Bruce Schneier’s Wired Op-Ed Slams Blockchain, But Why

Big Dick Bruce Schneier on why Bitcoin isn't trustless

submitted by SJWcucksoyboy to Buttcoin [link] [comments]

Bitcoin overview: Bitcoin is hopelessly useless - Bruce Schneier, Harvard University - FXStreet

Bitcoin overview: Bitcoin is hopelessly useless - Bruce Schneier, Harvard University - FXStreet submitted by ulros to fbitcoin [link] [comments]

Bruce Schneier linked to a paper about tracking bitcoin scams from Marie Vasek and Tyler Moore

Bruce Schneier linked to a paper about tracking bitcoin scams from Marie Vasek and Tyler Moore submitted by Superkatzo to Bitcoin [link] [comments]

Bitcoin mentioned around Reddit: Bruce Schneier Sounds The Alarm: If You're Worried About Russians Hacking, Maybe Help Fix Voting Machine Security /r/politics

Bitcoin mentioned around Reddit: Bruce Schneier Sounds The Alarm: If You're Worried About Russians Hacking, Maybe Help Fix Voting Machine Security /politics submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Where to Find a Hacker to Hire

Where to Find a Hacker to Hire
https://preview.redd.it/r6t6um01tgx41.png?width=1280&format=png&auto=webp&s=054ae85c019c50e397e66c928facc0520a7d473c
Security analysis services like Rent-A-Hacker are just the start. Compa­nies are learning that they have more comprehensive protection.
Chief among the outsourced secu­rity companies is Counterpane Inter­net Security (thehackerforhire.com), founded by noted cryptographer Bruce Schneier (see “Hot Seat,” April 2000, page 42). Counterpane installs hardware on its customers’ premises that patrols the network for security violations. At one base of operations, Counterpane keeps tabs on clients’ networks 24 hours each day , and therefore the com­pany can act the instant something suspicious arises.
Schneier remains skeptical about his competition: “What hire-a-hacker services do is run a tiger team against your system, which is sweet for locating out what the vulnerabilities are. What we do is alarm monitoring…24–7, real-time.”
To better illustrate the difference, Schneier offers a physical analogy: You might want to rent someone to interrupt into your warehouse to ascertain if you’re vul­nerable, but that doesn’t mean you’re getting to fire your burglar alarm company. Both are valuable, but certainly a burglar alarm is more valuable. Experts are expensive, and that they don’t tell you if you’re safe or not. They tell you whether that specific expert was ready to break in thereon particular day using that par­ticular set of tools.
Best sites for hiring a hacker
In this guide we also want to point out you a couple of internet sites where you’ll hire a hacker:
One relatively new but documented website for dark web hackers for hire is
https://thehackerforhire.com
You need Tor browser to access the location . Once you’re there you’ll choose what services you’re curious about , and if you opt to order their hacking service, all you’ve got to try to to is open an account and send them some bitcoins.
These days bitcoins are often bought at many places, just google “where to shop for bitcoins using XYZ” or “Where to shop for bitcoin in country XYZ”.
Another site that gives hacking services is Rent-A-Hacker, it already exists since a few years and is additionally documented on the dark web.
The link to Rent-A-Hacker is:
https://thehackerforhire.com
Again, you would like Tor browser to access the location , see above.
And that is essentially all you would like to understand , which site you select is up to you. all of them provide similar service.
Whatever sort of hacking job you would like them to try to to , as long as you buy it, they’re going to roll in the hay .
They offer DDOS service, general website hacking, smartphone remote , stealing sensitive data or whatever else hackers can do.

Conclusion:

As you could see, it is really not hard to find a hacker for hire on the dark web.
Everything you need is the Tor browser and some money in Bitcoin, which is both easy and intuitive to use these days.
And both Tor and Bitcoin will provide you the needed anonymity for hiring a hacker, they won’t know who you are, and you won’t know who they are.
submitted by BacklinksSeo73 to u/BacklinksSeo73 [link] [comments]

Treasure Hunt! We put the key to $2000 worth of BTC on the Siacoin network

I've been thinking about this idea for a while. Some people think storing data on the Siacoin network is not secure, so let's put it to the test!
The Sia Network uses Reed Solomon Erasure Coding to split up the data and store it across multiple hosts. All Sia data is encrypted by default using Threefish, a modern symmetric cipher designed by Bruce Schneier. No practical attack on this cipher has ever been demonstrated. If you can steal my data from the Sia network, you can break Threefish encryption.

The Bounty

Here’s the Bitcoin wallet: https://www.blockchain.com/btc/address/bc1qta34d4r20t0a02f74yg6n0x9naddxqx2qh3q6e
It’s simple. I have uploaded the private key for this Bitcoin to the Sia network. To make things even easier, I am announcing the hosts that I am storing this data with: https://gist.github.com/nitronick600/6cd8bf005d75d404b0fa1e2e578cedbe
The tweet: https://twitter.com/LuxorTechTeam/status/1197628939914498048?s=20 The medium: https://medium.com/@LuxorTechTeam/the-siacoin-bitcoin-bounty-b8b2dcf4d4f6
submitted by luxordevs to siacoin [link] [comments]

