Pages:
Author

Topic: Why so little talk of Dave Kleiman? - page 5. (Read 16530 times)

sr. member
Activity: 420
Merit: 262
May 05, 2016, 10:29:19 AM
If we are basing it on the drcraigwright.com website "proof", then the Sartre document is the one claimed to have been hashed, but he didn't disclose what portion of that document.

He didn't disclose anything else about the document, which is why it's impossible to disprove any claim about it.

You could at a minimum disprove that any contiguous portion of the document can't match the hash. You all haven't done that, thus you are derelict. You all shouldn't go spouting off "Craig a fraud" without even attempting to verify some basic things such as whether drcraigwright.com is his website and whether any portion of the text could match the hash that was signed.

My point is the you Bitcoin zealots didn't do your homework. Haha. You also didn't even validate if that was his official website.

I never claimed that it was, nor do I even care. Why would I if it doesn't contain any evidence for any claims that have been made?

'backsplaining.

You guys are derelict, as well as censoring free speech and technical discussion. No wonder you will end up in failure mindlessly following Blockstream's SegWit soft forking Trojan Horse.

Non sequitur.

See above. REKTED.

I asked you a specific question, "Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds?". I see you are unable to answer it?

I didn't care to answer it since it is irrelevant. I have explained the most likely reason why double SHA256 was used, which is what you asked.

Which is technically incorrect, but I will come back to that point to REKT you after we finish this.

After we confirm that you can't answer it, then I will REKT the rest of your technically incorrect response above.

Alright, fine. The answer is yes. I do understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds. It would be pretty meaningless if it was.

So tell me the reason? Obviously I didn't ask the question to only receive a "yes". Anyone can say "yes". I want you to prove you understand how cryptographic hash functions are constructed and prove you have knowledge about how collision attacks are often constructed. Because these are things I had researched in the past. You've had enough delay to google it by now, so surely you can cheat and tell me?

Try reading the linked article to learn more about your character.

It says more about yours than mine.

That is the sort of reply which the linked article explains you would make. So you've confirmed it. Thanks.
legendary
Activity: 996
Merit: 1013
May 05, 2016, 10:15:14 AM

For someone with time to kill...
The Sartre text is here
http://www.nybooks.com/articles/1964/12/17/sartre-on-the-nobel-prize/

You'd need to copy and paste into a notepad and maybe
increment whitespace at the end til you hit the right hash.

But maybe the real message is in the (con)text
legendary
Activity: 4551
Merit: 3445
Vile Vixen and Miss Bitcointalk 2021-2023
May 05, 2016, 10:11:35 AM
If we are basing it on the drcraigwright.com website "proof", then the Sartre document is the one claimed to have been hashed, but he didn't disclose what portion of that document.
He didn't disclose anything else about the document, which is why it's impossible to disprove any claim about it.

My point is the you Bitcoin zealots didn't do your homework. Haha. You also didn't even validate if that was his official website.
I never claimed that it was, nor do I even care. Why would I if it doesn't contain any evidence for any claims that have been made?

You guys are derelict, as well as censoring free speech and technical discussion. No wonder you will end up in failure mindlessly following Blockstream's SegWit soft forking Trojan Horse.
Non sequitur.

I asked you a specific question, "Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds?". I see you are unable to answer it?
I didn't care to answer it since it is irrelevant. I have explained the most likely reason why double SHA256 was used, which is what you asked.

After we confirm that you can't answer it, then I will REKT the rest of your technically incorrect response above.
Alright, fine. The answer is yes. I do understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds. It would be pretty meaningless if it was.

Try reading the linked article to learn more about your character.
It says more about yours than mine.
legendary
Activity: 3654
Merit: 8909
https://bpip.org
May 05, 2016, 10:09:24 AM
Analysis of what? Please post the facts being analyzed, i.e. the public key, the message Wright signed, and the signature. The thread you linked to doesn't have that.

Your laziness isn't my fault. You find all the links if you click the link I provided to you upthread:

The three things that I asked for are nowhere to be found in the link you provided. There is only your own speculation.

So just to establish the facts - you DON'T have one or more of the following: the public key, the message Wright signed, the signature. Your claims that Wright cracked SHA256 are baseless.

Are you fucking blind?

