On Wed, Nov 15, 2017 at 10:42 AM, Raul Miller <rauldmil...@gmail.com> wrote: > Assumption is invalid. Flaws are widely documented (e.g. fixed > supply). Probably wrong list, also. >
Ok a little more on topic then. SSH. How would you secure SSH without a password, iteratively password - free? a blank password does not count as password-free. My motivation is turn the internet upside down. Does any current crypto mechanism come to mind? A possible example is the use of Diffie-Hellman at the network layer to identify hosts. I think that would be password-free. > Thanks, > > -- > Raul > Thanks, James > On Wed, Nov 15, 2017 at 8:46 AM, James <jamex1...@gmail.com> wrote: >> While a little off topic it is security related so I hope you don't mind. >> >> This is the misc list, right? >> >> Assumption 1. >> bitcoin is a secure protocol without flaws. >> >> quote from >> https://github.com/bitcoinbook/bitcoinbook/blob/second_edition/ch01.asciidoc >> >> With these keys they can sign transactions to unlock the value and >> spend it by transferring it to a new owner. Keys are often stored in a >> digital wallet on each user’s computer or smartphone. Possession of >> the key that can sign a transaction is the only prerequisite to >> spending bitcoin, putting the control entirely in the hands of each >> user. >> >> >> Is the security of a bitcoin wallet ultimately determined by it's password? >> The way I see it If an attacker had access to my computer, the only >> thing protecting access to the wallet would be a password or some >> iteration of a password scheme, if not mine than a centralized server >> of trust somewhere, but eventually someone has a password that is used >> to, unlock a bitcoin. Is that correct reasoning or are there >> alternatives? >> >> Thanks, >> James >>