You are viewing a single comment's thread from:

RE: BITCOIN Just Blew Through $1,900 to Hit New All-Time High... BERWICK VS. DUANE

in #bitcoin8 years ago

I share your skepticism. While crypto appears to be impervious to the same level of manipulation found in all other markets, it is difficult for me to believe that there are asset classes and tech that are immune. The recent, massive increases in the value of crypto remind me of the rapid share price advances in precious metals mining stocks in 2016. I believe that the manipulators were the main purchasers of those stocks last year. Which were then strategically sold off in tandem with pm to suppress sentiment. With that said, cryptocurrencies must be taken note of and may be an incredible opportunity for astute and risk tolerant people.

Sort:  

These are words of Konstantinos Karagiannis
CTO, Security Consulting, Americas, BT.
But is it safe?
My RSA 2017 talk, “Hacking Blockchain”, includes a fair amount of time explaining historic and current attacks faced by all implementations of the technology. A lot of these attacks are old school, focusing on supporting technology and not on the blockchain itself.

Consider attacks against credentials used at an online cryptocurrency exchange. Such exchanges act as hot wallets, or storage of funds available for transacting online at any time. Traditional authentication hacking of these sites can lead to illegal transactions. Some attacks are even more creative, such as the ability to force a cold or offline wallet to become hot and therefore a target for fraudulent transactions.

The major issue I cover, though, is the inherent flaw on page one of Satoshi’s paper. That elegant if pesky line about “computationally impractical to reverse” transactions. You see, the crypto behind cryptocurrency is actually public key. We are likely less than three years away from this being completely hackable by a quantum computer.

Facing reality.
Fantasy? Hardly. Labs around the world have already proven that quantum computers can run Shor’s Algorithm and almost instantly find the private key of a public key pair even 4,096 bits long. Because of how public key works in most blockchain implementations, including Bitcoin, this would mean any time a transaction occurs, a quantum computer has everything it needs to obtain a user’s private key. Spend a single cryptocoin, and any entity with a quantum computer can download that currency’s blockchain, see your transaction, and in a few moments spend the rest of your funds.

The threat seems even worse if you consider blockchains designed to prove ownership of land or other critical identity-related transactions. A private key attack here can lead to an irreversible type of identity theft, at least within that blockchain ecosystem.

The NSA has already warned against the use of non-quantum-safe encryption. Its’ time to realise we may be rushing towards putting everything on a digital house of cards rather than an unbreakable chain. Let’s fix blockchain’s inherent flaws now, before it’s too late.

If you want to see our Blockchain demo in person, why not visit Innovation 2017, our technology and innovation exhibition taking place in June.
$0.00Reply Edit Delete