Pages:
Author

Topic: Why so little talk of Dave Kleiman? - page 2. (Read 16530 times)

AGD
legendary
Activity: 2070
Merit: 1164
Keeper of the Private Key
May 08, 2016, 03:25:58 AM
This is not just a tax scam, but it looks definitely like a PSYOP. Why core developers are not discussing this issue (edit: in public)?
vip
Activity: 1428
Merit: 1145
May 08, 2016, 12:22:32 AM
http://financial-advisors.credio.com/l/56219/Andrew-Kleinman



Now that's a trust!

Do you wonder where Andrew Kleiman has his office?



Quote
515 North Flagler Drive
Suite 1700
West Palm Beach, Florida 33401-0347
United States

What are the odds... Ah, fuck it! I'll just cut to the chase and answer the [incomplete] rhetorical question - 100%.

First the setup: http://www.oreilly.com/pub/au/2560

Quote
Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP, ISSAP, ISSMP, MCSE) has worked in the information technology security sector since 1990. Currently, he is the owner of SecurityBreachResponse.com and is the Chief Information Security Officer for Securit-e-Doc, Inc. Before starting this position, he was Vice President of Technical Operations at Intelliswitch, Inc., where he supervised an international telecommunications and Internet service provider network. Dave is a recognized security expert. A former Florida Certified Law Enforcement Officer, he specializes in computer forensic investigations, incident response, intrusion analysis, security audits, and secure network infrastructures. He has written several secure installation and configuration guides about Microsoft technologies that are used by network professionals. He has developed a Windows operating system lockdown tool, S-Lok.

Dave was a contributing author to Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6). He is frequently a speaker at many national security conferences and is a regular contributor to many security-related newsletters, Web sites, and Internet forums. Dave is a member of several organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners� (ISFCE), Information Systems Audit and Control Association� (ISACA), High Technology Crime Investigation Association (HTCIA), Network and Systems Professionals Association (NaSPA), Association of Certified Fraud Examiners (ACFE), Anti Terrorism Accreditation Board (ATAB), and ASIS International�. He is also a Secure Member and Sector Chief for Information Technology at The FBI�s InfraGard� and a Member and Director of Education at the International Information Systems Forensics Association (IISFA).

http://web.archive.org/web/20031203213625/http://www.securitybreachresponse.com/nm/contact/contact.asp



Here was Global Trust's original address (perhaps not relevant): http://web.archive.org/web/20120302225123/http://www.gbltrust.com/contact



https://who.godaddy.com/whoisstd.aspx?domain=gbltrust.com&prog_id=GoDaddy&k=N91EefNRsSsSiZpPh%20TIvsLLyIvLQ5R5bTRTCdfi%2ftL2pD1XJ0LsRSg2eCcrDFT3

Quote
Domain Name: GBLTRUST.COM
Registry Domain ID: 1496672519_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.aitdomains.com
Registrar URL: http://ait.com
Updated Date: 2014-09-29T16:06:15Z
Creation Date: 2008-06-18T22:02:43Z
Registrar Registration Expiration Date: 2023-06-18T22:02:43Z
Registrar: THE NAME IT CORPORATION DBA NAMESERVICES.NET
Registrar IANA ID: 57
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.9103211200
Reseller:
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Edward Holt
Registrant Organization: Global Trust Asset Management, LLC.
Registrant Street: 515 N. Flagler Drive Suite 1700
Registrant City: West Palm Beach
Registrant State/Province: FL
Registrant Postal Code: 33401
Registrant Country: US
Registrant Phone: +1.5614720191
Registrant Phone Ext:
Registrant Fax: +1.
Registrant Fax Ext:
Registrant Email: [email protected]

http://seclists.org/basics/2003/Sep/970

Quote
New free security tool download
From: "dave kleiman"
Date: Wed, 24 Sep 2003 13:09:16 -0400
Hey all,

I would like to announce the release off our free tool,
Securit-e-PortControl. This is a lightened version of one tool that comes as
part of our Securit-e-Lok tool suite.

It gives you an easy GUI, to manipulate all of your security settings for
your NIC's in one interface instead of having to switch back and forth
between NIC'c. It allow you to mask your MAC.  It list all of the IP
Protocol and Ports, and there function for ease of use.

It also displays all active connections, via TCP, UDP  or both. And resolves
all IP's in the Activity window.


The tool is available for download at
http://www.securit-e-doc.com/products/securitelok.asp
Click on free downloads.  There is no form to fill out, and we will not
collect your e-mail addy's or attempt to send marketing material to you.

