Arensis and Schneider Electric to Develop Smart Microgrid ...

Cryptography news and discussions

Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited to encryption of messages such that only the key-holder can read it. Cryptography lives at an intersection of math and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.
[link]

Part 6. (Last part) I'm writing a series about blockchain tech and possible future security risks. Failing shortcuts in an attempt to accomplish Quantum Resistance

The previous parts will give you usefull basic blockchain knowledge and insights on quantum resistance vs blockchain that are not explained in this part.
Part 1, what makes blockchain reliable?
Part 2, The mathematical concepts Hashing and Public key cryptography.
Part 3, Quantum resistant blockchain vs Quantum computing.
Part 4A, The advantages of quantum resistance from genesis block, A
Part 4B, The advantages of quantum resistance from genesis block, A
Part 5, Why BTC is vulnerable for quantum attacks sooner than you would think.

Failing shortcuts in an attempt to accomplish Quantum Resistance
Content:
Hashing public keys
“Instant” transactions
FIFO
Standardized fees
Multicast
Timestamped transactions
Change my mind: If a project doesn't use a Quantum Resistant signature scheme, it is not 100% Quantum Resistant.
Here are some of the claims regarding Quantum Resistance without the use of a quantum resistant signature scheme that I have come across so far. For every claim, I give arguments to substantiate why these claims are incorrect.
“We only have public keys in hashed form published. Even quantum computers can't reverse the Hash, so no one can use those public keys to derive the private key. That's why we are quantum resistant.” This is incorrect.
This example has been explained in the previous article. To summarize: Hashed public keys can be used as an address for deposits. Deposits do not need signature authentication. Alternatively, withdrawals do need signature authentication. To authenticate a signature, the public key will always need to be made public in full, original form. As a necessary requirement, the full public key would be needed to spend coins. Therefore the public key will be included in the transaction.
The most famous blockchain to use hashed public keys is Bitcoin. Transactions can be hijacked during the period a user sends a transaction from his or her device to the blockchain and the moment a transaction is confirmed. For example: during Bitcoins 10 minute blockchain, the full public keys can be obtained to find private keys and forge transactions. Page 8, point 3 Hashing public keys does have advantages: they are smaller than the original public keys. So it does save space on the blockchain. It doesn't give you Quantum Resistance however. That is a misconception.
“Besides having only hashed public keys on the blockchain, we also have instant transactions. So there is no time to hijack a transaction and to obtain the public key fast enough to forge a transaction. That's why we are quantum resistant.” This is incorrect and impossible.
There is no such thing as instant transactions. A zero second blocktime for example is a claim that can’t be made. Period. Furthermore, transactions are collected in pools before they are added to a block that is going to be processed. The time it takes for miners to add them to a new block before processing that block depends on the amount of transactions a blockchain needs to process at a certain moment. When a blockchain operates within its maximum capacity (the maximum amount of transactions that a blockchain can process per second), the adding of transactions from the pool will go quite swiftly, but still not instantaneously.
However, when there is high transaction density, transactions can be stuck in the pool for a while. During this period the transactions are published and the full public keys can be obtained. Just as with the previous hijacking example, a transaction can be forged in that period of time. It can be done when the blockchain functions normally, and whenever the maximum capacity is exceeded, the window of opportunity grows for hackers.
Besides the risk that rush hours would bring by extending the time to work with the public key and forge transactions, there are network based attacks that could serve the same purpose: slow the confirmation time and create a bigger window to forge transactions. These types are attacks where the attacker targets the network instead of the sender of the transaction: Performing a DDoS attack or BGP routing attack or NSA Quantum Insert attack on a peer-to-peer network would be hard. But when provided with an opportunity to earn billions, hackers would find a way.
For example: https://bitcoinmagazine.com/articles/researchers-explore-eclipse-attacks-ethereum-blockchain/
For BTC: https://eprint.iacr.org/2015/263.pdf
An eclipse attack is a network-level attack on a blockchain, where an attacker essentially takes control of the peer-to-peer network, obscuring a node’s view of the blockchain.
That is exactly the recipe for what you would need to create extra time to find public keys and derive private keys from them. Then you could sign transactions of your own and confirm them before the originals do.
This specific example seems to be fixed now, but it most definitely shows there is a risk of other variations to be created. Keep in mind, before this variation of attack was known, the common opinion was that it was impossible. With little incentive to create such an attack, it might take a while until another one is developed. But when the possession of full public keys equals the possibility to forge transactions, all of a sudden billions are at stake.
“Besides only using hashed public keys as addresses, we use the First In First Out (FIFO) mechanism. This solves the forged transaction issue, as they will not be confirmed before the original transactions. That's why we are quantum resistant.” This is incorrect.
