Bitcoin Halloween... A Dangerous Idea... They're Terrified We'll Use It
Bitcoin (Andreas M. Antonopoulos) code.talks 2015 (ehem. Developer Conference) https://www.codetalks.de/Published on Oct 29, 2015 https://www.youtube.com/watch?v=dB-CXu5ECIg&t=43m17s It's Halloween, so terrify them, start using it tonight and upport your favorite fiendish authors and friends... ;-) bitcoin: 14Chgo1sK3N3ng8sZMkbxVkH4EZ4E8dHXu
From: coderman <coderman@gmail.com> To: grarpamp <grarpamp@gmail.com>
https://blockchainbdgpzk.onion/tx/6d0ffd7e5147232507054f70f4cea17b908c7f9826... Response: "This Webpage is not available."
On 10/31/15, jim bell <jdb10987@yahoo.com> wrote:
...
https://blockchainbdgpzk.onion/tx/6d0ffd7e5147232507054f70f4cea17b908c7f9826... Response: "This Webpage is not available."
hey Jim, you can upgrade your "Web Experience (TM)" via Tor Browser: https://www.torproject.org/download/download-easy.html.en best regards, :)
From: coderman <coderman@gmail.com> On 10/31/15, jim bell <jdb10987@yahoo.com> wrote:
https://blockchainbdgpzk.onion/tx/6d0ffd7e5147232507054f70f4cea17b908c7f9826... Response: "This Webpage is not available." Hey Jim, you can upgrade your "Web Experience (TM)" via Tor Browser: https://www.torproject.org/download/download-easy.html.en
Generally, I'm not interested in "upgrading" anything. I just want things to WORK. Should I have been able to access the site using my browser? Jim Bell
On 10/31/15, jim bell <jdb10987@yahoo.com> wrote:
... Generally, I'm not interested in "upgrading" anything. I just want things to WORK. Should I have been able to access the site using my browser?
Jim, you are 100% right. asking above and beyond better come with a benefit! who the fuck and why for onions? DON'T CARE! ... this played out in a thread on twitter about Tor Messenger, "Fuck! Disappointed to learn that Tor Messenger doesn't include logging of chats. I thought we'd learned…" - https://twitter.com/zooko/status/660627576990203904 ... earth humans, you scare me! - me on every day of the year.
On Sat, Oct 31, 2015 at 11:24 PM, coderman <coderman@gmail.com> wrote:
"Fuck! Disappointed to learn that Tor Messenger doesn't include logging of chats. I thought we'd learned…"
It's open source, a few lines of code will solve that. Feeling sorry for the people who will choose to use it believing it's not loggable and thus end up being compromised. Tor should not allow that belief.
On Sat, Oct 31, 2015 at 11:16 PM, jim bell <jdb10987@yahoo.com> wrote:
Generally, I'm not interested in "upgrading" anything. I just want things to WORK. Should I have been able to access the site using my browser?
Onions should never resolve, so the answer is no. However if you wanted to access it or any other onions people talk about, the Tor Browser Bundle would probably be the simplest standalone option. http://tools.ietf.org/html/rfc7686 https://www.torproject.org/projects/torbrowser.html.en
From: grarpamp <grarpamp@gmail.com> To: "cypherpunks@cpunks.org" <cypherpunks@cpunks.org> Sent: Saturday, October 31, 2015 11:41 PM Subject: Re: Bitcoin Halloween... A Dangerous Idea... They're Terrified We'll Use It On Sat, Oct 31, 2015 at 11:16 PM, jim bell <jdb10987@yahoo.com> wrote:
Generally, I'm not interested in "upgrading" anything. I just want things to WORK. Should I have been able to access the site using my browser?
Onions should never resolve, so the answer is no. I wish I understood what you just said. Jim Bell
On 01/11/15 08:07, jim bell wrote:
From: grarpamp <grarpamp@gmail.com> To: "cypherpunks@cpunks.org" <cypherpunks@cpunks.org> Sent: Saturday, October 31, 2015 11:41 PM Subject: Re: Bitcoin Halloween... A Dangerous Idea... They're Terrified We'll Use It
On Sat, Oct 31, 2015 at 11:16 PM, jim bell <jdb10987@yahoo.com> wrote:
Generally, I'm not interested in "upgrading" anything. I just want things to WORK. Should I have been able to access the site using my browser?
