Search content
Sort by

Showing 20 of 42 results by xanatos
Post
Topic
Board Italiano (Italian)
Re: Fisco / Tasse / Legge sul Bitcoin
by
xanatos
on 20/05/2018, 12:18:27 UTC
Qualcuno ha trovato esempi su come questo benedetto modulo RW andrebbe compilato, almeno per la casistica di bitcoin (o altro) depositati su exchange? Perché io nel 2017 ho riconvertito degli Ethereum Classic in Ethereum tramite exchange, e vorrei capire come segnarli. Non dovrei pagare tasse perché (sfortunatamente) la soglia dei 51k euro non l'ho mai vista tranne che con il binocolo (lo so, essere poveri è una colpa), però sembrerebbe che l'RW lo deva compilare.
Post
Topic
Board Italiano (Italian)
Topic OP
Aprire un sito di exchange, che autorizzazioni servono?
by
xanatos
on 23/04/2013, 07:27:08 UTC
Supponiamo che volessi aprire un sito di intermediazione di acquisto/vendita di btc (tipo mtgox, btc-e...), di che autorizzazioni avrei bisogno?
E da che tipologia di esperti "legali" dovrei andare? (commercialisti/avvocati esperti di Huh)

Grazie!
Post
Topic
Board Electrum
Re: Why you cannot enter an arbitrary seed in Electrum
by
xanatos
on 22/04/2013, 10:17:18 UTC
Quote
Of course, Armory uses waaaay more than 128 bits of entropy, but I'll be bringing it down to 128 or 160 in the next release -- I was thinking 160 because I wanted to give a little margin in case your system does not have a high-quality entropy pool at creation time.  This because I totally agree with ThomasV -- 128 bits is a nice, unbreakable value.  Maybe in 1000 years when we have Dyson spheres around a few different stars for the purpose of collecting energy to break my wallet, they might break 128 bits.  

I hope you where exaggerating. 128 bits encryption could be breaked "routinely" in 100 years. Armchair explanation: DES at 56 bits can be breaked "routinely" by NSA/CIA ecc. If Moore's Law is sustainable the number of transistors in a chip will double every 1.5 years. Let's say that every doubling in number of transistors double the speed (because, in the end, cracking a code is a highly parallelizable task, so doubling the number of processors WILL double the speed). So each 1.5 years the number of bits that can be cracked "routinely" is raised by 1 (double speed = +1 bits, because +1 bit doubles the keyspace)... So 72 * 1.5 = 108 years... But note that DES was cracked "routinely" some years ago.

(read for example here. http://en.wikipedia.org/wiki/EFF_DES_cracker , in 1998 EFF brute-force cracked DES in 56 hours for 250,000$. So if Moore Law is sustainable, in 2106 AES128 could be cracked in 56 hours, but note that some years before a resolute cracker with some million $ and a month of time could probably crack it)
Post
Topic
Board Development & Technical Discussion
Re: Reminder: zero-conf is not safe; $500USD reward posted for replace-by-fee patch
by
xanatos
on 19/04/2013, 16:14:23 UTC
What happens if a block becomes orphan? Its transactions are readded to the transaction pool, so they could be changed by the sender... So you would only need to wait for a split in the network to double spend your money?

I've never analysed the data myself, but I'd guess that honest splits tend to carry almost (if not exactly) the same transactions on each side of the split.

They probably collect the transactions in a "best effort" way... But if 2 blocks are orphaned, perhaps you can't put all their transactions in a new block.
Post
Topic
Board Development & Technical Discussion
Re: Reminder: zero-conf is not safe; $500USD reward posted for replace-by-fee patch
by
xanatos
on 19/04/2013, 10:04:01 UTC
What happens if a block becomes orphan? Its transactions are readded to the transaction pool, so they could be changed by the sender... So you would only need to wait for a split in the network to double spend your money?
Post
Topic
Board Development & Technical Discussion
Topic OP
Version of Berkeley DB
by
xanatos
on 03/12/2011, 07:08:21 UTC
Bitcoin 0.4 began using BerkeleyDB 4.8 instead of 4.7. Can I ask why they didn't directly jump to 5.2? 4.8 is still quite "old" (it's two major releases from the newest: 5.0 and 5.2)
Post
Topic
Board Mining software (miners)
Re: another 3% mining increase with poclbm kernel.cl
by
xanatos
on 29/06/2011, 10:24:44 UTC
On my 5870 it jumped 16 mh from 385 to 401. I'm using the poclbm "old" kernel + the other +3% patch (that gives me only 1% of speedup :-( )
Weird, what's the rest of your setup? I've listed mine above and this mod decreases my performance on every 5870 I have tried, mix of ubuntu/windows, ati versions & sdk.
I have a single card, clocked 300/900 on Windows and Catalyst 11.5 (too lazy to install 11.6 and I've read that they don't change anything) and I'm using -w 256. Someone had a big difference on the other patch. I got only a 1%. Perhaps the trick is in the ratio of memory clock/process clock.
Post
Topic
Board Mining software (miners)
Re: another 3% mining increase with poclbm kernel.cl
by
xanatos
on 29/06/2011, 05:30:41 UTC
On my 5870 it jumped 16 mh from 385 to 401. I'm using the poclbm "old" kernel + the other +3% patch (that gives me only 1% of speedup :-( )
Post
Topic
Board Bitcoin Discussion
Re: ALL of my bitcoins stolen (Around 60) . What the F*CK.
by
xanatos
on 27/06/2011, 18:15:20 UTC