If you click any of these links in the link I provided to you several times, you will end up finding the links to the analysis done by others which has all the information you asked for:

[...]

The only contention remaining is whether the Sartre text hashes to the hash Craig signed. Apparently no one has bothered to check that, even they are so damn quick to declare him a fraud without checking it.

It's mighty humble of you to finally admit that you don't have any proof of your claims. I'm sure you'll let us know when you find that Sartre text.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 10:05:22 AM
Why so little talk of Dave Kleiman? Angry

Say something then about him.

Perhaps you didn't realize that I was the one who before this thread started, pointed out that we should be talking about him.  Roll Eyes Do I need to provide a link as proof?

P.S. see you registered a sock puppet account today so you can do your hatchet attack anonymously.
newbie
Activity: 14
Merit: 0
May 05, 2016, 09:57:16 AM
Why so little talk of Dave Kleiman? Angry
sr. member
Activity: 420
Merit: 262
May 05, 2016, 09:40:42 AM
1. Craig said he signed a hash of some Sartre document but did not disclose which portion of the text. No one has written a script to prove that no portion or combination of portions of that Sartre text will not hash to the value that was signed. Thus I stated until someone has proven that it is impossible for Craig to later show that some portion of the Sartre text will hash to the sign hash value, then you can't claim with certainty that he can't do that. At the bare minimum, those who were checking Craig's proof, should have at least run a simple script to try every contiguous portion (no permutations) of the Sartre text (which is a tractable computation).

Such a script would prove nothing, since you know nothing about the input Craig allegedly used.

If we are basing it on the drcraigwright.com website "proof", then the Sartre document is the one claimed to have been hashed, but he didn't disclose what portion of that document.

Nice try. Fail.

My point is the you Bitcoin zealots didn't do your homework. Haha. You also didn't even validate if that was his official website. You guys are derelict, as well as censoring free speech and technical discussion. No wonder you will end up in failure mindlessly following Blockstream's SegWit soft forking Trojan Horse.

2. I have stated that no one seems to know why Bitcoin employs double hashing, and I have stated a theory that double hashing may weaken the collision resistance of the SHA256. I gave my logic for why that may be the case. I also note that SHA256 is documented to be reasonably close to being broken with 46 - 52 of the 64 rounds already broken. Thus I presented the theory that perhaps the double-hashing might push the vulnerability over the edge of breakage of 64 rounds. I didn't present that as a likely theory. I presented it as a point of discussion. If you have no way to refute this technical possibility because you don't know a damn thing about cryptographic hash function construction then that means you are not expert enough to comment about the quality of my theory. Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds? I ask you a specific question and I expect a specific answer.

Because double hashing is routinely employed to avoid preimage and length extension attacks, whether such protection is needed or not. Multiple iterations do not make it more vulnerable (again, if you believe it does, it's up to you to produce evidence of such a vulnerability), so there's no downside except for a slight reduction in performance.

I asked you a specific question, "Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds?". I see you are unable to answer it?

After we confirm that you can't answer it, then I will REKT the rest of your technically incorrect response above.

I understand you don't like me, but that is your personal problem.

No, it isn't. It would a problem if I did like you, since anyone who does must be a poor judge of character.

Try reading the linked article to learn more about your character.

Btw, why are you so defensive of a coin that is 70% controlled by China's miners and allegedly soon to be 98.5% controlled. Can you even look in the mirror and not laugh at yourself.
legendary
Activity: 4551
Merit: 3445
Vile Vixen and Miss Bitcointalk 2021-2023
May 05, 2016, 09:31:45 AM
1. Craig said he signed a hash of some Sartre document but did not disclose which portion of the text. No one has written a script to prove that no portion or combination of portions of that Sartre text will not hash to the value that was signed. Thus I stated until someone has proven that it is impossible for Craig to later show that some portion of the Sartre text will hash to the sign hash value, then you can't claim with certainty that he can't do that. At the bare minimum, those who were checking Craig's proof, should have at least run a simple script to try every contiguous portion (no permutations) of the Sartre text (which is a tractable computation).
Such a script would prove nothing, since you know nothing about the input Craig allegedly used. If you feed the script a plain ASCII text file, you'll just claim he might have used UTF16. Or a PDF file, which can altered in infinitely many ways without affecting the text content. Or a JPEG of a photograph of a printout of the document. Or something else entirely. You can't prove a negative. The burden of proof is on you to show that such a hash collision exists, not on anyone else to prove that it doesn't.