Onions should never resolve, so the answer is no. I wish I understood what you just said. Jim Bell
Please accept my apologies if I'm teaching granny to suck eggs, being trolled, shit like that but I'm going to assume minimal knowledge of this... Basically, you have a bunch of tools designed to hide your communications when using the internet. This particular set of tools has at it's core, The Onion Router (Tor) which passes your internet communications via many different proxies using multiple layers of encryption so that none of the proxies in the middle of this chain can identify the source and destination of the connection. Tor can be used to hide your communications when looking at normal websites such as www.cryptome.com but this carries a risk. Any of the proxies can be monitored and using traffic correlation you can be identified by comparing the communications entering Tor and exiting Tor (to reach the website). To avoid this, you can use Tor to only access Hidden web servers so that your traffic never leaves the Tor network, making the traffic correlation techniques much harder to do. These hidden web servers are only visible in the Tor network and their web addresses end in .onion Hence, people referring to onions :) So, if you wish to view the content on the hidden servers like the one coderman linked to then you need access to the Tor network. The Tor project make a modified version of the Firefox web browser available for download and install that gives a simple way to access Tor without having to do much messing about with your computer. It also, has a modified configuration to reduce the amount of private information you leak when using it. Information from the horses mouth: https://www.torproject.org/about/overview.html.en Download the Tor Browser: https://www.torproject.org/download/download.html.en The quality of information available at the Tor link will far surpass what I have just written and you should assume small but possibly devastating inaccuracies in my description above :) Sorry for the long post but I couldn't think of a quick way of writing it if you haven't come across Tor before. There are also other similar systems: i2p, freenet but Tor seems to be the most popular. Something to weigh up though is that Tor was created by the US Navy and the project still receives US Government funding so you should probably bear this in mind when using it although reading more information on the Tor Project's website may or may not reduce feelings of discomfort that come from knowing where the funding comes from. Cheers, oshwm
On 11/1/15, oshwm <oshwm@openmailbox.org> wrote:
... Please accept my apologies if I'm teaching granny to suck eggs, being trolled, shit like that but I'm going to assume minimal knowledge of this...
the beauty of forever on the web, is that if only one finds your reply useful, one day, then all not in vain, even when trolled lightly, or with vigor. ;)
Basically, you have a bunch of tools designed to hide your communications when using the internet.
This particular set of tools has at it's core, The Onion Router (Tor) which passes your internet communications via many different proxies using multiple layers of encryption so that none of the proxies in the middle of this chain can identify the source and destination of the connection.
Tor can be used to hide your communications when looking at normal websites such as www.cryptome.com but this carries a risk. Any of the proxies can be monitored and using traffic correlation you can be identified by comparing the communications entering Tor and exiting Tor (to reach the website).
To avoid this, you can use Tor to only access Hidden web servers so that your traffic never leaves the Tor network, making the traffic correlation techniques much harder to do.
These hidden web servers are only visible in the Tor network and their web addresses end in .onion
Hence, people referring to onions :)
So, if you wish to view the content on the hidden servers like the one coderman linked to then you need access to the Tor network.
The Tor project make a modified version of the Firefox web browser available for download and install that gives a simple way to access Tor without having to do much messing about with your computer. It also, has a modified configuration to reduce the amount of private information you leak when using it.
Information from the horses mouth: https://www.torproject.org/about/overview.html.en
Download the Tor Browser: https://www.torproject.org/download/download.html.en
The quality of information available at the Tor link will far surpass what I have just written and you should assume small but possibly devastating inaccuracies in my description above :)
Sorry for the long post but I couldn't think of a quick way of writing it if you haven't come across Tor before.
There are also other similar systems: i2p, freenet but Tor seems to be the most popular.
Something to weigh up though is that Tor was created by the US Navy and the project still receives US Government funding so you should probably bear this in mind when using it although reading more information on the Tor Project's website may or may not reduce feelings of discomfort that come from knowing where the funding comes from.
Cheers, oshwm
thank you! a reasonable summary for certain. and Jim, this special ".onion" domain is reserved by Tor, and recently officially recognized. when connecting via SocksPort, and requesting connection to a *.onion host, tor the process handles this hidden service circuit building internally, and connects the "hidden server" to your client through this SocksPort connection. this is why saying "Onions should not resolve" via normal means, is another way of saying "Use the Tor network to access that hidden site." an excellent detailed technical review is here: https://ritter.vg/p/tor-vlatest.pdf --- pedant detour: there is DNSPort and TransPort, which allows transparent proxy of connections. when behind a transparent Tor proxy, DNS will indeed resolve onions correctly, and your normal browser can reach these previously unresolvable/unroutable destinations. see https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy for details and caveats... best regards,
On Sun, Nov 1, 2015 at 3:07 AM, jim bell <jdb10987@yahoo.com> wrote:
Onions should never resolve, so the answer is no.
I wish I understood what you just said.
When you ask your browser to show you cpunks.org, your browser takes that name, asks your computer to translate (resolve) that name into an IP address. Your computer doesn't have the knowledge to do that so it then in turn sends the question out to the nameservers (resolvers) on the internet. They look up the name to IP mapping in their tables and send the IP back to your computer and browser which then turns around and connects back out over the internet to that IP address (cpunks server) which then sends the page back to your browser for display. Under the hood the internet (routers) only know IP traffic, so you need that translation layer if you want to punch names into your browser bar instead of IP numbers. While blockchainbdgpzk.onion is a name, .onion names are based on crypto under the hood, not IP's, and they're understood to belong to the Tor network, not the internet network. (Even though Tor rides on top of the internet somewhat like letters in sealed envelopes through the post office.) So just punching onions into your browser (which ultimately only knows the IP based internet) should not "work" unless you've installed software and modified your system to support that. If it does "work" and you're not aware that you've specifically modified your system to do that, then you're under attack and should seek help. For reasonably randomly trustable walk-in support / mentorship you might try computer clubs in your area. For punkery, trust no one :)
On Sat, Oct 31, 2015 at 7:48 PM, coderman <coderman@gmail.com> wrote:
When bitcoin reaches $9000 in a few years, you, Sir, shall be repaid, and terror shall be struck with the rest :)
participants (4)
-
coderman
-
grarpamp
-
jim bell
-
oshwm