Bitcoin Lead Developer Gavin Andresen on Origins, Expectations, Projects & Pitfalls. Alan Reiner of Armory Wallet, Bitcoin powered Tor & Wi-Fi Nodes, And Feathercoin Lead Developer. Catch it all here for Let's Talk Bitcoin! Episode 015
BlockSettle Terminal - new light-weight bitcoin wallet with integrated trading model
The BlockSettle Terminal is an open-source desktop wallet that offers integrated non-custodial trading of bitcoin. The wallet is based on goatpig’s continued development of the Armory open-source stack. Wallet features: • BIP 32 (Hierarchical Deterministic) wallet(s) • Native Segwit, Nested Segwit, Legacy address support • Watching-Only wallets • Offline/Remote signing • Hardware Wallet support (Trezor / Ledger) • Network connectivity through remote or local server • Coin control • RBF/CPFP • Fee control • BIP 39 and Armory seed imports • Built-in blockchain explorer • Armory interoperability The trading model is a hybrid between centralized and decentralized platforms. In our model, the bitcoin leg is non-custodial (removing custody risk) while the fiat leg is centralized (in order to pool liquidity). Trading is currently limited to testnet while users get acquainted with the model. Trading features: • Request-for-Quote matching • OTC off exchange reporting • Encrypted chat • Products o Bitcoin vs fiat o Bitcoin vs Coloured Coin (coinjoin trading) o Fiat vs fiat (FX) Webpage: https://www.blocksettle.com/ Github: https://github.com/BlockSettle/terminalhttps://github.com/BlockSettle/BlockSettleDB CTO: goatpig https://bitcointalk.org/index.php?action=profile;u=7811
"You're fucking crazy John," the man in the black T-Shirt announced. "Seriously, you want to pretend to be a paedo, so you can lure in the FBI and fuck with them? That is some next level warped shit." "Chill out dude. That was just an example. Doesn't have to be a paedo." "I don't give a fuck. Anything that's gonna make them zero-day you is some dark shit that you can't just laugh off. And what if they chain the sploits? They'll bounce out of your sandbox and be kicking the door down in minutes." "No, no, it's ok. Really. I bought these laptops from a heroin addict in another city. Totally untraceable. I've had the lid off and de-soldered the camera, microphone and wireless." "That's no use, we've got to get online somehow. And when their payload fires they'll trace us through a ToR bypass." "That's why we need three laptops. Physical separation. This one," he tapped the metallic blue case, "is the bait. It's a regular laptop, but it's only connection is a single wired Ethernet. The only route to the Internet is via this one," tap tap, "which is running hardened Kali and only connects via ToR." "Seriously, you're going to actually do this?" "Come on dude, I've always wanted to try. Live a little." "What's the third one for?" "It's hardened Kali too. We proxy everything from the bait browser through here. When they deliver their exploit we'll catch it here, do some reverse engineering, and get ready for the fun bit!" "What the hell. But you're crazy man. And we never speak of this." "Of course. Goes without saying." "How do we start?" "You get a proxy running on that. I'll get the ToR connection set up. I got a 4G dongle off the same guy." John removed a small ethernet hub from his bag, connected its power but held off from plugging in the laptops. He connected the 4G dongle, started the ToR service and watch its status update. With the connection active he configured the iptables firewall so outbound traffic was permitted only through ToR. Cal started the intercepting proxy, exposed its listener and looked at John. "Ready" They both plugged into the hub, and Cal watched as John connected the bait laptop, accessed the proxy settings and linked it to the listener. He accessed a non-descript site to check the setup. It loaded a little slowly, while the series of requests popped up on the intercepting proxy. "Are we sure it's going through ToR?" Cal asked. "Don't worry". "Seriously, show me a packet trace." John started a sniffer, gestured to Cal to refresh the bait browser, while a series of packets scrolled up the screen, all safely encrypted by ToR. "So what now?" a pause "And definitely no paedo stuff. That's too dark to mess about with." "Old school," John replied, "I guess it's a bit of a cliche. We go on the dark net and try to order a murder for BitCoin. We'll make it an American prosecutor, that'll get the FBI going." Cal stared at him. But that didn't stop him typing and Cal watched with grim fascination as he navigated around dark net markets, registering accounts, searching vendors and sending onimous enquiries. Cal monitored the proxy, configuring ever more intricate filters to weed out the mundane. They'd crossed a line of no return and complicit Cal joined in, weaving convincing tales in their messages, striking the right tone to complete their deception. This went on for hours, with no sign of any incoming exploits. Until the browser popped up with "Do you want to allow this site to access WebGL?" "That's it," John smiled, "there's no way that site really uses WebGL. This is an exploit. Stands to reason too, we always knews that had huge attack surface." He was about to permit it, but Cal stopped him. "No, don't allow it. If we allow it, we'll just get a lame zero day that requires WebGL. Deny it and carry on. They'll send a better exploit soon enough." The intensity increased, Cal identified the malicious code that had tried to access WebGL. But it was just a stager - no exploit there. John carried on his ruse, until he noticed the browser stutter. He grabbed Cal's arm, "this is it!" Fear in the room intensified. This was serious now, some hacker - be it FBI or otherwise - had control of the laptop right in front of them. "Carry on with the messaging Cal. If we stop now they'll know our game." Cal typed into the bait laptop while John began to investigate the exploit delivery. He identified the malware quickly enough, and a lingering connection that could be to the command and control server. Alarmingly, it was transferring a lot of data in both directions, a detail he decided not to share with Cal. He loaded the malware into a binary analysis tool and begun the painstaking process of unpicking its workings. 