From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 47A54932 for ; Wed, 24 Aug 2016 19:22:17 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from outmail148098.authsmtp.com (outmail148098.authsmtp.com [62.13.148.98]) by smtp1.linuxfoundation.org (Postfix) with ESMTP id 81B01250 for ; Wed, 24 Aug 2016 19:22:16 +0000 (UTC) Received: from mail-c232.authsmtp.com (mail-c232.authsmtp.com [62.13.128.232]) by punt21.authsmtp.com (8.14.2/8.14.2/) with ESMTP id u7OJMFE3018883; Wed, 24 Aug 2016 20:22:15 +0100 (BST) Received: from petertodd.org (ec2-52-5-185-120.compute-1.amazonaws.com [52.5.185.120]) (authenticated bits=0) by mail.authsmtp.com (8.14.2/8.14.2/) with ESMTP id u7OJMBwW044004 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 24 Aug 2016 20:22:13 +0100 (BST) Received: from [127.0.0.1] (localhost [127.0.0.1]) by petertodd.org (Postfix) with ESMTPSA id 38B9F40118; Wed, 24 Aug 2016 19:18:59 +0000 (UTC) Received: by localhost (Postfix, from userid 1000) id 13E3A20532; Wed, 24 Aug 2016 19:22:11 +0000 (UTC) Date: Wed, 24 Aug 2016 19:22:11 +0000 From: Peter Todd To: Matthew Roberts Message-ID: <20160824192211.GB24668@fedora-21-dvm> References: <20160824014634.GA19905@fedora-21-dvm> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="QTprm0S8XgL7H0Dt" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) X-Server-Quench: 0fde77a5-6a30-11e6-829e-00151795d556 X-AuthReport-Spam: If SPAM / abuse - report it at: http://www.authsmtp.com/abuse X-AuthRoute: OCd2Yg0TA1ZNQRgX IjsJECJaVQIpKltL GxAVKBZePFsRUQkR aAdMdAYUGUATAgsB AmAbWVReUl97WGA7 bghPaBtcak9QXgdq T0pMXVMcUQIXe2Fz QXkeVh1ydwEIfnx2 YwhiCCQOW0MrcFt7 E01UCGwHMGF9YGIW BV1YdwJRcQRDe0tA b1YxNiYHcQ5VPz4z GA41ejw8IwAXAy1N Qx0EKRo/T0gKFT8x QQxKPTIpEFwdQDko ZwNhYhQnF0ELOUU/ PRMMUEgEM1VwQiFZ AktJDTRBKl8NRiwk RTtAWlITGyFcRiE0 X-Authentic-SMTP: 61633532353630.1037:706 X-AuthFastPath: 0 (Was 255) X-AuthSMTP-Origin: 52.5.185.120/25 X-AuthVirus-Status: No virus detected - but ensure you scan with your own anti-virus system. X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] Capital Efficient Honeypots w/ "Scorched Earth" Doublespending Protection X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Aug 2016 19:22:17 -0000 --QTprm0S8XgL7H0Dt Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Aug 25, 2016 at 01:37:34AM +1000, Matthew Roberts wrote: > Really nice idea. So its like a smart contract that incentivizes > publication that a server has been hacked? I also really like how the > funding has been handled -- with all the coins stored in the same address > and then each server associated with a unique signature. That way, you > don't have to split up all the coins among every server and reduce the > incentive for an attacker yet you can still identify which server was > hacked. >=20 > It would be nice if after the attacker broke into the server that they we= re > also incentivized to act on the information as soon as possible (revealing > early on when the server was compromised.) I suppose you could split up t= he > coins into different outputs that could optimally be redeemed by the owner > at different points in the future -- so they're incentivzed to act lest Remember that it's _always_ possible for the owner to redeem the coins at a= ny time, and there's no way to prevent that. The incentive for the intruder to collect the honeypot in a timely manner is simple: once they've broken in, the moment the honeypot owner learns about = the compromise they have every reason to attempt to recover the funds, so the intruder needs to act as fast as possible to maximize their chances of being rewarded. --=20 https://petertodd.org 'peter'[:-1]@petertodd.org --QTprm0S8XgL7H0Dt Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJXvfPgAAoJEGOZARBE6K+yY9AH/RFGbldLUmLTUobuKwsF2LAg DxtP+8UoTLAWr6q8kJhyLooxrTq6dzh+UNEEH+/nGe2FvqkgP9Wftwc51fjFTuWG Owt7OZB3BNt90VAOXFAtKNC0LvWdV2ligeFg/KHCeEUw06tRMxgnzqGcAayKCSrI n8tfGJ1jgX6HLJM7oHOulA4SFh6+FeRROpr6DhslCyRcS/ukwwyYSaoX+BczoMQq 0IZrX952/w7K5XpmalBkLLw2jOWDY40dklx+XE6ygbjm8yl3pd/tK5Y6lrXeYnCy iMjZezhGbmOeO/8XG/lIulAXoxbaSiIVWJk0i17alA4EfEpkIKm8qkS97HAwfhA= =FXt0 -----END PGP SIGNATURE----- --QTprm0S8XgL7H0Dt--