Search content
Sort by

Showing 20 of 36 results by paultramarine
Post
Topic
Board MultiBit
Re: Help Installing Multibit in Ubuntu
by
paultramarine
on 29/01/2014, 08:16:17 UTC
You need to move into the folder that contains the multibit file, ie downloads folder, before calling commands of the file.

try "cd Downlands/"
only then enter the chmod command
Post
Topic
Board Altcoin Discussion
Re: How good do NXT passwords really need to be?
by
paultramarine
on 23/01/2014, 20:42:08 UTC
Thanks, maardein and lonesoul, I'll take a look at those.
Post
Topic
Board Altcoin Discussion
Topic OP
How good do NXT passwords really need to be?
by
paultramarine
on 23/01/2014, 08:32:02 UTC
http://blog.webernetz.net/wp-content/uploads/2013/07/Password-Entropy.jpg

We traditionally think of password strength needing to be strong enough to prevent a brute force attack on a single password, but the password-only protection (ie, brain wallet) of NXTcoin presents a different challenge.  With typical accounts (e.g. bitcoin qt) an attacker would first have to gain access to your wallet file and THEN start a brute force attack on encryption or other passwords.  But we now have to prevent a random brute force attack, that is, a situation where the attacker does not need to pick the single correct target password for a stolen wallet file, but rather he need only guess anyone's password correctly to gain access to their account without any access to a wallet file.  There are numerous postings here of people complaining that they lost their NXTcoins from their wallet, likely because they picked a fairly simple password and an attacker guessed it correctly. An attacker with even a modest setup can easily guess over a billion passwords a day so many possible passwords are vulnerable.
 
If people keep losing their coins to these simple attacks then faith may be lost in the NXTcoin protocol which would be a shame since it is such an interesting innovation in many many ways.  One innovation of NXT is that it is purely a brain wallet, something many of us aren't used to (unless we use Electrum clients) so we need to adjust our understanding of the importance of password strength while also making a real brain wallet based on words possible.  Of course we could all make passwords of random characters that consume all 256 bits of entropy available, but I'm taking the approach of trying to come up with reasonable recommendations for those who want to try and rely on a reasonable number of random words as their password.

So how good do our passwords really have to be to insure that it is extremely unlike that anyone would lose their wallet due to a random brute force attack?

Jean-Luc (NXTcoin developer) gives a starting point as to how many passwords a processor might be able to guess in a second:
... On my laptop, with the Vanity.java code I posted on bitcointalk, I can go through 8000 passwords per seconds.

Simple attack:
Assuming the attacker starts with the lowest entropy passwords and moves up from there we can calculate how many bits are needed to prevent such an attacker from guessing your password in the course of a year:
Attacker entropy covered = logbase2(1 processor * 8000 pws/sec * 31536000 sec/year) = 37.9 bits of entropy
According to this excellent post on entropy and passwords (http://blog.webernetz.net/2013/07/30/password-strengthentropy-characters-vs-words/ , see jpg above) 38 bits of entropy is what you get in a password consisting of 12 random numbers, 6 random characters (drawn from 83 possible), or 3 words (drawn from 10,000).  So that gives you an idea of what type of passwords will definitely be hacked, if your password is as simple as "Igetbread", you'll lose your coins soon.
Note that 38 bits is not a suggested level, it is the MINIMUM entropy needed to have any chance of surviving such an attack. 
(In all calculations I assume the attacker chooses a password type and sticks with it (e.g., number string, character string, or passphrase), though there are methods of more efficient attacks on non-random passwords)

Expected attack:
But an attacker who is serious (either about stealing coins to get rich or destroying NXT by destroying people's trust in it) and has access to resources will have many more processors and a probably a more efficient guessing algorithm.  I don't know what's realistic for either of those (suggestions welcome!) so I'll say 1,000,000 processors and an algorithm that guesses ten times faster, 80,000 pws/sec. In this situation the attacker will be able to guess up through an entropy of 61 bits in a year.  I judge that such a level of attack is likely (definitely if NXT continues on it's current growth trajectory) and passwords that would be compromised by this attack are: 18 numbers, 10 characters, or 4 words.  This is still a pretty low bar for passwords, but the thought that ALL NXTcoin wallet passwords that do not exceed these lengths are likely to be successfully attacked is still unsettling.  After all, many websites consider 8-10 random characters a very good password.

