From eugen@leitl.org Tue May 17 12:39:00 2011 From: Eugen Leitl To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [silk] Bitcoin Date: Tue, 17 May 2011 12:39:00 +0000 Message-ID: <20110517163602.GB24232@leitl.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============7514294895170088350==" --===============7514294895170088350== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable ----- Forwarded message from Alaric Snell-Pym ---= -- --===============7514294895170088350==-- From lodewijkadlp@gmail.com Tue May 17 18:15:46 2011 From: lodewijk =?utf-8?q?andr=C3=A9?= de la porte To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [silk] Bitcoin Date: Tue, 17 May 2011 18:15:46 +0000 Message-ID: In-Reply-To: <20110517163602.GB24232@leitl.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============7369381077488168486==" --===============7369381077488168486== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit It is possible for any current governmental agency to hijack the entire system, due to their access to supercomputer infrastructures and/or immense budgets. This will however become less and less possible while bitcoin continues to grow and is already a massive and technological challenge which I do not see any governmental institutions execute proper. It is also strange to say these transactions are "untraceable". Nothing is less true. Governments have complete transcripts of all sent data (USA, GB and AUS have a neat little system for this set up, catch all emails too), and every transaction is signed by the money's owner, it needs to be processed. Sure one could create many different unique signatures (bitcoin adresses) but those could all be traced moving out of the house. It's just immensely more tedious to do than tracking, say, bank transactions and so many agencies will just not be technical enough to do this. Funny enough the same internet security things will help as with all internet things Tor on your neighbors network with IPSEC and SSL "behind 7 proxy's". (even then the network will need to process your transactions and agencies can just follow along with that, they just can't really trace the transactions back to you; if you use different bitcoin adresses) So kids; go crazy, be paranoid and have fun, Best regards, Lodewijk Andre de la Porte 2011/5/17 Eugen Leitl > ----- Forwarded message from Alaric Snell-Pym > ----- > > From: Alaric Snell-Pym > Date: Tue, 17 May 2011 17:25:22 +0100 > To: silklist(a)lists.hserus.net > Subject: Re: [silk] Bitcoin > User-Agent: Mozilla/5.0 (X11; U; NetBSD amd64; en-US; > rv:1.9.1.9) Gecko/20100520 Lightning/1.0b2pre Shredder/3.0.4 > Reply-To: silklist(a)lists.hserus.net > > On 05/17/11 17:01, Srini RamaKrishnan wrote: > > On Tue, May 17, 2011 at 1:09 PM, Alaric Snell-Pym > > wrote: > >> Currently, the bitcoin network produces about 1.5 trillion hashes per > >> second, total. So somebody managing a billion a second, in a mining > >> pool, earns about a 1500th of the total "income" of new bitcoin - 50 > >> every ten minutes... > > > > Wait, it doesn't work like this? > > > > http://xkcd.com/538/ > > > > Alas no! The design of the system is all about global consensus - more > than 50% of the hashing capacity needs to agree for stuff to happen. > There's nobody to whack with a wrench - it'd cost more to go and whack > each pimply nerd with a basement full of computers than to just buy more > computers ;-) > > ABS > > -- > Alaric Snell-Pym > http://www.snell-pym.org.uk/alaric/ > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE --===============7369381077488168486==-- From eol1@yahoo.com Tue May 17 19:03:45 2011 From: Peter Thoenen To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [silk] Bitcoin Date: Tue, 17 May 2011 19:03:45 +0000 Message-ID: <421898.33866.qm@web111401.mail.gq1.yahoo.com> In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============8045162692319099073==" --===============8045162692319099073== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit >It is possible for any current governmental agency to hijack the entire >system, due to their access to supercomputer infrastructures and/or immense >budgets. This will however become less and less possible while bitcoin >continues to grow and is already a massive and technological challenge which >I do not see any governmental institutions execute proper. I'm not so sure that's true. Given the network at all times knows the amount of nodes out there (hence the 50%+1 rule for consensus) it would be trivial for a NSA (Nation State Actor, not TLA) to stand up 50%+1 virtual nodes fast enough to gain consensus and usurp the currencies (tokens) if I understand correctly the mechanism for determining legitimate tokens from the EconTalk interview. Am I missing something here? --===============8045162692319099073==-- From sneak@datavibe.net Tue May 17 19:12:40 2011 From: Jeffrey Paul To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [silk] Bitcoin Date: Tue, 17 May 2011 19:12:40 +0000 Message-ID: In-Reply-To: <421898.33866.qm@web111401.mail.gq1.yahoo.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1610014448331371602==" --===============1610014448331371602== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit On 18 May, 2011, at 01:00 , Peter Thoenen wrote: > I'm not so sure > that's true. Given the network at all times knows the amount of nodes out > there (hence the 50%+1 rule for consensus) it would be trivial for a NSA > (Nation State Actor, not TLA) to stand up 50%+1 virtual nodes fast enough to > gain consensus and usurp the currencies (tokens) if I understand correctly the > mechanism for determining legitimate tokens from the EconTalk interview. Am I > missing something here? You are. The moment that they stop doing that, the legitimate network overtakes it and restores order. It would have to be a sustained attack until all users of the network had abandoned it. Furthermore, it is really only a minor denial-of-service, because solving 100% of the blocks going forward only allows you to deny confirmation of the transactions of others, and to double-spend your own pre-existing coins. The moment the attack stops, the legitimate network would begin catching up, and would soon overtake it. -jp -- ======================================================== Jeffrey Paul -datavibe- sneak(a)datavibe.net +1 (800) 403-1126 http://sneak.datavibe.net 5539AD00 DE4C42F3 AFE11575 052443F4 DF2A55C2 "Virtue is its own punishment." ======================================================== --===============1610014448331371602==--