tor almost all the time. Even writhing this is through tor. So its fully usable, unless your everyday use includes lots of youtube or downloading stuff.

And with VPNs I would be careful, especially on the list you provided:
http://txti.es/2015-vpn-providers-and-paying-using-bitcoin



OK, let's switch focus to TOR vs. VPNs then.  I have never used TOR before, and it looks complicated for a beginner.  I am aware of it's website ( https://www.torproject.org/ ), but still it looks more complicated than email encryption.

Do you three (owm123, Denker and NorrisK) have other comments for a non-pro like me?  How hard is it to learn?


What do some others btctalk members have to say about TOR?


Disclosure: I am not into illegal things nor have any desire to go there.  I just want to know how to be private as I may so choose.
sr. member
Activity: 392
Merit: 250
Regarding the government snooping, TOR is quite slow for your everyday use. You may want to consider a high speed VPN instead.

If you pick one that does not log anything from its costumers (including real IP, DNS, websites visited, etc), you are already very difficult to find.


Yes totally agree.
There are several good VPN providers out there who offer really a great service.
And often you can pay them with Bitcoin!

This link can be helpful to get some informations.
https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/

I dont fully agree. It depends what you are using tor for. I use tor almost all the time. Even writhing this is through tor. So its fully usable, unless your everyday use includes lots of youtube or downloading stuff.

And with VPNs I would be careful, especially on the list you provided:
http://txti.es/2015-vpn-providers-and-paying-using-bitcoin

legendary
Activity: 2968
Merit: 1895
...

I am now reasonably comfortable using gpg4win encryption.

Thank you again Dabs and Ayle56.

I will tinker with them both some more to nail down my knowledge better.

*  *  *

One question:

I tried exporting "my keys" to a flash drive, bit it looks like it only sent the Public Key.  So, how would I decrypt a message on ANOTHER computer (the one at my office)?  I do not see how to do that.

Or does that mean having to have a Key Set for each computer one actively uses?

*  *  *

So, in a few days it's on to other technologies...  Smiley
legendary
Activity: 2968
Merit: 1895
...

Ayle56 and Dabs

Each of you has a message on somewhat different subjects.

Ayle56...  Eeek!  Some of that last post on the last page made my brain break out in some kind of mental rash or something.  I dimly understand what you are writing about Craig Wright in Oz, but that's about it.  But, I will check out the countermail tool you provided in due course (soon).  I already have a homework assignment to check out verifying signatures...

Smiley

*   *   *

Keep in mind, though, that we are ALL likely "little fish" (I am anyway), and so are not a target of our pals at .gov.

Would the Rich And Powerful be commenting here at bitcointalk?  Probably not (well, maybe r******* and some developers/pioneers, but I wouldn't know).

Still, the more who are better informed, the better for all of us.
full member
Activity: 185
Merit: 100
If you want to see the metadata hidden inside your PGP key, or messages signed with it you can use this online PGP packet analyzer.

https://countermail.com/?p=tools

At the bottom of the page there is a text box with a PGP packet analyzer label where you can paste your key or message. It's the easiest PGP packet analyzer tool to use that I know of.
full member
Activity: 185
Merit: 100
...

Dabs and Ayle56

You both have a message, although Dabs got one that might be incorrectly formatted (the LATTER message is probably the right one).



I got your message and sent a reply.

Recently a guy called Craig Steven Wright attempted to trick the world into believing he was the real Satoshi Nakamoto. He created a PGP key, signed a message, and tried to pass it off as something posted on the internet the same day Satoshi posted PGP content.

Someone analyzed the PGP message header and discovered it used a modern version of crypto algorithms, rather than the old version of crypto algorithms from years ago that the real Satoshi's PGP content used.

Some of the information in a PGP header can be read by anyone with the right software. The Key ID in the header can compromise your anonymity, as this quote from a webpage shows. If it's important there are ways of removing the Key ID from PGP message headers to make it more anonymous.


http://tech.michaelaltfield.net/2013/10/19/analyzing-pgp-content/

Quote
This post attempts to answer the following question: If an evesdropper intercepts a message encrypted with gpg, how much information will they be able to extract from the message without a decryption key?

I will show the unencrypted metadata added to a GPG-encypted message, and I will present commands that can be used to extract this unencrypted metadata.

In the below execution, I demonstarte the creation of a key, the encryption of a file, the deletion of the secret key, and the analysis of the encrypted file without the ability to decrypt its contents

...


Now that all the files are created and the secret key has been deleted, let’s try to analyze the pgp file to see what unencrypted data we can pull out.


root@Microknoppix:/tmp/test# gpg --list-packets test.txt.gpg
:pubkey enc packet: version 3, algo 1, keyid D65FA0A95D0D3E9C
data: [1023 bits]
:encrypted data packet:
length: 80
mdc_method: 2
gpg: encrypted with RSA key, ID 5D0D3E9C
gpg: decryption failed: secret key not available

As you can see above, this message was encrypted using the key “D65FA0A95D0D3E9C” using RSA.

Let’s try another (more human readable) tool for dumping unencrypted data from PGP files: PGPdump.


root@Microknoppix:/tmp/test# pgpdump test.txt.gpg
Old: Public-Key Encrypted Session Key Packet(tag 1)(140 bytes)
New version(3)
Key ID - 0xD65FA0A95D0D3E9C
Pub alg - RSA Encrypt or Sign(pub 1)
RSA m^e mod n(1023 bits) - ...
-> m = sym alg(1 byte) + checksum(2 bytes) + PKCS-1 block type 02
New: Symmetrically Encrypted and MDC Packet(tag 18)(80 bytes)
Ver 1
Encrypted data [sym alg is specified in pub-key encrypted session key]
(plain text + MDC SHA1(20 bytes))

As you can see, pgpdump seems to have pulled the same data, but it’s expounded a bit on what RSA does. It also appears to include information about a symmetric key, which makes sense but isn’t obvious from the `gpg—list-packets` command above.

Now, let’s try to hide the recipient of the message using `gpg—hidden-recipient` instead of `gpg—recipient`.

...


And below we peek at the gpg file’s packet’s headers to see if we can still see the recipeient.


root@Microknoppix:/tmp/test# gpg --list-packets test.txt.gpg
:pubkey enc packet: version 3, algo 1, keyid 0000000000000000
data: [1022 bits]
:encrypted data packet:
length: 80
mdc_method: 2
gpg: encrypted with RSA key, ID 00000000
gpg: decryption failed: secret key not available
root@Microknoppix:/tmp/test# pgpdump test.txt.gpg
Old: Public-Key Encrypted Session Key Packet(tag 1)(140 bytes)
New version(3)
Key ID - 0x0000000000000000
Pub alg - RSA Encrypt or Sign(pub 1)
RSA m^e mod n(1022 bits) - ...
-> m = sym alg(1 byte) + checksum(2 bytes) + PKCS-1 block type 02
New: Symmetrically Encrypted and MDC Packet(tag 18)(80 bytes)
Ver 1
Encrypted data [sym alg is specified in pub-key encrypted session key]
(plain text + MDC SHA1(20 bytes))

Success! We’ve hidden the key id of the recipient!
legendary
Activity: 1610
Merit: 1183
I think privacy related stuff is very needed for Bitcoin, thats why stuff like confidential transactions or the bip47 that i learned through a Chris Odom speech is extremely important, we need more people improving Bitcoin's privacy, the centralized mixers aren't enough.
legendary
Activity: 2968
Merit: 1895
Got your message. First one was "modified". Don't change anything in between the ---BEGIN and ---END parts.

For German and Italian, while I am not fluent, I recommend looking for Pimsleur. Actually, for most languages. I have not tried the others so I have no experience with them.

I will send you another encrypted message.


Yes, that's where I messed up in my message, I probably executed a "Cut & Paste" wrong.  (Whoops, I just lost my Queen to a stupid mistake!)

For Italian, all I have to do is talk w/ my wife.  She was born in Peru but has been taking Italian on-and-off for 18 years, she's pretty good at it. 

German?  That's hard, declining nouns, adjectives and articles...  Reminds me of Latin.  Ugh!

Spanish I have down pat though: "Si no practico español en la casa, me PEGA la jefa!"  (Peruvian self-deprecation for men)
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
Got your message. First one was "modified". Don't change anything in between the ---BEGIN and ---END parts.

For German and Italian, while I am not fluent, I recommend looking for Pimsleur. Actually, for most languages. I have not tried the others so I have no experience with them.

I will send you another encrypted message.
legendary
Activity: 2968
Merit: 1895
...

Dabs and Ayle56

You both have a message, although Dabs got one that might be incorrectly formatted (the LATTER message is probably the right one).

*   *   *

xmax

I suspect ANY puzzles here at bitcointalk are WAY beyond my capability!  I would bet that only highly-skilled programmers or other experts in BTC can break such codes.  As mentioned (ad nauseam?) above, I am not any kind of expert here.

*   *   *

For the moment, I am learning email encryption as part of my 2016 efforts to learn a few technologies of interest.  My new website will give me ample opportunities to learn (by struggle) new technologies...

Maybe pick up a little more German and Italian too.  See Europe again before it all changes...  Smiley
full member
Activity: 131
Merit: 100
I would personally like to learn how the coding and programming works.  i see on here where there is a puzzle where you can earn some BTC if you can break the codes, but it all looks foreign to me and I do not understand any of it.  Do I need general coding knowledge in order to be able to code with Bitcoin code?
legendary
Activity: 2968
Merit: 1895
Yes, go and make a few private keys, play around, revoke them, publish them, etc. Make small ones (1024 bit) and large ones (3000+)

Then when you think you are ready, go make larger keys if you want. (4096 is the largest practical key.)


Dabs, you have (will soon) a message!  Maybe I did it right?  Smiley

I used Ayle56's link to get another set of keys, but I think I have a better understanding of importing keys, etc.

Now I have to figure out how to find my public key number two...

Does this ever end?   (Ah, I already know the answer)

Ayle56, I'll drop you a line (PM) sometime too.
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
Yes, go and make a few private keys, play around, revoke them, publish them, etc. Make small ones (1024 bit) and large ones (3000+)

Then when you think you are ready, go make larger keys if you want. (4096 is the largest practical key.)
legendary
Activity: 2968
Merit: 1895
There was a short documentary on bitcoin released last year? 2014? Or something. Some really old stuff in there, but it's good to know a little history, plus it was entertaining to watch. Try here: http://bitcoindoc.com/ I think I found somewhere else where you can get it for free (may be not legal, depends, dunno. hehe. didn't care at the time.)

As for GPG, https://gnupg.org/download/index.html

http://gpg4win.org/download.html for windows
http://gpgtools.org/ for mac

Go send me an encrypted email and I'll reply. I'll leave it as an exercise for you to find my public key and my email address. Smiley Or you can encrypt a message and send it in a PM. A lot of bitcointalk members do that.

As for other skill sets, I think, if you managed to do okay with SQL, you'll pick up bitcoin fast. All my resources were from this forum or anything I can find in google or the wiki.

The rest, well, I believe a lot of old timers were basically self taught. While this forum has a lot of noise, you'll find good stuff around here.



Thank you, Dabs.  My evening's work (um, after the New Year's celebrations) yielded only a GPG/email working withing my new website's boundaries only.

I run windows, so I will try that http://gpg4win.org/download.html for windows.

Then:

Saturn643's comment: The simplest way to encrypt emails with GPG/PGP is to just write the email in another text editor, encrypt that text using whatever GPG software you are using, and then copy and paste the encrypted text into the email as the message.

So, I will do some homework and be back...

Try using gpg4usb from this website.

http://www.gpg4usb.org/download.html

It's portable and easy to use. All you need to do is unzip the zip file and double click the exe file in the unzipped folder. It's got a built in text editor and simple buttons on an intuitive GUI that do almost anything you need. I tried gpg4win but found this easier to use.


Thank you Ayle56!  I will try that one out too.  "Easy is good."  It looks like I can have as many Keys as I want, so I will play with a few and pick my permanent one once I get the hang of everything.  Besides, it looks like my current password may be compromised, in that I sent a close version to a friend.  But, one thing I have learned here in Internetbitcoinistan is that you cannot be too careful.

Standard Disclosure:  

I am trying to learn all of this myself (with all of your help, and again, my sincere thanks to you all), I did not study Computer Science or related, so my skill set is not so great.  And I was always one of the slower students, just ask any of my teachers/professors, they would tell you the same if they remember at all...
Pages:
Jump to: