Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo Blockchain.info - WatchOnly address scam 2013

Seo Master present to you:
Blockchain.info provides a nice to use feature "WatchOnly Address"

Watch Only - Watch Only addresses allow you to view transactions at an address without storing the private key in your wallet.

With use of watch only address you can add address to your wallet to keep track of its balance. This is useful when you have offline wallet and you would like to see its balance in your blockchain.info account. This is possible because blockchain.info will also add balance of this address to your wallet balance and will show it as total balance in your account. For example, you have balance 2 BTC in your wallet and you add a watchonly address having 3 BTC balance , blockchain.info will show you 5 BTC as your total balance. Good.

Since it is just an address added to your wallet and not actual private key you will not be able to spend bitcoins from this address. If you will try to spend, it will ask you to provide private key.

How the scam works :

Scammer creates a brand new blockchain.info account and adds an address as watchonly. So now it will show you balance of that address as balance in the account.

Scamer confirms trade with some one for BTC. Scammer says to seller that he is a noob and dont know how to operate blockchain.info account. He gives account access to seller. Scammer asks seller that he will give access to his blockchain.info wallet to seller and seller sends him agreed upon goods ( most probably LTC or any other crypto currency ). Seller checks account and sends him goods. Seller tries to withdraw BTC and he can not.

Normally new users get stuck with this. One of my customer got this issue

So now onwards make sure you do not accept blockchain.info wallet access as payment. In case you do make sure you transferred coins to your wallet first.

In any case you should never trust wallet coming from other party as he may always have access to private keys. Always make sure bitcoins are transferred to address under your control only before completing the deal.

By buysellbitcoin of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=237439
2013, By: Seo Master

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master

seo FEATURED: Bitcoin News Aggregator 2013

Seo Master present to you: Project Name: Bitcoin News Aggregator
Type: Journalism/News Aggregator
Described as: "ONE PAGE NEWS"
URL: http://btcnews.tk
RSS Feed: http://btcnews.tk/feed/
Daily eMail Subscription: http://is.gd/btcnewsmail

Bitcoin News Aggregator, a.k.a Bitcoin News is one of the world’s first source where you can read any thing related to Bitcoin from many media companies. You no longer have to visit many websites. Now you can read all the news, opinions and articles related to Bitcoin here. You can even subscribe to our daily newsletter or directly subscribe our RSS feed. The site updates automatically every 30 minutes.

Technorati Claim Code: THWQZDK8X4AH2013, By: Seo Master

seo DDoS attacks played a role in this week's Bitcoin crash says Mt. Gox 2013

Seo Master present to you:
Mt. Gox, a Bitcoin exchange, revealed that a Distributed Denial of Service Attack played a bigger role in the company's decision to suspend trading for 12 hours Thursday than they initially claimed.

"We have two problems: the DDoS and volume related to new accounts," Mt. Gox officials confirmed. "The trade engine is capable of accepting much more of a load. Within 2-3 weeks we will completely rewrite the trade engine, in the meantime we shut down the system today and installed a new server with the current trade engine. Of course, if we didn't have DDoS everything would be fine, so now we're dealing with two issues at once."

Mt. Gox's trading suspension and technical errors drove the price down to a low of $54. JUst few minutes the price was $111.
2013, By: Seo Master

seo Why do you use Bitcoins for your business ? 2013

Seo Master present to you: BitCoin is a decentralized digital currency in the Internet. There are many businesses that use BitCoins as their exchange tools. They can be exchanged from one person to another one easily. BitCoin does not have any central banks in the world. It relies on the internet based peer to peer network. This system is very popular among all internet users to do their online transactions. This tools is widely known as the alternative currency on the Internet. Today, the monetary base of BitCoins is around 400 million US dollars. All transactions of BitCoins are going to be sent or received through some apps and websites called wallets. The wallet can be encrypted with some additional passwords to increase the protection and security. There are many benefits of BitCoins for your business. Here are some of those benefits.

1. Fraud mitigation

This is the first reason why you have to accept BitCoin in your business. BitPay is the best BitCoin processing platform. It reports that there are more than 10,000 transactions using BitCoins and there is zero incident of fraud. It means that BitCoins can be widely accepted by most people as the secure way to send and receive payment on the Internet. Because of that reason, there are many people using this service. It is very important to avoid any frauds that are very common in the Internet these days. BitCoin can be a perfect option for most businesses to send and accept payment.

2. Protect the user's information

This system is much safer than the online credit card transaction. When the information is pulled from the credit card, it also includes the user's personal information and financial information. That information is very vulnerable to any thefts and frauds. BitCoin can be a perfect solution for people who want to keep their personal information safe. There is an important feature called anonymity in this BitCoin system. It means that the BitCoin system does not pull any personal information from the users. As a business owner, you are able to protect your customers' information from any frauds or thefts.

3. BitCoin can be exchanged for the traditional and conventional currencies

This is another benefit of using BitCoin for your business. When you use this system for your business, you can receive payments in forms of BitCoin from your customers. Then, you are able to exchange it for the conventional and government backed currencies, such as US dollars, Yen, and Euros. You should understand that the exchange rates are having an upward trend because there are many BitCoin users in the world. It can be the best advantage for you as the business owners.

4. Give another alternative payments for your customers

BitCoin system can be a perfect solution for your customers who are looking for the alternative payment for them. If you sell products on your website, it is important for you to have several methods of payment, such as credit cards, PayPal, BitCoins, and many other payment methods. This is very important to give broad option to your customers when they want to purchase your products or services from your website. Having many alternatives for your online payment can be the most important thing to give the best service for your customers. They are able to purchase their favorite products or services by using their favorite payment methods.

5. As a good investment

Many business owners believe that using BitCoin system in their businesses is very important for them. They can use the BitCoin as an investment tool that they can use to prepare their future. BitCoin is a perfect option for people who want to start building their investments. The market price of this coin tends to increase from time to time because the demand keeps increasing. Because of that reason, this system can be a good investment for most people.

Those are some benefits of using BitCoins in your business. Today is the perfect time for you to start accepting this BitCoin system in your business. This system is able to improve your business performance. You can also increase your effectiveness and service in your business by using BitCoin system. Start implementing this system to your business, and you will see the results within short period of time.

Jason Smith is an online manager for BCVAWEB - dallas videographers. Jason likes blogging about online strategies that are related to SEO, Content, PPC & Lead generation.2013, By: Seo Master

seo Is Bitcoin Safe For Business? 2013

Seo Master present to you: Bitcoin can be a relatively safe way to do business. There are many things you should consider when deciding if Bitcoin is right for your business. Here's some information about Bitcoin and using it in your business.

There are several positives to using bitcoin in your business. First, the bitcoin system is a simple payment system. Once you are paid there is no middleman that can decide to chargeback the funds to the customer. This means that if you have payment, you know it will be yours to keep. This can make a significant positive difference in your companies profit margin.

Bitcoin also has no or very low fees. Compared to the fees for accepting credit cards, the Bitcoin system charges almost nothing. The fees are to keep the bicoin network secure and running well. These very small fees prevent the network with being attacked and being overloaded with lots of small spam transactions.

Bitcoin is also easy to setup at your store's location or on your online store. You can install a payment extension for your online store. These payment extensions are available for many of the popular ecommerce sites. Or you can create a QR code that customers can scan to pay with their mobile devices. You could also have your customers pay directly by scanning a qr code on an tablet or other device at your location.

Bitcoin will also expose you to new markets. Many people prefer to pay with Bitcoin. There are even some countries who cannot pay using credit cards. The Bitcoin network is accessible anywhere the internet exists. You don't need to worry about fraudulent orders as there are no chargebacks and you can wait to ship product until you have received payment.

There are a few downsides to Bitcoin. One is the fluctuating value of this relatively new currency. This volatily should smooth out in the coming years as bitcoin becomes more widely adopted. This volatility can be mitigated by converting your bitcoins to your own currency or by using a payment processor such as Bitpay. Bitpay will convert your bitcoins to dollars and send them to you everyday if you like. This is much more convenient than most credit card payment processors who they usually only send your funds once a month. Bitpay's fees are also much lower the fees you would pay if you accepted credit cards

There are several popular companies accepting Bitcoin such as Reddit and WordPress. If you would like to accept Bitcoin at your business, take some time to learn more about how Bitcoin works and become familiar with the Bitcoin system. You can learn more at www.weusecoins.com

Josiah Garber is ecommerce professional and runs an ecommerce store called Keystone Pet Place accepting payment from Bitcoin, Paypal and Credit Cards.


2013, By: Seo Master
Powered by Blogger.