Securit-e-Lok is a complete OS hardening system for the MSFT OS.

Please feel free to give me your thoughts and comments on it.

Please send all your comments to me at this e-mail address not my
Securit-e-Doc address.


Thanks


Chief Information Security Officer
Securit-e-Doc, Inc.
515 N. Flagler Dr. Suite 203
WPB, FL 33401
561.833.2303 x121  Fax: 561.833.0132 http://www.securit-e-doc.com



 
______________________
Dave Kleiman
dave () netmedic net
www.netmedic.net

"High achievement always takes place in the framework of high expectation."
Jack Kinder

http://csrc.nist.gov/groups/STM/cavp/documents/skipjack/skipval.html



Andrew Kleiman of Global Trust occupying an office in the same building as his brother Dave once did, never mentioned the passing of David Kleiman, his brother: https://www.facebook.com/AndyLKleinman

Andrew's partner, Edward T. Holt, Jr, passed away on March 8, 2016: http://www.lehmanreen.com/obits/printpdf.php?oid=670753&cs=f38bfa76293844dc0fa1aa66d9be8fd9&ap=1

https://www.facebook.com/pages/Global-Trust-Asset-Management/162840640406265



227 Accounts.
U$120M in total assets.
1 Review by its founder: Andrew Kleiman
Maybe Global Trust will eventually get around to letting its account holders that one of its principals has passed away.
newbie
Activity: 28
Merit: 0
May 07, 2016, 12:48:15 PM
That'd be nice but everything you've posted in this thread has been incoherent drivel. You come off as a crackhead.

Click to the word "Quote" read more:

I don't share your romantic guess of who created BitCON.

Btw, Craig says the name Satoshi comes from "the book" about the House of Morgan:

https://forum.bitcoin.com/bitcoin-discussion/the-name-satoshi-comes-from-satoshi-david-character-from-the-house-of-morgan-t7619.html

And Nakamoto means "in the book" in Japanese.

And Julian Assange knew Craig in 1996:

https://www.reddit.com/r/Bitcoin/comments/4hozs5/wikileaks_on_twitter_wed_like_to_thank_satoshi/d2rdg7u

Don't forget that (I was told) a House of Rothschild person was sheltering Assange when he was still free in the UK. And note now how the UN is attempting to supercede the UK's authority on the case. There is always a globalist plan for these pawns, including Edward Snowden.

I think someone paid off Craig to discredit Matonis and Gavin. Gavin has now lost commit access.

The danger is not that BitCON fails, but that it becomes the new totalitarian digital currency.

Hope you are aware that ostensibly the Dr. Craig Wright can't be proven to have made the blog posts, which implicate him:

http://craigswright.com/

Meaning a failure of Bitcoin is not the big problem we face...
legendary
Activity: 1358
Merit: 1014
May 07, 2016, 10:07:58 AM
I've been making myself the same question lately. All those news on the media, and no one of them had the decency to talk about Dave Kleiman which could have been a really important person behind this, to the point that I think all of Craig has was given/stolen from Kleiman.
This is better than any movie i've ever seen, let's see how things develop.
legendary
Activity: 1068
Merit: 1020
vip
Activity: 1428
Merit: 1145
May 06, 2016, 10:39:55 PM
http://financial-advisors.credio.com/l/56219/Andrew-Kleinman



Now that's a trust!

Do you wonder where Andrew Kleiman has his office?



Quote
515 North Flagler Drive
Suite 1700
West Palm Beach, Florida 33401-0347
United States

What are the odds... Ah, fuck it! I'll just cut to the chase and answer the [incomplete] rhetorical question - 100%.

First the setup: http://www.oreilly.com/pub/au/2560

Quote
Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP, ISSAP, ISSMP, MCSE) has worked in the information technology security sector since 1990. Currently, he is the owner of SecurityBreachResponse.com and is the Chief Information Security Officer for Securit-e-Doc, Inc. Before starting this position, he was Vice President of Technical Operations at Intelliswitch, Inc., where he supervised an international telecommunications and Internet service provider network. Dave is a recognized security expert. A former Florida Certified Law Enforcement Officer, he specializes in computer forensic investigations, incident response, intrusion analysis, security audits, and secure network infrastructures. He has written several secure installation and configuration guides about Microsoft technologies that are used by network professionals. He has developed a Windows operating system lockdown tool, S-Lok.

