Search content
Sort by

Showing 20 of 28 results by LuaPod
Post
Topic
Board Project Development
Re: 20 BTC bounty for first AT *atomic cross-chain transfer* with Script clone
by
LuaPod
on 15/11/2014, 09:21:41 UTC
Perhaps I should have waited to post : https://bitcointalk.org/index.php?topic=852917.msg9489290#msg9489290

Though my idea was generating two private keys from many private parts generated on different sides and shared in certain steps so that they both reveal each others private keys at the same time. (while leaving proof that the transaction occured and both addresses in fact were derived from shared keyparts.)
A few public keys from the transaction along with signed transaction logs from all three parties would be added to the public ledger (for each node that can process the type of request ie: BTC - LTC | LTC - DOGE)


Since private keys are essentially large numbers there shouldn't be any problems using different ECC curves in generating keypairs from another curve when being used in split key generation.

Though the keys would appear different the math involved would never change the fact that we are just adding, subtracting, multiplying, and dividing large numbers on scalar charts. I don't believe there would be issues with prime number curves either.
Perhaps to add a type of miner to the system it could use a private key that is partially known with a range of numbers that could have been subtracted from it to give it a sort of difficulty and require the miners to find the missing keypart solution.

o.o I just read that stuff and my chart is almost exactly what that thing is.

Would a lite node.js p2p version of this win the bounty?

Post
Topic
Board Exchanges
Re: Exchange addresses proposal
by
LuaPod
on 11/11/2014, 08:11:42 UTC
Maybe it isn't  necessary. The exchanges could just do a proof of reserves audit. It will make sense to choose an exchange that it was made an audit.
Federal regulations (recently clarified that they apply) require them to have security systems that cover their audit systems.
ontop of that they are required to also have an anti laundering system.

Especially since they qualify as MSB and need a Money Transfer License in order to be operated.
Post
Topic
Board Project Development
Re: Genius idea ever
by
LuaPod
on 10/11/2014, 15:05:03 UTC
What exchanges do you use?
Post
Topic
Board Development & Technical Discussion
Re: Blind signatures using Bitcoin-compatible ECDSA
by
LuaPod
on 10/11/2014, 01:20:34 UTC
Btw, here's a second draft, a better worded and formatted one.
http://oleganza.com/blind-ecdsa-draft-v2.pdf
Great work Oleg, superb thing, here is your 4. Core protocol in Go language, w/ playground https://gist.github.com/kac-/a25e8410beb2d1514f2c.

BTW: Has anybody tried to code it? It doesn't work for me.


This actually sounds remarkably similar to something I am working on:
https://bitcointalk.org/index.php?topic=852917.msg9489290#msg9489290
Post
Topic
Board Development & Technical Discussion
Re: Script review before presenting to PHP developer meetup
by
LuaPod
on 10/11/2014, 01:17:01 UTC
Your systems could easily be spoofed upon a database breach. I believe you should take a look at forms of verification to prove where the transaction is from and who it is to. The server should also have a method of proving it allowed the transaction within the system. Otherwise once a hacker gets inside they will have a hayday with your money. Other things to think about adding are systems such as solvency ensurer.
In my system I use private keys that are generated on the browser. The users use them when making requests so that their requests can not be faked
by another person. Their requests are also usable once unless they sign again and send a new signature.

You should really take a look at reworking your whole account structure.
Post
Topic
Board Development & Technical Discussion
Re: Faster bitcoin transaction times
by
LuaPod
on 09/11/2014, 20:41:23 UTC
Currently we do see an issue with many transactions clogging the queue. Could we convert the wallets to broadcast anyone can pay transactions so that any wallet that sees the transactions could append to it? That would mean many people could accomplish all of their moving in single lump transactions. Perhaps just by letting anyone can pay transactions be rebroadcast and used if available is a better solution. Could that also be a great method of mitigating dust attacks on top of keeping the minimum send amount?
Post
Topic
Board Development & Technical Discussion
Topic OP
P2P Cross Currency Trading
by
LuaPod
on 09/11/2014, 17:23:58 UTC
Hi, I have just spent the last 12+ hours working on a mind racking concept to allow trading between seperate cryptocurrencies PEER TO PEER without the need for operator trust. The main issue faced by other similar projects is ensuring the node nor the buyer/seller could trick the system or steal the money. I believe this graph represents a great method of removing the risk of peer to peer trading. I believe in this structure The Clients (Left and Right side) can safely make a trade after the node has helped them find each other.


http://ress-luapod.rhcloud.com/Diagram.jpg


In my head everything plays out. I am working on doing a concept if any programmers would like to give some assistance!
Any pointers would be great! This (in theory) removes completely the need to trust that the other user will send their secret key.


