Hacker Newsnew | past | comments | ask | show | jobs | submit | Qweef's commentslogin

It's awesome!!


here's richard wilkinson talking about why income inequality is toxic


The author goes to great lenghts to analyze transactions, yet he fails to reveal even a single name.

Bitcoin is not anonymous, but finding out who did what is damn hard.


There are two authors.

We made a decision not to reveal names (or forum names, etc), because we are doing academic research here. Our motivation is to let people know they aren't inherently anonymous when they use Bitcoin, rather than to publicly compromise the privacy of as many individuals as we can.

We could have published a mapping between information we had (typically bitcoin forum usernames, twitter handles, lists of names of organisations) and sets of bitcoin addresses. This would probably have made our point in a harder-to-argue-with way, but probably wouldn't be a good thing to do.

Of course we don't typically have names and addresses of the people using Bitcoin.

We weren't interested in arguing that its often possible to go from, say, forum IDs, or twitter accounts, to names and addresses. I suspect everyone knows that.

What we were trying to show is that Bitcoin doesn't automatically hide your identity, and that a lot of activity on Bitcoin, that seems superficially hard to analyse, can actually be analysed. Our point was that a lot of people might think the Bitcoin system is making them anonymous, because they are often using different Bitcoin addresses, but that people had better be careful (say, if they are using Bitcoin while living in a repressive regime) because its much easier to link your different addresses than you might think.


You could release a list of hashes with a known input format corresponding to (name, key) tuples. That way, any individual could check whether their own key had been de-anonymized by your analysis, without creating a public mapping between the two.


Pseudonymous, as they call it. Pseudonyms are very public (wallet addresses), but association to real identities is not provided.


Until you have something delivered to your real address, or exchange bitcoins with a financial account in your real name.


Right, exactly.

With careful precautions, Bitcoin can, I'm sure, be used anonymously. (Mine the coins yourself, connect to the network using TOR, never use your computer for anything else, be paranoid, never pay for a transaction that could be linked to you, etc).

By this argument, credit cards can be used anonymously too. But everyone isn't going around saying that credit cards are anonymous.

If, sometime in future, Bitcoin happened to be commonly used for online commerce, by casual, semi technical users, then, with the system as its currently implemented in clients, most of most peoples transactions are going to be very obviously linked to other transactions that are linked to their real identities.

If, as the implementation currently stands, casual users were doing their Amazon.com shopping using Bitcoin, Bitcoin probably wouldn't look very anonymous to Amazon at all.

I can only guess how anonymous it looks to Mt Gox.


How is it that credit cards can be used anonymously?


What I mean is that while the credit card system can be used anonymously, it is not easy to do so. By default, most casual users of credit cards should assume they are certainly not anonymous. And most people with credit cards know this.

Now, if you google for it, you will find people out there that are very careful about their privacy, and so go through great lengths to acquire and use credit cards that are not bound to their identity.

I can't speculate why they do this. My point is really that you wouldn't say 'the credit card system is anonymous' even though it can, with great care, probably be used anonymously.

Equally, people shouldn't say 'Bitcoin is anonymous', if the case is that it can be anonymous if used with care, but when used casually, it also leaves information that can be used to link user accounts. People should not think of it like cash.


They sell gift cards that can be used as credit cards for cash.


Pretty cool. This is like a spiritual successor to WebOS, which was awesome btw.

Though, WebOS didn't take the API idea nearly this far.


I don't get it...can't pretty much any device capable of running Netflix also run Youtube?


Excellent use of tax dollars, freedom of speech, and small government.


They could have just come and asked here.

You must have already have root but since they mentioned it's a Samsung phone then all you do is find a CWM/Rooted kernel tar and flash via Odin then do the steps below.

adb -d shell

sqlite3 data/data/com.android.providers.settings/databases/settings.db

sqlite> update system set value=0 where name='lock_pattern_autolock'; sqlite> .exit

exit

Reboot from there and the lockscreen is bypassed.

Remember kids, use this for good and not evil muahahhahaahhaah


(IANAL) Modifying anything on the phone would make the data inadmissible.


I don't think the "A Haskell tutorial" part of the submission title is accurate. It's an mp3 tutorial... which happens to use Haskell. Not everything which uses Haskell is specifically about doing so. :-)


Was that actually in the submission title here at HN? I didn't put that into it and it's not there now, so if it was.. we know an admin was fidgeting with it! :-)


How fun would it be if you could program it with facial recognition and replace con attendants with their fursonas? :D


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: