As was foretold, we've added advertisements to the forums! If you have questions, or if you encounter any bugs, please visit this thread: https://forums.penny-arcade.com/discussion/240191/forum-advertisement-faq-and-reports-thread/
Options

[Crypto and NFTs and associated garbage] Still can't figure out good uses for Blockchain

19899100101102104»

Posts

  • Options
    Commander ZoomCommander Zoom Registered User regular
    since crypto still stubbornly refuses to die (completely), shall we have a new thread? or just keep adding onto this one, like The Blockchain?

  • Options
    TetraNitroCubaneTetraNitroCubane The Djinnerator At the bottom of a bottleRegistered User regular
    Cross-posting from the Social Media thread, but:

    Reddit is getting in on the crypto shit. This is ostensibly why they murdered their other paid options without warning recently.
    Community Points are the first step towards a better future for online communities. In order to be truly independent from platforms like Reddit, communities need to be owned by their members in ways that platforms cannot take away. With the advent of blockchain technology, we now have a way to establish this freedom in a decentralized and secure way.

    As blockchain tokens that are owned and controlled by communities themselves — not by any app or platform — Community Points represent a way for Redditors to own a piece of their favorite communities. They are earned by making contributions to the community, like creating content and moderating. They not only represent ownership and reputation within the community, but can also be used for community governance, moderation, and unlocking premium features. They can even be used in custom tools outside of Reddit and on other platforms.

    Wow! Ownership and reputation of a community, used for governance, and transferrable to other platforms! Just like all those videogame NFTs that worked so well and appreciated in value so much.

    Good luck, Reddit.

  • Options
    SchrodingerSchrodinger Registered User regular
    since crypto still stubbornly refuses to die (completely), shall we have a new thread? or just keep adding onto this one, like The Blockchain?

    In the spirit of blockchain, we should have one thread that's 200 gigabytes and you need to download and verify the entire thing every time you add a post.

  • Options
    PreacherPreacher Registered User regular
    It's failed for everyone else, but maybe just maybe...

    I would like some money because these are artisanal nuggets of wisdom philistine.

    pleasepaypreacher.net
  • Options
    evilmrhenryevilmrhenry Registered User regular
    edited August 2023
    Crius wrote: »
    The public and private keys are created as part of the same process, right? You could just run the generation code to pre-compute all possible public-private key pairs -- 32-bit input seed means you've only got ~2 billion possible key pairs, which isn't a particularly large number in this context.

    Throw the key pairs in a lookup table and scan the blockchain for any public keys in your table and you're golden.

    A rainbow table attack? No; while the random bit can be guessed, there's also going to be a salt in place, based on the username or other known--actually let me check that. (Re-reads the exploit summary) They didn't put a salt in. This is vulnerable to a rainbow table attack. An attacker can trivially generate a lookup table of all possible public key values going to all possible private key values, for all wallets created with the vulnerable software, and just check all new wallets against that table. No wonder so many people got hacked.

    EDIT: For those of you who didn't understand this, just know that this was so stupid I literally didn't even consider it. If you generated your private key at the same second as a different user, both of you would have the same public and private keys.

    evilmrhenry on
  • Options
    SiliconStewSiliconStew Registered User regular
    Cross-posting from the Social Media thread, but:

    Reddit is getting in on the crypto shit. This is ostensibly why they murdered their other paid options without warning recently.
    Community Points are the first step towards a better future for online communities. In order to be truly independent from platforms like Reddit, communities need to be owned by their members in ways that platforms cannot take away. With the advent of blockchain technology, we now have a way to establish this freedom in a decentralized and secure way.

    As blockchain tokens that are owned and controlled by communities themselves — not by any app or platform — Community Points represent a way for Redditors to own a piece of their favorite communities. They are earned by making contributions to the community, like creating content and moderating. They not only represent ownership and reputation within the community, but can also be used for community governance, moderation, and unlocking premium features. They can even be used in custom tools outside of Reddit and on other platforms.

    Wow! Ownership and reputation of a community, used for governance, and transferrable to other platforms! Just like all those videogame NFTs that worked so well and appreciated in value so much.

    Good luck, Reddit.

    Community Points! Gain ownership and control* of your community.

    *Community Points do not grant any express or implied ownership or control of services or content.

    Just remember that half the people you meet are below average intelligence.
  • Options
    Eat it You Nasty Pig.Eat it You Nasty Pig. tell homeland security 'we are the bomb'Registered User regular
    It seems like just Reddit coins but on The Blockchain(tm), so… same but also worse?

    I will say I’m darkly excited for WSB or someone else to attempt a hostile takeover of another sub

    NREqxl5.jpg
    it was the smallest on the list but
    Pluto was a planet and I'll never forget
  • Options
    OneAngryPossumOneAngryPossum Registered User regular
    It’s good that Reddit leadership got out there and really established their feelings on the community before trying this.

  • Options
    DibbitDibbit Registered User regular
    Crius wrote: »
    The public and private keys are created as part of the same process, right? You could just run the generation code to pre-compute all possible public-private key pairs -- 32-bit input seed means you've only got ~2 billion possible key pairs, which isn't a particularly large number in this context.

    Throw the key pairs in a lookup table and scan the blockchain for any public keys in your table and you're golden.

    A rainbow table attack? No; while the random bit can be guessed, there's also going to be a salt in place, based on the username or other known--actually let me check that. (Re-reads the exploit summary) They didn't put a salt in. This is vulnerable to a rainbow table attack. An attacker can trivially generate a lookup table of all possible public key values going to all possible private key values, for all wallets created with the vulnerable software, and just check all new wallets against that table. No wonder so many people got hacked.

    EDIT: For those of you who didn't understand this, just know that this was so stupid I literally didn't even consider it. If you generated your private key at the same second as a different user, both of you would have the same public and private keys.

    This doesn't sound right, I've only made a custom implementation of oauth2, and every computer has it's own source of truly random bits that you can use to get the needed entropy, it's pretty easy to use, and while the generator CAN run out, that's only an issue if the server has just booted up and the bucket hasn't been filled, or maybe if you generate like... a 100 keys a second, it's a pretty big bucket.

    Why would you use something as non-random as the system clock, when the tools are RIGHT there, and free, and widely supported, and known?

  • Options
    EchoEcho ski-bap ba-dapModerator mod
    Dibbit wrote: »
    Why would you use something as non-random as the system clock, when the tools are RIGHT there, and free, and widely supported, and known?

    They could just have hit up Amazon.

    wr4a03corwd5.png

  • Options
    chrisnlchrisnl Registered User regular
    Crius wrote: »
    The public and private keys are created as part of the same process, right? You could just run the generation code to pre-compute all possible public-private key pairs -- 32-bit input seed means you've only got ~2 billion possible key pairs, which isn't a particularly large number in this context.

    Throw the key pairs in a lookup table and scan the blockchain for any public keys in your table and you're golden.

    A rainbow table attack? No; while the random bit can be guessed, there's also going to be a salt in place, based on the username or other known--actually let me check that. (Re-reads the exploit summary) They didn't put a salt in. This is vulnerable to a rainbow table attack. An attacker can trivially generate a lookup table of all possible public key values going to all possible private key values, for all wallets created with the vulnerable software, and just check all new wallets against that table. No wonder so many people got hacked.

    EDIT: For those of you who didn't understand this, just know that this was so stupid I literally didn't even consider it. If you generated your private key at the same second as a different user, both of you would have the same public and private keys.

    Just when you think crypto can't get any dumber, they pull this crap. Anybody who has ever had a diner breakfast knows that you always salt the hash!

    steam_sig.png
  • Options
    evilmrhenryevilmrhenry Registered User regular
    edited August 2023
    Dibbit wrote: »
    Crius wrote: »
    The public and private keys are created as part of the same process, right? You could just run the generation code to pre-compute all possible public-private key pairs -- 32-bit input seed means you've only got ~2 billion possible key pairs, which isn't a particularly large number in this context.

