@sdrebel -- on HT you wrote "i believe a fair comparison would be that faking a dkim signature is as easy as solving a btc block. it can happen, but it takes a shitload of computing power to do it"
Nope, that's not right, if by solving a block you mean a miner generating a new block.
It's more like faking a DKIM signature is like finding the private key for an already-generated address, i.e., being able to spend someone else's bitcoins without knowing their private key. Bitcoin is secure because that's so *extremely* computationally difficult. Much harder than generating a candidate block for the blockchain.
this is probably over my head...but isn't that basically the same as solving a block? or not because solving a block is an approximation and for the KDIM we would need the exact key?
You guys need to do some more study on SHA-256.
To break a completely random 2^256 with the biggest computer networks we have currently would literally take more time than the life of the universe.
yes, that I admitted when I said "this is probably over my head"
maybe i'll get to do more research when I have enough time...maybe when my kids turn 6-8 years old and let me breathe (the third one is about -7 days old), so it will take a while
You're doing well. I have one 2-year old only, and i hardly have time to blink.
With regard to the SHA-256 and DKIM, if those on HT really knew what DKIM and SHA-256 was and how hard it would be to "fake" or "change" an email proven to be signed, they would be very very worried.
Wait, hard isn't the word for it. Impossible is. With current technology.
Although, I didn't need the DKIM signed emails to know that JG has been scamming his customers all this time. The DKIM signed emails was just an indisputable (to those intelligent enough to understand or comprehend the technology, or at least listen to those who do know, or do some research themselves) factual cherry on top.
Now, as to the context of those emails, well, people can say CoinBrief was showing those emails out of context. He may have been joking or somesuch. But let's address the context angle.
If you put those emails into context with EVERYTHING else he has done, it fit's. There is context for you.
yeah, sometimes I barely handle and really look forward to the time they are finally in bed

bambino was typing nonsense
"Yeah thats what i mean. They are all part of only 1 DKIM signature, so the signature covers the whole email including all responses/quoted emails.
So someone could just have copied an email conversation, altered it a bit and then send it through the gaw server with DKIM. Then made some printscreens/copies of it and then deleted it from the server like nothing happened.
Again im not saying this is the case, but it can be done very easily and only takes a few minutes to do..
All needed is a directadmin/plesk login"