Internet and e-mail policy and practice
including Notes on Internet E-mail


2018
Months
JanFeb
Mar Apr
May Jun
Jul Aug
Sep Oct
Nov Dec

Click the comments link on any story to see comments or add your own.


Subscribe to this blog


RSS feed


Home

22 Dec 2017

Great forking Bitcoins Money

Let's say I'm with the Chinese government and decide that I am tired of people evading currency controls and money laundering using Bitcoin. So we adjust the Great Firewall of China to block port 8333. We also add some proxies that allow some uncleared transactions from outside to flow into Chinese networks but not the other way, and keep track of which ones we let through.

Since a large fraction of the miners are inside China and all of the hard currency exchanges are outside, this will cause a pretty serious fork. No doubt people will start trying to evade the block, but the GFoC works pretty well, and any evasion will take a while to start being effective. It'd also be easy to tell who was trying to evade (look for outside transactions in the chains they publish) and send someone around to chat with them.

Even if the two sides are eventually reunited, then what? You have two separate chains, with overlapping sets of transactions, which would make any sort of ad-hoc hack to splice one chain onto the other impossibly hard, even if the anarchists in the Bitcoin world could agree to it. The bitcoin voting algorithm would eventuall make one chain win and the other one disappear. If some of the disappeared transactions were yours, how would this affect your opinion on Bitcoins?


posted at: 15:08 :: permanent link to this entry :: 0 comments
Stable link is https://jl.ly/Money/bitsplit.html

22 Oct 2017

The hack back bill in Congress is better than you'd expect Internet
Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named
Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted.

See more ...


posted at: 16:31 :: permanent link to this entry :: 0 comments
Stable link is https://jl.ly/Internet/hackback.html

26 Sep 2017

Some contrary advice about the Equifax breach Money
Here's some unexpected advice about what to do about the recent giant Equifax breach: nothing.

See more ...


posted at: 01:47 :: permanent link to this entry :: 0 comments
Stable link is https://jl.ly/Money/equinot.html

26 Aug 2017

Not quite two factor, or is your phone number really something you have? Security

A recent article in the New York Times Dealbook column reported on phone number hijacking, in which a bad guy fraudulently takes over someone's mobile phone number and used it to reset credentials and drain the victim's account. It happens a lot, even to the chief technologist of the FTC. This reminds us that security is hard, and understanding two factor authentication is harder than it seems.

The usual definition of two-factor is to pick two different items from a list of security types:

See more ...


posted at: 20:49 :: permanent link to this entry :: 0 comments
Stable link is https://jl.ly/Security/2fphone.html

10 Aug 2017

Supporting new DNS RR types with dnsextlang, Part II Internet
Yesterday's
article introduced my DNS extension language, intended to make it easier to add new DNS record types to DNS software. It described a new perl module Net::DNS::Extlang that uses the extension language to automatically create perl code to handle new RRTYPEs. Today we look at my second project, intended to let people create DNS records and zone files with new RRTYPEs.

See more ...


posted at: 19:17 :: permanent link to this entry :: 0 comments
Stable link is https://jl.ly/Internet/extlang2.html

Topics


My other sites

Who is this guy?

Airline ticket info

Taughannock Networks

Other blogs

CAUCE
CAUCE Welcomes Two New Board Members - Tom Grasso and Allison Nixon
38 days ago

A keen grasp of the obvious
Live from the collander-cam
147 days ago

Related sites

Coalition Against Unsolicited Commercial E-mail

Network Abuse Clearinghouse



© 2005-2015 John R. Levine.
CAN SPAM address harvesting notice: the operator of this website will not give, sell, or otherwise transfer addresses maintained by this website to any other party for the purposes of initiating, or enabling others to initiate, electronic mail messages.