There is another period where the public key is openly available: the moment where a transaction is sent from the users device to the nodes on the blockchain network. The sent transaction can be delayed or totally blocked from arriving to the blockchain network. While this happens the attacker can obtain the public key. This is a man-in-the-middle (MITM) attack. A MITM is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. No transaction is 100% safe from a MITM attack. This type of attack isn’t commonly known amongst average usergroups due to the fact communication is done either encrypted or by the use of private- public key cryptography. Therefore, at this point of time MITM attacks are not an issue, because the information in transactions is useless for hackers. To emphasize the point made: a MITM attack can be done at this point of time to your transactions. But the information obtained by a hacker is useless because he can not break the cryptography. The encryption and private- public key cryptography is safe at this point of time. ECDSA and RSA can not be broken yet. But in the era of quantum computers the problem is clear: an attacker can obtain the public key and create enough time to forge a transaction which will be sent to the blockchain and arrive there first without the network having any way of knowing the transaction is forged. By doing this before the transaction reaches the blockchain, FIFO will be useless. The original transaction will be delayed or blocked from reaching the blockchain. The forged transaction will be admitted to the network first. And First In First Out will actually help the forged transaction to be confirmed before the original.
“Besides having only hashed public keys, we use small standardized fees. Forged transactions will not be able to use higher fees to get prioritized and confirmed before the original transactions, thus when the forged transaction will try to confirm the address is already empty. This is why we are quantum resistant.” This is incorrect.
The same arguments apply as with the FIFO system. The attack can be done before the original transaction reaches the network. Thus the forged transaction will still be handled first no matter the fee hight.
“Besides the above, we use multicast so all nodes receive the transaction at the same time. That's why we are quantum resistant.” This is incorrect.
Multicast is useless against a MITM attack when the attacker is close enough to the source.
“Besides the above, we number all our transactions and authenticate nodes so the user always knows who he's talking to. That's why we are quantum resistant.” This is incorrect.
Besides the fact that you’re working towards a centralized system if only verified people can become nodes. And besides the fact that also verified nodes can go bad and work with hackers. (Which would be useless if quantum resistant signature schemes would be implemented because a node or a hacker would have no use for quantum resistant public keys and signatures.) There are various ways of impersonating either side of a communication channel. IP-spoofing, ARP-spoofing, DSN-spoofing etc. All a hacker needs is time and position. Time can be created in several ways as explained above. All the information in the transaction an original user sends is valid. When a transaction is hijacked and the communication between the user and the rest of the network is blocked, a hacker can copy that information to his own transaction while using a forged signature. The only real effective defense against MITM attacks can be done on router or server-side by a strong encryption between the client and the server (Which in this case would be quantum resistant encryption, but then again you could just as well use a quantum resistant signature scheme.), or you use server authentication but then you would need that to be quantum resistant too. There is no serious protection against MITM attacks when the encryption of the data and the authentication of a server can be broken by quantum computers.
Only quantum resistant signature schemes will secure blockchain to quantum hacks. Every blockchain will need their users to communicate their public key to the blockchain to authenticate signatures and make transactions. There will always be ways to obtain those keys while being communicated and to stretch the period where these keys can be used to forge transactions. Once you have, you can move funds to your own address, a bitcoin mixer, Monero, or some other privacy coin.
Conclusion
There is only one way to currently achieve Quantum Resistance: by making sure the public key can be made public without any risks, as is done now in the pre-quantum period and as Satoshi has designed blockchain. Thus by the use of quantum resistant signature schemes. The rest is all a patchwork of risk mitigation and delaying strategies; they make it slightly harder to obtain a public key and forge a transaction but not impossible.
Addition
And then there is quite often this strategy of postponing quantum resistant signature schemes
“Instead of ECDSA with 256 bit keys we will just use 384 bit keys. And after that 521 bit keys, and then RSA 4096 keys, so we will ride it out for a while. No worries we don’t need to think about quantum resistant signature schemes for a long time.” This is highly inefficient, and creates more problems than it solves.
Besides the fact that this doesn’t make a project quantum resistant, it is nothing but postponing the switch to quantum resistant signatures, it is not a solution. Going from 256 bit keys to 384 bit keys would mean a quantum computer with ~ 3484 qubits instead of ~ 2330 qubits could break the signature scheme. That is not even double and postpones the problem either half a year or one year, depending which estimate you take. (Doubling of qubits every year, or every two years). It does however have the same problems as a real solution and is just as much work. (Changing the code, upgrading the blockchain, finding consensus amongst the nodes, upgrading all supporting systems, hoping the exchanges all go along with the new upgrade and migrate their coins, heaving all users migrate their coins.) And then quite soon after that, they'll have to go at it again. What they will do next? Go for 512 bit curves? Same issues. It's just patchworks and just as much hassle, but then over and over again for every “upgrade” from 384 to 521 etc.
And every upgrade the signatures get bigger, and closer to the quantum resistant signature sizes and thus the advantage you have over blockchains with quantum resistant signature schemes gets smaller. While the quantum resistant blockchains are just steady going and their users aren’t bothered with all the hassle. At the same time the users of the blockchain that is constantly upgrading to a bigger key size, keep on needing to migrate their coins to the new and upgraded addresses to stay safe.
submitted by QRCollector to CryptoTechnology [link] [comments]

A Look at DCG & Bitfury's Incestuous Ties With the U.S. Government

Peter Todd Tweet in 2014: https://archive.is/vKZ9C
[email protected] I gotta say, looks really bad legally how Austin Hill's been negotiating deals w/ pools/etc. to get control of hashing power.
Board of Digital Currency Group
Glenn Hutchins
Advisory Board
Larry Summers
DCG of course is an investor in both Blockstream and BTCC.
DCG's money comes from:
DCG also owns Coindesk.
BTCC and Bitfury are the only two large mining pools who are outspoken in their support of Bitcoin Core.
The Bitfury Group Leadership to Present at Clinton Global Initiative (https://archive.is/MWKee)
Full Video (Begins at 32:00)
“The Bitfury Group is proud to be the world’s leading full service Blockchain technology company, we are deeply honored to represent this innovation to an audience of extremely dedicated game-changers, and we look forward to highlighting our company’s groundbreaking ‘Blockchain for global good’ work at such an important event, said Smith. “From the White House to the Blockchain, I know this technology has the power to deliver inclusion and opportunity to millions, if not billions, of people around the world and I am so grateful to work for a company focused on such a principled vision.”
Bitfury Lightning Implementation
  • In partnership with a French firm called ACINQ (http://acinq.co)
  • ACINQ is a subsidiary of the larger ACINQ Financial Services
  • CoinTelegraph: Bitfury Lightning Network Successfully Tested With French Bitcoin Company
  • TEAM: https://archive.is/Q5CNU
  • ACINQ’s US Headquarters is in Vienna, Virginia, a small town of only 16,000. Why would a global financial firm choose to locate here? -- Feeder community into Washington, D.C. Has an orange line metro stop. -- Located in Fairfax County, VA. -- The US Federal Government is the #2 largest employer -- Booz Allen Hamilton (NSA front company) is #6 largest employer -- In fact, most of the top employers in Fairfax County are either US Federal Gov’t or companies that provide services to Federal Government -- The county is home to the headquarters of intelligence agencies such as the Central Intelligence Agency, National Geospatial-Intelligence Agency, and National Reconnaissance Office, as well as the National Counterterrorism Center and Office of the Director of National Intelligence.
Chairman: Avinash Vashistha
CEO: Chaman Baid
CSO: Nandan Setlur
  • https://www.linkedin.com/in/nandansetlur https://archive.is/wp3L0
  • From 1986-1993 he worked for Information Management Consultants (imc) Ltd as a Technical Consultant with various federal government agencies. McLean, Virginia
  • 1993-2000 Technical Consultant for Freddie Mac, in McLean Virginia
  • From 2000-2007, President of InterPro Global in Maryland
  • From 2011-2012, Director of VibbleTV in Columbia, Maryland
  • From 2008-Present has been Executive Director at ACINQ and Managing Partner at Vine Management, both in Vienna, Virginia.
BitFury Enhances Its Advisory Board by Adding Former CFTC Chairman Dr. James Newsome and Renowned Global Thought Leader and President of the Institute for Liberty and Democracy Hernando de Soto (Businesswire)
Bitfury Board of Directors
Robert R Dykes
The other board members include two Bitfury founders, and an investor.
Bitfury Advisory Board
James Newsome
  • Ex-chairman of CFTC
  • Dr. Newsome was nominated by President Clinton and confirmed by the Senate to be at first a Commissioner and later a Chairman of CFTC. As Chairman, Newsome guided the regulation of the nation’s futures markets. Additionally, Newsome led the CFTC’s regulatory implementation of the Commodity Futures Modernization Act of 2000 (CFMA). He also served as one of four members of the President’s Working Group for Financial Markets, along with the Secretary of the Treasury and the Chairmen of the Federal Reserve and the SEC. In 2004, Newsome assumed the role of President and Chief Executive Officer of the New York Mercantile Exchange (NYMEX) where he managed daily operations of the largest physical derivatives exchange in the world. Dr. Newsome is presently a founding partner of Delta Strategy Group, a full-service government affairs firm based in Washington, DC.
Hernando de Soto
  • Hernando de Soto heads the Institute for Liberty and Democracy, named by The Economist one of the two most important think tanks in the world. In the last 30 years, he and his colleagues at the ILD have been involved in designing and implementing legal reform programs to empower the poor in Africa, Asia, Latin America, the Middle East, and former Soviet nations by granting them access to the same property and business rights that the majority of people in developed countries have through the institutions and tools needed to exercise those rights and freedoms. Mr. de Soto also co-chaired with former US Secretary of State Madeleine Albright the Commission on Legal Empowerment of the Poor, and currently serves as honorary co-chair on various boards and organizations, including the World Justice Project. He is the author of “The Other Path: the Economic Answer to Terrorism”, and his seminal work “The Mystery of Capital: Why Capitalism Triumphs in the West and Fails Everywhere Else.”
  • Frequent attendee at Davos World Economic Forum
  • Frequent Speaker @ Clinton Global Initiative http://www.dailymotion.com/video/x2ytfrs https://archive.is/MWKee
  • Criticisms: -- In his 'Planet of Slums'[104] Mike Davis argues that de Soto, who Davis calls 'the global guru of neo-liberal populism', is essentially promoting what the statist left in South America and India has always promoted—individual land titling. Davis argues that titling is the incorporation into the formal economy of cities, which benefits more wealthy squatters but is disastrous for poorer squatters, and especially tenants who simply cannot afford incorporation into the fully commodified formal economy. -- An article by Madeleine Bunting for The Guardian (UK) claimed that de Soto's suggestions would in some circumstances cause more harm than benefit, and referred to The Mystery of Capital as "an elaborate smokescreen" used to obscure the issue of the power of the globalized elite. She cited de Soto's employment history as evidence of his bias in favor of the powerful. https://www.theguardian.com/business/2000/sep/11/imf.comment http://www.slate.com/articles/news_and_politics/hey_wait_a_minute/2005/01/the_de_soto_delusion.html
Tomicah Tilleman
  • https://en.wikipedia.org/wiki/Tomicah_Tillemann
  • Dr. Tomicah Tillemann is Director of the Bretton Woods II initiative. The initiative brings together a variety of long-term investors, with the goal of committing 1% of their assets to social impact investment and using investments as leverage to encourage global good governance. Tillemann served at the U.S. State Department in 2010 as the Senior Advisor on Civil Society and Emerging Democracies to Secretary Hillary Clinton and Secretary John Kerry. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Tillemann received his B.A. magna cum laude from Yale University. He holds a Ph.D. with distinction from the School for Advanced International Studies at Johns Hopkins University (SAIS) where he also served as a graduate level instructor in American foreign policy. http://live.worldbank.org/node/8468 https://archive.is/raDHA
  • Secretary Clinton appointed Tomicah Tillemann, Ph.D. as the State Department’s Senior Advisor for Civil Society and Emerging Democracies in October 2010. He continues his service under Secretary Kerry.
  • Mr. Tillemann and his team operate like venture capitalists, identifying ideas that can strengthen new democracies and civil society, and then bring together the talent, technology and resources needed to translate promising concepts into successful diplomacy. He and his team have developed over 20 major initiatives on behalf of the President and Secretary of State.
  • Mr. Tillemann came to the State Department as a speechwriter to Secretary Clinton in March 2009 and collaborated with her on over 200 speeches. Earlier, he worked for the Senate Foreign Relations Committee, where he was the principal policy advisor on Europe and Eurasia to Committee Chairmen, Senators Joe Biden and John Kerry. He also facilitated the work of the Senate's Subcommittee on European Affairs, then chaired by Senator Barack Obama. Mr. Tillemann’s other professional experience includes work with the White House Office of Media Affairs and five U.S. Senate and Congressional campaigns. He was a reporter with Reuters New Media and hosted a commercial radio program in Denver, Colorado. http://m.state.gov/md160354.htm https://www.newamerica.org/our-people/tomicah-tillemann/ https://archive.is/u2yF0
  • Director of “Bretton Woods II” initiative at New America Foundation Bretton Woods was an international summit that led to the creation of the IMF and the IBRD, one of five members of The World Bank
Jamie Smith
Jason Weinstein
Paul Brody (no longer appears on site, and his LinkedIn has no mention of Bitfury, but he is mentioned in a Press Release
  • https://www.linkedin.com/in/pbrody
  • Ernst & Young since 2015 as “Americas Strategy Leader”, “Global Innovation Leader”, and “Solution Leader”
  • Prior to E&Y, he was an executive at IBM since 2002
New America Foundation
Muskoka Group
[note: this is worthy of much more research]
  • https://www.bloomberg.com/news/articles/2016-08-29/blockchain-s-backers-embark-on-campaign-to-improve-its-image
  • Don Tapscott, co-author of the book “Blockchain Revolution,” hosted the meeting with his son and co-author Alex Tapscott at his family’s summer compound in Lake of Bays, Ontario. The group included some of blockchain’s biggest backers, including people with ties to IBM and JPMorgan. They considered ways to improve the governance and oversight of the technology behind the digital currency bitcoin as a way to fuel the industry’s growth. They included Jim Zemlin, executive director of the Linux Foundation; Brian Behlendorf, executive director of the Hyperledger Project, a blockchain supporter group that includes International Business Machines Corp., Airbus Group SE and JPMorgan Chase & Co.; and Ana Lopes, board member of the World Wide Web Foundation. Participants with blockchain industry ties include former deputy White House press secretary Jamie Smith, now chief global communications officer of BitFury Group Ltd., and Joseph Lubin, founder of startup Consensus Systems.
Blockchain Delegation Attends Democratic National Convention https://archive.is/k16Nu
Attendees:
Jamie Smith — The Bitfury Group & Blockchain Trust Accelerator Tomicah Tillemann— New America Foundation & Blockchain Trust Accelerator Alex Tapscott— co-author: Blockchain Revolution Brian Forde — MIT, Digital Currency Initiative
Brian Forde
  • Was the founding director of the MIT Digital Currency Initiative -Left his 4 year post as White House Senior Advisor for Mobile and Data Innovation to go directly to the MIT DCI
  • Brian Forde has spent more than a decade at the nexus of technology, entrepreneurship, and public policy. He is currently the Director of Digital Currency at the MIT Media Lab where he leads efforts to mainstream digital currencies like Bitcoin through research, and incubation of high-impact applications of the emerging technology. Most recently he was the Senior Advisor for Mobile and Data Innovation at the White House where he spearheaded efforts to leverage emerging technologies to address the President’s most critical national priorities. Prior to his work at the White House, Brian founded one of the largest phone companies in Nicaragua after serving as a business and technology volunteer in the Peace Corps. In recognition of his work, Brian was named a Young Global Leader by the World Economic Forum and one of the ten most influential people in bitcoin and blockchain. https://www.linkedin.com/in/brianforde https://archive.is/WjEGU
Alex Tapscott
World Economic Forum
  • Strategic Partners: https://www.weforum.org/about/strategic-partners
  • Includes Accenture (See Avinash Vashistha), Allianz, Deloitte (Scaling Bitcoin platinum sponsor, Blockstream Partner), Citigroup, Bain & Company (parent of Bain Capital, DCG investor), Dalian Wanda Group (working on blockchain technology), Ernst & Young (see Paul Brody), HSBC (Li-Ka Shing, Blockstream investor, used to be Deputy Chairman of HSBC), IBM, KPMG International, Mastercard (DCG Investor), PwC (Blockstream partner, also sponsor of Scaling Bitcoin)
  • Future of Financial Services Report [PDF] The word “blockchain” is mentioned once in this document, on page 23 (http://i.imgur.com/1SxyneJ.png): We have identified three major challenge areas related to innovation in financial services that will require multi-stakeholder collaboration to be addressed effectively. We are launching a project stream related to each area, with the goal of enabling tangible impact.... Decentralised systems, such as the blockchain protocol, threaten to disintermediate almost every process in financial services
  • The Steering Group who authored the report is a who’s who of the global financial elite. (Pages 4 & 5) http://i.imgur.com/fmYc1bO.png http://i.imgur.com/331FaX6.png
Bitfury Washington DC Office
Washington DC Office 600 Pennsylvania Avenue Suite 300 Washington, D.C. 20003
http://bitfury.com/contacts https://archive.is/ugvII
Bitfury Chosen for Ernst & Young Blockchain Startup Challenge
Deloitte Unveils Plan to Build Blockchain-Based Digital Bank http://www.consultancy.uk/news/12237/deloitte-unveils-plan-to-build-blockchain-based-digital-bank https://archive.is/UJ8Q5
submitted by 5zh8FoCiZ to btc [link] [comments]

