Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Qoz4k-0003rk-HR for bitcoin-development@lists.sourceforge.net; Thu, 04 Aug 2011 14:39:06 +0000 X-ACL-Warn: Received: from zinan.dashjr.org ([173.242.112.54]) by sog-mx-1.v43.ch3.sourceforge.com with esmtp (Exim 4.76) id 1Qoz4f-0005sp-Ml for bitcoin-development@lists.sourceforge.net; Thu, 04 Aug 2011 14:39:06 +0000 Received: from ishibashi.localnet (fl-67-77-87-241.dhcp.embarqhsd.net [67.77.87.241]) (Authenticated sender: luke-jr) by zinan.dashjr.org (Postfix) with ESMTPSA id EEB2D3AA050 for ; Thu, 4 Aug 2011 14:38:53 +0000 (UTC) From: "Luke-Jr" To: bitcoin-development@lists.sourceforge.net Date: Thu, 4 Aug 2011 10:38:44 -0400 User-Agent: KMail/1.13.7 (Linux/2.6.39-gentoo; KDE/4.6.4; x86_64; ; ) References: In-Reply-To: X-PGP-Key-Fingerprint: CE5A D56A 36CC 69FA E7D2 3558 665F C11D D53E 9583 X-PGP-Key-ID: 665FC11DD53E9583 X-PGP-Keyserver: x-hkp://subkeys.pgp.net MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-15" Content-Transfer-Encoding: 7bit Message-Id: <201108041038.47396.luke@dashjr.org> X-Spam-Score: -0.8 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -0.8 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain X-Headers-End: 1Qoz4f-0005sp-Ml Subject: Re: [Bitcoin-development] Blitcoin? (Black Hat 2011) X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Aug 2011 14:39:06 -0000 On Thursday, August 04, 2011 6:56:42 AM John Smith wrote: > L.S. > > Some bitcoin "security vulnerabilities" have been discussed by Dan Kaminsky > at BH 2011, there is one article about this dated yesterday: > > http://searchsecurity.techtarget.com/news/2240039221/Black-Hat-2011-Dan-Kam > insky-reveals-network-security-research-topics > > The article is very unspecific though. They talk about a tool called > "blitcoin" that "unmasks" both sides of a bitcoin transaction. A google > search also turned up nothing, except some misspellings. Well, that certainly doesn't sound like a security vulnerability at all. It's by design that everyone knows about every transaction.