    Throw the key pairs in a lookup table and scan the blockchain for any public keys in your table and you're golden.

    A rainbow table attack? No; while the random bit can be guessed, there's also going to be a salt in place, based on the username or other known--actually let me check that. (Re-reads the exploit summary) They didn't put a salt in. This is vulnerable to a rainbow table attack. An attacker can trivially generate a lookup table of all possible public key values going to all possible private key values, for all wallets created with the vulnerable software, and just check all new wallets against that table. No wonder so many people got hacked.

    EDIT: For those of you who didn't understand this, just know that this was so stupid I literally didn't even consider it. If you generated your private key at the same second as a different user, both of you would have the same public and private keys.

    This doesn't sound right, I've only made a custom implementation of oauth2, and every computer has it's own source of truly random bits that you can use to get the needed entropy, it's pretty easy to use, and while the generator CAN run out, that's only an issue if the server has just booted up and the bucket hasn't been filled, or maybe if you generate like... a 100 keys a second, it's a pretty big bucket.

    Why would you use something as non-random as the system clock, when the tools are RIGHT there, and free, and widely supported, and known?

    It's in the vulnerability report:
    https://milksad.info/
    They're using a psudo-random source of randomness, and initializing it with the system clock.
    const auto now = high_resolution_clock::now();
    return static_cast<uint32_t>(now.time_since_epoch().count());
    ...
    twister.reset(new std::mt19937(get_clock_seed()));

    Converting the result of now.time_since_epoch().count() into a uint32_t turns it into the number of seconds since the epoch, instead of retaining any fractional seconds. Then they initialize the twister random number generator with that value.

    EDIT: or maybe the conversion cuts off the top values instead? I'm not actually sure what this does, because I don't do enough C++. But I can tell they've dropped system time to a 32bit number, which means there are only 32 bits worth of possible private keys this could ever generate, which is well within the possibility for a rainbow table. A site I found online estimated a table size in megabytes, not gigabytes.

    evilmrhenry on
  • Options
    PolaritiePolaritie Sleepy Registered User regular
    And this is why you're supposed to use an actual god damn entropy source for anything where security matters.

    (Also entropy isn't all that hard to come by either - any running system has random noise that can be collected by the OS)

    Steam: Polaritie
    3DS: 0473-8507-2652
    Switch: SW-5185-4991-5118
    PSN: AbEntropy
  • Options
    HevachHevach Registered User regular
    It even seems Libbitcoin did things right(ish) until version 3.0. It supposedly made errors in some implementations so as an example the win32 version was also playing with half a deck, but an attacker at least didn't know which half.

    At that point they decided to take all the locks off their house (including that fishy Wal Mart brand one that was still technically a lock) and replace them with rusty wang hangers chip clips.

  • Options
    FencingsaxFencingsax It is difficult to get a man to understand, when his salary depends upon his not understanding GNU Terry PratchettRegistered User regular
    Preacher wrote: »
    It's failed for everyone else, but maybe just maybe...

    https://www.youtube.com/watch?v=Po4adxJxqZk&amp;ab_channel=JesseClark

  • Options
    cloudeaglecloudeagle Registered User regular
    I should mention again that someone with better technical knowledge than me should make the next thread.

    That's not a high bar to clear! I'm an English major.

    Switch: 3947-4890-9293
  • Options
    marajimaraji Registered User regular
    edited August 2023
    cloudeagle wrote: »
    I should mention again that someone with better technical knowledge than me should make the next thread.

    That's not a high bar to clear! I'm an English major.

    If there’s one thing this whole topic has shown, it’s that you don’t need technical knowledge to write about crypto.

    Though I can see how understanding and/or respecting the English language would put up a roadblock to doing it authentically.

    maraji on
  • Options
    GilgaronGilgaron Registered User regular
    Polaritie wrote: »
    And this is why you're supposed to use an actual god damn entropy source for anything where security matters.