Posts everyone interested in cryptocurrency should read

Edit: WIP

Posts

Here are some great posts/articles everyone should read before speculating in cryptocurrency.
Post Date
50 Crypto Trading & Investing Lessons Learned Over The Past 5 Years January 2018
'Be Your Own Bank', A Cautionary Tale December 2017
I lost ~40k USD today. Reminder to keep coins off exchanges if you are not trading. February 2018
How the Bitcoin protocol actually works December 2013
Blockchain and Trust February 2019
Bitcoin: A Peer-to-Peer Electronic Cash System October 2008

Common Advice

Disclaimer Not my advice. Don't sue me.

Not your keys, not your Bitcoin.

This applies to all cryptocurrencies. The ownership of cryptocurrencies can only be determined using cryptography (hence "crypto" in the name). To be able to spend/receive and otherwise control units of a cryptocurrency you must have the corresponding private key. If you are using a cryptocurrency exchange to store your cryptocurrency you do not control the private key(s) corresponding to your coins, the exchange does. To control your private keys you must withdraw your coins to a local wallet stored on your phone/PC. It is highly recommended that you don't use a Windows computer to store your private keys (because Windows is very prone to malware). There are numerous examples of prominent exchanges stealing/losing their customers coins because the exchange had the private key(s) rather than the customer. The most well known such occurrence was Mt. Gox.
Being 'your own bank' (controlling your private keys) also means you are responsible for the safety of your coins. Use a deterministic wallet and write down your seed (on paper, not electronically) so that you do not lose your coins if your wallet is lost/corrupted. Encrypt your wallet so malware cannot easily 'scrape' your private keys. Be careful updating your wallets. Wallet updates are a known and actively exploited attack vector. Wallet updates may also contain bugs.

Do not invest more than you can afford to lose.

Cryptocurrency prices are extremely volatile and losses of 90% are common. The software is under continual development and so may contain bugs. If you chose to speculate, assume you will lose all of your money and so only speculate money you do not need to pay bills or debts.

Past performance does not guarantee future results.

If the price has behaved some way in the past, it does not guarantee it will perform that way again in the future. This is especially true on short timescales.