2. I have stated that no one seems to know why Bitcoin employs double hashing, and I have stated a theory that double hashing may weaken the collision resistance of the SHA256. I gave my logic for why that may be the case. I also note that SHA256 is documented to be reasonably close to being broken with 46 - 52 of the 64 rounds already broken. Thus I presented the theory that perhaps the double-hashing might push the vulnerability over the edge of breakage of 64 rounds. I didn't present that as a likely theory. I presented it as a point of discussion. If you have no way to refute this technical possibility because you don't know a damn thing about cryptographic hash function construction then that means you are not expert enough to comment about the quality of my theory. Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds? I ask you a specific question and I expect a specific answer.
Because double hashing is routinely employed to avoid preimage and length extension attacks, whether such protection is needed or not. Multiple iterations do not make it more vulnerable (again, if you believe it does, it's up to you to produce evidence of such a vulnerability), so there's no downside except for a slight reduction in performance.

I understand you don't like me, but that is your personal problem.
No, it isn't. It would a problem if I did like you, since anyone who does must be a poor judge of character.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 09:27:29 AM
The plot thickens.  Tongue

Makes everyone who says he was a fraud look like a total imbecile for not checking whether the website is really the official word of Craig Wright.

In the thread of mine that Gregory Maxwell deleted, I made the point that those accusing Craig of fraud, hadn't done their homework. Lol.  Roll Eyes

Think about it - if you were purchasing a domain with your name in the title, why would you register it using an anonymous registrant to hide your name?

Forgot to tick-off default option "Protect my privacy for 5.99$ per year" maybe?

That's one perfectly plausible explanation Smiley
It couldn't possibly be anything like

My guess is wishful thinking. Never change, bitcointalk, never change...



not really sure where you're going with this. so you're saying that craig can deny his ties to the domain? what would that do? his claims on satoshi's identity were recorded in a video.

Not suggesting that he did not claim to be Satoshi. Merely that not everything posted on the internet can be taken at face value. If he needed to claim that he is not the author of that apology, he easily could.
And, of course,
Quote
< >The BBC understands that this tweet signifies that Mr Matonis still believes Dr Wright is indeed Satoshi.

"A lot more people in the Bitcoin community are going to be unconvinced of Dr Wright's claims than will believe he is Satoshi, based upon what's happened to date," commented Dr Garrick Hileman, an economic historian at the Cambridge Centre for Alternative Finance.

"But many of the doubters don't want to be convinced. Satoshi has been mythologised and if you pull back the curtain, you shatter a lot of people's fantasies.
newbie
Activity: 14
Merit: 0
May 05, 2016, 09:24:28 AM
Quote from: TPTB_need_war link=topic=1459687.msg14761032#msg14761032
Also how do you know that Craig didn't withdraw his plan because I just explained how he may of accomplished the feat he claimed he can do? I mean if someone could even explain the rational justification for the double-hashing, then we wouldn't be wondering as much.



Ahm..



I will not say, that you are wrong, but arent you wrong here?




Dave Kleiman is dead, his identity of having been Satoshi Nakamoto is always doubted. And if..

..then his brother, what was inheriting the suspicious USB-drive with the wallets worth half a billion dollar is absolutely inconscient about his property and in big danger, as there exist gamblers as this unspeakable false doctor Craig Wright what are interested in nothing than these bucks really. Some kill for a handful dollars, as our wild Gleb was remembering very sage.

 Shocked

Isnt it better to think about this closer here, and about other things somewhere else?

sr. member
Activity: 420
Merit: 262
May 05, 2016, 08:25:24 AM
Your thread was deleted because it was utterly moronic, even more so than your usual bullshit. Everyone who had the misfortune to read it is now dumber for having done so. Go ahead and sell your coins, and don't let the door hit you on your way out.

The Bitcoin maximalists are having a heart attack because they don't like the facts.

While there are facts I don't like, I can accept them and I've never suffered a heart attack as a result. Though it's irrelevant since you've never said anything that even remotely resembles a fact.

You are free to present a refutation of anything I've written. So far, I've seen no technical argument from you.