20 minutes in he told Cal to stop. "That'll do. Sign off naturally and shut it down." Cal joined him with the binary anaysis and gradually they formed a picture of its armory. "It's not like one I've seen before," Cal said, "it's tighter coded than a typical rootkit. Really could be FBI." John nodded. "You can see it repeatedly copying this string. That's gotta be a heap spray. And it looks like self-decrypting machine code. Yeah, that's the payload for sure. We can just plug our own in here." "What if the exploit's been watermarked?" Cal interjected, "We don't know where they could have hidden one." "Who cares? We're gonna deliver it anonymously anyway." They worked industriously to decouple the exploit and payload, build a delivery mechanism, and soon they were ready to test it. They watched in delight as a fully-patched browser accessed their delivery site, churned the laptop's CPU, then registered a ping back on the console. The next step was to incorporate a real payload. "So what's it gonna do John?" "Persist itself to disk, then sit quietly and await further instructions. I've got the C&C software figured out already, it was a fun project from long ago. What I need you to do is use BitCoin to rent a couple of dozen virtual servers in different data centres around the world." As Cal started registering the servers, John used the third laptop to generate a public/private key pair. One by one, the servers came online, and John installed the C&C software, configuring each to only respond to instructions signed by their private key. On the 20th he told Cal to stop. There was a sparkle in his eyes. "We're nearly there! Everything's in place." "How are we going to deliver it?" "That's why we had to do this today. I found something earlier. A cache poisoning vulnerability on a major site." Cal stared at him. The chain was complete. This was not real. They completed their final maneouvers. Scripted a mechanism to dynamically generate payloads containing a random sample of C&C servers. Uploaded the exploit delivery mechanism into the control cloud, and generated a list of exploit URLs. John accessed the vulnerable major site, saved the HTML code locally, and modified it to include an exploit URL. Then he exploited the cache poisoning flaw, so that every visitor - at least every visitor coming through that particular cache cluster - would receive not the legitimate site but his malicious modificiations. They watched the C&C management console. Around the world, thousands of unsuspecting web users experienced an annoying pause while their web pages loaded. Each time, under the hood, the zero day exploit fired, the payload persisted itself to disk, and made a connection to their C&C network to receive further instructions. Each time a new node joined their botnet, a line was logged to their console, and soon the screen was scrolling uncontrollably. John was elated, Cal terrified. Cal watched in horror as John repeated the cache poison process across multiple clusters in different data centres. The rate of scrolling on the C&C console exploded. John cancelled it with a smile. "Lets just look at the numbers" Running a grep count on the log showed over 900,000 payload activations. And their malware had been live for barely 15 minutes. "What are you going to do with it?" "That's for another day. Now, we cover our tracks." John removed two USB drives from his bag. He created an encrypted container, and into it put his decoy. Some nudes of an office chick that had been circulating. Incriminating enough, but not the crown jewels. He then created a hidden container within the free space of the first container, using a very strong password. Into this hidden container he copied the private key for the C&C network. This key put him in control. The only way to control the botnot was having both the USB drive, and his strong password. He repeated the process for Cal, inviting him to choose his own passwords. When he handed over the drive, Cal held it like it was on fire. He shut down the bait laptop, gesturing Cal to do the same with the proxy. Removed the hard drive and connected it via USB to the ToR relay. The ToR relay was unlikely to have been compromised that night, a trustworthy system he could use to erase the others. After a secure erase of both drives, then of the ToR relay itself, John started putting everything in a bag. They left the hotel room in silence. Bag on the rear seat and John drove. Cal was acutely aware of the USB drive in his pocket, the angled corners pressing into his leg. He went out of town, down lanes Cal didn't recognise, and stopped by a chain link fence. They both got out, John retrieved the bag, and with a big hurl, launched it over the fence into the landfill. Back home, John smoked a large joint of double zero hash and fell fast asleep. He awoke a few hours later. It almost felt like a dream. But he ran his fingers along the USB drive and remembered the sheer power it contained.
From the GRS discord: BCG came and people discoverd that is has the same qualities as VTC But then not premined and ASIC resistent Then people started looking for more ASIC resistent coins and came to GRS VTC has a great dev team and now people are seeing that GRS has developed a lot further then VTC Then this list came with GRS First coin with SegWit Only coin that has succesfully ported Bitcoin Armory Only coin that have over 40 Electrum servers. One of the few coins that have a Ubuntu PPA available One of the few coins that is officially maintained by the Bitcoin Debian packaging team Only coin that has succesfully ported Multibit HD We have 10 different Android wallets. Most struggle to have just 1. We have 9 different Blackberry wallets. Most dont have any. One of the few coins that have an ios wallet We have over 10 different desktop wallets Only coin that has ported Samourai and thus succesfully implemented BIP147. You can work with payment channels with Groestlcoin. One of the few coins where you can play with OP_HOLD, RBF and other new features Only coin that has ported electrum client to java One of the few coins that has ported rushwallet.com Only coin with over 100 repositories with developed work. Only coin that is capable of sending GRS over SMS Only coin that has wallets which can use NFC tags as encryption key. Only coin that has ported Msigna. Only coin that has ported sentinel. Only coin that is still being compiled with Visual Studio (like Satoshi himself did) We got now also 2 ios wallets We got 1 more android and 1 more blackberry wallet We have a working testnet We got a testnet android and blackberry wallet We got a chrome os wallet We got 2 new webwallets We got tor support for our electrum since january 2017 We got 40 tor servers VTC jumped from 0.60 usd to 4usd in two weeks (my guess is partially thanks to the btc fork) GRS is now only 0.12usd And all these have SW, LN and AS TLDR: GRS is very well developed.
Waiting on your BTC to go through? Vendor taking their sweet time getting back to your PM? Here's a list of working (as of 26/01/2014) .onion links you can visit while you wait. Most are not illegal, although none are CP.
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network;
leave no trace on the computer you are using unless you ask it explicitly;
use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
Our community suffers from security measures being to difficult to access. Without access to an offline computer and printer, it would be nice to have tools to create bitcoin vaults on anyone's computers using available tech. Can we fork Tails to provide a distro with Bitcoin tools?
Offline archives of bitaddress and/or bitcoinpaperwallet tools. These are useful especially for dealing with BIP38 encrypted keys used for crypto cards.
Allow for easy customization and addition of tools?
It would be incredibly liberating to hold your funds on a bootable USB with relative safety. To prevent disaster from a physical malfunction, the wallet inside an encrypted (truecrypt) container could be safely kept on the cloud. This would compliment cold storage This helps paper wallets and methods such as CryptoCards. Since opening these cold storages on a normal computer would reduce the security of your cold storage, using a secure bootable environment would allow you to manage your funds more safely. Could this raise security or does it suffer a flaw that prevent's it's usefulness? I'd love to hear your guys input on this. We very much need relatively easy to use tools that promote security and independence of need for 3rd parties.
Hey guys, I know there are a lot of noobs on this sub who are always asking the same questions as me but if you could take the time to help me out I'd greatly appreciate it. So, my friend and I want to try LSD. I intend to order some off Abraxas. Now, the only way I can get bitcoin is through using a debit card that's in my own name on Circle, then transferring it to my wallet. For a wallet I use Armory since it just seemed like one of the safer ones. If I use Tor and a public wifi, and then send it to my friend's house in his name (he lives in a rural area if that matters), then should I have any major worries about getting caught? I'm not as tech savvy as I wish I was, and so I realize that I might be making my self look like a real dumbass, but is there anything else I need to insure my safety, or am I probably good with that? I thank you in advance for your time.
"The Correct Strategy of Bitcoin Entrepreneurship" by Daniel Krawisz | Satoshi Nakamoto Institute Mempool
The Correct Strategy of Bitcoin Entrepreneurship by Daniel Krawisz We're All in This Together Bitcoin entrepreneurs have yet to appreciate fully collaborative nature of the Bitcoin economy and its implications for entrepreneurial strategy. Every successful entrepreneurial act improves the Bitcoin economy and attracts more people in, thus raising the value of the coins. Each new service benefits everyone else who is already invested. Consequently, Bitcoin businesses do not necessarily need to see themselves as competitors to one another. Even if they have the same business model, they both have more to gain from the influx of new users from outside than by taking customers from one another. Furthermore, the growth of any Bitcoin business is limited ultimately by the growth of Bitcoin itself. Since the number of coins is strictly capped, the currency must grow with its price. This means that few business can be expected to earn a much better return than the coin itself over time. Entrepreneurs should therefore invest in coins, not businesses, because coins are where the profit is. In addition, if Bitcoin fails, then the Bitcoin businesses fail—so Bitcoin is less risky than any Bitcoin business too. Thus, Bitcoin entrepreneurs should be less interested in making money than in making bitcoins into money. An entrepreneur who follows that precept should generally be expected to be more successful than otherwise because the potential for Bitcoin itself is so much greater than any Bitcoin business he could invest in. Of course, Bitcoin cannot succeed without businesses, or at least some sort of entrepreneurship. What is the best way to fund ventures in an environment in which they are relatively poor investments? The trick, I propose, is to think of these ventures more as donations to the Bitcoin economy than as profit-seeking ventures. Any useful Bitcoin service will tend to make the Bitcoin price increase because it adds value to the network. It may, therefore, be perfectly rational for a Bitcoin investor to contribute the service to the economy for free. Furthermore, the success of such a business being desired by everyone who holds coins, such a business can be run more like a non-profit or open-source project than an business. Thus, a new venture may attract investment even if it is not profitable as long as it provides a service the Bitcoin world needs. In mid 2013 Armory, an open-source Bitcoin wallet project, received $600k in seed funding without even though nobody knows how it will eventually be monetized. These people have the right idea, but they shouldn't try to monetize it at all—it is obviously making all the coins more valuable. Don't be a venture capitalist—be a speculative philanthropist. Labor Is Scarcer than Ideas The task ahead of us is monumental—the construction of a new financial economy to replace the one built around the national currencies. This will take a lot of work. Unfortunately, a lot of work is being wasted right now. The venture capitalists are looking to invest in a sharp team with a cool idea but the group of people that matters most is the entire network of Bitcoin users, and the idea that matters most is Bitcoin itself. Big new ideas get hyped up almost every week around here, and the Bitcoin economy will work a lot better if people would try harder to ignore them. There are lots of business ideas floating around and limited time to create them. Only ideas that have a very high probably of being an important part of the future Bitcoin economy should be implemented because that is all we have time for and those are the only ideas worth risking Bitcoins on. The proof that ideas aren't scarce is that anybody can make his own altcoin at any time. Already there are hundreds, and every one of them a bad idea from people who don't understand the cumulative benefits of cooperation. Since