White men are people too

Joined Jun 26, 2018

Profile not set

qpegl7k2dkq0gxmmrk58hm5f54d9u8rylcj074xg52  

Legacy Address
1BSkWkWjxJpziUB3HQtGuoF9nKPXQcj6Xz
Actions 837
Following 0
Followers 14
Topics following 0
And #MIGA and "Israel ZEROTH" will help us with this how?
I tried to watch that movie, and I had to stop. There was no explanation of why all this vague stuff "proves" FE. Like, if I can't explain why I humans have index fingers, does that prove FE?
Silentsam even openly supports globalism. A total establishment shill. What bugs me is that he and LR manages to get all discussion about such issues down to their level.
If memory serves, there were suppose to be some big happenings just around this date? A day or two away? Did anything big happen yet?
OK boby. If this is for my benefit you can stop explaining. I have long since written you off as incompetent as well as arrogant and condescending
This is not the security researchers mindset, rather the mindset of the whimsical engineer. If an attack is possible, it can become practical later on. Remember the amount of money involved
The answer so far seems to be "Yes, but I wouldn't do it, therefore nobody else would do it, since everyone thinks exactly the same way and are in the exact same situation as me. QED"
If a single person uses this setup for pocket money, sure, it is super secure. If a hundre million people use a standardized version of it to hold their life savings, it is a joke.
are all controlled by bugfree software and so on. Even evil maid attack can be a bit tricky on a properly designed hardware wallet (which btw I have not audited, I cannot really vouch for them)
you would have to assume that software for all extra meters like temperature meter does not have a bug that can be exploited, you would have to assume the connections you do use like wifi/usb...
I realize what is ment in the link is direct connection "attack surface", but you would then have to assume the device does what you ask and not try to "phone home" when you ask it not to...
I am extremely skeptic about taking an insecure device and gluing "security" on top of it, which seems to be the suggestion here.
Further, cellphones are not primarily made for security, the demands for conveniency/entertainment are too big, and the security demands too small. They are however made with backdoors.
An example of why such things are problematic is car hacking, which as I understand it is typically done by hacking the entertainment system first. A cellphone is one big entertainment system
https://tinyurl.com/y77tjvhd claims attack surface on such a device is "extremely small". My understanding is it is huge, enormous. All the electronics not in use on it is potentially dangerous
So what is the (supposed?) next step of Q? Will finally some secret FISA stuff be released? Or some other real action?
Is there a hardware wallet made/coming soon for SV?
I started buying SV with fiat I had set aside right before the hashwar started. I suppose that means my choice of sides is hardening.
If so, what if other nodes are given another "truth" where blocks are added to the legitimate non secret chain so it too reaches 10 blocks, will they not also set a (different) checkpoint?
Will that not lead to a new checkpoint being set and legitimate blocks inconsistent with the 10 blocks (but shorter than 10 blocks) rejected?
So I suppose I made a mess of what I was going to say above. I will reiterate it, as maybe someone has a comment on it. Checkpoint depth 10, attacker gives 10 "secret" blocks to some nodes.
OK, I shall have to just conclude that you were not smart enough to get my points and leave it with that. Fine by me.
Your counters were like "I don't understand what you are saying, can you explain?". Did I dodge that?
That part is trivial, the whole point of the "feature" was the ability to override PoW after all.
"If it wasn't smart, they wouldn't have done it would they? So it must be OK". I admit I did not prove there was a problem, but I make no excuse for it. However, it DOES mess with PoW