Another Method:

Two transactions are made (timelocked hashlocked transaction.) Instead of A1 and A2 outputting address keypairs it would output a key that will redeem your transaction!  


A trading ledger will exist with the math to prove trades could have occured. This ledger will be used by the network to determine the stability and trustworthiness of a node.
The information that will be recorded onto the ledger will be the Public Keys used in the process of generating the Two addresses. Since they both can be verified as being derived from the
nodes key which it gives out in the beginning of the transaction. In order for the ledger to be accepted into the system the trading wallets must sign a response that will be signed by all three
parties, the node and both clients,  If either of them disagree to this signing step the transaction will not continue and the funds will instead revert back to their accounts after the timelock.
Therefore keeping a nodes trust level low and fractional trust points removed. The trust points are merely used to determine their position on the Node list and availability on the network (Transactions failing from no-response causes the trust score to drop)
Post
Topic
Board Exchanges
Re: Exchange addresses proposal
by
LuaPod
on 15/10/2014, 11:17:52 UTC
We need to be able to measure how many coins are on exchanges. Fractional banking is a concern. There are many flaws to the proof of reserves process. I propose we create a standard of special exchange addresses. When sending coins to exchanges they must use an address that identifies that it is on an exchange. When an order happens on exchange coins are sent to a new exchange address and we can match time and amount of coins to the exchanges reported volume according to the orderbook but preserves pseudonymity.


In the systems I am developing at LuaPod we do not store our funds as float or double values. They are stored in single satoshi increments
(1 = 0.00000001 )

The wallets are not capable of being accessed by the webserver. In fact our balances
can not even be adjusted from the webserver if it were compromised. The main thing
we are doing to create a form of transparency is disclosing full access to the front-end
database. The system in order to continue running and in order to make withdraws must
also pass several steps that are described at : http://xboxtrial.cf/info/info.lua

Companies should move towards being more transparent is what needs to happen
in order for us to get a consensus of what is going on. Most of the money stolen
has actually been because these systems somehow had control over the money in
areas where users had frequent access (such as webservers)
Post
Topic
Board Services
Re: Free Bitcoin Vanity Pool
by
LuaPod
on 15/10/2014, 03:09:42 UTC
The domain is a demonstration (Hence the reason deposits are not allowed)
of a framework that I have been working on since Jan.
Next month we are coming out with full access to the front-end sql user.
Incorporating also (in the new base) elliptical curve signatures so that client requests are signed and can't be
forged without having the private key.


The xbox codes are given out in the shop in exchange for Lua (Moon) which are earned by doing surveys.

The site doesn't have any form of income other than that. As I have said right now it exists primarily for
demonstration.


So this is for mining xbox codes?  Huh Huh







http://btclinks.webstarts.com/
Wink




As for the security of this vanity pool
We have no need for your private key so we don't even ask for it.
The private key and public key you must generate are generated on your browser at another site (not belonging to me)

The public key is used by the miners to generate a private key part which if added to your other private key which
you have kept hidden will be the main private key to control the address belonging to the public key of

Public Key 1 + Public Key 2



A nodejs method of verifying the submitted work (Without the private key) is:

Code:
var bitcoin = require('bitcoinjs-lib');
var BigInteger = require('bigi');
var ecurve = require('ecurve');
var curve = ecurve.getCurveByName('secp256k1');
var inpt = {};
var inte = -2;
process.argv.forEach(function (val, index, array) {
  inpt[inte] = val;
  inte = inte + 1;
});

var PrivKey1 = new bitcoin.ECKey(new BigInteger(inpt[0], 16));
var PubKey1 = PrivKey1.pub;
var point = bitcoin.ECPubKey.fromHex(inpt[1]);
process.stdout.write(new bitcoin.ECPubKey(point.Q.add(PubKey1.Q),false).getAddress().toString());


Whenever you sumbit a request for a vanity address you must submit a public address.
For that public address you will have the matching private key. WE DO NOT ASK FOR THAT
The private key is required by you to generate the full private key with the mined private
key part.
Post
Topic
Board Services
Topic OP
Free Bitcoin Vanity Pool
by
LuaPod
on 14/10/2014, 09:10:36 UTC
LuaPod is allowing public use of it's demonstration website's Vanity Pool NO FEES AND WE DO NOT ASK FOR YOUR PRIVATE KEY.

http://xboxtrial.cf


You are able to set a reward
(It is up to you whether or not you send the user their funds)
We are not allowing deposits into this system since it is for demonstration purposes only.
If you are interested in how our currency is/will be protected whenever we step
from demonstration you may check our page
at http://xboxtrial.cf/info/info.lua



This is a secure vanity pool that was built using the software VanityGenMiner
It operates securely by calculating addresses in a two part step called
split key generation. In order to make a Bitcoin address you need a public key
The public keys used by Bitcoin (to my understanding) are ECDSA (Elliptical Curve)
Which is another method of saying A HUGE NUMBER that is graphed with points.