entrepreneurs don't understand Bitcoin very well yet, it is easy to dazzle them with technobabble and funnel investment into flawed projects like Protoshares, Mastercoin, and Ethereum that have a very low probability of furthering Bitcoin adoption to any significant degree. There is no real reason to keep secrets because the more that everyone knows about what everyone else is doing, the more easily they can decide what the Bitcoin economy most needs of them. Everything about a business can be done openly for the benefit of the entire industry. Product development, future plans, market research, finances; everything except private customer data, which shouldn't be collected anyway, and, in the case of illegal Tor businesses, the real identities and locations of the owners. We need open business and open businesses. Entrepreneurship as a Collaborative Scientific Enterprise In an open-business world, less experimentation is necessary to produce a workable system than among other businesses because there is no reason to keep secrets from one another. All trial-and-error should immediately benefit all the other Bitcoin entrepreneurs so that everyone can more easily figure out the most effective way to work. Open business as a generally accepted best practice would have eliminated terrible businesses like MtGox and Butterfly Labs early on. But even that would have been too late. Everything possible should be done to try to eliminate ideas before they can turn into failed businesses. That means sharing all ideas with the community, and investing in nothing that does not already have widespread community support. Much of the Bitcoin world already works very openly. Lots of terrible ideas get shot down all the time in the Bitcointalk.com forums. All the software is open source. However, more is required: Bitcoin entrepreneurship should be run more like scientific research than a gold rush or an Internet bubble. There should be open research into the future Bitcoin economy, complete with peer review and consensus over which ideas are the most useful and important. Investment should focus on ideas that already have been vetted by the community. It should be considered reprehensible for startups to inventtheir own cryptographic algorithms. It is too much of a waste of resources to test ideas in experiments with real businesses. All business models ought to be carefully critiqued beforehand and only the most necessary ones that we have time for should be created. This is not central planning; it is consensus-based entrepreneurship. No one shall be forced to follow any idea at all; it is simply in everyone's best interest to cooperate. If I am right, then soon investors will learn to back only heavily vetted ideas and entrepreneurs will it as well. In the early Renaissance, mathematics was practiced in secret and mathematicians carefully guarded their own discoveries because a mathematicians' career depended on being able to show patrons that he could solve problems other mathematicians could not. However, in 1545, Gerolamo Cardano sparked a new trend with Ars Magna, the first published work to include the general solutions of the cubic and quartic equations. He even included secret work (with citation) by Niccolò Fontana Tartaglia, which whom Cardano had promised not to reveal. Gradually, mathematics transformed into a tradition characterized by publication rather than secrets. Open-access publishing is now demanded. Entrepreneurship is in its Renaissance still. Conclusion In a low-growth economy, one grows rich by carefully leveraging one's skills and assets so as to negotiate the most profitable trades. In other words, wealth comes from performing better than everyone else. It makes sense to guard closely any edge that one might have. Whereas in a high-growth economy, wealth comes from doing as well as everyone else. It is more difficult to improve one's state relative to everyone else than to enjoy the overall growth that improves everybody's state. The Bitcoin world understands this instinctively, but needs to take it to its logical conclusion. The entire Bitcoin economy needs to be open-sourced. This is how to make Bitcoin succeed most quickly and with the least effort, which is the best outcome for everyone. Let's get to work.  In a post-singularity world, everything should be expected to grow at a phenomenal rate, similar to the growth of the Bitcoin economy today. Thus, I would expect the attitude of sharing and collaboration should apply generally.↩
Initial Armory Sync taking over 5 days now?? I have BTC stuck in Purgatory. Advice??
Hi everyone! I'm reaching out to reddit on this one, as I am a noob at bitcoin, the blockchain, and apparently choosing the appropriate wallets for my little and insignificant BTC transactions. To start, this is my first transaction ever with BTC. I purchased funds from coinbase and sent them over to an Electrum wallet I had set up through the clearnet. I started reading forums and apparently went with some bad advice as to setting up a secondary wallet through tor and transferring my coin to it as a means to further anonymize my bitcoin. It was then also recommended that I use Armory as they have a reputation for being secure. So this I did. I set up a secondary Armory wallet over tor (which later found out isn't very secure at all, depending on who controls those exit nodes) and then foolishly initiated a transfer prior to even beginning the ledger download, ridiculously long initialization process I was soon to find out needed to be done/should have been done beforehand. I obviously am now eating crow for not being nearly as versed on or prepared for this transaction before jumping in, nose first. Ok so now my questions are these... My OS (with good CPU, 4 gb RAM, excellent bandwidth) has been in the verification process for going on 5 days now and currently at 83% of the Initializing Bitcoin Engine phase. I've only been creeping at maybe a 3% gain per day. Is this bc I set up the wallet through tor? Is there any fix that I can use to speed this up? Also, will my coin even be available anymore and show up in my wallet if and when I finally do get back online?? Obviously I'm feeling most idiotic at the moment for this and I really appreciate ANY advice I can be given on the subject. I'm now aware that I should have never gone with such a heavy wallet for my small-time bitcoin to begin with. But I just don't know where to go from here. Thanks for reading guys...