A Look at DCG & Bitfury's Incestuous Ties With the U.S. Government

Peter Todd Tweet in 2014: https://archive.is/vKZ9C
[email protected] I gotta say, looks really bad legally how Austin Hill's been negotiating deals w/ pools/etc. to get control of hashing power.
Board of Digital Currency Group
Glenn Hutchins
Advisory Board
Larry Summers
DCG of course is an investor in both Blockstream and BTCC.
DCG's money comes from:
DCG also owns Coindesk.
BTCC and Bitfury are the only two large mining pools who are outspoken in their support of Bitcoin Core.
The Bitfury Group Leadership to Present at Clinton Global Initiative (https://archive.is/MWKee)
Full Video (Begins at 32:00)
“The Bitfury Group is proud to be the world’s leading full service Blockchain technology company, we are deeply honored to represent this innovation to an audience of extremely dedicated game-changers, and we look forward to highlighting our company’s groundbreaking ‘Blockchain for global good’ work at such an important event, said Smith. “From the White House to the Blockchain, I know this technology has the power to deliver inclusion and opportunity to millions, if not billions, of people around the world and I am so grateful to work for a company focused on such a principled vision.”
Bitfury Lightning Implementation
  • In partnership with a French firm called ACINQ (http://acinq.co)
  • ACINQ is a subsidiary of the larger ACINQ Financial Services
  • CoinTelegraph: Bitfury Lightning Network Successfully Tested With French Bitcoin Company
  • TEAM: https://archive.is/Q5CNU
  • ACINQ’s US Headquarters is in Vienna, Virginia, a small town of only 16,000. Why would a global financial firm choose to locate here? -- Feeder community into Washington, D.C. Has an orange line metro stop. -- Located in Fairfax County, VA. -- The US Federal Government is the #2 largest employer -- Booz Allen Hamilton (NSA front company) is #6 largest employer -- In fact, most of the top employers in Fairfax County are either US Federal Gov’t or companies that provide services to Federal Government -- The county is home to the headquarters of intelligence agencies such as the Central Intelligence Agency, National Geospatial-Intelligence Agency, and National Reconnaissance Office, as well as the National Counterterrorism Center and Office of the Director of National Intelligence.
Chairman: Avinash Vashistha
CEO: Chaman Baid
CSO: Nandan Setlur
  • https://www.linkedin.com/in/nandansetlur https://archive.is/wp3L0
  • From 1986-1993 he worked for Information Management Consultants (imc) Ltd as a Technical Consultant with various federal government agencies. McLean, Virginia
  • 1993-2000 Technical Consultant for Freddie Mac, in McLean Virginia
  • From 2000-2007, President of InterPro Global in Maryland
  • From 2011-2012, Director of VibbleTV in Columbia, Maryland
  • From 2008-Present has been Executive Director at ACINQ and Managing Partner at Vine Management, both in Vienna, Virginia.
BitFury Enhances Its Advisory Board by Adding Former CFTC Chairman Dr. James Newsome and Renowned Global Thought Leader and President of the Institute for Liberty and Democracy Hernando de Soto (Businesswire)
Bitfury Board of Directors
Robert R Dykes
The other board members include two Bitfury founders, and an investor.
Bitfury Advisory Board
James Newsome
  • Ex-chairman of CFTC
  • Dr. Newsome was nominated by President Clinton and confirmed by the Senate to be at first a Commissioner and later a Chairman of CFTC. As Chairman, Newsome guided the regulation of the nation’s futures markets. Additionally, Newsome led the CFTC’s regulatory implementation of the Commodity Futures Modernization Act of 2000 (CFMA). He also served as one of four members of the President’s Working Group for Financial Markets, along with the Secretary of the Treasury and the Chairmen of the Federal Reserve and the SEC. In 2004, Newsome assumed the role of President and Chief Executive Officer of the New York Mercantile Exchange (NYMEX) where he managed daily operations of the largest physical derivatives exchange in the world. Dr. Newsome is presently a founding partner of Delta Strategy Group, a full-service government affairs firm based in Washington, DC.
Hernando de Soto
  • Hernando de Soto heads the Institute for Liberty and Democracy, named by The Economist one of the two most important think tanks in the world. In the last 30 years, he and his colleagues at the ILD have been involved in designing and implementing legal reform programs to empower the poor in Africa, Asia, Latin America, the Middle East, and former Soviet nations by granting them access to the same property and business rights that the majority of people in developed countries have through the institutions and tools needed to exercise those rights and freedoms. Mr. de Soto also co-chaired with former US Secretary of State Madeleine Albright the Commission on Legal Empowerment of the Poor, and currently serves as honorary co-chair on various boards and organizations, including the World Justice Project. He is the author of “The Other Path: the Economic Answer to Terrorism”, and his seminal work “The Mystery of Capital: Why Capitalism Triumphs in the West and Fails Everywhere Else.”
  • Frequent attendee at Davos World Economic Forum
  • Frequent Speaker @ Clinton Global Initiative http://www.dailymotion.com/video/x2ytfrs https://archive.is/MWKee
  • Criticisms: -- In his 'Planet of Slums'[104] Mike Davis argues that de Soto, who Davis calls 'the global guru of neo-liberal populism', is essentially promoting what the statist left in South America and India has always promoted—individual land titling. Davis argues that titling is the incorporation into the formal economy of cities, which benefits more wealthy squatters but is disastrous for poorer squatters, and especially tenants who simply cannot afford incorporation into the fully commodified formal economy. -- An article by Madeleine Bunting for The Guardian (UK) claimed that de Soto's suggestions would in some circumstances cause more harm than benefit, and referred to The Mystery of Capital as "an elaborate smokescreen" used to obscure the issue of the power of the globalized elite. She cited de Soto's employment history as evidence of his bias in favor of the powerful. https://www.theguardian.com/business/2000/sep/11/imf.comment http://www.slate.com/articles/news_and_politics/hey_wait_a_minute/2005/01/the_de_soto_delusion.html
Tomicah Tilleman
  • https://en.wikipedia.org/wiki/Tomicah_Tillemann
