Good morning Mike,

> ZmnSCPxj,
>
> The growing tare in growing disagreement continues to divide mining capacity 
> while the network waits for formation of future blocks - you'll never get to 
> complete consensus unless three is a way to avoid ambiguity in disagreement, 
> which you have not addressed.  The topic of my discussion is an exploitable 
> condition, your three block plan does not add up.
>
> I wrote the exploit before I wrote the paper. It is telling that still no one 
> here has refenced the threat model, which is the largest section of the 
> entire 8 page paper.  The security came before the introduction of FPNC 
> because security fundamentals is what drives the necessity for the solution.
>
> The text you are reading right now was delivered using the mailing list 
> manager Majordomo2, which I shelled in 2011 and got a severity metric and an 
> alert in the DHS newsletter. Correct me if I am wrong, but I bet that just of 
> my exploits has probably popped more shells than everyone on this thread 
> combined.   Cryptography?  Sure, I'll brag about the time I hacked Square 
> Inc. This is actually my current favorite crypto exploit — it was the time I 
> used DKIM signature-malleability to conduct a replay-attack that allowed an 
> adversary to replay another user's transactions an unlimited number of times. 
> After receiving a normal payment from another Square user you could empty 
> their account.  This was reported ethically and it was a mutual joy to work 
> with such a great team.  Now it is not just impact, but I am also getting the 
> feeling that I have collected more CVEs, all this is to say that I'm not new 
> to difficult vendors.

Argument screens off authority, thus, even if I have no CVEs under this 
pseudonym, argument must still be weighted more highly than any authority you 
may claim.

> To be blunt; some of you on this thread are behaving like a virgin reading a 
> trashy love novel and failing to see the point — Just because you aren't 
> excited, doesn't mean that it isn't hot.
>
> The exploit described in this paper was delivered to the Bitcoin-core 
> security team on August 4 at 9:36 PM PST.  The industry standard of 90 days 
> gives you until November 2nd. Now clearly, we need more time. However, if the 
> consensus is a rejection, then there shouldn't be any concerns with a 
> sensible 90-day disclosure policy. 

I am not a member of this security team, and they may have better information 
and arguments than I do, in which case, I would defer to them if they are 
willing to openly discuss it and I find their arguments compelling.

The attack you describe is:

* Not fixable by floating-point Nakamoto consensus, as such a powerful 
adversary can just as easily prevent propagation of a higher-score block.
* Broken by even a single, manually-created connection between both sides of 
the chain-split.

Regards,
ZmnSCPxj

_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to