High-end attack:
What if the attacker has an incredible algorithm (1,000,000 pw/sec) and even more processors (10,000,000)?  Then the threshold 
becomes 68 bits of entropy, which would be a password with 6 words (drawn from 10,000).  If the attacker carries this out for 10 years then the minimum entropy needed to avoid the attack would be 71.5 bits. (Again, I welcome input on how realistic these # of processors and guessing algorithms are for a resource rich attacker)

However, these previous calculations all assume that the attacker will start at the lowest entropy passwords and move up as he goes.  If instead an attacker sets the max bits of entropy he will attempt to compromise higher, then his reach can increase significantly.  With the 'simple attack' an attacker who used a max limit of 40 would guess one out of every 4.3 passwords with 40 bits of entropy or less (in a year) and if he choose a max of 50 he would guess one out of every 4460 passwords with 50 bits or less. 
In the case of the 'Expected attack', this would lead to chances of one in every 468 passwords compromised that have 70 or less bits of entropy or one in every 480,000 with less than 80 bits.  If this attack were carried out for 10 years, those would change to one in every 47 and one in every 48,000. 
On the extreme side, if the 'High-end attack' were carried out for 10 years then passwords with 80 bits of entropy have a one in 380 chance of compromise while those with 90 bits have a one in 390,000 chance.  A password with 100 bits would have a chance of one in 400,000,000 to be compromised. 

Conclusion:
Now, one in 400,000,000 or even one in 390,000 sound pretty unlikely (though they are not far from the chances of winning lottery tickets that people buy everyday) but they are probably worth avoiding if is as simple as adding an extra word or two to a passphrase.  Furthermore, I may underestimate the capability of current or future technology in carrying out a brute force attack.  For these reasons I think that NXT users should make wallets with 140+ bits of entropy, the absolute minimum should be 120 bits.
Passwords with 140 bits of entropy are composed of:
43 random numbers
22 random characters (of 83 possible)
11 random words (from a pool of 10,000 possible)
9 random words (from a pool of 90,000 possible)


(Note this recommendation is well above the 80 bits of entropy frequently suggested for internet passwords)

If you want a brain wallet made of random words then make sure you know how big the pool of words is that you draw from.
Generating a list of random words is probably safest to do with a physical dictionary (ie, completely offline and non-electronically) but here are some links I found with a quick search for word generators - I can't vouch for these products in any way and I'm sure there are many other good ones out there:
90k words online: http://www.wordgenerator.net/random-word-generator.php
28k words online: http://coyotecult.com/tools/randomwordgenerator.php
300k words program: http://www.gammadyne.com/rndword.htm
Using an online generator is risky because the website could be recording words or could use an poorly/predictably randomized algorithm.  If you do use word generators online, then maybe use multiple ones to come up with the password so if any of the websites are logging entries or compromised they won't be able to record your password. That said, many people would never use an online generator due to the risks.

An ideal solution might be like that of Electrum: the NXT software could give a user a new password of 11+ random words when the user wants to create a new account.  This could be modified by the user but would at least make the point to them that the password should be very long.  At the least, a better warning when putting in a short password would be great - maybe the warning could suggest the above
password sizes or something like that.  If people want to be stupid they will still be stupid and make a short password, but at least such an improved warning would give them a chance to make an informed decision.

I know this may all be pretty basic info for the many experienced folks out there but I wanted to post this as guidance for those who aren't this knowledgeable or thinking this carefully.
And please don't hesitate to check/ask questions about my math.  I'm pretty such these calculations are correct but of course I may have made mistakes.


Cheers!

paultramarine


NXT: 7633621308036609036
BTC: 1AedbB3jAv1AaTQZ1KMiaVoqu1VFouHGCj


*Some might take issue with my point that NXT is susceptible to this attack because it's the users who pick their passwords - but NXT could have a minimum length password or some other way of making these attacks much less likely.  Ultimately, yes, people do foolish things like make short passwords and that is up to them.
Post
Topic
Board Announcements (Altcoins)
Re: [ANN] NEM :: descendant of NXT - 4 billion coins
by
paultramarine
on 22/01/2014, 20:03:25 UTC
Interested - sent 0.0025 btc
ID: 4a0dc8b73c3b606e074e23f4d1e51c5f4c212ad36b2d11621d7f681d270ca8da
Good luck!
Post
Topic
Board Announcements (Altcoins)
Re: [XPM] [ANN] Primecoin Release - First Scientific Computing Cryptocurrency
by
paultramarine
on 19/07/2013, 20:29:48 UTC
Why does block generation remain 200%+ of the target rate?  Since diff isnt rising quickly now I assume new power no longer being added to the network at high rates.  so shouldn't the network have adjusted difficulty well enough by now to keep block generation close to target?

I'm going by cryptometer.org charts: http://cryptometer.org/primecoin_90_day_charts.html
Post
Topic
Board Altcoin Discussion
Re: [XPM] Primecoin Built-in Miner Sieve Performance Issue
by
paultramarine
on 14/07/2013, 23:26:07 UTC
I pushed a new commit with sieve optimizations. It appears to generate larger performance improvement on systems not heavily crippled by v0.1.0 miner.

Give it a try. Please note this version has a slower warmup period.

https://github.com/primecoin/primecoin/commit/ab9fe91d711c92527fcde2fa34563b0aefd16742

I had a noticeable decrease in PPS from this update ( ~1/10th of PPS from original release).  I'm running a Core2 Quad.  I realize PPS isn't a great measure of efficacy but the decrease seems pretty consistent and dramatic (15min thus far). 

Is the "slower warmup period" longer than this, Sunny King??


Maybe wait a bit longer, what's your pps on core2quad?

It was 70-150pps with the original setup, then went down to 1-10pps with your updated .cpp and .h files.  I switched to the mikaelh qt and d files now (retaining your .cpp and .h files) and I'm up above 1000pps. 
Post
Topic
Board Altcoin Discussion
Re: [XPM] Primecoin Built-in Miner Sieve Performance Issue
by
paultramarine
on 14/07/2013, 07:39:29 UTC
I pushed a new commit with sieve optimizations. It appears to generate larger performance improvement on systems not heavily crippled by v0.1.0 miner.

Give it a try. Please note this version has a slower warmup period.

https://github.com/primecoin/primecoin/commit/ab9fe91d711c92527fcde2fa34563b0aefd16742

I had a noticeable decrease in PPS from this update ( ~1/10th of PPS from original release).  I'm running a Core2 Quad.  I realize PPS isn't a great measure of efficacy but the decrease seems pretty consistent and dramatic (15min thus far). 

Is the "slower warmup period" longer than this, Sunny King??

Post
Topic
Board Altcoin Discussion
Re: Ripple Giveaway!
by
paultramarine
on 25/04/2013, 06:41:50 UTC
rPN288hF4RkdUtvTk2tXZU6ezQ28t2p9sQ
Post
Topic
Board Beginners & Help
Re: MtGox to carry PPC. No ETA at this time
by
paultramarine
on 18/04/2013, 06:24:38 UTC
That'd be sweet!  I wonder if NVC is in the works, too...
Post
Topic
Board Service Discussion
Re: Woot! to take bitcoin?
by
paultramarine
on 08/04/2013, 15:56:52 UTC
I know reddit links are not popular here, but thought this was worth linking as it is on the same topic.

http://www.reddit.com/r/Bitcoin/comments/1bczlf/just_asked_wootcom_to_accept_bitcoin

Thanks, waterskeer - I didn't even see that before starting the woot post!
Post
Topic
Board Altcoin Discussion
Re: MTGox to Support Litecoin - Can Anyone Confirm?
by
paultramarine
on 08/04/2013, 15:51:18 UTC
Post
Topic
Board Bitcoin Discussion
Re: [SOLVED] Is there an easy explanation of how Bitcoin works? A video maybe?
by
paultramarine
on 08/04/2013, 03:23:19 UTC
I've been looking for a mid-level article/set of articles/videos like the OP is also seeking.  This thread helped me understand parts of it all better.
Thanks DannyHamilton and remotemass - those explanations were very helpful.