How can I? One can only make a technical argument against disputed facts, and as I said, nothing you've ever said resembles a fact, disputed or otherwise.

I presented a technical argument. Regardless of the actions of Craig, that technical argument remains.

A technical argument by definition is not a fact. It is a technical position that stands to be debated. So if you are unwilling to respond technically to my technical points, then obviously you have nothing technical to say.

Here are some positions I made which you and no one else has refuted:

1. Craig said he signed a hash of some Sartre document but did not disclose which portion of the text. No one has written a script to prove that no portion or combination of portions of that Sartre text will not hash to the value that was signed. Thus I stated until someone has proven that it is impossible for Craig to later show that some portion of the Sartre text will hash to the sign hash value, then you can't claim with certainty that he can't do that. At the bare minimum, those who were checking Craig's proof, should have at least run a simple script to try every contiguous portion (no permutations) of the Sartre text (which is a tractable computation).

2. I have stated that no one seems to know why Bitcoin employs double hashing, and I have stated a theory that double hashing may weaken the collision resistance of the SHA256. I gave my logic for why that may be the case. I also note that SHA256 is documented to be reasonably close to being broken with 46 - 52 of the 64 rounds already broken. Thus I presented the theory that perhaps the double-hashing might push the vulnerability over the edge of breakage of 64 rounds. I didn't present that as a likely theory. I presented it as a point of discussion. If you have no way to refute this technical possibility because you don't know a damn thing about cryptographic hash function construction then that means you are not expert enough to comment about the quality of my theory. Do you for example even understand why two SHA256 hash function applications in series is not equivalent to 2 x 64 rounds? I ask you a specific question and I expect a specific answer.

I understand you don't like me, but that is your personal problem. Only a technical reply from you is relevant. Of course you can't make one.

Also how do you know that Craig didn't withdraw his plan because I just explained how he may of accomplished the feat he claimed he can do? I mean if someone could even explain the rational justification for the double-hashing, then we wouldn't be wondering as much.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 08:08:03 AM
You got your answer, satoshi my ass... lol

http://www.drcraigwright.net/



LOL, back to work Cheesy

We don't know yet for sure who Craig is working for.

This obviously was not done without a purpose.

You don't take these huge risk (e.g. of being sued, etc) without a sufficient reason.

Is Matonis a large blocker like Gavin?

Not?

https://www.reddit.com/r/Bitcoin/comments/3yupa6/philosophy_jon_matonis_extending_transaction_fee/

But they both are key members (control?) the Bitcoin Foundation?

What were their positions on Blockstream's SegWit?

Matonis is against block chain soft forks that are in SegWit:

https://www.cryptocoinsnews.com/jon-matonis-believes-block-size-debate-precursor-block-reward-debate/

http://bitcoinist.net/bitcoin-industry-leaders-block-size/



I guess there goes your Bitcoin is broken fud theory.

It might still be technically valid even if Craig isn't availing of such a vulnerability. And I am not yet sure if Craig has quit. He would place himself in greater legal burden by not following through.

Asking to have a technical discussion with a question mark and asking readers to please wait for the replies from other experts, hardly constitutes FUD. Please re-read the quote where I specifically stated those caveats from the very start (of course Gmaxwell deleted the thread but we still have my quote of the OP).

Remember Monero (not smooth) ignored for a year or more my points about combinatorial unmasking and IP address correlation. Finally now they admit it.
member
Activity: 107
Merit: 11
May 05, 2016, 07:53:30 AM
TPTB_need_war stop posting.

That would be great, Ignore works pretty well too.
legendary
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
May 05, 2016, 07:50:55 AM
go back down under CSW!! and never come back!! you fucking lying bastard!!
sr. member
Activity: 360
Merit: 250
Token
May 05, 2016, 07:47:03 AM
 TPTB_need_war stop posting.
legendary
Activity: 1708
Merit: 1040
May 05, 2016, 07:46:16 AM

It appears that the entire fiasco was crafted to destroy Matonis and Andresen.

He has apparently taken the fall in order to hand more power to those who are not Matonis and Andresen.

But the saga may not be fully played out yet...

WOW.

The May 2 blog post has disappeared as well. Either Craig Wright's site got hacked, or his scam came unglued, or this is part of the scam somehow. (*grabs more popcorn*)
sr. member
Activity: 420
Merit: 262
May 05, 2016, 07:38:39 AM

It appears that the entire fiasco was crafted to destroy Matonis and Andresen.

