[ExI] The second step towards immortality

Martin Sustrik sustrik at 250bpm.com
Thu Jan 2 19:07:57 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/01/14 17:40, Adrian Tymes wrote:
> On Wed, Jan 1, 2014 at 11:09 PM, Martin Sustrik
> <sustrik at 250bpm.com> wrote:
> 
>> The guys at the hosting facility have no private keys.
>> 
> 
> They have root access to the hardware your program is running on.
> Your private keys are on said hardware, else you wouldn't be able
> to use them. (If you put them somewhere else, then whoever's
> hosting that somewhere else.)  Therefore they have your private
> keys.

You are underestimating what crpytography can achieve. Check this:

https://en.wikipedia.org/wiki/Homomorphic_encryption#Fully_homomorphic_encryption

In short, the program would be fully encrypted (including the private
key is uses for Bitcoin transactions) and evaluated in its encrypted
form. It would never be decrypted.

Thus, the attacker won't be able to get the private key even if he's
controlling the hardware the program is running on. He can check what
the program does but he'll see just randomly looking manipulation of
randomly looking data. Still, when the program is run it will
magically produce valid bitcoin transfer requests.

Martin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSxbkNAAoJENTpVjxCNN9YXqUIAJD/eoRHqg/idDW71d//lfN/
k9Ndvki0jzctqyKLLifUiFE1A2nNi7hmlFAK1hxEr+yHba3o+K96iPZZMR904bxk
RrvrpYxY4y0K01HuKAMpro6gZtlP/RY4XNp1TVCjAQNewEd7pia/4gGPMvX6a24u
tY7u1VD8ciTrCDJo0ig7Wj+XsiQQA/5GkGY+S2qzfKQBl/Rg+g/txdbMb/kHqeop
dwS+UvZwB83zF8Lwg2PWCUXR14dH7riMN9yQRdfUCeczqVecrCKwtWG1zWRiHZ7q
WpdiRu5SHdu7L+MNHwM6NySndg1AHtbaS3vEvPVc89j0k/M3eQ5GrxO4mu2igJQ=
=KyUe
-----END PGP SIGNATURE-----



More information about the extropy-chat mailing list