Dave was a contributing author to Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6). He is frequently a speaker at many national security conferences and is a regular contributor to many security-related newsletters, Web sites, and Internet forums. Dave is a member of several organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners� (ISFCE), Information Systems Audit and Control Association� (ISACA), High Technology Crime Investigation Association (HTCIA), Network and Systems Professionals Association (NaSPA), Association of Certified Fraud Examiners (ACFE), Anti Terrorism Accreditation Board (ATAB), and ASIS International�. He is also a Secure Member and Sector Chief for Information Technology at The FBI�s InfraGard� and a Member and Director of Education at the International Information Systems Forensics Association (IISFA).

http://web.archive.org/web/20031203213625/http://www.securitybreachresponse.com/nm/contact/contact.asp



Here was Global Trust's original address (perhaps not relevant): http://web.archive.org/web/20120302225123/http://www.gbltrust.com/contact



https://who.godaddy.com/whoisstd.aspx?domain=gbltrust.com&prog_id=GoDaddy&k=N91EefNRsSsSiZpPh%20TIvsLLyIvLQ5R5bTRTCdfi%2ftL2pD1XJ0LsRSg2eCcrDFT3

Quote
Domain Name: GBLTRUST.COM
Registry Domain ID: 1496672519_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.aitdomains.com
Registrar URL: http://ait.com
Updated Date: 2014-09-29T16:06:15Z
Creation Date: 2008-06-18T22:02:43Z
Registrar Registration Expiration Date: 2023-06-18T22:02:43Z
Registrar: THE NAME IT CORPORATION DBA NAMESERVICES.NET
Registrar IANA ID: 57
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.9103211200
Reseller:
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Edward Holt
Registrant Organization: Global Trust Asset Management, LLC.
Registrant Street: 515 N. Flagler Drive Suite 1700
Registrant City: West Palm Beach
Registrant State/Province: FL
Registrant Postal Code: 33401
Registrant Country: US
Registrant Phone: +1.5614720191
Registrant Phone Ext:
Registrant Fax: +1.
Registrant Fax Ext:
Registrant Email: [email protected]

http://seclists.org/basics/2003/Sep/970

Quote
New free security tool download
From: "dave kleiman"
Date: Wed, 24 Sep 2003 13:09:16 -0400
Hey all,

I would like to announce the release off our free tool,
Securit-e-PortControl. This is a lightened version of one tool that comes as
part of our Securit-e-Lok tool suite.

It gives you an easy GUI, to manipulate all of your security settings for
your NIC's in one interface instead of having to switch back and forth
between NIC'c. It allow you to mask your MAC.  It list all of the IP
Protocol and Ports, and there function for ease of use.

It also displays all active connections, via TCP, UDP  or both. And resolves
all IP's in the Activity window.


The tool is available for download at
http://www.securit-e-doc.com/products/securitelok.asp
Click on free downloads.  There is no form to fill out, and we will not
collect your e-mail addy's or attempt to send marketing material to you.

Securit-e-Lok is a complete OS hardening system for the MSFT OS.

Please feel free to give me your thoughts and comments on it.

Please send all your comments to me at this e-mail address not my
Securit-e-Doc address.


Thanks


Chief Information Security Officer
Securit-e-Doc, Inc.
515 N. Flagler Dr. Suite 203
WPB, FL 33401
561.833.2303 x121  Fax: 561.833.0132 http://www.securit-e-doc.com



 
______________________
Dave Kleiman
dave () netmedic net
www.netmedic.net

"High achievement always takes place in the framework of high expectation."
Jack Kinder

http://csrc.nist.gov/groups/STM/cavp/documents/skipjack/skipval.html

legendary
Activity: 2646
Merit: 1138
All paid signature campaigns should be banned.
May 06, 2016, 11:57:11 AM
Within 30 minutes or so of the story breaking:

I have first dibs on calling this bullshit.

Looks like a good call to me.
hero member
Activity: 1106
Merit: 521
May 06, 2016, 11:47:10 AM
Yeah i read something the other day about this, its interesting i must look it up again.
legendary
Activity: 2842
Merit: 1511
May 06, 2016, 11:45:29 AM
Hey guys - those documents say Wheeler is the Solder of the Year for Army Missile Command. Not for the whole Army. So was there a top award for the overall Army? Or maybe different branches of the Army each had their own Soldier of the Year? Those are details a journalist could easily get screwed up. So don't stop digging.

