[ExI] The second step towards immortality
sustrik at 250bpm.com
Thu Jan 2 19:07:57 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 02/01/14 17:40, Adrian Tymes wrote:
> On Wed, Jan 1, 2014 at 11:09 PM, Martin Sustrik
> <sustrik at 250bpm.com> wrote:
>> The guys at the hosting facility have no private keys.
> They have root access to the hardware your program is running on.
> Your private keys are on said hardware, else you wouldn't be able
> to use them. (If you put them somewhere else, then whoever's
> hosting that somewhere else.) Therefore they have your private
You are underestimating what crpytography can achieve. Check this:
In short, the program would be fully encrypted (including the private
key is uses for Bitcoin transactions) and evaluated in its encrypted
form. It would never be decrypted.
Thus, the attacker won't be able to get the private key even if he's
controlling the hardware the program is running on. He can check what
the program does but he'll see just randomly looking manipulation of
randomly looking data. Still, when the program is run it will
magically produce valid bitcoin transfer requests.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
-----END PGP SIGNATURE-----
More information about the extropy-chat