FreeSpeechMe-SPECIFIC IMPROVEMENTS WE PLAN TO DO: Hide nmcontrol/namecoind windows on Windows GNU/Linux users don't see the terminal windows for backend software; Windows users shouldn't be bothered by them either. Don't try to visit .bit websites when blockchain isn't downloaded Right now, visiting a .bit website with an incomplete blockchain will use an older version of that name's data. Usually this results in a failure to load the page with no good explanation of what's wrong, but in certain rare cases it could also hypothetically result in security issues such as hijacking. A better version of FreeSpeechMe should refuse to use incomplete blockchains. Facilitate non-Firefox usage FreeSpeechMe uses a networking method, HTTP, which is specific to website traffic. Replacing it with a different method, SOCKS, would make it much more flexible, so you could use Dot-Bit for non-website Internet applications such as SSH. It should also be possible to route other web browsers such as Chromium through FreeSpeechMe. FreeSpeechMe should support being installed as a standalone application for users who don't use Firefox (although obviously Firefox will remain the main method of installation). Improvements for anonymous browsing Right now FreeSpeechMe supports routing its traffic through anonymization proxies such as Tor and I2P (if they are installed), but it is not compatible with TorBrowser, so while attackers generally can't see your location or IP address, they can deduce that different activities you do online may have come from the same person. FreeSpeechMe should be improved to function in TorBrowser, which would prevent linkage of different online activities. Improvements for anonymous hosting FreeSpeechMe supports Tor and I2P hidden services (if the user has Tor or I2P installed), but does not support Freenet, OnionCat, GarliCat, or other anonymous hosting networks. This should be improved. Support for next-gen TLS specification FreeSpeechMe is using a method of specifying certificates to prevent hijacking which is deprecated in the Dot-Bit specification. While this method remains very secure, the newer specification has more features, and FreeSpeechMe should implement it. HTTPS enforcement Websites which claim to support HTTPS in their domain record should automatically be loaded in HTTPS, even if the user accidentally forgets the "s", to prevent hijacking in such cases. (Note for geeks: this is like the HSTS specification, but works even for sites you haven't visited before.) Intelligent Redirecting Websites that want to support Dot-Bit should be able to do so without changing their server configuration, and instead have FreeSpeechMe make the server think the preexisting domain is being requested. The user would still see the Dot-Bit URL in Firefox, and unlike iframe-based methods, the URL displayed in Firefox would change accordingly as the user clicks links.. Fix HTTP protocol bugs Unencrypted HTTP Dot-Bit websites occasionally have odd behavior in FreeSpeechMe (sometimes manifesting as links not working properly); this is most frequently seen in WordPress websites. While we strongly encourage the use of HTTPS (which isn't subject to these bugs), we still want to fix the bugs with HTTP websites. Round-Robin Load Balancing Some large websites use multiple server IP addresses for a single domain. FreeSpeechMe should be able to randomly choose one. OTHER NAMECOIN SOFTWARE IMPROVEMENTS Some of this is possibly out of the scope of this one Indiegogo campaign, depending on funds raised. But these are things we're very interested in helping implement: Rebase on the latest Bitcoin code Namecoin is based on an outdated version of Bitcoin (0.3.x). We should rebase on a current release. We inquired with a well-qualified and well-respected contractor (who developed Namecoin-Qt) about how much this rebase would cost; the estimate was around $17,000-$35,000 US. Spending that much on one project would be out of the realm of this first campaign. However, it may be possible to reduce this cost significantly by rebasing on a codebase other than Bitcoin, such as libcoin. Improve scalability Namecoin currently requires having the entire blockchain for good security. While the 1.6GB blockchain isn't a large concern right now, future scalability requires that clients be able to securely resolve names without possessing the blockchain. There is a proposal for this called SPV+UTXO. Automatic renewal of names Losing your names because you forgot to renew them is a problem. Names should be able to be renewed automatically. Preferably without decrypting the wallet each time the name is renewed, and maybe without even needing your client to be open when it renews. Any solution must be trust-free. Cold storage of Namecoin name keys To update a Namecoin name, the keys must be decrypted on a computer with Internet access; this could be a security risk if malware is installed on that computer. To fix this, cold storage should be used, as is possible with Bitcoin. This is in two parts: (1) port the Armory client to Namecoin (this allows transactions to be signed offline), and (2) allow a cold-storage name to be used as a revocation key for a hot-wallet name (this is called the "import" field). Optimize Speed Dot-Bit is already much faster than other top-level domains for both name lookup and name propagation. However, it can be made even faster. We estimate that pre-cached name lookup time can be decreased by 2- to 5-fold in some cases, uncached name lookup time can be decreased significantly, name update propagation can be reduced from 40 minutes to under 1 minute, and blockchain sync time can be reduced significantly. Android support Namecoin software currently does not support Android; this situation should be improved. Better blockchain anonymity Like Bitcoin, Namecoin can keep the location and IP address of name owners anonymous (if used with Tor), but the various activities of name owners can be linked by an attacker. This should be improved, e.g. by implementing Zerocoin. Better blockchain privacy Some name owners may wish their records to not be publicly accessible; encryption would improve this situation. Decentralized website single sign-on Namecoin can be used to log into websites in a secure way without needing a password (protecting people from database leaks or cracked passwords without trusting a third party such as "all your data are belong to us" systems like Facebook); this is implemented as the NameID library by domob. Unfortunately, this library is not easy for non-programmers to integrate with existing websites. Plugins should be created for major website backends such as Drupal, phpBB, WordPress, and SMF, to allow trust-free NameID sign-on to be as easy as checking a box. Automated builds Namecoin software should support automated builds and testing so that our developers and testers can work more efficiently. The builds should also be deterministic (as Bitcoin and Tor are doing) to improve security. Offline signing of static websites Verifying signatures of static websites against the blockchain would prevent hijacking even if a web server is completely compromised. SSH client integration Log into your servers remotely without trusting your network or manually verifying fingerprints, using the same anti-hijacking features that FreeSpeechMe first implemented.
Estimated total time: Up to 2 hours, not including blockchain downloading. You can install this on a VPS, a spare PC, or on your own PC. You can install it in Virtualbox on your own PC, or into Windows. If you just want to try it out, I recommend installing in Virtualbox.
After installing Ubuntu in Virtualbox, to make it fullscreen you will need Guest Additions. Run these commands by clicking on the swirl icon top right, typing ter and opening Terminal: sudo apt-get install build-essentials module-assistant and then sudo m-a prepare Before selecting Devices > Insert Guest Additions CD image, telling Ubuntu to install them, and shutting down. //Thanks go to http://www.binarytides.com/vbox-guest-additions-ubuntu-14-04 for those instructions.//
Next I went into the Virtual Machines settings and changed Network Adapter 1 to be "Attached to Bridged Network" instead of "Attached to NAT".