The cheapest android device is 99€ here in italy. It can be used as a "close" system. You install a thin client, install the fat client on your PC and keep on your PC the encrypted private keys (AES encrypted). These keys are downloaded from the android and decrypted by the cell phone on demand (your phone have the AES key). The PC needs "rearming" if the AES key sent is wrong. The AES key on your phone is PIN protected. You can send from your PC to your cell phone the public keys of persons you want to pay. You want to pay someone? In some "sicure" way you send the public key of the person to your cell phone, use the key to decrypt, and send the signed transaction to your PC. You don't use the phone in any other way than a client of bitcoin. You don't put a sim in the phone. You don't browse internet. Done.

Why even download the private key from the Android device instead of leaving them on the Android device? I think for this to work the Android device would have to be locked down very tight which maybe hard if it is connected to the PC using USB.  All it would take is for a hacker or virus to know it exists and root the device from the PC.  A device with Ethernet and only a listening API would be more secure to the PC.  I am also not sure if I would trust the Android device on Wifi.  The PC could send a transmit BTC request to the Android device with the recipient public key and amount.  After the user enters his pin or password on the Android device it would sign the transaction and transmit it to the PC like it was a Bitcoin node to pass on to the Internet.

-Dukejer

You don't connect the Android to the PC with a cable. You use Wi-Fi or Bluetooth. You don't keep the private key on the cellular because it can be easily stolen. Stealing the PC AND the cellular is more complex (you can easily hide the cellular when you don't need it). Yes, it's perhaps possible to hack a cellular through wi-fi, but it's quite complex, and it's model-by-model. There isn't a single-hack that works for everything. It isn't totally fool-proof but it raises the difficulty of an hack very much. Especially if you consider that economical Android cellulars will multiply in the next year or so.
Post
Topic
Board Bitcoin Discussion
Re: ALL of my bitcoins stolen (Around 60) . What the F*CK.
by
xanatos
on 27/06/2011, 17:07:59 UTC
Quote
I understand what your are talking about but what do we do?  Put our head in the sand and let Bitcoin go away or centralize and put our Bitcoins back in a digital bank that is insured by the FDIC and end back where we are now.  I doubt I will lose my Bitcoins on my secure Linux box but everyone I work with that is not technical would not be able to run their own secure Linux box.  They can not even secure Windows.  I gave up supporting Windows for my family and friends.   I only run Linux Systems at my home and I only support Linux for family and friends that are willing to go in a different direction and not use Windows.

Maybe we need a hardware device that is not on the Internet that holds our wallet private keys and uses an API over the local LAN to request that you send money.  Then you have to walk over to this secure hardware widget and put in your password there.  Of course this would put Bitcoin out of the hands of everyday users who would not want to spend any additional money to send and receive Bitcoins.  
-Dukejer

The cheapest android device is 99€ here in italy. It can be used as a "close" system. You install a thin client, install the fat client on your PC and keep on your PC the encrypted private keys (AES encrypted). These keys are downloaded from the android and decrypted by the cell phone on demand (your phone have the AES key). The PC needs "rearming" if the AES key sent is wrong. The AES key on your phone is PIN protected. You can send from your PC to your cell phone the public keys of persons you want to pay. You want to pay someone? In some "sicure" way you send the public key of the person to your cell phone, use the key to decrypt, and send the signed transaction to your PC. You don't use the phone in any other way than a client of bitcoin. You don't put a sim in the phone. You don't browse internet. Done.
Post
Topic
Board Bitcoin Discussion
Re: ALL of my bitcoins stolen (Around 60) . What the F*CK.
by
xanatos
on 27/06/2011, 14:44:49 UTC
Quote
This is not true.  If the private keys are encrypted in the wallet and in memory and only unencrypted at the time of sending BTC to a different spot in memory each time and then promptly erased from memory.  This would be a reasonable amount of security and make it difficult for a Virus or Trojan to steal the private keys.  The only problem I see with this method is people losing their password to their private keys but I think that also Bitcoin Clients should mandate the user backing up their keys unencrypted to a removable device or print them out at time of key generation.
This would be a shitty security method that would protect you only from the most noob script kiddie.
Two ways to hack it:
* the simple: wait for the window asking the password to appear and take the password (keyloggers)
* the "a little harder": You know (by looking at the source, the client is open source, you know?) in which function the key is unencrypted, you wait for the exe of the client to be loaded (you are a trojan, you are resident in memory), put a breakpoint there and snoop the memory. Each time a new version of the client is created you lose half an hour to "expand" your library of possible breakpoints. Hackers do more complex things to games that are protected by latest generation protections. You think that an open source software that anyone can compile is more resistant? Encryption will only make the wallet.dat more resistant to "one shot" trojans that enter, steal and exit (or to trojans written by script kiddies that don't know assembly). This would steal one private key at a time, if the program is well written (but then, if you are already putting a bp in the code, you can directly steal the password).