Looks like there is one in each command and one overall winner.

https://www.army.mil/article/156980/

Yes, it seems like there are multiple recipients of the award specific to each command. Prior to 2002 the Best Warrior competition didn't exist, so it isn't clear if there was an overall Soldier of the Year. I certainly haven't found any reference to one.
newbie
Activity: 14
Merit: 0
May 06, 2016, 01:07:32 AM
I believe you are a liar.

Thats your good right, to believe what you like.
In my estimation, I am at least not lying much more than the average.
But its hard to quantify, I cannot proof anything.

Prove it by revealing your identity. My identity is known to everyone. I have revealed my full name, where I live, my history, my LinkedIn account, my public non-anonymous writings published over the internet, etc..

Why that?
Because you will pass me an ass-kick in the supermarket? No, thanks, I dont like.
Or because you will go to tell everywhere, that I am a liar and not proving it too not? I dont like too not.
Its the what you seem to be intentioned to do with your menaceing attitude.

Its not an obligation, to post here revealing public any personal data.

Do you know, what a stalker is?
Its because of the stalkers, what have nothing to do than to run the whole day after the people to pester their existance. Its an illness.

And thats a reason, why it is better to keep the identity in the unknown. Other good reasons exist too. Ever heard something about an agency named NSA? And an individual named Edward Snowden? Ever thought about all the others, what make the same? Do you like to get radiated by Google in every wrinkle of the asshole? Thats why some mean its clevermore, not to walk around with the trousers down.


Why do you mean you have to command around at all and to bark at me as an imperator?
Do you confuse yourself with Hulk, the Shrek of the little girls, or what?


As for my name, I confess, its a ly. But its a poetical ly as all the poets do always forcely. Are you accusing Shakespeare too of being a liar, because the story of Hamlet isnt true? Its another poetical ly.
No poetry without poetical ly. Not even a novel without poetical ly. Its an artist-name, not a ly. I could explain it to you in every detail, inspite of the artist-rule, of never explaining the own artworks.

But I cannot. Because I can upload my avatar only getting a full member. And I need the avatar to explain the name, there is a figurative explication. Its a riddle, if you can crack it, you are a real crack. But I warn you: Its difficult more than the riddle of Rumpelstiltskin of Grimms, and the cryptographic competiency is useless. Its difficult as much, that I suppose, it is impossible to guess. But thats what Rumpelstiltskin said too. And I will not get furious as Rumpelstiltskin and stamp with the foot as much that the earth is getting divided, if you find out. I will give you the first and only hint: the artist-name is an artwork, the avatar is an artwork, but the explication is not. Its the blank, sober, bonedry, boring truth. Then, you will be forced to admit, that I am not a liar. At least not always.

Now the REKTing will ensue.

I dont understand, that.
What do you mean?
And why do you write some letters capitalized?
And should i relate this statement somehow to me?

I was sleeping.

Oh..
Good morning, how are you?

Ah..
I see you are awake some time.
Excellent mood, as usual? Grin


BTW:
Dont bark at me, then I will not make a cabaret. I certainly will not produce with you virtually, what is getting called in the real life the yelling-around. If you bark, you make me scream of laughter.
LOL
Like that, thats as with the dog of Pawlow. Its a reaction, what is stronger than me. At least, the sarcasm, what then follows forcely too, is actually acid quasi-zero. I hope, you understand some humour, its not funny else, I know, sorry for that. At the beginning, I wasnt offending you, I only was stateing, that you are off-topic. And I was saying it polite..
Well I see, you are active. Looks out important, but looks out off-topic again. I will not repeat my opinion about, you know it. And not even if I would, I could talk with you about this materia reasonable. I miss some concepts, of what you will talk. I wish you anyway a constructive and fruitful day and hope you find the people, what can talk with you in a way, what ends not in the yelling around.

Well its late..
.. its me, what is going now to bed.

Good night. Grin

PS:
One last question: Your artist name of TPTB_need_war has an aggressive denotation, is it program, the aggressive comportment? But be aware, saying yes, I will push the ignore button, we will thereafter never nomore be able to exchange our jokes.

legendary
Activity: 1068
Merit: 1020
May 06, 2016, 12:35:57 AM
He also talks about Tulips and how their price rose.  What if that a metaphor for Bitcoin price rising? Maybe some kind of signal to everyone? Maybe his supercomputer can manipulate the markets...I don't see why not!
legendary
Activity: 1068
Merit: 1020
May 06, 2016, 12:31:08 AM
What does CSW say right here? https://youtu.be/LdvQTwjVmrE?t=2140
sr. member
Activity: 420
Merit: 262
May 05, 2016, 11:43:36 PM
I am done speaking to these amateurs. Waste of my time.