After booting the machine back up, I followed the steps here: https://bitcoin.org/en/full-node/#linux-instructions And installed both bitcoin-qt and bitcoind. Skip over the parts where you edit bitcoin-qt's settings to start at boot, or edit cron to start bitcoind at boot, since this will interfere with using armory.
I then started up Armory in Offline Mode by clicking on the swirl icon top left and typing Armory. In the program, after clicking Skip, I scrolled down slightly, clicked on Download Bitcoin, Download, and agreed to let it do whatever it wanted to; (which was download and install Satoshi).
I then closed Armory Offline and opened Armory, which began downloading the blockchain from a torrent. I then went into File > Settings (top left of your screen, near the swirl; menu options will appear once the mouse hits that taskbar) and personally chose to Disable OS and version reporting. There is a setting here for "Enable settings for proxies/Tor" but I haven't ticked it yet, since I haven't set Tor up.
Should I add a user to run bitcoin as, and should that user be on the sudoers list or not (this is the list of users that can type sudo and then after authenticating run most commands an administrator account can).
Will Armory or bitcoind start on boot? Do I need to login for this to happen? I know I missed the above steps in bitnodes guide regarding starting up bitcoin-qt or bitcoind on boot, this was because it seemed to prevent me from opening Armory (it would report bitcoin-qt or bitcoind were already running).
How can I broadcast transactions over Tor.
If I want to broadcast transactions over Tor, but not receive incoming connections over Tor, is that a problem for the health of the Bitcoin Tor network? Or will those transactions be broadcast out to "clearnet" nodes, as opposed to hidden ones?
What tweaks can I make to bitcoin.conf? I don't even know how to tweak it, I'd like to provide some connection slots to testnet if I'm not already. Since I'm using armory I don't know if it'll be bitcoind or armory will need configuring (I think it's bitcoind).
Thanks to all writers of articles referenced here for your help. By the way, even if you don't want to run a bitcoin node full time, I've read that running one even 6 hours a day is useful. These are instructions for ubuntu but you can also run it from Windows on the same machine you work on (I don't know about privacy implications). Perhaps someone should write an article about running a bitcoin node on your PC at work!
[Table] IAmA: I am Wired contributor Joshuah Bearman, and I just published Part 2 of a 20,000-word story on the Rise and Fall of Silk Road. (I also wrote the story that became Argo, which was exciting.) I'm sure people have questions about Silk Road. AMA!
Verified?(This bot cannot verify AMAs just yet) Date: 2015-05-14 Link to submission (Has self-text)
Good question. Yes, I think the trial was fair. My personal opinion is that Ross' lawyer mounted a peripatetic and somewhat ineffective defense. Not sure what a better defense would have been, but there were some clear missteps.
And again, the evidence was overwhelming. Court beat reporters and law enforcement professionals alike who got anywhere near that case or the trial all said that they had never seen such clear evidence of a criminal conspiracy.
The only way Ross is innocent is if the FBI planted it all. Which would have taken some doing. There was 1TB of information on his drive. Thousands of files. Hundreds directly about the Silk Road. Many of which were entered into evidence. The FBI would have had to fabricate them all -- including a diary full of intimate detail about Ross' personal life that they couldn't really have known -- for that argument to hold any water.
And, incidentally -- even if that were true, the defense said that would only explain the period he supposedly handed off Silk Road to someone else. They admitted he created it, and was running it at the end. Both of which also constituted the crimes he was charged with. So the multiple DPR theory and/or conspiratorial notion of the FBI planting evidence wouldn't even clear Ross of the charges.
Good question. And I don't think legal lines were crossed. For it to be illegal, the FBI would have had to break the functionality of the site -- the statutory definition -- and there's no evidence that occurred. Although yes, I entertained the possibility. As I described in another response, I see why there is so much speculation. It's a key point. And it relates to the much bigger and very important issue of electronic privacy. But the theorists about the hack don't suggest how the server was hacked. They just say that the server could not have been accidentally discovered. Everyone seems adamant about this, despite the fact that Ross himself wrote that he leaked the IP at times. And users posted publicly about that as well. Ross wasn't a programmer. The Occam's razor explanation is the one provided by the government, not the theorists of the hack: Ross made a mistake.
Well, I will admit I wasn't so hot on this story at first. Started working on it with Josh Davis, and it's more in his realm. But then, he started working on other things, I got these reporting breakthroughs, and then got sucked in to the piece, realizing along the way, that it had the makings of a non-fiction novella, which is how I tried to write it.
The story kept getting more interesting. The zeitgeist of it, and the cops and robbers element were a solid foundation -- but the emotional story was what drew me in.
The transformation of the characters and the ideas. From youthful vigor into cynical narcissism. From "do no harm" to "change the order to execute." Even though it played out in a technological realm, it felt like a deeply human story.
That's a good question. My story included Variety Jones in its longer version, when it was a 30,000 word (!) manuscript. But, it got complicated, for narrative purposes, to explain that relationship as space got tight. I mean, the story is already the longest Wired has ever published, and he just didn't have that much more room.
That said, Variety Jones/cimon clearly played an important role. He wasn't another user of the DPR handle, but he helped Ross conceptualize his role as leader. And he guided Ross toward the moral Rubicon of hiring a hit man. Variety Jones was the Silk Road's Rasputin, whispering into the Czar's ear.
Also like Rasputin, hard to take down! Not sure why he hasn't been caught. Although I suspect that he will eventually.