The public key and private keys are technically "huge" numbers.
We can actually do two steps to generate a single private/public key from two.
The logical laymans math is this:

Bitcoin Address = bitcoinshafunction(Pub Key 1 + Pub Key 2)

and the Private key for that address would be

Main Private Key = Priv Key Part 1 + Priv Key Part 2


Since we are capable of generating the Bitcoin address with just the
public keys we are able to keep the other Private key hidden
and even out of our servers hands. This is kept safely by the user.



(I did not develop the split address generation method)

Newer methods are being worked on and do exist for split address generation
such as multiplication however these two options provide the same amount of entropy regardless.
The chance of hitting the same key is 1 in an unthinkable number for me.




Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 13:43:35 UTC
This is getting ridiculous. Would be cool to have some kind of graphics or statistic about stolen coins in similar services. I think im going to have everything in Bitcoin QT and forget about it. Too much risk.

Here is a statistic that sticks pretty well for most people:

 Over nine thousand
Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 13:18:31 UTC
Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 13:09:06 UTC
Server Login:

justin7674
HACKMEPLEASEorz94358

#Wastingmylifewaitingformagic

I have 1 bitcoin on that server. Almost EVERY btc exchange hack is the stupidity of the creator and programmer.  


PASSWORD WILL REMAIN THE PREVIOUS SAID FOR A MONTH

BOLD !!!

I have spent a year racking my brain on this. I have pretty good confidence in it's security and stability (Except that the webserver currently doesn't have ddos protection turned on)

So much faith that even with the authentication given out I believe that it is safe still.
Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 12:49:15 UTC

I will give you the username and password for the DB right now

Mysql_User = "front-end"
Mysql_Pass = "m1taLu4ayu84vO7eVu27JOw1vIk7mo"
Mysql_Host = "25.15.147.88"


There you go. I already thought of the things you have said. The system is secure enough that I can give a hacker the mysql information and they would be incapable of financially harming me NOR revealing private user information other than email addresses.

The funny thing is you still couldn't get access to the database.

Man I am not challenging you nor I have the time to go hack. We are discussing a topic and this is a pure discussion maybe to help someone. Also, if you really want to test out your security by disclosing passwords, I suggest you give out your password for your webserver and then see the magic happen. I am sure someone in the forum might be interested.

Server Login:

justin7674
HACKMEPLEASEorz94358




#Wastingmylifewaitingformagic

I have 1 bitcoin on that server. Almost EVERY btc exchange hack is the stupidity of the creator and programmer.  


PASSWORD WILL REMAIN THE PREVIOUS SAID FOR A MONTH
Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 12:41:36 UTC
If I wanted to I could have my computer running a VPS with 13 GB of ram aloted and close all ports with outbound requests only. I could then use that Virtual machine to run the wallets. No ports being forwarded or any direct communications from anything. The servers decide their job based off of the Mysql Database they are connected to through a virtual network that is hub and spoke managed.

Its actually a little more complicated because if your webserver has access to the MYSQL db, then I could hypothetically just go and make changes in Mysql and take all your funds. You need to think how to ensure that even if I get access to the Mysql DB connected to the webserver, I shouldn't be able to cause any damage financially.
How could you make changes with a SQL user that has no write access to any of the finance tables nor any direct access to methods manipulating balances? If you were to read the description on the front page it clearly states that the SQL gives no permissions to the front-end except to view user information and to view balance information. IT can submit a request to be processed by the back end server that is structured like
create/trade/5/1000/100/5 and is signed and encrypted. Even if you managed to figure out the signing and encryption the backend servers do another check to verify the trade is even allowed to be created.

The servers all are on a closed network with communication enabled ONLY to the SQL database. Each server has its own SQL user with its own permission.



To even prove that you lacked the true effort of reading here is an excerpt from the main page:

Code:
[The webserver must only be capable of reading information and relaying commands without having any
direct access or direct command of the wallets. Any transactions believed to be taking place on the website are
 in fact not taking place on the website. The users input is checked and their balances verified; Then the
system puts forth a structured request that is then processed by the Wallets server.]