Thank you so much. Now that you're gone perhaps we can get back on topic and talk about Kleiman.

To make it clear in case it wasn't enough, I won't be replying to Foxpop again.

FYI truce, I will cease & desist:

Quote from: myself in a private message
I also don't believe CW is Satoshi. But that isn't my point. I explained the salient point more concisely here which is really about ridicule, censorship, and manipulation of public opinion instead of rational, well elucidated, and amicable/patient/unencumbered reasoned discussion (i.e. acadamics versus corporate fiefdoms):

https://bitcointalksearch.org/topic/m.14766475

Please also read the subsequent to the above linked post as I broad stroked some of my theoretical concerns about the double-hashing in Bitcoin.

Theymos is allowing me to continue so I think it is possible that Theymos is helpless due to not being capable himself of leading technologically. So appears he may be trying to appease Greg while also allowing for the minute possibility that someone else could accomplish in code and in reality something as relevant. I think I respect Theymos if this is the case. But we don't really know what is going on behind the scenes. I am at the point now where I really want to ignore everything on BCT and Reddit. My discussions about programming language theory are going very well at the Rust forum. Did you see I solved the age old computer science problem known as the Expression Problem articulated by Philip Wadler in 1999:

https://bitcointalksearch.org/topic/m.14757751
(click the sublink in item #6)

Did you see how I REKTed Greg's logic on the Ogg streaming index which was hilarious given he is co-inventor of the Ogg orbis codec:

https://bitcointalksearch.org/topic/m.14035614
(search for the phrase "Also I don't understand how you calculate 20% increase" within that post)

I don't claim he isn't smart in his cryptography and math fields of expertise. And generally a very smart guy. But that is not the problem we are apparently agreeing on.
legendary
Activity: 3654
Merit: 8909
https://bpip.org
May 05, 2016, 11:17:19 PM
I am done speaking to these amateurs. Waste of my time.

Thank you so much. Now that you're gone perhaps we can get back on topic and talk about Kleiman.

Hey guys - those documents say Wheeler is the Solder of the Year for Army Missile Command. Not for the whole Army. So was there a top award for the overall Army? Or maybe different branches of the Army each had their own Soldier of the Year? Those are details a journalist could easily get screwed up. So don't stop digging.

Looks like there is one in each command and one overall winner.

https://www.army.mil/article/156980/
sr. member
Activity: 420
Merit: 262
May 05, 2016, 10:48:40 PM
TPTB_need_war, you cannot prove nor disprove that the Sartre text Craig Wright supposedly hashed is a collision for SHA256.

I asked you to not do what you just did above:

Don't cherry pick my context to make inane non-rebuttals which side-step my holistic set of points.



You also pointed out that he supposedly has access to a supercomputer. Even with access to a supercomputer, he would not be able to find a collision as other researchers have already tried. Simply having a lot of computing power does not mean that he can find a collision.

Alternatively, Craig could have found a vulnerability in sha256, in which case a lot more things than just Bitcoin is screwed. If Craig did not responsibly disclose such a vulnerability and instead exploited it, this would be incredibly sketchy and dishonest behavior.

The point is that with a supercomputer together with a new cryptoanalysis break, the two together might be required to accomplish the attack. I want you to know that if China's pools see nearly all the mining shares, then they are viewing about 268 of SHA-256 hashing power per annum which may or may not be fulcrum. Don't presume you know all the theoretical attacks that are possible.

The theory that the sha256 double hash is weaker than sha256 is false. It has been proven that performing multiple iterations of a hash is more secure than just one iteration. Specifically, many websites will store users passwords in the form of a multiple iteration hash.

You've made at least two mathematically illiterate errors in that quoted text:

1. Testing that double-hashing fulfills some criteria you have prechosen, says nothing about security against cryptoanalysis which your criteria has not considered.
2. Securing a password by iterated hashing (because it requires the dictionary attacker to perform the iteration cost on each dictionary trial) says nothing about the increased vulnerability of collision cryptanalysis. You are conflating two separate issues of security.  Roll Eyes

I am done speaking to these amateurs. Waste of my time.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 10:24:33 PM
I will proceed to explain once you confirm that do not understand why Merkle–Damgård construction is relevant? Either explain or admit you don't know. So I can proceed to teach you something. You are wasting my scarce time with your stalling/deception tactics and trolling.