I realize that this is a controversial point. (Although even if the server was "hacked," it does not actually exculpate Ross.) And I understand why people are attracted to the theory of the hack. But no one has provided any substantiated account of what this hack would have been. There were no tools to "hack" Tor. It's all speculation, and theorizing. And yet, Ross wrote in his diary that he leaked the IP. Many people noted on Reddit that the Silk Road leaked the IP at times. Ross was not a professional programmer, as we know. The simplest explanation is that he made mistakes -- as he did many other areas of operational security -- and the feds got lucky and exploited them.
That's a GOOD QUESTION. I did consider that it was plausible, but that was before I saw the evidence. It is just overwhelming. Ross admitted to starting Silk Road. He was arrested while logged into the admin panel as /mastermind. He claims that in the meantime the site was run by someone else. But his own diary, chat logs, and various other records (like a spreadsheet showing Silk Road assets) found on his computer, show that he was running it the whole time.
Moreover, it was demonstrated at the trial that during the time Ross claimed that someone else ran Silk Road, he was receiving all of the bitcoin commissions from the Silk Road escrow account. So that makes it fairly impossible for anyone else to have been DPR.
THANKS! I appreciate it. Man, it was a beast to report and write. But rewarding to get a huge story like this into Wired, in two parts even.
As for a film adaptation, this story has been optioned. And efforts are underway. I was struck while writing this story how it hit the zeitgeist of our time, with drugs and entrepreneurialism and youthful idealism, and also underlined some deep, resonant themes about how we live now, mediated through the digital world, and fragmented identity -- all within the quick-moving narrative of a true crime case. I think that could make for a great movie. As I said somewhere in the story, sort of a true crime version of The Social Network.
I think the War on Drugs is a failure. An expensive one. And broadly favor decriminalization. Although I haven't given real thought to whether that should extend to opiates, etc.
Also, the drug laws have led to massive incarceration, and helped destroy an urban generation. So, in that sense, I sympathize with that part of the Silk Road (and Ross') early philosophy. The problem, of course, was when that idealism turned into ideology. And it became a criminal enterprise rather than just a political idea.
1) Yes, the hype was a radical over-simplification. Silk Road was mostly drugs. And some odd ordinary items, like you'd find on eBay. The rules prohibited anything that would harm someone else, like identity theft stuff. (Although sometimes that stuff wound up on there anyhow.) There was no child porn. There were no guns, although DPR created the short-lived Armory, for that express purpose.
2) Yes. I think so. Had he known how big it would become, had tight op-sec from the beginning, and been a professional programmer, rather than learning along the way, Silk Road might very well still be operating, its servers undetected.
No personal effect, other than people seem to like the story! I did have to be very careful, obviously, with law enforcement info. You can veer close to subpoenas with reporting like this. I had never done that kind of reporting before. I also had to keep the confidence of sources from inside Silk Road. That was just as important to protect.
And for the most part, there's been little criticism of the story. I hope that's because it was so exhaustively reported! And fact-checked, and edited, and reviewed by lawyers, etc.
Last updated: 2015-05-18 17:50 UTC This post was generated by a robot! Send all complaints to epsy.
This is a smart question and demands a much longer answer than i can give here. but the short of it in my opinion is that it's a misunderstanding to assume it's harder for 'middle class artists' in this climate. it's always been very very hard. there have always been obstacles and gatekeepers. the digital landscape has opened many many doors and closed some doors. it's in many ways easier, but you still need that magic combo of talent, tenacity and luck.
Haha. not an offensive question at all. I quit acting professionally in 94, after Freaked to focus on writing and directing. I'd been acting professionally since I was 10 years old and I wanted out of the public eye. It's really only been in the last couple of years that i've intentionally been slipping back in front of the camera. But I think it's important for child actors to spend time away from constant exposure. I tell a lot of kids this in that field.
Both BnT movies were made independently. The first one was really low budget and kind of under the radar when we made it. then it sat on a shelf for a year after being made, when the producing company went belly up. So we kind of gave up on it. Then it was bought up and released and was a big hit :)
I first got interested in Bitcoin in '09, when it magically appeared out of the ether. Much like Napster appeared out of nowhere 10 years prior. I recognized that Bitcoin felt like the next big thing to come out of peer-to-peer.
Absolutely not. SR accounts for a tiny fraction of TOR use and is not going to impact Bitcoin much either in the long run. As Wozniak so perfectly put it, you don't shut down the whole highway when one car is speeding.
Having dirt kicked into my eyes by the two Coreys in my death scene. Actually it wasn't funny at the time; i had full eye contacts in and my cornea got scratched. had to go the hospital. Loved those guys tho...
Because, like the Napster story, there is a lot of noise but not a lot of context. I think we need some context and our film will be one form of providing that. We are using Kickstarter for some of the funding in order to begin to build our community for the film. We want people's input, the changes occurring through the Web are part of a global movement.
Our doc is an expansive examination of a movement that began decades ago and is now hitting a peak of global impact. we are interviewing the core players in this story. It's not the kind of thing news articles do in any capacity. join our kickstarter, be part of the process and of the movie's community :)
The Deep Web lies at the heart of the digital revolution, that has impacted every corner of our lives. There are huge changes that have occurred in the last decade, and many more around the corner. Examining the Deep Web in detail allows us to closely examine this revolution and its implications.
No one knows where it will settle. It's not unlike gold in this regard. But once it's been around a bit longer and more people are taking it, the value will increase within that framework but not in such a wild manner. this form of currency is here to stay, of that there is no question.
There is a lot of dark and horrible stuff in the Dark Web. The Deep Web is a much broader world, and in my view needs to be understood as separate from the much smaller Dark Web, and in need of protection.