The only "possible" way would be to make the program polymorphic, like the viruses, so it would be more difficult to put a breakpoint in memory, but it's quite complex... And it would protect only against the second method. And in the end the trojan would simply replace your exe with another one that would only ask you the password and send it to the hacker.
Post
Topic
Board Development & Technical Discussion
Re: Client Feature Suggestion - RFC1751 Key 'Export'
by
xanatos
on 26/06/2011, 13:28:34 UTC
Even better then... I had trusted the comments on key.h . It's 56 "phonetic symbols" to codify 256 + 32 bits in base36.
Post
Topic
Board Development & Technical Discussion
Re: Client Feature Suggestion - RFC1751 Key 'Export'
by
xanatos
on 26/06/2011, 12:45:50 UTC
Right. You can derive your public key from your private key with ECDSA. So it's 61 characters, and you can use 36 bits for CRC, or at least you could use a CRC-32 optimized for detecting errors, like the CRC-32C that is considered to be the best one.
Post
Topic
Board Development & Technical Discussion
Re: Client Feature Suggestion - RFC1751 Key 'Export'
by
xanatos
on 26/06/2011, 12:21:45 UTC
Probably converting to Base36 and using the NATO phonetic alphabet would be better (alpha, bravo, charlie... one... zero). It's 5.16 bits/symbol, so only 0.7 bits/symbol less than Base58. Mmmmh secp256k1 is 279 + 65 bits. Base58 adds 32 bits for the crc (technically a truncated sha256) and I think 32 bits is the minimum we should add (but someone has noticed that sometimes you can change a single symbol and still the crc won't change, but if you save both private and public key this shouldn't be a problem... I think you can check if they are "connected" one to another so you could ignore the crc.), so it's 376 bits = 73 NATO "words" to save both public and private key together OR 352 = 69 NATO "words" without the "CRC". Made a test... Writing 4 "words" per row, 2 columns, on a Letter sheet with 0.5 inches of margin you can put 4 public/private "couples" at Arial 12 without any problem.
Post
Topic
Board Development & Technical Discussion
Re: Client Feature Suggestion - RFC1751 Key 'Export'
by
xanatos
on 26/06/2011, 11:36:08 UTC
It seems to be something more funny than useful. These "words" don't add anything to simply using Base58 (and perhaps adding some huffman coding upon it to make it auto-error correcting). Two examples:

FEED and FEET. Their "distance" is one character (D and T) AND they have a similar sound (D and T are both dental consonants).
DIME and DINE. The only difference is a single segment. Are you sure an OCR will distinguish between them?

Another problem: the length of each "symbol" is variable (A, AD, ADA are three legal symbols), so the space is an important separator. ADADAD could be AD AD AD or ADA DAD.
Post
Topic
Board Bitcoin Discussion
Re: How many with the account stil locked at MtGox?
by
xanatos
on 26/06/2011, 05:16:49 UTC
My account has been verified... And the problem was fully mine! I hadn't pressed the button to verify the account :-) I had only added the proofs :-) I got help on irc by Tux. (ah... you are permitted to think (but only to think) that I'm quite stupid... I feel the same :-) )
Post
Topic
Board Bitcoin Discussion
How many with the account stil locked at MtGox?
by
xanatos
on 25/06/2011, 17:10:52 UTC
Am I the only one with the account still locked?
Post
Topic
Board Development & Technical Discussion
Re: "buggy" beta
by
xanatos
on 24/06/2011, 18:51:00 UTC
Ok... Thanks! I wasn't imagining thing... But I was remembering quite badly :-) There are bits and pieces that are correct... There was a pull request (and not a full version) with the bug... And the money lost was 65 btc (but there was a reference to 10 btc)
Post
Topic
Board Development & Technical Discussion
Re: "buggy" beta
by
xanatos
on 24/06/2011, 18:30:31 UTC
It was a "single instance" bug... It happened to only a single person on only a single release. I'm quite sure of it.
Post
Topic
Board Development & Technical Discussion
"buggy" beta
by
xanatos
on 24/06/2011, 17:16:55 UTC
I'm quite sure there was a beta version some weeks ago that had a bug that "ate" 10 btc to a person. There was a message about it. I'm trying to find the message and, if possible, the update revision in github (I'll add that, if I remember correctly, the bug was that the public key the money was to be sent was zeroed, so the 10 btc had been sent to someone with public key 0000......000000, but clearly there wasn't this public key.)

Thanks!