No, you're the one wasting my time. I don't have to explain anything. You do. And you're not. I can only assume by your lack of explanation that you can't produce one.

Next time you will realize not to fuck with me, because I know a lot more than you assume.

I assume you know nothing, so knowing more than that isn't much of an accomplishment. But please go ahead and demonstrate your accomplishment. We're all waiting.

I'll interpret your reply as an ostensibly intentional veiled admission that you could not answer the question. So I will proceed to explain the sort of theoretical analysis that I was interested in discussing in the thread that the "forum-Hitler" Gmaxwell nuked.


Tangentially note the disclaimer that I wrote in the OP of the thread which was nuked:

Does anyone know what black hole Bitcoin core (Blockstream) developer Gmaxwell moved the quoted thread to?

[...]

I urge immediately peer review of my statements by other experts. I have not really thought deeply about this. This is just written very quickly off the top of my head. I am busy working on other things and can't put much time into this.

I had written in that nuked and vaporized thread a post (my last or nearly last post in that nuked thread) which explained that at the moment I wrote that quoted OP, I had been mislead by sloppy writing on the news sites (and also the linked sites of the protagonists) into thinking that the hash of the Sartre text was already confirmed. For example, I provided this quote:

Craig Wright’s chosen source material (an article in which Jean-Paul Sartre explains his refusal of the Nobel Prize), surprisingly, generates the exact same signature as can be found in a bitcoin transaction associated with Satoshi Nakamoto.

Being at is was by that time late in the evening for my timezone and I had been awake roughly 18 hours already, and I was skimming in an attempt to make some quick feedback on this potentially important event, so I could return to my work asap. In the nuked thread, I quickly realized that the Sartre text hadn't been verified to match the hash, so I actually stopped posting in the nuked thread for a few hours. Then when I came back to thread, it didn't exist so I could no longer follow up or read what had been elucidated. Thus note my original focus was on how the hell could Craig have achieved that match, so he must have broken the hash. I had recalled that I had theoretically doubts about the double hashing which I had never bothered to discuss with anyone. It had been 2+ years since I did that research on cryptographic hash functions, so I had to decide if I was going to go dig back into that research or not. I figured I'd sleep on it and then be able to think with a clearer, rested mind about the implications of the revelation (to me) that the hash had not been verified to match the text because the portion of the text had not been sufficiently specified (again the "undisclosed" term didn't make sense to me in quick skimming because I had read on the blog that the Sartre text was referred to).

But instead of being able to sleep on it and then decide whether to let it go or dig back into my past research, my thread was nuked and I was under attack. Remember I don't back down from anyone when I think I am justified. When I think I am wrong, I mea culpa.



So now back to the subject matter of whether double hashing could theoretically lead to any weakening of the second preimage and/or collision security of the SHA-256 cryptographic hash function.

Afaik, there is no research on this question. If anyone is aware of any, please kindly inform me.

First I will note the Merkle–Damgård construction (which SHA-256 employs) is subject to numerous generic attacks and even though afaik none of these are currently known to be a practical threat against a single hash of SHA-256, we can perhaps look to those generic attacks for potential clues as to what a double-hashing might enable which a single-hash application perhaps might not.

Note in the pseudo-code for SHA-256 that what distinguishes a double-hashing from doubling rounds (i.e. "Compression function main loop:") or repeating the input text in double the block chunks (i.e. "Process the message in successive 512-bit chunks:"), is that the h0 - h8 compression function state which is normally orthogonal to the input block chunks instead gets transmitted as input to a block chunk in the second hash application (i.e. "Produce the final hash value (big-endian):") after being added to the output of the compression function (i.e. "Add the compressed chunk to the current hash value:"). And the h0 - h8 compression function state is reset to a constant (i.e. "Initialize hash values:").

The reason I think this might be theoretically significant is because we should note that the way cryptographic hash functions are typically broken is by applying differential cryptanalysis. Differential cryptanalysis is attempting to find some occurrence of (even higher order) differences between inputs that occurs with more frequent probability than a perfectly uniform distribution. In essence, differential cryptanalysis is leveraging some recurrent structure of the confusion and diffusion and avalanche effect of the algorithm.