I would like to learn more about why counterfeiting isn't possible.  Or more to the point, why couldn't a 51% attacker use his majority network to confirm the creation of larger amounts of bitcoin?

I understand that bitcoins only come into existence as mining rewards and that the amount of reward is hardcoded into the software.  Is this alone enough to prevent the faster creation of bitcoin? If a 51% attacker could modify the client software his nodes run and why couldn't he control difficulty or simply change the block reward protocol?  Would his nodes be completely rejected by the other nework nodes at that point, effectively pushing him off the bitcoin network?
Post
Topic
Board Service Discussion
Topic OP
Woot! to take bitcoin?
by
paultramarine
on 07/04/2013, 23:43:41 UTC
I've started a thread on the Woot.com boards to encourage them to start accepting bitcoin.  Consider joining the discussion if you'd use that option:
http://www.woot.com/forums/viewpost.aspx?postid=5400258
Post
Topic
Board Service Discussion
Re: Vircurex gets hacked
by
paultramarine
on 05/04/2013, 17:12:58 UTC
Update: https://twitter.com/@Vircurex
So... hopefully not a hack.
Post
Topic
Board Altcoin Discussion
Re: Vircurex AND BTC-E in DDOS?
by
paultramarine
on 05/04/2013, 16:57:31 UTC
Vircurex has a thread here: https://bitcointalk.org/index.php?topic=49383.new#new

They announced they were down and having datacenter trouble. So it should be nothing to worry about. Just persistant DDOS.

BTC-E dev says they didn't say anything about Vircurex hacked, so thats just FUD.

I ain't trollin - i saw the statement from btc-e support that vircurex was a hack myself.  But I'm glad it was wrong.
Post
Topic
Board Altcoin Discussion
Re: Vircurex AND BTC-E in DDOS?
by
paultramarine
on 05/04/2013, 16:49:58 UTC
Yes, i notice new DDOS protection on BTC-e even just yesterday.

I was on btc-e chat jsut before it went down.  btc-e support had just said that vircurex was HACKED, not DDOS.

Are you sure about that, there was someone spamming btc-e was hacked but I didn't see anyone from support say that  Undecided

Yeah, how would support even know if Vircurex was hacked?

Both russian exchange operators, so maybe in contact with eachother?  that's what i figured.
Or btc-e could just dislike vircurex of course.
Post
Topic
Board Service Discussion
Re: Vircurex gets hacked
by
paultramarine
on 05/04/2013, 16:43:41 UTC
It wasn't just trollbox, it was btc-e support saying that vircurex was hacked.  So maybe a bit more reliable.  Then 1 min later btc-e went down.

Hopefully just DDOS on both...
Post
Topic
Board Altcoin Discussion
Re: Vircurex AND BTC-E in DDOS?
by
paultramarine
on 05/04/2013, 16:39:58 UTC
Yes, i notice new DDOS protection on BTC-e even just yesterday.

I was on btc-e chat jsut before it went down.  btc-e support had just said that vircurex was HACKED, not DDOS.
Post
Topic
Board Altcoin Discussion
Re: How high will litecoin go this month? $10 $20 $50 more?
by
paultramarine
on 04/04/2013, 14:47:07 UTC
Seems like litecoin is now beginning to act as an extension of bitcoin,  and perhaps it's well enough supported to hold that role.  Though I do wonder when the 'killer coin' will appear that has all the better attributes that none (even bitcoin) have now.

Anyhow, here are some related bets:

LTC @ $20 this month:
http://betsofbitco.in/item?id=1457

LTC outperforms BTC 5 to 1 this month:
http://betsofbitco.in/item?id=1450
Post
Topic
Board Altcoin Discussion
Topic OP
How high will litecoin go this month? $10 $20 $50 more?
by
paultramarine
on 04/04/2013, 05:21:24 UTC
How high do you think litecoin will go this month (April 2013) and why?

Seems safe to assume that Mt. Gox will start trading in LTC by the end of month, so will LTC attain the 1/4 of BTC that some say it deserves simply due to having 4x the total coinage as BTC?  Or more or less?