On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller <rauldmil...@gmail.com> wrote:
> Assumption is invalid. Flaws are widely documented (e.g. fixed
> supply). Probably wrong list, also.
>

Ok a little more on topic then. SSH.

How would you secure SSH without a password, iteratively password - free?
a blank password does not count as password-free.

My motivation is turn the internet upside down.

Does any current crypto mechanism come to mind?

A possible example is the use of Diffie-Hellman at the network layer
to identify hosts. I think that would be password-free.


> Thanks,
>
> --
> Raul
>

Thanks,
James



> On Wed, Nov 15, 2017 at 8:46 AM, James <jamex1...@gmail.com> wrote:
>> While a little off topic it is security related so I hope you don't mind.
>>
>> This is the misc list, right?
>>
>> Assumption 1.
>> bitcoin is a secure protocol without flaws.
>>
>> quote from 
>> https://github.com/bitcoinbook/bitcoinbook/blob/second_edition/ch01.asciidoc
>>
>> With these keys they can sign transactions to unlock the value and
>> spend it by transferring it to a new owner. Keys are often stored in a
>> digital wallet on each user’s computer or smartphone. Possession of
>> the key that can sign a transaction is the only prerequisite to
>> spending bitcoin, putting the control entirely in the hands of each
>> user.
>>
>>
>> Is the security of a bitcoin wallet ultimately determined by it's password?
>> The way I see it If an attacker had access to my computer, the only
>> thing protecting access to the wallet would be a password or some
>> iteration of a password scheme, if not mine than a centralized server
>> of trust somewhere, but eventually someone has a password that is used
>> to, unlock a bitcoin. Is that correct reasoning or are there
>> alternatives?
>>
>> Thanks,
>> James
>>

Reply via email to