Not only does the double-hashing introduce a constant  h0 - h8 midstream thus introducing a known recurrent structure into the middle of the unified algorithm of a double-hashing, but it shifts the normally orthogonal compression function state to the input that it is designed supposed to be orthogonal to. On top of that, the additions of the h0 - h8 state at the midpoint, can possibly mean the starting state of the midpoint is known to have a higher probability of zeros in the least significant bits (LSBs). This last sentence observation comes from some research I did when I created a much higher bandwidth design variant of Berstein's ChaCha by fully exploiting AVX2 SIMD, that was for a specific purpose of creating a faster memory hard proof-of-work function. In that research, I had noted the following quote of an excerpt in my unfinished, rough draft, unpublished white paper written in late 2013 or early 2014 (and kindly note that the following might have errors because it was not reviewed for publishing and was merely notes for myself on my research understanding at that time 2+ years ago):

Quote from: shazam.rtf
Security

Addition and multiplication modulo (2^n - 1) diffuse through high bits but set low bits to 0. Without shuffles or rotation permutation to diffuse changes from high to low bits, addition and multiplication modulo (2^n - 1) can be broken with low complexity working from the low to the high bits [5].

The overflow carry bit, i.e. addition modulo minus addition modulo (2^n - 1), obtains the value 0 or 1 with equal probability, thus addition modulo (2^n - 1) is discontinuous i.e. defeats linearity over the ring Z/(2^n) [6] because the carry is 1 in half of the instances [7] and defeats linearity over the ring Z/2 [8] because the low bit of both operands is 1 in one-fourth of the instances.

The number of overflow high bits in multiplication modulo ∞ minus multiplication modulo (2^n - 1) depends on the highest set bits of the operands, thus multiplication modulo (2^n - 1) defeats linearity over the range of rings Z/2 to Z/(2^n).

Logical exclusive-or defeats linearity over the ring Z/(2^n) always [8] because it is not a linear function operator.

Each multiplication modulo ∞ amplifies the amount diffusion and confusion provided by each addition. For example, multiplying any number by 23 is equivalent to the number multiplied by 16 added to the number multiplied by 4 added to the number multiplied by 2 added to the number. This is recursive since multiplying the number by 4 is equivalent to the number multiplied by 2 added to the number multiplied by 2. Addition of a number with itself is equivalent to a 1 bit left shift or multiplication by 2. Multiplying any variable number by another variable number creates additional confusion.

Multiplication defeats rotational cryptoanalysis [9] because unlike for addition, rotation of the multiplication of two operands never distributes over the operands i.e. is not equal to the multiplication of the rotated operands. A proof is that rotation is equivalent to the exclusive-or of left and right shifts. Left and right shifts are equivalent to multiplication and division by a factor of 2, which don't distribute over multiplication e.g. (8 × 8 ) × 2 ≠ (8 × 2) × (8 × 2) and (8 × 8 ) ÷ 2 ≠ (8 ÷ 2) × (8 ÷ 2). Addition modulo ∞ is always distributive over rotation [9] because addition distributes over multiplication and division e.g. (8 + 8 ) ÷ 2 = (8 ÷ 2) + (8 ÷ 2). Due to the aforementioned non-linearity over Z/(2^n) due to carry, addition modulo (2^n - 1) is only distributive over rotation with a probability 1/4 up to 3/8 depending on the relative number of bits of rotation [9][10].

However, multiplication modulo (2^n - 1) sets all low bits to 0 orders-of-magnitude more frequently than addition modulo (2^n - 1)—a degenerate result that squashes diffusion and confusion.

[5] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX. 2 Related Work.
[6] Daum. Cryptanalysis of Hash Functions of the MD4-Family.
     4.1 Links between Different Kinds of Operations.
[7] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX.
     6 Cryptanalysis of generic AR systems.
[8] Berstein. Salsa20 design. 2 Operations.
[9] Khovratovich, Nikolic. Rotational Cryptanalysis of ARX.
     3 Review of Rotational Cryptanalysis.
[10] Daum. Cryptanalysis of Hash Functions of the MD4-Family.
    4.1.3 Modular Additions and Bit Rotations. Corollary 4.12.

So now put those aforementioned insights about potential recurrent structure at the midpoint of the double-hashing, together with the reality that a Boomerang attack is a differential cryptoanalysis that employs a midpoint in a cipher to form new attacks that weren't plausible on the full cipher. Bingo!

I'll refrain from providing my further insights on specifics beyond this initial sharing. Why? Because I've been treated like shit by Gmaxwell and you all here grant him too much Hitler-esque control over the Bitcoin Technical Discussion subforum where these sort of discussions are supposed to occur, so I will take my toys else where. Enjoy your echo chamber.