  • Dr. Tomicah Tillemann is Director of the Bretton Woods II initiative. The initiative brings together a variety of long-term investors, with the goal of committing 1% of their assets to social impact investment and using investments as leverage to encourage global good governance. Tillemann served at the U.S. State Department in 2010 as the Senior Advisor on Civil Society and Emerging Democracies to Secretary Hillary Clinton and Secretary John Kerry. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Tillemann received his B.A. magna cum laude from Yale University. He holds a Ph.D. with distinction from the School for Advanced International Studies at Johns Hopkins University (SAIS) where he also served as a graduate level instructor in American foreign policy. http://live.worldbank.org/node/8468 https://archive.is/raDHA
  • Secretary Clinton appointed Tomicah Tillemann, Ph.D. as the State Department’s Senior Advisor for Civil Society and Emerging Democracies in October 2010. He continues his service under Secretary Kerry.
  • Mr. Tillemann and his team operate like venture capitalists, identifying ideas that can strengthen new democracies and civil society, and then bring together the talent, technology and resources needed to translate promising concepts into successful diplomacy. He and his team have developed over 20 major initiatives on behalf of the President and Secretary of State.
  • Mr. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009 and collaborated with her on over 200 speeches. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Mr. Tillemann’s other professional experience includes work with the White House Office of Media Affairs and five U.S. Senate and Congressional campaigns. He was a reporter with Reuters New Media and hosted a commercial radio program in Denver, Colorado. http://m.state.gov/md160354.htm https://www.newamerica.org/our-people/tomicah-tillemann/ https://archive.is/u2yF0
  • Director of “Bretton Woods II” initiative at New America Foundation Bretton Woods was an international summit that led to the creation of the IMF and the IBRD, one of five members of The World Bank
Jamie Smith
Jason Weinstein
Paul Brody (no longer appears on site, and his LinkedIn has no mention of Bitfury, but he is mentioned in a Press Release
  • https://www.linkedin.com/in/pbrody
  • Ernst & Young since 2015 as “Americas Strategy Leader”, “Global Innovation Leader”, and “Solution Leader”
  • Prior to E&Y, he was an executive at IBM since 2002
New America Foundation
Muskoka Group
[note: this is worthy of much more research]
  • https://www.bloomberg.com/news/articles/2016-08-29/blockchain-s-backers-embark-on-campaign-to-improve-its-image
  • Don Tapscott, co-author of the book “Blockchain Revolution,” hosted the meeting with his son and co-author Alex Tapscott at his family’s summer compound in Lake of Bays, Ontario. The group included some of blockchain’s biggest backers, including people with ties to IBM and JPMorgan. They considered ways to improve the governance and oversight of the technology behind the digital currency bitcoin as a way to fuel the industry’s growth. They included Jim Zemlin, executive director of the Linux Foundation; Brian Behlendorf, executive director of the Hyperledger Project, a blockchain supporter group that includes International Business Machines Corp., Airbus Group SE and JPMorgan Chase & Co.; and Ana Lopes, board member of the World Wide Web Foundation. Participants with blockchain industry ties include former deputy White House press secretary Jamie Smith, now chief global communications officer of BitFury Group Ltd., and Joseph Lubin, founder of startup Consensus Systems.
Blockchain Delegation Attends Democratic National Convention https://archive.is/k16Nu
Attendees:
Jamie Smith — The Bitfury Group & Blockchain Trust Accelerator Tomicah Tillemann— New America Foundation & Blockchain Trust Accelerator Alex Tapscott— co-author: Blockchain Revolution Brian Forde — MIT, Digital Currency Initiative
Brian Forde
  • Was the founding director of the MIT Digital Currency Initiative -Left his 4 year post as White House Senior Advisor for Mobile and Data Innovation to go directly to the MIT DCI
  • Brian Forde has spent more than a decade at the nexus of technology, entrepreneurship, and public policy. He is currently the Director of Digital Currency at the MIT Media Lab where he leads efforts to mainstream digital currencies like Bitcoin through research, and incubation of high-impact applications of the emerging technology. Most recently he was the Senior Advisor for Mobile and Data Innovation at the White House where he spearheaded efforts to leverage emerging technologies to address the President’s most critical national priorities. Prior to his work at the White House, Brian founded one of the largest phone companies in Nicaragua after serving as a business and technology volunteer in the Peace Corps. In recognition of his work, Brian was named a Young Global Leader by the World Economic Forum and one of the ten most influential people in bitcoin and blockchain. https://www.linkedin.com/in/brianforde https://archive.is/WjEGU
Alex Tapscott
World Economic Forum
  • Strategic Partners: https://www.weforum.org/about/strategic-partners
  • Includes Accenture (See Avinash Vashistha), Allianz, Deloitte (Scaling Bitcoin platinum sponsor, Blockstream Partner), Citigroup, Bain & Company (parent of Bain Capital, DCG investor), Dalian Wanda Group (working on blockchain technology), Ernst & Young (see Paul Brody), HSBC (Li-Ka Shing, Blockstream investor, used to be Deputy Chairman of HSBC), IBM, KPMG International, Mastercard (DCG Investor), PwC (Blockstream partner, also sponsor of Scaling Bitcoin)
  • Future of Financial Services Report [PDF] The word “blockchain” is mentioned once in this document, on page 23 (http://i.imgur.com/1SxyneJ.png): We have identified three major challenge areas related to innovation in financial services that will require multi-stakeholder collaboration to be addressed effectively. We are launching a project stream related to each area, with the goal of enabling tangible impact.... Decentralised systems, such as the blockchain protocol, threaten to disintermediate almost every process in financial services
  • The Steering Group who authored the report is a who’s who of the global financial elite. (Pages 4 & 5) http://i.imgur.com/fmYc1bO.png http://i.imgur.com/331FaX6.png
Bitfury Washington DC Office
Washington DC Office 600 Pennsylvania Avenue Suite 300 Washington, D.C. 20003
http://bitfury.com/contacts https://archive.is/ugvII
Bitfury Chosen for Ernst & Young Blockchain Startup Challenge
Deloitte Unveils Plan to Build Blockchain-Based Digital Bank http://www.consultancy.uk/news/12237/deloitte-unveils-plan-to-build-blockchain-based-digital-bank https://archive.is/UJ8Q5
submitted by 5zh8FoCiZ to btc [link] [comments]