Trust me I read but the fact is that if there is no way to write something in a db, then how will the user modify data. You cannot expect to provide manual intervention to each and every data entry. Again, if someone hacks the server, the purpose wont be to perform trades but to perform withdrawals. How have you designed your system so that you know for sure that the incoming request is true and is also automated.

Also, for this argument, assume that I have hacked the webserver and I exactly know your db username and password and even if the db server is on an internal network, I can still access it using the webserver ssh. Moreover, most probably if I have SSH access to the webserver, I will exactly know your DB encryption passwords.


I will give you the username and password for the DB right now

Mysql_User = "front-end"
Mysql_Pass = "m1taLu4ayu84vO7eVu27JOw1vIk7mo"
Mysql_Host = "25.15.147.88"


DNS NAME
luapod-sql.cloudapp.net
HOST NAME
LuaPod-Sql
PUBLIC VIRTUAL IP (VIP) ADDRESS
191.238.226.47

There you go. I already thought of the things you have said. The system is secure enough that I can give a hacker the mysql information and they would be incapable of financially harming me NOR revealing private user information other than email addresses.

The funny thing is you still couldn't get access to the database.


Also, the database isn't encrypted. The signature and hash passwords are entered upon each server boot. You would have to intercept me trying to boot the software. But good luck getting past the subversion code control with code signing.

Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 12:13:59 UTC
If I wanted to I could have my computer running a VPS with 13 GB of ram aloted and close all ports with outbound requests only. I could then use that Virtual machine to run the wallets. No ports being forwarded or any direct communications from anything. The servers decide their job based off of the Mysql Database they are connected to through a virtual network that is hub and spoke managed.

Its actually a little more complicated because if your webserver has access to the MYSQL db, then I could hypothetically just go and make changes in Mysql and take all your funds. You need to think how to ensure that even if I get access to the Mysql DB connected to the webserver, I shouldn't be able to cause any damage financially.
How could you make changes with a SQL user that has no write access to any of the finance tables nor any direct access to methods manipulating balances? If you were to read the description on the front page it clearly states that the SQL gives no permissions to the front-end except to view user information and to view balance information. IT can submit a request to be processed by the back end server that is structured like
create/trade/5/1000/100/5 and is signed and encrypted. Even if you managed to figure out the signing and encryption the backend servers do another check to verify the trade is even allowed to be created.

The servers all are on a closed network with communication enabled ONLY to the SQL database. Each server has its own SQL user with its own permission.



To even prove that you lacked the true effort of reading here is an excerpt from the main page:

Code:
[The webserver must only be capable of reading information and relaying commands without having any
direct access or direct command of the wallets. Any transactions believed to be taking place on the website are
 in fact not taking place on the website. The users input is checked and their balances verified; Then the
system puts forth a structured request that is then processed by the Wallets server.]



ANOTHER THING IS you can't just change a balance on this. If you change the balance on any transaction the system comes to a halt (because it detects that there is an discrepancy between the information inside the account balance and the signature for the transaction that has been changed) NOT ONLY does it know that it has been changed, but it knows what it was changed from. So through a type of persistence I can also keep transactions from being deleted.
Post
Topic
Board Bitcoin Discussion
Re: BTCT.com hacked and lost 107 btc
by
LuaPod
on 26/09/2014, 10:31:37 UTC
When the companies are supposed to store most of their funds in cold wallets, how is it possible that they loose so much funds. Alternatively, if 107 btc's only accounts for lets say 3-5% which might be kept in the hot wallet, then it shouldn't matter as the company should be able to pay back their customers if not instantly, then within sometime by their operating incomes.

The fact however remains that if a Webserver has access to the wallets, their is always a possibility of hacking. There is not much any of us can do as the hacks keep evolving and if you dont know about a vulnerability, then there is not much you can do to prevent it. Its not like the Crypto companies are as big as google that they can be on top of everything. Thus, the only option is to sever the link between the webserver and the wallet server and still make them talk somehow. Its very difficult to do but possible.

YOU ARE EXACTLY RIGHT! The reason exchanges keep getting hacked is because their webservers have some sort of access to the MONEY. Take a look at luapod if this is your type of area. I have already completely separated the handling of users money from the webserver. The webserver actually has no permission to handle anybodies money. It only builds and signs requests. EVEN though a request is signed that doesn't mean the backend server accepts it as true. The backend does its own check on the information. You can read up a little bit on how it works at the index page: http://luapod-web.cloudapp.net/index.lua



If I wanted to I could have my computer running a VPS with 13 GB of ram aloted and close all ports with outbound requests only. I could then use that Virtual machine to run the wallets. No ports being forwarded or any direct communications from anything. The servers decide their job based off of the Mysql Database they are connected to through a virtual network that is hub and spoke managed.
Post
Topic
Board Altcoin Discussion
Topic OP
LuaPod Proof Of Origin Accounting (AKA: POO)
by
LuaPod
on 26/09/2014, 08:15:58 UTC
http://luapod-web.cloudapp.net/index.lua







Rules of LuaPod Moneys:
Code:
    Must have an origin verifiable by the wallets.
     Every transaction inside the system must contain:
          oTxid -> Origin Transaction Identification
          CID -> Coin Identification
          AMT -> Amount spent from the transaction.
               --> The first transactions to use the unspent amounts are the only ones acknowledged. Others will be ignored/flagged for review.
     A transactions moneys is considered spent after it has left the system (withdraw)
Steps of Withdraw:
Code:
    Add up all user account balances and check against total wallets (Including cache from the cold
storage) [This will prevent us from going insolvent in any scenario except a full wallet breach.]
     Follow through the account transactions and verify every origin for each moneys via the Transaction
Signatures. [Will verify the validity of every transaction by mapping their whole history]
   
Why This Structure?
Code:
The following system structure can be beneficial by allowing us to continue working in cases where
 certain blocks orphan or invalidate. We may continue working because the system is capable of isolating any
 leaks where money has become in-existent while it is in or has already left the system. In a case where it has
 already left the system; The system will be able to instantly notify an administrator the involved accounts and
 transactions with a proposed solution if one is available. An example of such solution would be the origin
account where the deposit occurred has extra of the same currency we can simply make the system respond
for a scenario like this by reassigning the signature on the account chain to have the origin of the available
moneys. If our user and company agreement allows it we could also convert one of the origin accounts other
available currencies automatically and reassign the debt to the converted total. In any case where the system
can not solve the insolvency it would halt and wait for administrative assistance after reporting the origin of the
 insolvency and the users involved.


Rules for Continuing Operation:
Code:
No servers must have posted halt in the protected database.
System MUST NEVER be insolvent.

   
-----Network Information-----
   
   Network Rules:
      1. Webserver:
Code:
[The webserver must only be capable of reading information and relaying commands
without having any direct access or direct command of the wallets. Any transactions believed to be taking place
 on the website are in fact not. The users input is checked and their balances
verified; Then the system puts forth a structured request that is then processed by the Wallets server.]
      2. Wallets:
Code:
[The wallets must not communicate with any servers but the mysql. They must not take
 any direct user information and assemble their work basedon the information inside the mysql database. Any
tables being used that are related to the funds of a user must not be written by any server other than the
wallet server. That means READ only to every server but one. Some information may not even be visible to
other systems. Any information being read or interpretted by the server MUST HAVE BEEN GENERATED BY THE
 SERVER. The wallets server CAN NEVER BELIEVE any information displayed within the requests table as already
sanitized or approved. It then checks the users balance AGAIN to ensure the transaction may indeed take
 place.]
      3. SQL:
Code:

[The SQL server must not be exposed in anyway to direct net. Any communication done is
 done in a Local network or through a managed Virtual network.All servers within the virtual network MUST be
 assigned specific permissions and roles. The front-end may have read only access to almost all tables;
INCLUDING ALL OF the accounting tables which are any tables dealing with currency. Within the virtual network servers ARE NOT capable of
communicating with any other but the SQL or the Hub of the network.]


[This is the current behavior of the LuaPod main and sub-systems]

Any opinions?



I believe a system structure of this nature could have protected many exchanges and perhaps in real world scenarios where finance companies through a fluke were losing millions and not even knowing.
Post
Topic
Board Service Discussion
Re: How does blockchain get your address balance?
by
LuaPod
on 26/09/2014, 07:02:16 UTC
BlockChain implements their own storage methods for the blockchain if I am correct. They have things "pre-indexed" as a laymans term. As you said listunspent is actually a very good method of doing it.
Post
Topic
Board Service Announcements (Altcoins)
Re: [REVOLUTION] **BIT-CHIKUN.COM LTD** SATOSHI DOES NOT PLAY DICE!!
by
LuaPod
on 26/09/2014, 00:38:29 UTC
This project interests me a whole lot. If you guys ever need any assistance (Particularly securing your wallets and keeping the web server from communicating with them) I would be glad to do some work with you guys.
Thanks very much for the vote of confidence and we will definitely bare your offer in mind Smiley
Thanks for being the first poster in the thread too! Cheesy

Np, I will be keeping my eye on this for sure.