Do I have an attack against Bitcoin's double-hashing? I leave that for you to ponder.
vip
Activity: 1428
Merit: 1145
May 05, 2016, 09:57:06 PM
I hope you conspiracy buffs have enough aluminum foil in stock because I'm sad to say this is about to become a tad (maybe more) weirder.

Go here: http://delivereddata.com/



Fair enough, given that...

https://who.godaddy.com/whoisstd.aspx?domain=delivereddata.com&prog_id=GoDaddy

Quote
Domain Name: DELIVEREDDATA.COM
Registry Domain ID: 119667898_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Update Date: 2015-02-12T19:15:59Z
Creation Date: 2004-05-10T08:23:28Z
Registrar Registration Expiration Date: 2017-05-10T08:23:28Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
Registry Registrant ID:
Registrant Name: cv conrad
Registrant Organization: DeliveredDATA, LLC
Registrant Street: po box 22935
Registrant City: west palm beach
Registrant State/Province: Florida
Registrant Postal Code: 33416
Registrant Country: US
Registrant Phone: 15615023935
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: [email protected]

David Kleiman and Carter V. Conrad were partners along with Patrick Paige.

Here's more on Conrad: http://www.zoominfo.com/p/Carter-Conrad/1484242250



But the address I highlighted above is not the address I wish to bring attention to in this post. The following address is.

http://web.archive.org/web/20080509034542/http://www.delivereddata.com/contact_us.htm



301 Clematis Street, West Palm Beach, Florida, 33401, USA

Who else is at that address?

http://www.totaldigitalsecurity.com/



Who founded Total Digital Security?

https://www.linkedin.com/in/bradforddeflin



The Bitcoin connection?

http://www.totaldigitalsecurity.com/blog/cryptolocker-virus-is-back-ransomware-and-the-evolution-of-extortion



https://www.google.com/search?sourceid=chrome-psyapi2&ion=1&espv=2&ie=UTF-8&q=site%3Awww.totaldigitalsecurity.com%20bitcoin&oq=site%3Awww.totaldigitalsecurity.com%20bitcoin&rlz=1C1CHFX_enUS549US549&aqs=chrome..69i57j69i58.6938j0j4



TDS was formed on 3/13/13 (~1 month prior to David Kleiman's death [near his owl pillow]): http://search.sunbiz.org/Inquiry/CorporationSearch/SearchResultDetail?inquirytype=OfficerRegisteredAgentName&directionType=Initial&searchNameOrder=DEFLINKENDALLH%20P130000237433&aggregateId=domp-p13000023743-0504a4cf-5af6-4bb1-b793-d8e783049f35&searchTerm=Deflin%20%20%20%20%20%20%20%20%20%20%20%20%20%20Kendall%20%20%20%20%20%20%20H&listNameOrder=DEFLINKENDALLH%20P130000237433



I was ready to post, but just found the following, not sure how it may or may not fit in: https://dietrolldie.com/2013/05/20/malibu-media-claims-fabrication-of-evidence-and-seeks-sanctions-212-cv-02078-pa/#comment-14107

Quote
May 25, 2013 at 3:52 pm
So…while Prenda & friends use a large, loud and obnoxious backhoe to dig their hole – Lipscomb, Colette & Brig use a quiet, quaint and simple shovel to dig theirs. Is it safe to say Lipscomb’s big BT litigation lessons were learned in response to Prenda’s huge mistakes?

We’d bet there is a lot to learn about Patrick Paige & Carter V. Conrad, Computer Forensic Examiner, Computer Forensics LLC and Delivereddata LLC – http://www.corporationwiki.com/Florida/West-Palm-Beach/computer-forensics-llc/101108561.aspx (Computer Forensics LLC filed as a Florida Limited Liability on Monday, February 06, 2012) http://www.corporationwiki.com/Florida/West-Palm-Beach/delivereddata-llc-5410889.aspx (Delivereddata, LLC filed as a Florida Limited Liability on Wednesday, May 02, 2007)

But how is http://www.corporationwiki.com/Florida/West-Palm-Beach/c4-wellness-llc-5196097.aspx
CV Conrad and C4 Wellness related?
legendary
Activity: 1708
Merit: 1040
May 05, 2016, 09:25:55 PM
Hey guys - those documents say Wheeler is the Solder of the Year for Army Missile Command. Not for the whole Army. So was there a top award for the overall Army? Or maybe different branches of the Army each had their own Soldier of the Year? Those are details a journalist could easily get screwed up. So don't stop digging.
Pages:
Jump to: