The Real Weakness of a Centralized Exchange

   The real weakness of a centralized exchange in cryptofinance is the unknown. The unknown attempt at theft makes the digital exchange no different than any other financial institution, like a bank or credit card company. There are far too many people in the world who, oftentimes even by their own admission, are thieves. Plain and simple. Take the current woes of Mt. Gox. And, trust the fact that Mt. Gox’s troubles run deep and are are much greater than a software glitch. This little software glitch has all but obliterated the largest, longest running cryptocurrency exchange. What was really done was nothing new and yet at the same time it was. A new vulnerability was exploited. That, by itself, is absolutely nothing new. Mt. Gox has, in the past, most assuredly been hacked and its users have fallen prey to many, many scams. Imagine during the early days of banking how many bank accounts were liquidated due to forged documents? During the “Wild West” era of the American westward expansion many, many banks had their vaults emptied by thieves in the night. It is unavoidable. Large amounts of wealth, whether physical or digital, attracts thieves. Thievery of vast amounts of wealth has been one of the greatest motivators for creativity in the history of mankind. Mt. Gox, should it survive, will find itself[and those who rely upon it] the future victim of many more creative and sometimes successful hacks and scams.

   So what exactly is the real weakness again? It’s the act of storing vast amounts of valuables in a single place. That’s the weakness. Pile up the treasure and people will try to steal it. And, they will continue trying until they succeed. You simply cannot stop people from attempting to steal. And, to top it off, the greater the value is…the more ingenious and stringent the attempts will be. One does not need a degree in sociology nor an intricate understanding of cryptofinance to see this as plain, simple, everyday common sense. Which came first the lock or need for the lock? Kind of a pointless question really. The reliance upon promised security has always had its risks. How about Stanley Rifkin’s 1978 looting of Security Pacific National? I’ll bet that doesn’t ring a bell. He was the first of his kind. He used electronic means to steal. 10.2 million dollars to be exact. But, he really wasn’t a “bank robber,” so to speak. He simply solved a problem based on the ill-fated notion that one particular string of numbers was secure. He used the bank’s daily “secret code” to divert the 10.2 million. The bank was totally unaware of the theft until the FBI arrested Rifkin while he was trying to convert the stolen funds into diamonds…over a month later. Time magazine called it the “Ultimate Heist.” During the same year, the famous Lufthansa Cargo Heist went down. While drastically different in their approach, one used guns and one used brains, they both ultimately attained their goal: the theft of millions of dollars. The real weakness was and still is storing immense amounts of value in one location which, in essence, lights a beacon for thieves.

   So, how do we solve this problem, at least as to how it affects cryptofinancial institutions? Easy. Eliminate the need for a centralized exchange server. Period. Stealing from many separate entities at once presents an infinitely more complex problem to solve than stealing from one static or stationary source. That’s not to suggest that the problem could not still be solved. But, it certainly presents a much more complex problem to solve. And, it also gives each node of value the opportunity to defend its own value as opposed to relying upon the security of any given exchange for the validity of every hash in the chain. Looking for the solution? Try altchain.org.

Cryptocurrency Technology Almost 100% Developed by the Government

Almost 100% of the technology used to build the current cryptofinance infrastructure was developed by the United States and the British Government. The entire basis of modern cryptography from DES, AES, SHA256, etc. is built upon technology developed between the two nations. The basis of the Data Encryption Standard[DES] and the Advanced Encryption Standard[AES] came when Whitfield Diffie and Martin Hellmanpublished their work in Scientific American in 1976. The real technology was developed by British Intelligence but had been kept classified. Keep all of this in mind.

The entire basis of the cryptographic encryption used in most security measures, from WPA to email passwords, is based on a public/private key exchange and large, odd-integer n factorization of polynomials. Simply stated, they all hinge upon mathematical difficulty of completing the functions for computing large prime numbers in real time. However, this does not mean that they cannot be hacked. As a matter of fact, several exploits have been used already, such as the birthday attack, brute-force attack, collision attack and the meet-in-the-middle attack. These all rely upon hash collision. A collision occurs when two unique pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest. These collisions are unavoidable whenever members of a very large set are hashed to a relatively short bit string. They are also an instance of the pigeonhole principle.

Shor’s Algorithm can also, theoretically, be used to crack even the most difficult cryptography techniques but requires a quantum computer. Another thing to keep in mind is that Google and the National Security Agency claim to be very close to having a working quantum computer. Although, it’s highly unlikely that a first generation unit will have the Qubits, quantum bits, needed to successfully solve Shor’s Algorithm. Still, it’s food for thought.

Let’s take a look at the most popular cryptocurrency, Bitcoin. According to the Bitcoin Protocol, every transaction in a block is hashed and broadcast to the every node in the network. Each block’s hash is timestamped and each new block contains the hash of the preceding in the input portion of creating its own hash. Thus, a chain of timestamped hashes is created where each new block verifies every single block that preceded it. This means that it can never be erased as long as the network exists. Imagine, just for one moment, that this protocol gets applied to other aspects of data transmission rendering every piece of that data into data that can never, ever be successfully erased.

Imagine, in the end, the possibility of useless encryption coupled with data that can never be erased. We aim to make sure that never happens at altchain.org.

Cryptofinance and Privacy

   Everywhere cryptocurrencies are being debated one of the biggest topics seems to be anonymity.  On one hand the debate seems to be all about the seedy level of anonymity, silk road, illegal markets, etc.  The other side of the debate seems to be the deliberate avoidance of the privacy issue from within the cryptocurrency community. 

   No matter.  Plainly displayed on the Bitcoin.org privacy page is tons of information plainly stating that Bitcoin transactions are 100% transparent and have no level of anonymity. 

Bitcoin works with an unprecedented level of transparency that most people are not used to dealing with. All Bitcoin transactions are public, traceable, and permanently stored in the Bitcoin network. Bitcoin addresses are the only information used to define where bitcoins are allocated and where they are sent. These addresses are created privately by each user’s wallets. However, once addresses are used, they become tainted by the history of all transactions they are involved with. Anyone can see the balance and all transactions of any address. Since users usually have to reveal their identity in order to receive services or goods, Bitcoin addresses cannot remain fully anonymous. For these reasons, Bitcoin addresses should only be used once and users must be careful not to disclose their addresses.

They go on further to describe an open environment with an acceptable level of privacy protection.  Read on another page and “some effort is required to protect your privacy.  That same page also seems to say that absolutely 100% of any type of anonymity is the user’s responsibility.  Read it anyway, but none of it seems to really add up to anything remotely resembling either private or anonymous.

Some effort is required to protect your privacy with Bitcoin. All Bitcoin transactions are stored publicly and permanently on the network, which means anyone can see the balance and transactions of any Bitcoin address. However, the identity of the user behind an address remains unknown until information is revealed during a purchase or in other circumstances. This is one reason why Bitcoin addresses should only be used once. Always remember that it is your responsibility to adopt good practices in order to protect your privacy.

<

p>   Once again, privacy and anonymity seem to be being discussed as if they were two completely different subjects when, in fact, they go hand in hand if not one and the same.  This poses the following question, “If Bitcoin is neither private nor anonymous and also requires a centralized exchange server then why is it touted as peer-to-peer?”  That may seem like a loaded question but it is not.  True peer-to-peer technology, or P2P, is defined as a decentralized architecture where individual computers, or nodes, can act as senders and receivers of information to any other node without the need for an authoritative centralized server as defined in the traditional client-server model.  Within the p2p model there is no need for a centralized server in any fashion.  Individual computers can communicate directly with one another and therefore increase or decrease encryption, security, processor power sharing, etc. as deemed necessary by the network.  In other words, using true p2p technology, anonymity and privacy could be established if deemed necessary by the network.  Once again the question arises as to how Bitcoin can be labeled “p2p” when it absolutely requires a centralized server and utilizes a system that records every single transaction ever made?

   So, where did the whole “Bitcoin Is Peer-To-Peer” ideology come from and why is it not referred to as “client-server” or even simply “based on p2p” technology?  The answer is not that simple.  Just peruse through any of the forums in any one of the Bitcoin communities like bitcointalk.org and see how the subject is avoided and those asking the questions are ostracized.

   There seems to be a truly peer-to-peer cryptofinance infrastructure on the rise.  Altchain.org seems to be the most promising up and coming community that is directly addressing the anonymity and privacy concern by eliminating the need for a centralized server or exchange of any sort.  They claim to have developed a new technology based on the Bitcoin Protocol called “Confidence Chains.”  Instead of proof of work, the block is a set of transactions (including the hash of the previous block) that is then RSA signed by a participating identity in the network.  The chain is a list of RSA signed transaction blocks.  Each node in the network attempts to work off of the most confident chain in the network.  The confidence weight of each block is obtained by adding the weight of each identity that approved it.  The total confidence weight of the chain is determined by the summation of all the confidence weights from each signed block in the chain.  Over time the confidence of each chain will build and it will become impossible for any single node to build a chain of higher confidence with the given cryptographic resources and information available to it.  The confidence of the chain becomes an irreversible function of the cryptographic historical interaction of one or more nodes.  Let’s see what the future holds!!!