    (Also entropy isn't all that hard to come by either - any running system has random noise that can be collected by the OS)

    You just have to call the entropy chaos service
    https://m.youtube.com/watch?v=y8OnoxKotPQ

  • Options
    ArchangleArchangle Registered User regular
    The attributes of crypto are numerous in amount. One attribute is that it can be difficult to understand, like a maze. Or as the first nations call it - maize. Another famous crypto person is Satoshi.

    In conclusion, crypto is a land of contrasts.

  • Options
    marajimaraji Registered User regular
    xktccfaubycp.jpeg

    This is my NFT do not right click and save that’s stealing.

  • Options
    HevachHevach Registered User regular
  • Options
    OrcaOrca Also known as Espressosaurus WrexRegistered User regular
    Non-Fungible Tokens are yesterday's news

    today's news is Non-Fungible Threads

  • Options
    DarkPrimusDarkPrimus Registered User regular
    edited August 2023
    Polaritie wrote: »
    And this is why you're supposed to use an actual god damn entropy source for anything where security matters.

    (Also entropy isn't all that hard to come by either - any running system has random noise that can be collected by the OS)

    Reminded of that one security firm on the West Coast that generates their security hashes using a wall of lava lamps

    Edit: It's Cloudflare, and they use seismic data and other uncontrolled variables recorded at other international offices as well.

    DarkPrimus on
  • Options
    AngelHedgieAngelHedgie Registered User regular
    DarkPrimus wrote: »
    Polaritie wrote: »
    And this is why you're supposed to use an actual god damn entropy source for anything where security matters.

    (Also entropy isn't all that hard to come by either - any running system has random noise that can be collected by the OS)

    Reminded of that one security firm on the West Coast that generates their security hashes using a wall of lava lamps

    Edit: It's Cloudflare, and they use seismic data and other uncontrolled variables recorded at other international offices as well.

    Shame that they have a policy of protecting bigots and terrorists. But it's okay - they have hate offsets!

    (That's not a joke, by the way - CloudFlare literally handles providing services to bigots by then giving their services free to pro-marginalized group organizations so they can...combat the disinformation and hate coming from the bigots who are CloudFlare customers.)

    XBL: Nox Aeternum / PSN: NoxAeternum / NN:NoxAeternum / Steam: noxaeternum
  • Options
    ironzergironzerg Registered User regular
    Orca wrote: »
    Non-Fungible Tokens are yesterday's news

    today's news is Non-Fungible Threads

    I'm going to quit my job and open up a second-hand boutique apparel store in San Francisco called "Non-Fungible Threads".

  • Options
    CorlisCorlis Registered User regular
    ironzerg wrote: »
    Orca wrote: »
    Non-Fungible Tokens are yesterday's news

    today's news is Non-Fungible Threads

    I'm going to quit my job and open up a second-hand boutique apparel store in San Francisco called "Non-Fungible Threads".
    Just got to make sure you never have two equivalent versions of the same shirt or they WILL be fungible.

    But I don't mind, as long as there's a bed beneath the stars that shine,
    I'll be fine, just give me a minute, a man's got a limit, I can't get a life if my heart's not in it.
  • Options
    EchoEcho ski-bap ba-dapModerator mod
    hey

    hey

    guess what
    U.S. judge revokes Sam Bankman-Fried's bail, saying FTX founder tampered with witnesses

    FTX founder Sam Bankman-Fried was ordered jailed on Friday to await trial after a bail hearing for the fallen cryptocurrency wiz left a judge convinced that he had repeatedly tried to influence witnesses against him.

    https://www.cbc.ca/news/world/sam-bankman-fried-bail-revoked-witness-tampering-1.6934340

  • Options
    BurtletoyBurtletoy Registered User regular
    Sam bankmen freid got his house arrest taken away and is now going to jail

  • Options
    PreacherPreacher Registered User regular
    Oh fucking baby.

    I would like some money because these are artisanal nuggets of wisdom philistine.

    pleasepaypreacher.net
This discussion has been closed.