Don't HODL

A misspelling of the word 'hold'. A meme telling people not to sell. Do not base your financial decisions on memes. Have a rigorous plan of when you will sell and execute it without emotion/hesitation.

This time isn't different.

Past performance does not guarantee future results but past performance is the best indicator of long-term prices. Familiarize yourself with the graphs of the past, learn about how the price is cyclic and then only speculate once you are as familiar with the price history as someone who bought in 2013.
submitted by 4vWte1ovZK1i to u/4vWte1ovZK1i [link] [comments]

Quantum Conspiracy

This is not reality changing quantum computing meta-science / Mandela Effect / parallel universes bull.
The following is at least trying to be factual
I some information for you of which you may not be aware, as well as speculation related to such events.
Here is the gist...
TIMELINE
May 11th: WannaCry ransomware was released into the public.
May 15th: A small flurry of news articles on websites about quantum computation not effecting RSA encryption showed up.
June 13th: IOTA is added to the bitfinex exchange.
June 14th: Quantum market value passes 5 billion. Through D-Wave and IBM-Q
June 25th: The Petya ransomware released.
June 27th: A second test revision of the Petya ransomware released as NotPetya.
July 3rd or 4th: We will see. (This is only speculation.)
WHAT YOU NEED TO KNOW
The WannaCry ransomware is a private sector project disguised as a ransomware. The Petya ransomware is a revision of this project with some fixes re-released for testing. NotPeta was released shortly after, so that it was not as noticeable over the current threat.
IOTA is a cryptocurrency that you should probably put some money into, it will be important later. It is not generated via mining. It is does not have a blockchain. It is quantum computationally proof by design. It is currently worth more than 1 billion USD, becoming the 8th largest traded cryptocurrency in 14 days.
The major project is a programming project with the following goals.
@ This might be an attempt by combined forces to create a viral remote administration tool.
@ The active function of this secret tool would be primarily benign malicious. With goal to install this on as many internet of things devices, cellphones, and computers as possible in order to steal an unnoticeable amount of CPU and GPU resources (1%), from computers that stay idle for more than 6 hours. Effectively a world wide zombie botnet.
@ Here is the list of currently involved entities: TPTB, Google, D-Wave Systems, Microsoft, Intel, IBM, CERN, Cisco, CERT, a counter-collective group of approximately 2,200 people with backgrounds in information security, cryptography, mathematics, and quantum physics.
REVELATIONS
This is very important so listen.
@ I feel this is to use this computing power, piping it into the Google network in order to mask the internet traffic as legitimate.
@ These computing resources are being used to assist Google Deepmind in order to finish a computation project that when successful will result in artificially generated design for a cold operating quantum computer, possibly through carbon computation.
@ IOTA may have known about this project in advance. Developing a quantum proof cryptocurrency in order to capitalize from the downfall of other cryptomarkets. IOTA also is working in a very short timescale, implementing smart contracts to automate transactions over internet of things devices, presumably to prevent them from becoming idle.
@ After the project is complete, I assume TPTB will be able to effectively break nearly all encryption, and then all hell will break lose.
CAVEATS
@ I am not saying you should not drop all your bitcoin, because the timescale for this will be a few years. However, just keep in mind I feel this coming. If it is, there is nothing we can do.
submitted by SoaringMoon to conspiracy [link] [comments]

BTC-E.com safety checklist for noobs

DISABLE JAVA There's java zero day exploits being discovered all the time. One exploit still hasn't been fixed. You should do this permanently with your browser java is an exploit factory. IE you can't completely disable java so don't use it.
INSTALL NOSCRIPT ADDON https://addons.mozilla.org/en-US/firefox/addon/noscript/ or whatever shit script blockers Chrome/Safari use because Chrome is still lacking the required infrastructure for selective script disablement and object blocking so noscript isn't available, but inferior clones are. Whitelist only sites you need, like btc-e.com so it doesn't automatically load harmful scripts on untrusted sites.
GET AN ENCRYPTED PASSWORD SAFE http://www.schneier.com/passsafe.html Don't use any solution that 'encrypts in your browser' because it will need java and we disabled java remember?
MAKE NEW GMAIL ACCOUNT JUST FOR TRADING Make a random account name + password that can't be guessed. http://www.passwordgenerator.eu/
Store them in your password safe so you don't forget them. Never reuse that password on any site. ENABLE TWO FACTOR AUTHENTICATION.
Note that 2factor ID sometimes doesn't work if your phone time is off. You get 30 seconds to type in the code, if off by 10 seconds derp run out of time. Set your time manually if the shitty telco time server is off www.timeanddate.com
MAKE BTC-E ACCOUNT Use impossible to guess passwords from password generator + throw in your own random letters. Save in password safe. Do not pick a name anywhere close to being your email username.
ENABLE 2FACTOR ID Click Profile, then click 'Edit'
https://btc-e.com/profile#edit/home - confirm your email.
https://btc-e.com/profile#edit/security - enable "Withdraw only with request on E-Mail"
DO NOT CLICK ANY LINKS IN THE TROLLBOX!!!! No matter how innocent the link looks don't click anything in the chatbox. Hackers are dropping links full of java zeroday, redirectors that look just like btc-e login page and phish for passwords, all sorts of bad. Trollbox is also prone to misinformation being that it is a trollbox. Avoid.
If you chat on there, expect every PM sent to you will be from a hacker trying to mine information or get you to click a link. Assume every link is an exploit attempt. Notice how it displays your name, if you picked same name as your email, they can go to work on both by trying to break into your gmail account. This is another way how people get their coins stolen. Hacker takes chat name and tries it on gmail/hotmail/yahoo. If they get in because you didn't set up 2 factor expect to be robbed of coins.
DO NOT ENABLE API Unless you know what you're doing, do not enable this. Liberty Reserve disabled their API by default because of so many drained accounts.
DISCLAIMER Of course, be aware the exchange is in Russia or possibly Bulgaria and if anything happens the owner could just disappear, but this is highly unlikely. Why would you walk away from a money machine. Remember bitfloor (US) lost all it's customers bitcoins once, CryptoXchange (Australia) stole from users and disappeared, Bitcoinica (China?) stole or lost all the coins, and bitcoin-24 (German) has just lost their bank account and owner MIA. All exchanges carry risk no matter what country they are in.
You can fund btc-e through cash deposit in India, Singapore, Malaysia, Bangladesh, Nepal, Australia with http://www.ecurrencyzone.net/ which are authorized exchange listed on the Okpay.com site. They sell btc-e vouchers and Okpay. So does http://liliontransfer.org/ for wires and other methods.
If you want a really secure platform (you fear your comp is probably already infected with hidden java zeroday botnet) then download any linux live distro and make bootable USB or burn to CD. I recommend Liberty Linux http://dee.su and just use the non private browser (disable java and javascript!), NOT the Tor browser you don't want to trust SSL over Tor and risk a malicious exit node capturing traffic and running sslstrip on it or feeding you a MITM attack with spoofed certs.
If you want to know why watch this, nothing has changed since this talk was given: https://www.youtube.com/watch?v=Z7Wl2FW2TcA
submitted by Derpcoin to Bitcoin [link] [comments]

Large DDoS attacks cause outages at Twitter, Spotify, and other sites

This is an automatic summary, original reduced by 74%.
Dyn's general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks.
Although DDoS attacks are sometimes accompanied by extortion letters that ask a company to hand over bitcoin in exchange for ceasing an attack, Dyn said it has not received any messages from its attackers.
The DDoS attack on Dyn follows on the heels of one of the largest DDoS attack in history, which used the Mirai botnet to target the website of independent cybersecurity journalist Brian Krebs.
Although DDoS attacks have historically used large networks of compromised computers called botnets to send junk traffic to sites, overwhelming them and making them inaccessible to legitimate users, the Krebs attack expanded in scale by using compromised Internet of Things devices like security cameras to build a botnet.
After the attack on Krebs' website, the code used to build the botnet leaked online, making more massive DDoS attacks all but inevitable.
Security researcher Bruce Schneier reported in September that several internet infrastructure companies had been targeted with DDoS attacks, although they had not caused the kind of widespread outages experienced today.
Summary Source | FAQ | Theory | Feedback | Top five keywords: attack#1 Dyn#2 DDoS#3 used#4 around#5
Post found in /argentina, /The_Donald, /inthenews, /Comcast_Xfinity, /news, /realtech, /battlefield_one, /cCloud, /news, /TheWatchTowers, /DailyTechNewsShow, /ScienceUncensored, /gadgets, /2007scape, /worldnews, /technology, /NoFilterNews and /PoliticsAll.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

An interesting problem social media is disappearing. DNS Server cannot be contacted. OMG Technical problem? I think not. Twitter down.

This is an automatic summary, original reduced by 74%.
Dyn's general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks.
Although DDoS attacks are sometimes accompanied by extortion letters that ask a company to hand over bitcoin in exchange for ceasing an attack, Dyn said it has not received any messages from its attackers.
The DDoS attack on Dyn follows on the heels of one of the largest DDoS attack in history, which used the Mirai botnet to target the website of independent cybersecurity journalist Brian Krebs.
Although DDoS attacks have historically used large networks of compromised computers called botnets to send junk traffic to sites, overwhelming them and making them inaccessible to legitimate users, the Krebs attack expanded in scale by using compromised Internet of Things devices like security cameras to build a botnet.
After the attack on Krebs' website, the code used to build the botnet leaked online, making more massive DDoS attacks all but inevitable.
Security researcher Bruce Schneier reported in September that several internet infrastructure companies had been targeted with DDoS attacks, although they had not caused the kind of widespread outages experienced today.
Summary Source | FAQ | Theory | Feedback | Top five keywords: attack#1 Dyn#2 DDoS#3 used#4 around#5
Post found in /The_Donald, /inthenews, /news, /Comcast_Xfinity, /realtech, /battlefield_one, /cCloud, /news, /TheWatchTowers, /DailyTechNewsShow, /ScienceUncensored, /gadgets, /2007scape, /worldnews, /technology, /NoFilterNews and /PoliticsAll.
NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.
submitted by autotldr to autotldr [link] [comments]

