Reddit Posts
We are ready at Bloomberg, getting DES pages up as we speak.
CypherPunks, Cryptography, and the movement that would change the world forever. The Blockchain Theory.
"CypherPunks" Cryptography & The movement that would change the world. The Blockchain Theory.
TeslaMoonBSC stealth Launching in 10 Minutes | 5% Taxes | Tbr Renounced ownership|Funny and active Vc | Liquidity will be locked | 24/7 marketing | Promising af
The Truth about Bitcoin and the old Cypherpunk movement on peer-to-peer digital currency..
The Truth about Bitcoin and the old Cypherpunk movement on peer-to-peer digital currency
Recommended buys on the dip. Crypto Market Update and Investing Report 11.23
Catzcoin, +5000% this week, will donate 5% of all profits for charity to project for homeless and abandoned cats
Appreciating everyone who helped lay down the groundwork for Satoshi Nakamoto to create Bitcoin
Appreciating everyone who helped lay down the groundwork for Satoshi Nakamoto to create Bitcoin
Appreciating everyone who helped lay down the groundwork for Satoshi Nakamoto to create Bitcoin
Appreciating everyone who helped lay down the groundwork for Satoshi Nakamoto to create Bitcoin
📣 There’s no future without DeSpace 📣 | ($DES) by DESPACE | It is a single interface in which multiple DeFi and NFT platforms can be used.❗
💲DES by Despace will make an access to all NFTs that will be available via one single platform❗ It’s a one-stop shop for users throughout the whole DeFi ecosystem to enable safe, secure and easy navigation ❗
🚀DESPACE ($DES) | They made a single interface for accessing and utilizing many DeFi and NFT platforms | Their objective is to make DeFi and NFTs as easy to use as possible. | DESPACE ($DES) 🚀
📢 The most advanced DeFi and NFT navigation platform ever built is on its way! |🌠 DESPACE ($DES) |
🌠 DESPACE (DES), Game changer to DeFi and NFTs 🚀
🚀 DESPACE (DES)🚀 Rising Star of DeFi and NFTs, Phenomenal Opportunity on Seed Round
🚀 DESPACE (DES)🚀 Rising Star of DeFi and NFTs, Phenomenal Opportunity on Seed Round
Mentions
It is not the case that all encryption systems have flaws that will eventually be exploited, like SHA-1. But yes, my numbers assume the algorithms used do not contain significant flaws. BTW DES was only designed for educational purposes, so not sure why anyone ever thought it should be secure.
It doesn't work like that. Look up the history of digests like SHA-1, RC4/5, etc or DES (yes, the one in 3DES and still widely used)
If an exploit were found in the cryptography underlying Bitcoin, either in its hashing algorithm (SHA-256) or in its digital signature algorithm (ECDSA), it would effectively end the currency. If digital signatures could be forged due to the exploit, attackers might be able to send transactions from wallets without having actual access to the private keys. This could undermine the transaction immutability that blockchain technology is known for, allowing users to spend the same bitcoins more than once. Exploits in the hashing algorithm could allow miners to find block solutions faster than intended, potentially centralizing mining power or disrupting the normal creation of blocks. There are is a big list of hash and signature algorithms you shouldn’t use today because there are exploits. MD5, SHA-1, DES, RC4, etc. One day SHA-256 and ECDSA will be on that list. It could be due to advances in computing power like quantum computing, or it could be due to flaws found in the algorithms themselves. Result is the same, Bitcoin go bye bye, anyone holding Bitcoin will be screwed.
Absolutely, the brute-forcing of a 66-bit key, while not trivial, is still within the realm of possibility with current technology, but nowhere near as simple or fast as smaller key sizes. To put it in perspective, the highest bit encryption publicly brute-forced was a 64-bit key using DES. This was achieved back in 1999 through the efforts of the Electronic Frontier Foundation with their "Deep Crack" machine, and the collective power of distributed.net’s volunteers. They managed to decrypt the message in just over 22 hours. Given this, the jump from 64 to 66 bits adds a significant layer of complexity, and 160 bits is exponentially harder still. With each additional bit, the difficulty of brute-forcing doubles, rendering 160-bit encryption incredibly secure against brute-force attacks with our current technology. That said, I respectfully disagree and that it’s closer than most will entertain.
For the foreseeable future, I do not think a quantum computer could crack crypto without requiring an infinite budget. For reference, in 1997, the RSA Foundation wanted to demonstrate that DES was insecure. RSA made an made an ASIC that could crack DES. The asic they made was estimated to cost 250k to manufacture.
A solution showing P = NP could upend the field of cryptography, which relies on certain problems being difficult. A constructive and efficient solution[Note 2] to an NP-complete problem such as 3-SAT would break most existing cryptosystems including: Existing implementations of public-key cryptography,[32] a foundation for many modern security applications such as secure financial transactions over the Internet. Symmetric ciphers such as AES or 3DES,[33] used for the encryption of communications data. Cryptographic hashing, which underlies blockchain cryptocurrencies such as Bitcoin, and is used to authenticate software updates. For these applications, finding a pre-image that hashes to a given value must be difficult, ideally taking exponential time. If P = NP, then this can take polynomial time, through reduction to SAT.[34] From wikipedia
A solution showing P = NP could upend the field of cryptography, which relies on certain problems being difficult. A constructive and efficient solution[Note 2] to an NP-complete problem such as 3-SAT would break most existing cryptosystems including: Existing implementations of public-key cryptography,[32] a foundation for many modern security applications such as secure financial transactions over the Internet. Symmetric ciphers such as AES or 3DES,[33] used for the encryption of communications data. Cryptographic hashing, which underlies blockchain cryptocurrencies such as Bitcoin, and is used to authenticate software updates. For these applications, finding a pre-image that hashes to a given value must be difficult, ideally taking exponential time. If P = NP, then this can take polynomial time, through reduction to SAT.[34] From wikipedia
A solution showing P = NP could upend the field of cryptography, which relies on certain problems being difficult. A constructive and efficient solution[Note 2] to an NP-complete problem such as 3-SAT would break most existing cryptosystems including: Existing implementations of public-key cryptography,[32] a foundation for many modern security applications such as secure financial transactions over the Internet. Symmetric ciphers such as AES or 3DES,[33] used for the encryption of communications data. Cryptographic hashing, which underlies blockchain cryptocurrencies such as Bitcoin, and is used to authenticate software updates. For these applications, finding a pre-image that hashes to a given value must be difficult, ideally taking exponential time. If P = NP, then this can take polynomial time, through reduction to SAT.[34] From wikipedia
A solution showing P = NP could upend the field of cryptography, which relies on certain problems being difficult. A constructive and efficient solution[Note 2] to an NP-complete problem such as 3-SAT would break most existing cryptosystems including: Existing implementations of public-key cryptography,[32] a foundation for many modern security applications such as secure financial transactions over the Internet. Symmetric ciphers such as AES or 3DES,[33] used for the encryption of communications data. Cryptographic hashing, which underlies blockchain cryptocurrencies such as Bitcoin, and is used to authenticate software updates. For these applications, finding a pre-image that hashes to a given value must be difficult, ideally taking exponential time. If P = NP, then this can take polynomial time, through reduction to SAT.[34] From wikipedia
A solution showing P = NP could upend the field of cryptography, which relies on certain problems being difficult. A constructive and efficient solution[Note 2] to an NP-complete problem such as 3-SAT would break most existing cryptosystems including: Existing implementations of public-key cryptography,[32] a foundation for many modern security applications such as secure financial transactions over the Internet. Symmetric ciphers such as AES or 3DES,[33] used for the encryption of communications data. Cryptographic hashing, which underlies blockchain cryptocurrencies such as Bitcoin, and is used to authenticate software updates. For these applications, finding a pre-image that hashes to a given value must be difficult, ideally taking exponential time. If P = NP, then this can take polynomial time, through reduction to SAT.[34] From wikipedia
I suspect it's natural that a "Cipher Punk" would be sceptical of Government approved algorithms (DES-56 being a historical example).
I don't think this take is true. If I remember correctly, Satoshi used the random number generator from OpenSSL. He didn't write his own. **Given that:** The broken algorithm that was exposed by Snowden, Dual\_EC\_DRBG, was not accepted by the cryptography community and they were skeptic about it. I mean, it's really dumb of the NSA to keep the guessing of a random number path predictable based on 16-bit unknowability + 2 constants undisclosed. This is nothing new, since DES encryption, the cryptography community has known the idea of "nothing-up-my-sleeve number", and IBM was criticized for their unexplained choice of a random table in DES encryption procedure, which was done for an honest reason, to prevent Differential Cryptanalysis as discovered by Shamir. Same problem applies to Dual\_EC\_DRBG, where some unknown numbers and unexplained were pulled out of NSA's butt and no one explained it... and people were supposed to just take it for granted as secure? I think only noobs fell for this. OpenSSL didn't, especially that OpenSSL used full entropy to generate random numbers (and HID wallets didn't exist). So this idea that Satoshi single-handedly avoided the broken "randomizer" is not really based on reality. In fact, Satoshi has done a few things that come from lack of understanding of cryptography, including using RIPMD160 to shorten the Base58 address after SHA256. Just cropping SHA256 would've been enough. I don't blame him though, it doesn't really matter. He did a good job overall.
Eh, maybe, NSA occasionally does nice things. I learned about the following case in a Cryptography class: The National Security Agency (NSA) played a significant role in the development of the Data Encryption Standard (DES), particularly in the design of the S-boxes, which are a core component of the DES algorithm's complexity and security. When IBM initially developed DES, they did so in collaboration with the NSA. The NSA made modifications to the S-boxes, which at the time raised suspicions among some in the cryptographic community. The modifications made by the NSA were not publicly explained, leading to concerns that the NSA had weakened the algorithm to allow for a backdoor that only they could exploit. However, it was later understood that the modifications actually strengthened DES against a specific type of attack known as differential cryptanalysis. This was a sophisticated attack method that was not publicly known until it was independently discovered and published by Eli Biham and Adi Shamir in the late 1980s and early 1990s. Remarkably, the NSA's modifications to DES suggested that they had knowledge of differential cryptanalysis years before it became known to the public cryptographic community.
A key principle of cryptography is that you should always assume all components of the cryptosystem are known to your adversary except the key. Nonetheless, they will see the seed phrase and seeing that the checksum doesn't work, will start by assuming that either one of the seed words is wrong or try the permutations of the seed phrase. Either way, the "key space" for this system is only: - Around 16 bits for one incorrect seed word - Around 6 bits to permute two words around - 1 bit because it could be backwards - -4 bits because of the checksum Total security: 19 bits if you allow any combination of those features Even if the attacker tries all permutations of all 12 of the seed words, that only increases the 6 bits of swapping two words to log2(12!) ≈ 29 bits, or a 23-bit increase, making the security 42 bits in total, which is still rubbish. This makes it about as secure as DES encryption, which was bad even when it was introduced in 1975 and is trivial to crack, especially for a state adversary.
NEW: 🟠 Senior Bloomber analyst expects Bitcoin ETFs approvals coming in today between 4-6 PM 🙌 "Happy ETF Approval Day (for real this time) to all those who celebrate.. as far as we know it's ALL SYSTEMS GO. Most likely is we see formal approvals ballpark 4-6pm today with the Derby starting on Thursday. We are ready at Bloomberg, getting DES pages up as we speak." - Eric Balchunas
Eric Balchunas, senior EFT analyst for Bloomburg, thinks between 4-6pm for the announcement. So after market close. "Happy ETF Approval Day (for real this time) to all those who celebrate.. as far as we know it's ALL SYSTEMS GO. Most likely is we see formal approvals ballpark 4-6pm today with the Derby starting on Thursday. We are ready at Bloomberg, getting DES pages up as we speak."
Snark is a cryptographic protocol designed to interact and support only the Ethereum network. It’s not a DES, DDDES, AES, or any other know standard of cryptographic algorithm set by IEEE. Don’t pass off 11 year old software as innovation. It makes you look desperate.
No, the truncation of 256 bits will not give you GUARANTEE of a unique number translated from a sequence of numbers. Translation via matrix, like in AES, does that. If you keep adding 1 to an input and hash it once with AES, the resulting 128 bits are guaranteed to be unique, with no repetitions, no matter what key you choose. But if you truncate AES output to 66 bits, it is possible number 747374 AESed first 66 bits will be exactly same as +1, so 747375 AESed could in theory result in the same first 66 bits followed by different bits. Next, hashing algos in general are lossy in nature , o by design, you also could have collisions of your sequence inputs resulting in the same 66 bits. The best solution would be getting AES-like 64 bit algo (3DES for example), running it on 0..64bit sequences and the remaining 2 bits reserve for your threading, so choose assign each combo of them to each cracking thread, or if its one, run through them for each sequence number. For a single thread, assuming you're using 3DES it would go like: Input seed value (default 0) -> x For (unsigned int128 i=x, i<=0xffffffffffffffff, i++) { X0=3DESEncrypt(i); X1=3DESEncrypt(i^1<<64); X2=3DESEncrypt(i^2<<64); X3=3DESEncrypt(i^3<<64); ValidateBtckey(X0); ... ValidateBtckey(X3); ... } This way, you run through all sequences of 0..64bit in unique random way, no repetitions possible.
tldr; Thailand's Ministry of Digital Economy and Society (DES) has warned Meta's Facebook (formerly known as Facebook) to take action against fraudulent cryptocurrency investment scams advertised on its platform. The ministry has threatened to expel Facebook from the country if the scams are not curbed. Over 200,000 individuals have reportedly fallen victim to these fraudulent advertisements. The Minister in charge of DES has sought a court order to shut down Facebook if it fails to comply. This warning is part of a global effort to combat cryptocurrency scams and protect consumers. *This summary is auto generated by a bot and not meant to replace reading the original article. As always, DYOR. Try our free crypto chatbot at https://chat.coinfeeds.io*
Thailand’s Ministry of Digital Economy and Society (DES) has told Meta's (META) Facebook to curb the number of fraudulent crypto investment scams being advertised on the site, or risk being expelled from the country. Good action from Thai government 🇹🇭
TL:DR Thailand’s Ministry of Digital Economy and Society (DES) has issued a warning to Meta’s Facebook, formerly known as Facebook, urging the social media giant to take action against fraudulent cryptocurrency investment scams being advertised on its platform. The ministry has stated that if the number of these scams is not curbed, Facebook risks being expelled from the country. According to a statement on the ministry’s website, over 200,000 individuals have fallen victim to these fraudulent advertisements. In response, Chaiwut Thanakmanusorn, the Minister in charge of DES, has sought an order from a Thai court to shut down Facebook if the platform fails to comply by the end of the month.
This morning Source : tradingsat(dot)com POURQUOI LE SAUVETAGE DE CREDIT SUISSE PAR UBS PROVOQUE UNE CHUTE DES AUTRES BANQUES
This speech just made my day. It's even surprising 🙀 to see how the $DES altcoin is gonna go the same way.
The DeSpace lending product is known as DeLend and will be similar to MakerDAO with the release of a secured stablecoin backed by DES coin and DeSpace technology.
Is there any *legitimate* concern that SHA-256 has a trap door? The algorithm doesn’t seem to depend on suspicious unmotivated parameter choices (like for example the S-boxes in DES). The initializations of hash values and the round constants are in SHA-256 the fractional parts of roots of the first primes, so they are “natural” and not something into which the NSA could have deliberately built a trap door. Other point: Even if the NSA had a secret algorithm to reverse SHA-256, then what they could do is quicker mining and therefore double spending by generating forks. As soon as it turns out that any miner (NSA or other) can do that, Bitcoin would loose its functionality and become worthless. What would it help the NSA to be able to do that?
DeChain an amazing product of DeSpace protocol will enter the market and help make the ecosystem easier to use. $DES #DeSpace
First, most comprehensive DeFi aggregator that allows users to interact with several DeFi protocols from a single web-interface, and users are able to mine DES coin when they use the aggregator interface to execute DeFi and NFT transactions. Check out Despace Protocol
I’m using this time to bag some altcoin like DES from gate exchange so when bull season comes I will be smiling
Buy DES of Despace, you will be amazed you did
Crypto currency is here to stay and DES if Despace is also here to stay, you get rewarded for carrying out transactions
DeSpace is a DeFI & NFT revolution! We are bringing the much needed solution of aggregation to the Crypto world. All your DeFi and NFT services in one easy to use interface. Mine DES coin while you aggregate across multiple crypto platforms.. http://linktr.ee/DespaceProtocol
That's why you need to be buying and staking $DES when others are sleeping. Checkout http://linktr.ee/DespaceProtocol
You all should be buying and staking $DES . Massive gem don't miss out.. http://linktr.ee/DespaceProtocol #despace
Am greedy when it comes to my $DES tokens by #DeSpace
Hey guys, carry out #DeFi and #NFT transactions via #DeSpaceProtocol and earn a proportion of your coin back each time you transact. #DES #DeSpace #DeChain
DeSpace Protocol is a revolutionary new platform that is looking to shake up both the NFT and DeFi spaces. We’re building a unique product that aggregates across chains in order to unify the many different platforms that currently exist. $DES .. Despace.io
Hello DES4FIO. It looks like you might have found a new scam? If so, pinging u/Abhishekgarg0 so he can report this scam to http://scam-alert.io/. Please make sure to support him for his efforts. For more info about his scam reporting project, [click here](https://www.reddit.com/r/CryptoCurrency/comments/sbhp6f/i_have_a_project_little_project_going_in_this_sub/). For tips on how to avoid scams, [click here](https://www.reddit.com/r/CryptoCurrency/comments/s7srty/crypto_scams_how_not_to_fall_for_them_what_to_do/). Also consider visiting r/CryptoScamReport or r/CryptoScams. --- *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/CryptoCurrency) if you have any questions or concerns.*
The NSA is the biggest developer of cryptographic tech. They created or helped create DES, AES, SHA-2, and all sorts of encryptors like TACLANE.
They designed it. Remember NSA made DEC reduce number of bits for DES encryption standard in the 1970s for a reason. Or forcing an upgrade in PGP or going after PGPs author.
Encrypting 5 times is not safer than doing it 1 time correctly. Just pick an acceptable algorithm. A symmetric one will do. >https://en.m.wikipedia.org/wiki/Symmetric-key_algorithm >Examples of popular symmetric-key algorithms include Twofish, Serpent, AES (Rijndael), Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer, and IDEA.[6] If you are not sure, Google for "xxx vulnerabilities". Next, select a tool that supports your choice of algorithm. Choose a key that is long enough but also easy to remember. Example: ----------Hello-----987?----- This key is long (10+5+5+4+5=29) and makes use of - a-aA-Z0-9 --> 26+26+10=62 letters and digits - @#$_&-+()/*:;!?{}[]~|% --> 22 punctuation Character space=62+22 = 84. So, 29 characters from this space produce a key space of 84^29 = 6.4 * 10^55. It's pointless to try to brute force search this. So, remember the key as: - 10 times a dash - Hello - 5 times a dash - 987? - 5 times a dash By the way, even the following key is quite safe: A1:::::::::::::::z2 I would dare to protect lots of money with it. Make sure that the encrypted output (crypttext) is in base64 or similar encoding (not binary). Now you can even paste it in your telegram saved-messages conversation.