He has apparently taken the fall in order to hand more power to those who are not Matonis and Andresen.

But the saga may not be fully played out yet...
legendary
Activity: 3276
Merit: 2442
May 05, 2016, 07:35:48 AM
Who the hell is Dave Kleiman? Another Satoshi Nakamoto wannabe?

No thanks, we already have enough number of Satoshi rip-off's. Time is money my friend and people don't wanna talk over bullshit.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 07:26:42 AM
I understand it is only speculation at this point, and perhaps the other explanation you mentioned is more likely.

Yes it is much more likely he is a fraud. But one has to wonder why he has gone this far, if he can't follow through.

My theory was only to discuss a theory, but the Bitcoin maximalists can't tolerate freedom-of-speech. So this might tell you where Blockstream will lead Bitcoin. Their SegWit is arguably a scam where they will not have soft fork versioning control over Bitcoin after adding SegWit, as has been explained by Professor Stolfi for example.

The soft fork versioning is a Trojan Horse. Smooth and I challenged Gmaxwell on that point some weeks ago in the Bitcoin Technical Dicussion thread, and last time I checked he had never replied.

It is all politics.

Is there any other reason there is double hashing? I mean are there known benefits and thus reasons it was employed? It was simply a mystery addition that nobody could justify its existance?

Afaik, nobody can justify it. Apparently only Satoshi knows why.

I am now offering a theory as to why. And speculation could be perhaps some people already knew this and were covering it up perhaps, but that isn't necessary to make my theory worth discussing.

If there are no high level tech people here that can explain exactly why it is there then it does seem strange? why was it not questioned before and perhaps removed?

Afair it has been questioned and brushed aside as, "only satoshi knows".

So specifically LTC/Doge would be effected too? the algo does not matter ie scrypt is just as vulnerable as sha256 because this same double hashing is present?

Transaction signing is not related to mining hash algorithm.

Are there any other high level programmers here who have looked at the double hashing and have any ideas about it? negative or positive?

As far as I know, I am the first to present the potential for decreased collision resistance. I googled and didn't find anything.

Hopefully this is not the case and even if it were it is fixable before someone and their super computer or large hash farm can cause any issues.

What about ETH is that vulnerable.

I don't know if ETH uses a double hash on signing.

Also there is another detail which I am not sure about, which I was hoping to ask in that other thread that got deleted. I want to know if Bitcoin is signing a double hash of the transaction, or if the double-hash is only on the public key? That makes a big difference. If only the latter, then perhaps my theory is incorrect. As I wrote in the OP of the thread that got deleted, I didn't spend a lot of time checking all the details and hoped to receive peer review from other experts. but the thread was deleted.

I mean hopefully even worst case there would be a rush to other non vulnerable cryptos and not everyone bailing on the entire cryto scene.

This is why it is always good to have a few different currencies. Some which share practically no similaries so if a whole is found it one then capital can flow to another.

The most likely outcomes are:

1. Craig is a fraud and this issue dies.
2. I misunderstood some detail about where the double-hashing is in Bitcoin's transaction system, thus my theory is invalid.

However, there is also a chance my theory is correct. In that case, I don't know if altcoins without the vulnerability would benefit or suffer.

I just wanted to have a discussion. The Bitcoin maximalists turned it into a war. Bastards.
legendary
Activity: 4551
Merit: 3445
Vile Vixen and Miss Bitcointalk 2021-2023
May 05, 2016, 07:07:08 AM
Your thread was deleted because it was utterly moronic, even more so than your usual bullshit. Everyone who had the misfortune to read it is now dumber for having done so. Go ahead and sell your coins, and don't let the door hit you on your way out.

The Bitcoin maximalists are having a heart attack because they don't like the facts.

While there are facts I don't like, I can accept them and I've never suffered a heart attack as a result. Though it's irrelevant since you've never said anything that even remotely resembles a fact.

You are free to present a refutation of anything I've written. So far, I've seen no technical argument from you.
How can I? One can only make a technical argument against disputed facts, and as I said, nothing you've ever said resembles a fact, disputed or otherwise. There is no technical argument to be made against the ravings of a deranged lunatic.
Pages:
Jump to: