We have broken SHA-1 in practice This industry cryptographic hash function standard is used for digital signatures and file integrity verification, and protects a wide spectrum of digital assets, ranging credit card transactions, electronic documents, open-source software repositories and software updates.
It is now practically possible to craft two colliding PDF files and obtain a SHA-1 digital signature on the first PDF file which can also be abused as a valid signature on the second PDF file.
For example, by crafting the two colliding PDF files as two rental agreements with different rent, it is possible to trick someone to create a valid signature for a high-rent contract by having him or her sign a low-rent contract.
In addition to bruteforcing the infohash, you also have to crack the hashtable which contains 1 hash for every 64KB - 2MB piece of the file, every fraudulent piece you create has to be exactly piece size limit, and all those pieces together have to equal another hash from the sum of all those pieces.
See you next millenium, MAFIAA.
Owen Moore
are you retarded?
Charles Williams
??? lel
Anthony Hernandez
you only have to find a collision for one chunk
Alexander Baker
Every single torrent has to be completely rehashed again.
Not really, there's still some barrier to entry and my thousands of anime torrents don't really have a any value in targeting.
Robert Turner
...
Nathan Parker
no thanks
Benjamin Green
not written in an official meme languageā¢
Cameron Moore
shit, I didn't know that. Then what's the point of building a quantum computer? Can't we all just move to quantum-secure crypto right now?
Samuel Smith
Asymmetric post-quantum cryptography is not a solved problem. You'd have to drop public/private key systems.
Aiden Rivera
If you want to research existing/new quantum secure algorithms, implement them in existing protocols & software, and then convince everyone to upgrade to a protection against a threat that doesn't really exist in practice, go ahead.
Adrian Ortiz
why is every fucking board on Holla Forums full of ipfs retards frothing from the mouth? ive *still* never seen them say a single valid thing after at least a year since they started shilling
Logan Moore
go back to 4chan faggot
Tyler Gutierrez
*unsheaths go-ipfs*
Brandon Davis
if you want to circlejerk over your 1337 t3c|-| $|>>>/reddit/
Some of us are here to learn by posting zero-effort spoonfeeding questions on topics we don't really care about
Torrents aren't really affected, afaik it's a tree of hashes. You can't going to realistically do anything to torrents.
It's interesting but it's just the hash treadmill. By the time anything will be practical applications seriously affected will have moved onto the next digest.
Logan Brown
sha256 is already obsolete today, those who are smart use sha4096 instead
Blake Garcia
exactly. that makes it even easier
Tyler Ramirez
If wikipedia is to be believed each chunk of the file is checksumed and is stored in the torrent file/DHT. Every time a new chunk is downloaded it's hashed and checked against the hash in the torrent file.
Joseph Walker
Or you're part of a big group, like people who torrent game of thrones or the latest movie or something.
Nathaniel Hughes
Imo everything should have at least two hashes, if torrents had both MD5 and SHA1 hash of each block this wouldn't be a big problem. Personally I think Blake2 + SHA3 would be a nice combination. Wouldn't even hurt performance that much.
Sebastian Walker
yes it would.
Luke Bell
my dick is quantum. simultaneously in your waifu and in your mom.
Zachary Gomez
Blake2 and SHA3 combined are less cycles per byte than SHA1.
Gavin Hughes
case in point. did you guys like go to 4chan and get rekt by them when you tried to shill ipfs or something?
Jackson Smith
Skein. Get on my level
Landon Watson
Skein, Groestl and JH can have 1024-bit hash.
Aaron Martinez
What is there to say about it? You don't need people to SAY something valid when you can test the validity of the client yourself first hand, there's nothing more to it either, you want to send and retrieve files to and from peers, it does that. What more is there to say about it? This isn't like all those past projects that only had whitepapers I don't doubt it but if nobody is implementing it then it's practically useless, IPFS has actual clients you can use right now, it has transitional gateways that work right now, there's nothing to talk about because it's already implemented, the only things there are to talk about it the future features which seem nice and the optimizations but all that stuff is dull. People don't even talk about that kind of stuff with BitTorrent.
Eli Hernandez
Absolutely false when we're talking about software implementations. Hardware accelerated SHA3 is supposedly extremely fast but I've yet to see any real benchmarks. Blake2b is a suitable replacement for torrents performance and security wise but the hashes are over 3 times longer which means the torrent files/initial DHTs would also be over 3 times larger. Terabyte size torrents already have torrent files over 50MBs so over tripling it is pretty inconvenient.
Josiah Moore
That would make things even worse to defend against attacks like this. You do understand why algorithms like bcrypt exist?
Aaron Williams
What happened to that 'we bear raaaaaaaaa' whatever shit where they 'made the future of torrent' where a file would be divided in multiple pieces and both would be downloaded separately then combined by the end user, supposedly granting legal immunity to pirates
Cameron Hall
No, it doesn't.
Jayden Roberts
You mean freenet? Nobody used it because it was slow back in the day and required shitty Java. It grants "plausible deniability" because everything you host is encrypted so you have no idea what's actually on your drive at any moment. Once IPFS implements private swarms and the datastore code, allowing it to point to added data instead of making a copy of it, it will replace torrents anyways. It's already used heavily in many major Ethereum smart contract services.
Jeremiah Howard
sha512 is faster and more secure than sha256 and yet still isn't used in TLS HMACs. Really makes you think.
Do you understand that you have no idea what you're talking about? Hashing speed has nothing to do with the vulnerability found in SHA1. Google exploited a bug in the algorithm that made it easier to replicate a result, they didn't brute force it. It's still pretty much impossible right now to brute force SHA1. Second of all if bcrypt is so much better then why doesn't everything use it? Because it's a password hashing algorithm not a general purpose cryptographic hash algorithm. Bcrypt uses a random salt so your hash of "password" is different from my hash of "password". You're comparing apples to oranges.
Christian Gonzalez
doesn't downloading large things over tor fuck up the network?
Joseph Garcia
jesus christ. this board is fucking awful. most of you faggots have no fucking clue about anything. i regret that i created this thread. please kill yourselves.
Luis Garcia
Can you use torrents anonymously yet? No? Why are you using them?
That's what they want you to think :^) Besides i2p is built to better handle things like file sharing. Once Monero integrates it every miner and wallet will be a full i2p node and will catch up to Tor level popularity very quickly.
I barely come here anymore because of the constant bombardment of shit threads that are made. The mods should've really been more assertive about all the bullshit. You think it's worth making a /tech2.0/ with mods that enforce the rules?
Gavin Peterson
Just for clarification, does torrenting over tor harm the network because 1. Downloading large files over tor overloads the network 2. Making many connections to many peers overloads the network 3. Some other reason I didn't mention Or any combination of the list. According to this link, it seems to be mainly number 2. Also, there's the problem that you're not seeding through tor. tor.stackexchange.com/questions/11695/is-it-possible-to-use-bittorrent-over-tor-without-harming-the-network/11712 I guess I should ask is there anything different with ipfs that would change its affect on the tor network.
Adam Ramirez
Imo it should be encouraged. If a larger number of the people who use VPN services for torrenting would use Tor there would be more people contributing hardware to is since people like their torrents fast but even more importantly it would make traffic analysis much harder.
Jayden Collins
Pretty much what you said. Tor clients have to connect to a limited number of volunteer onion nodes so if everyone opens 50 connections it'll get out of hand fast. In i2p on the other hand every client participates in the routing of other peers so it's much more decentralized and better for complex applications beyond just websites and email. Unlike Tor, which only routs TCP, i2p can also rout UDP. i2p actually has an official bittorrent client already. IPFS is worse then torrenting on Tor because of all the additional DHT broadcasts it makes. Like I said, i2p is the way to go. Everyone asks about Tor because that's what most people know about but they don't really understand it. i2p is smaller but in the next 5 to 10 years I'm betting it will surpass Tor.
What? Tor clients don't contribute anything to the network. In fact the more clients there are the slower the network is given a constant amount of nodes.
Angel Collins
TOR and i2p serve two different niches. i2p is not built to access the clearnet.
Ethan Watson
Why do you think I meant the clients? There would be more reason for people to set up tor nodes is waht I meant.
Aaron Diaz
We should definitely do something about current state of imageboards. Firstly we should move to alternative network, internet is too friendly to normalfags. Maybe i2p or we can go full dn42 style creating one big VPN with use of BGP, everyone who would like to join would be required to run their own router and configure it properly. That would basicaly solve a lot of quality problems, at least on Holla Forums. Result would be almost 99.9% normalfag-free community network. Cjdns could also work. If anyone is interested we should definitely do something. We have the technology to move away from this shit, just a little bit of effort is required.
Jaxson Cox
I apologize for this user was the very first one who shilled ipfs into tech.
Hudson Fisher
i love i2p but it's fucking dead. also vpn with torrent works fine.
ipfs needs i2p support if it's going to ever work because filesharing over tor will kill the network.
Dominic Turner
gowo-whapf's-this
Noah Ross
...
Josiah Jones
Have you seen just how amazingly long it took for websites to leave SHA1 and RC4 behind? Literally Google and Mozilla had to interfere with the internet and have their browsers stop supporting it since last year, and if you have an old browser (which is pretty likely because normies fucking hate software updates, literally one of the top hates against Windows 10) you're still going to be able to connect to a website using SSL with a SHA1 certificate.
Also, I'm a megacorporation sysadmin, and you'd be surprised at not only how much of a pain in the ass it is to leave SHA1 behind on some softwares (for example, the very widely used IBM WebSphere Application Server), but also how amazingly difficult it is in some companies to get permission to do this shit. My company fortunately grants an exceptional license to fiddle with production servers in the name of security, but I'm pretty sure other companies might not think the same.
Nathan Sanders
I'm kinda glad Moore's law is dead, because I don't see SHA-1 being completely phased out by 2040
Brody Young
cia niggers don't want you to have sha512 nigger cattle.
This guy gets it. Except for cjdns part, cjdns community is currently hipsterland, and code itself is kinda buggy atm. Take a look at AnoNet, they allow peerings over pretty much anything (tor, i2p, clearnet (if you want to)). Peerings over tor are actually usable both latency and bandwidth-wise. I haven't looked at dn42 much personally, but it seems that they prefer peerings over clearnet and more nearby nodes.
Thomas Howard
we are already setting up bgp over tor/i2p/whatever, we got an irc for that sorta: irc://6mk5za2izxm5ubu7bhzw3io7x5h6yjnlc7iccmn2ilbwptceaiwq.b32.i2p/ or irc://psii2pdloxelodts.onion/
channel is #overchan
we also have a usenet network fork with imageboard ui but everyone here has shat on it or stuff.
Owen Taylor
also on mainline cjdns network at irc://reseed.i2p.rocks/
Jackson Gutierrez
replaced by what? i won't pay for some bullshit "services" like spotify or netflix
Kevin Foster
So what are we using for our shit now? sha256?
Josiah Evans
one time pad ^____^
Kayden Mitchell
BLAKE2. or SHA3 if you don't mind it being slower.
Austin Williams
We don't need to make it harder to use we just need to decouple mods from boards. Once we get this you can "choose your mod". You can have Autistic Andy or GNU/Linux Gabe moderating your posts and filtering out the shit threads for free.
We need decentralized imageboards where a faggot admin can't give mod powers to his reddit-tier buddies. Where the first person to claim a specific board doesn't get to stay Emperor for Life (along with his inability to effectively mod).
Nathaniel White
That's what I'm exactly thinking of. I gonna base it on NNTP, however, all my current work is in draft stage. I already started working on implementation though. Basically, every board would be like its own CA, with BO being essentially root key. All stuff would be moderated by signed messages from BO or moderators chosen by BO, and populated thru bit modified NNTP (with forced node signing and verification at every hop). Every node owner would be allowed to pick any boards they want, board name would include public key, therefore it would be possible to add boards with same name, but different key simultaneously, thus node owner would be able to provide multiple versions of moderations for particular board. Basically all moderation would be based on solid cryptography and decentralized. I'm planning using whatever mentioned at testing stages, though, to avoid unneded publicity untill it's solid. If you want more info or help me with it feel free to join irc other user mentioned.
Luke James
...
Brody Thomas
The type of people who watch culturally enriched TV series typically run NSA malware as their OS already.
Camden Edwards
Well, that was how it was solved in the ed2k protocol many years ago.
ed2k use MD4 hashes combined with file size for identifying files. The hash is a hash of the concatenated string of the hashes of chunks of 9.28MiB.
AICH (Advanced Intelligent Corruption Handler) was added to links. For corruption handling and together with the fact that filesize and hash are used together as identifier, it mitigates many problems with collisions.
In AICH each chunk is divided into 53 parts which are hashed with SHA1 to form a hashset of the chunk. The concatenated string of these hashes are then hashed to a verifying hash. All this is put into a tree with the root hash being a hash of the concatenation of the two verifying hashes below it in the tree. This hash is a part of the link or can be exchanged between clients, if it's missing.
Levi Price
Moderation should never involve deletion. Moderation actions should just be actions on the clients' views. If the client frontend is written to allow users to choose who's moderation decisions impact their view (or if any impact their view), then moderation effectively becomes an anarchic practice. The 'selected' moderators are only special as their moderation actions get stored with the board, but theoretically I don't see why there couldn't be user-moderators who host their actions elsewhere and clients can select them as "action-sources" (so long as the view rendering occurs client-side, for server security reasons).
James Garcia
muh security design a convoluted obscure system nobody can figure out how to break, thats how you win
Brayden Lopez
I've seen that idea before, and I like it enough that I'd want to try it, but it has a few issues.
Bans become impossible without leaking persistent identities. Bans are not strictly necessary, but they can be very useful.
If you (soft-)delete a post, what do you do with the replies and other posts that follow from that post? Do you also implicitly delete all the replies to the post? How do you detect a reply that doesn't want to get flagged as a reply, and how do you deal with posts that reply to multiple other posts?
Jackson Robinson
Bans are always impossible with true user tech.
Henry Peterson
Only on 64-bit processors. It's WAAAAYYYYY slower on 32-bit machines.
Torrenting over Tor is a bad idea because BT clients are REEEEEAAAAALLLLLLYYYYY promiscuous with your IP address. IOW, use Tor, show up in the swarm anyway.
Nicholas Hall
There's a difference between anonymity from mods and anonymity from users. The first doesn't affect discussion. It's a privacy feature, not a discussion format feature.
Jose Ward
As someone who uses Tor to torrent over, my client is specifically configured to torrent over TCP connections only, and over a SOCKS proxy (to Tor). The only thing the torrent client can access not over TCP/Tor is DHT for search-only (no announce) operations, as 95% of trackers are UDP-only.
There's still the vulnerability that $TOR_EXIT with $PORTID1 matches $DHT_CLIENT with same $PORTID1. Differing torrent and DHT ports would fix this small hole, but the media companies are unlikely to try and pop users of this method when there's lower-hanging fruit.