Bitcoin Security and Recent Thefts and the NSA

There is a failure of security on the internet.
Today there were 2 stories of the theft of bitcoins
  1. fr33a.com
  2. Ottawa bitcoin exchange defrauded of $100,000 in 'ridiculous' heist
Not to mention the on going Gox fiasco and the dozens of high profile thefts that have occurred in the last year plus numerous smaller thefts many of which probably never come to light.
I don't believe that bitcoin is inherently insecure. Nor do I believe that the possession of bitcoin should be beyond the reach of the average individual.
I do, however, believe that the price of bitcoin and the irrevocability of transactions have made bitcoin a high profile target.
Previously systems have remained unexploited and clean from botnets, viruses, etc., not because of exceptional security, but because there simply was nothing worth stealing.
Now there is.
Bruce Schneier has recently called for the restructuring of the NSA..
Specifically, from the Snowden revelations, it has come to light that the NSA is actively undermining the security of the internet.
I believe the NSA working to undermine security is the wrong approach.
Schneier states:
Much of the current debate in the U.S. is over what the NSA should be allowed to do, and whether limiting the NSA somehow empowers other governments. That's the wrong debate. We don't get to choose between a world where the NSA spies and one where the Chinese spy. Our choice is between a world where our information infrastructure is vulnerable to all attackers or secure for all users.
We all should encourage our representatives to press for the changes Schneier recommends.
If the NSA were actively working to enhance security on the internet all of our coins would be safer.
submitted by optimator999 to Bitcoin [link] [comments]

TOKEN : come sono fatti ?  Blockchain Caffe Breaking: Trustee Of Infamous Mt. Gox Denies BTC, BCH Sales Affected Crypto Markets Quanto vale Bitcoin adesso ?  Blockchain Caffe SOC Quarantine Diaries: Nick Percoco, CISO of Kraken, on the Crypto Exchange’s “Productive Paranoia U.S. Regulators Subpoena Crypto Exchange Bitfinex, Tether

[ad_1] Harvard professor criticizes the cryptocurrency as being totally meaningless. BTC/USD is under pressure amid profit-taking. Bitcoin is hovering around $3,600 handle, down 1.5% since the start of the day. The first digital asset retraced from the recent high of $3,707 late on Friday as speculative traders have been taking profits after a strong rally. … Mit Bitcoin war es ein Mix von Faszination, unternehmerischem Interesse, aber auch wirklichem persönlichen Nutzen. Weil ich zu diesem Zeitpunkt - ich glaube, ich war 15 oder 16 - regelmäßig Geld erhielt und meine Webentwickler bezahlen musste, habe ich die wirklichen Beschränkungen von Paypal bzw. Wire Transfers gesehen. Mal davon abgesehen, dass ich damals noch zu jung war, um mein ... Arensis Joins Hands with Schneider Electric to Develop Smart Microgrid Blockchain. Arensis, a decentralized energy systems provider, has joined hands with Schneider Electric, one of the biggest international microgrid development companies combining software, automation and energy, to develop a smart microgrid blockchain pilot program.. As part of the deal, the two firms will come together ... When that trust turns out to be misplaced, there is no recourse. If your bitcoin exchange gets hacked, you lose all of your money. If your bitcoin wallet gets hacked, you lose all of your money ... Crypto Trading – Rechtsanwalt berät bei Abzocke, Betrug und Manipulation. Daher gilt: Wer sich auf Crypto Trading einlässt, muss sich der Risiken bewusst sein, die mit dem digitalen Trading einhergehen.Gefahren sind nicht nur in den Währungen selbst begründet, sondern zum Teil auch in den Handelsplattformen für Crypto Trading.. Die Crypto Trading Anbieter sitzen teilweise im Ausland und ...

[index] [1461] [19079] [12905] [5123] [9544] [48707] [39626] [22031] [24676] [46744]

TOKEN : come sono fatti ? Blockchain Caffe

Spesso si parla di #token, ma come sono fatti? Per capire fino in fondo come sono realizzati e quindi cosa sono davvero, non c'è metodo migliore che farne uno (estremamente semplice) partendo ... This is a quick video I did for some friends who wanted to know how to move CryptoCurrencies in and out of wallets/exchanges/purchase houses. Breaking: Trustee Of Infamous Mt. Gox Denies BTC, BCH Sales Affected Crypto Markets The trustee of Mt. Gox – a once major and now defunct Bitcoin exchange – who reportedly sold over $400 mln ... Per conoscere il valore istantaneo di #bitcoin bastano poche righe di #python e conoscere le basi dell'uso delle #api messe a disposizione dagli #exchange. E' un primo semplice esperimendo, un ... Italian cryptocurrency exchange BitGrail loses $170 million BitGrail announced on its website that it lost $170 million to fraudulent transactions and that it has already reported them to ...

#