There's No Good Reason to Trust Blockchain Technology

This is the best tl;dr I could make, original reduced by 92%. (I'm a bot)
They're fond of catchphrases like "In code we trust," "In math we trust," and "In crypto we trust." This is trust as verification.
In his 2018 book, Blockchain and the New Architecture of Trust, Kevin Werbach outlines four different "Trust architectures." The first is peer-to-peer trust.
His second is leviathan trust, which corresponds to institutional trust.
What blockchain does is shift some of the trust in people and institutions to trust in technology.
In many ways, trusting technology is harder than trusting people.
To answer the question of whether the blockchain is needed, ask yourself: Does the blockchain change the system of trust in any meaningful way, or just shift it around? Does it just try to replace trust with verification? Does it strengthen existing trust relationships, or try to go against them? How can trust be abused in the new system, and is this better or worse than the potential abuses in the old system? And lastly: What would your system look like if you didn't use blockchain at all?
Summary Source | FAQ | Feedback | Top keywords: trust#1 blockchain#2 system#3 bitcoin#4 people#5
Post found in /technology, /Buttcoin, /hackernews, /techgeeks, /CryptoCurrency, /technology, /Wired_Top_Stories, /bprogramming, /Buttcoin and /Bitcoin.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

Why the NSA revelations make me worried about the safety of Bitcoin

This has probably been discussed before, but I don't see how Bitcoin can be a safe method of storing wealth, given our current situation where the NSA observes EVERYTHING. Not just that, the NSA has installed backdoors in nearly all of our hardware. Both Intel and AMD processors likely have hardware backdoors for the NSA.
Back in 2010, the NSA broke a variety of cryptographic standards. In addition, we know that the NSA has lobbied organizations to implement weak cryptographic standards. Furthermore, we know that the NSA has pushed for flawed random number generators. Weak random number generators have previously led to the theft of large numbers of Bitcoin on mobile devices.
Bitcoin completely relies on the integrity of the SHA-256 algorithm, which was developed by the SAME NSA that intentionally pushes flawed cryptographic standards. Bruce Schneier no longer trusts the NSA's elliptic curve cryptography standard, as he believes they may have intentionally chosen a weak elliptic curve that the NSA can use. The numbers used are supposed to be random to make it unlikely that anyone could exploit a weak curve, but the NSA provided different numbers, that are non-random.
Vitalik Buterin argues that we can expect Bitcoin not to use a weak curve, as the numbers used in Bitcoin are fairly simple to calculate, whereas arbitrary numbers would create the possibility of Satoshi using an intentionally weak curve.
However, it seems to me that we can argue the exact opposite as well. For p, Bitcoin uses 115792089237316195423570985008687907853269984665640564039457584007908834671663, which is arrived at by calculating 2256 – 232 – 977 and seems fairly arbitrary to me as well.
Perhaps the main cause of my worries is the fact that the NSA in 1996 created a document outlining how to make a digital currency based on cryptography. Thus we know that the NSA has been studying the possibility of cryptocurrencies for a long period. Considering how the NSA manages to keep control over cryptography by releasing weak standards itself, is it possible that the NSA attempts to do the same with cryptocurrency?
Finally, I'm very worried about who this anonymous hacker who calls himself Satoshi Nakamoto might be. The Bitcoin source code contained different incomplete ideas that were never implemented, such as a decentralized marketplace (this is from memory, can't find the link). It all seems very ambitious to be the product of a single individual.
What is most worrying about Satoshi Nakamoto however is what is found in the blockchain. There's a non-random distribution of nonces in the early blockchain. What this means is that Satoshi Nakamoto was mining Bitcoin with a mining rig that was completely different from what everyone else was using back then.
It seems that he used 58 different computers, all with a different ID and all programmed to use different nonces to avoid checking the same possible solution multiple times, and at some point some of the computers broke down and were not put back up. This is not a genius amateur, but rather, someone with access to a lot of equipment. What makes all of this worse, is the fact that most of these blocks appear never to have moved. In other words, whatever entity mined these blocks probably still has control over them and doesn't seem to be motivated by personal gain. Rather, their control over about 1 million Bitcoin seems to have created a kind of "deathswitch", that allows them to crash the market at will.
Finally, Nakamoto's behavior is strange. As noted by others, his timezone seems to indicate he lived on the West Coast, yet his language uses British spelling. Furthermore, he took up to two weeks to respond to comments, indicating that anything he said seemed to require approval from higher ups, or agreement among multiple persons.
In conclusion, there is nothing here that indicates to me that we are dealing with a project designed by a regular Joe. Instead, we seem to be sitting on a ticking time bomb, a ten billion dollar experiment that could be deflated at will and cause economic chaos in the process.
submitted by accountt1234 to Bitcoin [link] [comments]

How DPR might spend his millions from inside of prison

I spent some time thinking about how DPR might spend his millions from behind bars. Here's what I came up with. Can you do better?
Imagine that DPR is in prison and he's got 80 million dollars worth of BTC in a brainwallet. For example, all stored with the passphrase "correct horse battery staple" (c.h.b.s for short). The Feds want that money and they're definitely not going to let him send it to anyone so they're not letting him use a computer, especially not one connected to the internet.
If he had access to a computer, he could write a transaction from behind bars and pass it on a piece of paper to someone on the outside. But he doesn't. And if he did, that computer would have a keylogger.
His next alternative is to write c.h.b.s on a piece of paper and pass that to someone. But he'd then be trusting all his 80 million to one person. That's not safe, either.
Assuming some planning, maybe he divided up his money into tens of thousands of bitcoin addresses, each one with, say, 20BTC. Now he can give out private keys as needed, written down, and spend money in increments of 20BTC.
The problem with that is that he has to memorize thousands of passphrases. One option, he could use:
but someone would catch on to the pattern and take all his money.
In prison he might have books. Instead of numbers, he could use the first letter of words in a line from a book, like Romeo and Juliet. Like this:
Harder to crack but it's just obfuscation. If someone figures out the book, he's screwed.
Ideally, he would have a hash function that could be computed with innocent things that you'd find in a prison: a deck of cards, a book, maybe a calculator. Bruce Schneier invented a cryptographic algorithm that uses a deck of cards. If you had a good hash function that you could do mechanically, you could use those outputs at http://brainwallet.org:
A deck of cards is surprisingly strong. The order of a random deck of cards is about 200bits of entropy, even more than a 160bit bitcoin hash, so a deck of cards could be useful.
That's as far as I got. Any better ideas? How do you store 10,000 brainwallets in your brain without using a computer? Or make transactions without a computer?
submitted by eyal0 to Bitcoin [link] [comments]

Bitcoin Civil War (the bright sides)

It will be interesting to see how the next couple of months play out. Whatever happens, there are a couple of positive sides to the situation.
For one, we will see if it is possible to change the rules of the Bitcoin network even against considerable resistance.
The Japanese Constitution has never been amended. But it is very clear what is necessary to amend it. Article 96 of the Constitution states the requirements.
The Bitcoin network has never been challenged by an internal faction in the way it is now. In contrast to the Japanese Constitution, it is not very clear what is needed to push through the block size extension the Bitcoin Unlimited camp wants.
So if they succeed in their attempt, we will have a reference case what is needed to change the protocol against substantial resistance. If they fail, we will have a reference case as well, showing that the failed level of support was not enough.
This civil war will also be an interesting case to study when preparing for war with outside attackers. There has been speculation about "51%-attacks" before. But as far as I know, no one has ever actually pulled off a 51%-attack against the Bitcoin network.
In the course of this civil war, that may change. I hear that Peter Rizun, one of the supporters of Bitcoin Unlimited, is advocating for using hash power to shut down the original Bitcoin chain after a fork, mining empty blocks on that chain.
If that happens, that would be an excellent test case. A highly motivated, well-funded adversary trying to shut down the Bitcoin blockchain has not happened yet in real life.
If such an attack happens, and the Bitcoin blockchain survives it one way or another, that would be real-life proof of its resiliency.
Since all of the value of the Bitcoin blockchain comes from this resiliency against attack and the trust created, surviving such a test would be proof of its value. An eight year track record of unbroken service is valuable, but extending it defeating serious attacks shows even more value.
All cryptography has value only as far as people actually try to break it and fail (Schneier's law). It follows that attacks on the Bitcoin network like the one Rizun wants to happen are a good thing.
We also may get a short-term increase in block space (if the Bitcoin Unlimited faction wins the civil war).
Again, interesting times for the Bitcoin network.
submitted by Karl-Friedrich_Lenz to btc [link] [comments]

Cryptographic reviews of bitcoin?

I'm searching for informed bitcoin reviews, infact I haven't the knowledge to complitely understand and value its security, the only cryptographer that I read that write on this is Bruce Schneier, that wrote this:
"I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real issues are economic and political, and I don't have the expertise to have an opinion on that."
source
experienced people reviews of bitcoin
1 - Bruce Schneier
2 - Dan Kaminsky
submitted by pietrod21 to Bitcoin [link] [comments]

Decentralized Antivirus?

While driving home some hours ago i listened to the Bruce Schneier crypto-gram security podcast. He was talking about how big security companys don't tell us about security threats caused by spy agencies. At that moment i asked myself how hard would it be to build a opensource decentralized security suite?
I'm no programmer, i do Webapplications at work whenever i have some free time. My passion is UI design but i also do everything around it as a one man show. SQL Database design - i'm a noob but i get the job done PHP - i'm a noob but i get the job done Java - i'm a noob but i get the... CSS, HTML, ASP, .net, photoshop... you get it.
All i can contribute are my allround IT skills.
My idea is this (ATTENTION: might be stupid): A opensource security suite that updates itself decentralized trough encrypted channels that also verifies itself trough a blockchain that is maintained by all the clients in the network. The software is designed for end-user systems and will install its own network driver, take control over the phisical network devices and disables all network traffic trough them. It only allows traffic that goes trough it's own network driver and gives the user full control over every process that is trying to send whatever over the network. Just like VPN clients that big companies use on their devices (Cisco Anyconnect?).
Now i'm asking the talented programmers in the bitcoin community: Can a software like this be made with blockchain, encryption and opensource technology?
Please contact me trough reddit if you think so!
submitted by zlet2 to Bitcoin [link] [comments]

Writing a book on Bitcoin and blockchain technology, and I'm looking for particularly illuminating arguments for why it's taken as a given that a hostile attacker can't mass enough computing power to perform a 51% attack. Any help appreciated!

Hey all! As the title says, I'm working on a book about Bitcoin, blockchain tech, and cryptocurrencies. The section I'm working on now is about how the blockchain provides such robust security.
Bitcoin takes as a given that honest nodes will always control a majority of the computing power. To a reader who is unfamiliar with the space, though, this seems like an unsubstantiated claim. I have a vague understanding of why this is true, but I can't find a way to express it in a way that would be convincing to a layperson. Is anyone aware of any particularly illustrative examples of why this assumption is taken for granted among the Bitcoin community?
As an example of what I'm looking for, here is an illustration I'm using to demonstrate the security of a single Bitcoin private key, adapted from Bruce Schneier's writing (ctrl+f "second law of thermodynamics"):
First, recognize that a specific consequence of the second law of thermodynamics is that there is a minimum energy required to change a single binary bit of information.
Now suppose you were able to harness the entire energy output of the sun only to power a specially designed computer, whose job is to count through private keys, in the hopes of finding one corresponding to a public key that held Bitcoins.
Using a bit of math, you'll find that a perfectly efficient computer can count through 2178 values given the sun's entire annual energy output. If we divide this value into the number of possible private keys, 2256, we find that this hypothetical computer would only be able to count through 0.0000000000000000000003% of the total number of possible private keys, given the entire annual energy output of the sun.
Furthermore, this is just counting, and doesn't actually include the monumentally more complex task of actually checking each private key to see if it corresponds to a “winning” public key. So in the 0.0000000000000000000003% chance this computer did happen across a lucky private key, it wouldn't even know it.
Schneier closes with this: “These numbers have nothing to do with the technology of the devices; they are the maximums that thermodynamics will allow. And they strongly imply that brute-force attacks against 256-bit keys will be infeasible until computers are built from something other than matter and occupy something other than space.”
submitted by coinop-logan to Bitcoin [link] [comments]

Bitcoin GUARANTEED to fail

I have been following Bitcoin since ~2011/2012, and I have considered myself a "bitcoin bug". I found a comment on Bruce Schneier's website that seriously made me think:
*Bitcoin is doomed, in at least two different ways...
First, because it is based on ECDSA, if and when someone invents a sufficiently powerful quantum computer, Shor's algorithm will enable someone with such a computer to steal bitcoins at will.
Second, if no one ever does create a sufficiently powerful quantum computer, there is a fixed upper limit on the total number of Bitcoins (21 million), and no one has the authority to make more. So if you lose your private key/wallet (and don't have a quantum computer) then the bitcoins in that wallet are lost forever.
In other words, the bitcoin system can be thought of as an absorbing Markov chain. Bitcoins leap from wallet to wallet (the non-absorbing states), but there is always a chance they will leap to the absorbing state of being lost. As an absorbing Markov chain, it is inevitable that eventually most and then all the bitcoins will become lost, and the bitcoin system will break down.
Together with the deflationary aspect of the bitcoin system, I sometimes wonder if it was carefully designed as a Pyramid scheme to extract wealth over the next decade or so from conspiracy theorists, paranoids, currency speculators, gold-bugs, and Ayn-Randian fanatics. Perhaps that is the reason why the creator used a pseudonym and is still anonymous...*
http://www.schneier.com/blog/archives/2012/10/analysis_of_how.html
If those aspects are true, then there is only one valid reason left to invest in bitcoin, and it's not a good one: greed
submitted by jcoffy to Bitcoin [link] [comments]

Today at Sevilla, Brad Templeton has talked about Ethereum on the Singularity University Summit!

This is huge, 900 attendees at the conference. Brad Templeton (@Bradtem) as one of the speakers.
Please have a look about Singularity University if you don´t know what it is. Their summits are one of the most important conference about technology, They have behind a really important Think Tank.
Maybe this help to encourage the Comms team of Ethereum, the project will get traction inviting (talking with) influencers as Jacob Appelbaum, Bruce Schneier, Wei Dai (unit inspiration), ThomasV (Electrum), Pieter Hintjens and even Linus Torvalds. Security experts to test the platform and receive their feedback. There is much to do. So excited for that.
On the other hand, as Vinay writes today at the blog, please don´t being rush to get Frontier. Security-driven is a must.
Looking forward, you guys are making history.
From who you would like to get feedback of the project? Please feel free to answer. I say.. Satoshi :)
submitted by jmiehau to ethereum [link] [comments]

Remove My Tinfoil Hat Please

Bruce Schneier has an excellent article available here:
https://www.schneier.com/essay-198.html
What concerns me is that Bitcoin uses Elliptic Curve Cryptography. And there are known issues with random number generation which relies on Dual Elliptic Curve Random Number Generation. And of course, the problem is worse, since there are known issues with other random number generators which meet NIST standards (which are NSA-influenced).
To make matters worse, we don't know who Satoshi is. Satoshi could be the NSA, for all we know. Or Satoshi could be some other individual or agency who intends to exploit some of these issues.
Why should I think BTC's security algorithms are NSA-proof? Is there someone out there who can explain this to me? I previously advocated the IronKey as a secure device for storage of coins. But IronKey was developed with funding provided by the NSA. It would seem reasonable to believe it has an NSA backdoor. And now I'm starting to worry about how much of the software I use has an NSA backdoor. Why should I think that BTC software isn't NSA backdoored?
submitted by ScottishNous to Bitcoin [link] [comments]

Large DDoS attacks cause outages at Twitter, Spotify, and other sites

This is an automatic summary, original reduced by 74%.
Dyn's general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks.
Although DDoS attacks are sometimes accompanied by extortion letters that ask a company to hand over bitcoin in exchange for ceasing an attack, Dyn said it has not received any messages from its attackers.
The DDoS attack on Dyn follows on the heels of one of the largest DDoS attack in history, which used the Mirai botnet to target the website of independent cybersecurity journalist Brian Krebs.
Although DDoS attacks have historically used large networks of compromised computers called botnets to send junk traffic to sites, overwhelming them and making them inaccessible to legitimate users, the Krebs attack expanded in scale by using compromised Internet of Things devices like security cameras to build a botnet.
After the attack on Krebs' website, the code used to build the botnet leaked online, making more massive DDoS attacks all but inevitable.
Security researcher Bruce Schneier reported in September that several internet infrastructure companies had been targeted with DDoS attacks, although they had not caused the kind of widespread outages experienced today.
Summary Source | FAQ | Theory | Feedback | Top five keywords: attack#1 Dyn#2 DDoS#3 used#4 around#5
Post found in /argentina, /The_Donald, /inthenews, /Comcast_Xfinity, /news, /realtech, /battlefield_one, /cCloud, /news, /TheWatchTowers, /DailyTechNewsShow, /ScienceUncensored, /gadgets, /2007scape, /worldnews, /technology, /NoFilterNews and /PoliticsAll.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

An interesting problem social media is disappearing. DNS Server cannot be contacted. OMG Technical problem? I think not. Twitter down.

This is an automatic summary, original reduced by 74%.
Dyn's general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks.
Although DDoS attacks are sometimes accompanied by extortion letters that ask a company to hand over bitcoin in exchange for ceasing an attack, Dyn said it has not received any messages from its attackers.
The DDoS attack on Dyn follows on the heels of one of the largest DDoS attack in history, which used the Mirai botnet to target the website of independent cybersecurity journalist Brian Krebs.
Although DDoS attacks have historically used large networks of compromised computers called botnets to send junk traffic to sites, overwhelming them and making them inaccessible to legitimate users, the Krebs attack expanded in scale by using compromised Internet of Things devices like security cameras to build a botnet.
After the attack on Krebs' website, the code used to build the botnet leaked online, making more massive DDoS attacks all but inevitable.
Security researcher Bruce Schneier reported in September that several internet infrastructure companies had been targeted with DDoS attacks, although they had not caused the kind of widespread outages experienced today.
Summary Source | FAQ | Theory | Feedback | Top five keywords: attack#1 Dyn#2 DDoS#3 used#4 around#5
Post found in /The_Donald, /inthenews, /news, /Comcast_Xfinity, /realtech, /battlefield_one, /cCloud, /news, /TheWatchTowers, /DailyTechNewsShow, /ScienceUncensored, /gadgets, /2007scape, /worldnews, /technology, /NoFilterNews and /PoliticsAll.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

Someone is Learning How to Take Down the Internet

This is an automatic summary, original reduced by 78%.
These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down.
If you want to take a network off the Internet, the easiest way to do it is with a distributed denial-of-service attack.
Like the name says, this is an attack designed to prevent legitimate users from getting to the site.
Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them.
While its publication doesn't have the level of detail I heard from the companies I spoke with, the trends are the same: "In Q2 2016, attacks continued to become more frequent, persistent, and complex."
One company told me about a variety of probing attacks in addition to the DDoS attacks: testing the ability to manipulate Internet addresses and routes, seeing how long it takes the defenders to respond, and so on.
Summary Source | FAQ | Theory | Feedback | Top five keywords: attack#1 company#2 Internet#3 see#4 more#5
Post found in /Futurology, /DarkFuturology, /todayilearned, /The_Donald, /programming, /BitcoinAll, /Bitcoin, /China, /MrRobot, /hacking, /cybersecurity, /ARGIRC, /collapse, /techsnap, /RIPworldnews, /abetterworldnews, /technology, /dns, /linux, /geopolitics, /thisisthewayitwillbe, /TorontoCrypto, /impega, /security, /sysadmin, /Cyberpunk, /The_Donald, /SchneierOnSecurity, /netsec, /inthenews, /news, /technology and /politics.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

Bitcoin Security and Recent Thefts and the NSA

There is a failure of security on the internet.
Today there were 2 stories of the theft of bitcoins
  1. fr33a.com
  2. Ottawa bitcoin exchange defrauded of $100,000 in 'ridiculous' heist
Not to mention the on going Gox fiasco and the dozens of high profile thefts that have occurred in the last year plus numerous smaller thefts many of which probably never come to light.
I don't believe that bitcoin is inherently insecure. Nor do I believe that the possession of bitcoin should be beyond the reach of the average individual.
I do, however, believe that the price of bitcoin and the irrevocability of transactions have made bitcoin a high profile target.
Previously systems have remained unexploited and clean from botnets, viruses, etc., not because of exceptional security, but because there simply was nothing worth stealing.
Now there is.
Bruce Schneier has recently called for the restructuring of the NSA..
Specifically, from the Snowden revelations, it has come to light that the NSA is actively undermining the security of the internet.
I believe the NSA working to undermine security is the wrong approach.
Schneier states:
Much of the current debate in the U.S. is over what the NSA should be allowed to do, and whether limiting the NSA somehow empowers other governments. That's the wrong debate. We don't get to choose between a world where the NSA spies and one where the Chinese spy. Our choice is between a world where our information infrastructure is vulnerable to all attackers or secure for all users.
We all should encourage our representatives to press for the changes Schneier recommends.
If the NSA were actively working to enhance security on the internet all of our coins would be safer.
submitted by optimator999 to Bitcoin [link] [comments]

Decentralized Opensource Security Suite

While driving some hours ago i listened to the Bruce Schneier crypto-gram security podcast. He was talking about how big security companys don't tell us about security threats caused by spy agencies. At that moment i asked myself how hard would it be to build a opensource decentralized security suite?
I'm no programmer, i do Webapplications at work whenever i have some free time. My passion is UI design but i also do everything around it as a one man show. SQL Database design - i'm a noob but i get the job done PHP - i'm a noob but i get the job done Java - i'm a noob but i get the... CSS, HTML, ASP, .net, photoshop... you get it.
All i can contribute are my allround IT skills.
My idea is this (ATTENTION: might be stupid): A opensource security suite that updates itself decentralized trough encrypted channels that also verifies itself trough a blockchain that is maintained by all the clients in the network. The software is designed for end-user systems and will install its own network driver, take control over the phisical network devices and disables all network traffic trough them. It only allows traffic that goes trough it's own network driver and gives the user full control over every process that is trying to send whatever over the network. Just like VPN clients that big companies use on their devices (Cisco Anyconnect?).
Now i'm asking the talented programmers in the bitcoin community: Can a software like this be made with blockchain, encryption and opensource technology?
Please contact me trough reddit if you think so!
submitted by zlet2 to Bitcoin [link] [comments]

Data and Blockchain - YouTube Cybersecurity is Failing at Two Things: Patching & Authentication  Bruce Schneier  RSAC 2018 Bruce Schneier: Building Cryptographic Systems I Non-Coiners  Blockchain Caffe

Early life []. Bruce Schneier is the son of Martin Schneier, a Brooklyn Supreme Court judge. He grew up in Flatbush, attending P.S. 139 and Hunter High School.After receiving a physics bachelor's degree from the University of Rochester in 1984, he went to American University in Washington, D.C. and got his master's degree in computer science in 1988. He was awarded an honorary Ph.D from the Bruce Schneier • February 12, 2019 8:13 PM @asdf: "With bitcoin barely 10 years old, it seems premature to criticize the flaws, or to focus on the marketing message (AKA "hype") rather than the value add. The opinion of Harvard University cryptographer and technology researcher Bruce Schneier is that cryptocurrency is useless to anyone other than individuals trying to move money without being noticed by the government. Schneier believes that the aims of Bitcoin according to its original whitepaper have been defeated by the reality of its Meanwhile, the technology researcher and professor of Harvard University Bruce Schneier said that Bitcoin is attractive only to a small group of people who need to move money around without being noticed by the governments. Otherwise, the cryptocurrency is “hopelessly useless.” To support his point of view he used well-known arguments. Bruce Schneier is an internationally renowned security technologist, called a "security guru" by the Economist. He is the author of 14 books—including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World—as well as hundreds of articles, essays, and academic papers.. His influential newsletter "Crypto-Gram" and blog "Schneier on

[index] [15243] [15380] [9821] [12664] [13178] [14730] [12685] [13672] [5046] [5424]

Edward Snowden - "Bitcoin Won't Last Forever"

Bruce Schneier: "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" by Talks at Google. 42:23. ... Bitcoin, And The Internet CNBC by CNBC. Bruce Schneier's talks at RSAC are always well-attended. ... 'Fake Bitcoin' - How this Woman Scammed the World, then Vanished - Duration: 17:50. ColdFusion Recommended for you. Security guru Bruce Schneier talks with Charles Severance about security from the perspectives of both the National Security Agency and the National Institute of Standards and Technology. 🔴 🕮 The Bitcoin Standard : https://amzn.to/2teaq7i 🔴 🕮 Bitcoin dalla Teoria alla Pratica : ... 🔴 🕮 Bruce Schneier's APPLIED CRYPTOGRAPHY https://amzn.to/33GtPLA. Category 📖 The Bitcoin Standard : https://amzn.to/2teaq7i 📖 Bitcoin dalla Teoria alla Pratica : https://amzn.to/2jTFPaS 📖 Mastering EOS : https://amzn.to/2SkNG06