Hah, thanks for asking! I actually went to NYU film school to study directing before I acted in all the movies. It's always been one of my passions. I started directing professionally in about 86. Shooting music videos and commercials and then our show on MTV, The Idiot Box.
I have been interested in global web-based communities and emerging technologies since the mid 80's. There is a revolution occurring in global culture at the moment, that will change everything. and it's only just beginning. what's not interesting about that?? :)
I think the current media spin has that effect; in that it tends to paint the entire deep web and bitcoins and cryptography with a negative brush. this is both inaccurate and destructive. Our movie does not paint dark things in a positive light, it gives context to the entire arena.
I love the chili's and have known them for decades. they are still great, but in the mid 80's when I had the fortune of doing some work with them, it is hard to quantify how amazing they were. the best live act on the road, by far!!
You don't have to wait if you join our Kickstarter and become part of the making of the movie! It is hardly public knowledge as no one has framed this story up yet in one film, and the story itself is unfolding every day. :)
The Deep Web is being demonized somewhat in the press, which is a misunderstanding of what it is. DW represents all content on the web that is not indexed. this doesn't mean people are doing bad things. it means they are unseen. the Dark Web is a term that has come to characterize people who use the web for illicit means. the dark web represents a fraction of the Deep Web.
BitCoin is a peer to peer crypto-currency. Like any peer to peer technology it is decentralized and operated by a wide user base spread across the net. As such it is here to stay, and being an unregulated currency that exists outside the control of banks and governments, it is poised to have a massive impact on the world. That's what I mean :)
Question 1: I am absolutely not only focusing on the dark side of the Deep Web. In fact one of my key points is that the Deep Web is misrepresented, and inaccurately represented. It is mostly just a reference to all the content on the web that is not indexed. Most of which is not dark and a lot of which is frankly boring private data :)
2: We will absolutely be accepting BTC for the movie. But Kickstarter does not accept BTC so we are doing that separately. Stay tuned!
3: Yes the bias is a big problem and we will debunk the myths, just as I did with Downloaded. People like to hold onto their preconceptions tho, so I have no illusions about turning the world around :) A lot of people loved my Napster movie, but there were many in the mainstream press who were outraged that I didn't spend more time castigating the Napster architects for being thieves who created piracy software, when clearly that is not the truth, just the well-spun myth. but myths die hard.
It's a really fascinating case that is unfolding and changing constantly. No one knows the full story at the moment outside of the Feds, and I'm sure they're chasing some crazy leads trying to iron it all out!
Wow that is some ancient history! Yes when I was five my brother and I got into a fight and someone hit the tv with their body, hard (such is the way of fraternal skirmishes, my bro and I have actually always been super close). We didn't know we had blown some of the electricals inside the TV and the next time it was turned on it exploded into flames (for real!) and burned the whole house down (totally true story!!)
Sorry. truly. We didn't shoot there, we shot it in Phoenix, so I never thought about San Dimas one way or the other. Until many years later I made the mistake of taking my kids to the water park there without thinking about it. Very very very VERY big mistake for "Bill" to waltz into a water park in San Dimas...
Armory Bitcoin Qt And Tor For Mac Download • MultiSig account: It is a new feature wherein multiple private keys can be set-up for a single Bitcoin address. This enables users to set-up a shared account that needs private keys from multiple people to confirm a transaction. This adds an extra layer of security for corporate/family-sharing accounts. • Backup features: The wallet should ... Full nodes relay transactions for other programs on the Bitcoin network, so by running Armory on Tor, you help other people send their transactions with possibly-improved privacy. Sending your own transactions through Tor with Armory can help prevent anyone from associating your IP address with your transaction, possibly improving your privacy. Armory Armory is an advanced Bitcoin client that expands its features for Bitcoin power users. It offers many backup and encryption features, and it allows secure cold-storage on offline computers. Features: Full Node × Full Node: Some wallets fully validate transactions and blocks. Almost all full nodes help the network by accepting transactions and blocks from other full nodes, validating ... Tor is a distributed 'onion' network, that makes it more difficult for an adversary to track any one peer on the network. Tor also is very useful to access the 'uncensored' internet in countries such as China and Iran. Bitcoin's security model assumes that your node is well connected to the rest of the network, so even in less-censored countries using bitcoin over both Tor and clearnet can ... Bitcoin Armory. Python-based fully-featured Bitcoin Wallet Software. Releases; Documentation. Building From Source; Verify Binaries; Pathing; FAQ; Contribute. Armory To-Do list; Website To-Do list ; Contact Us; About; Armory 0.96.5 Released. This release is a minor release introducing many bug fixes and some new features. Full changelog Added. You can now set the database path from the ...
The Crypto Dad shows you how to buy bitcoin. We go through downloading (with verification) and installing the electrum bitcoin wallet. Then we go the Coinbas... Discord (Krowns Crypto Cave) - https://discord.gg/hzKU7qe Twitter - https://twitter.com/krowncryptocave?lang=en https://krowntrading.net/ - The digital hub o... Bitcoin Armory Setup - Duration: 14:37. Bitcoin Nick Rambos 4,490 views. 14:37. How to make a Bitcoin Paper Wallet - Duration: 9:25. BTC Sessions Recommended for you. 9:25. JAVA - How To Design ... In this tutorial we are going to get our private keys from the bitcoin core wallet. This only works when you created the bitcoin address in the same wallet. ... 20 The Silk Road Bitcoin Tor - Peter McCormack - Duration: 79 seconds. 12 views; 2 weeks ago; 1:29. 19 Four Horsemen Of The Middle Class Apocalypse - Jeff Vandroux - Duration: 89 seconds. 17 views ...