from Hacker News

Proof of Existence: Storing Hashed Files in the Bitcoin Block Chain

by CrunchyJams on 11/29/13, 1:51 PM with 41 comments

  • by icebraining on 11/29/13, 2:49 PM

    Discussion from yesterday's submission, with 75 comments: https://news.ycombinator.com/item?id=6809929
  • by rdtsc on 11/29/13, 2:50 PM

    This makes me think of another thing I was wondering about -- can some entity that doesn't like having Bitcoin around for whatever reason, DDoS it by filling it with meaningless transactions.

    Maybe just setting up 100 addresses and constantly transferring small payments between them, filling the transaction history with garbage. Is that possible, and is there any protection against that?

  • by mathretardthrow on 11/29/13, 4:37 PM

    There is absolutely no proof that one-way functions exist: therefore this is not a 'proof' of existence of files at a certain date.* It is just a strong indication of it.

    * that is, at some future date (or secretly, today) an algorithm could be discovered breaking the one-way function used to generate these hashes. Then a collision could be found, perhaps with chosen-prefix. Meaning an arbitrary file could be suffixed so that it looks as though that is what was hashed today. In the past, many hash algorithms thought to be strong were weakened in this way.

  • by drakaal on 11/29/13, 3:01 PM

    Adding lots of data to the transaction logs is one easy DDoS. Do so many transactions that the logs get to be larger than fit on most systems. With multiple Gigs of data already required, if someone was evil they could up the volume and keep people out of the game by making sure that that there were over a terabyte of transaction logs. Most machines won't have that kind of storage and would "fall off" the network.

    Patient0 mentioned before I got to post this, the other attack I know would work. Destroying tokens. But it is a bit more complex than he mentions, but you can actually generate ECDSA key's that will work for one transaction, and then never again. A one time spend token that then self destructs for the person you paid.

    I haven't been able to build anything that would work for two transactions. Which would be the most useful since you'd have a delayed "poison coin" but I don't see any reason it isn't computationally possible.

  • by notacoward on 11/29/13, 3:07 PM

    I'm not exactly a big Bitcoin booster, but I love the way techniques and structures developed for it are being adapted to uses like this.

    Given that this seems very similar to el33th4xor's Virtual Notary, how would one distinguish between the strengths or use cases of the two?

    http://hackingdistributed.com/2013/06/20/virtual-notary-intr...

  • by Patient0 on 11/29/13, 2:51 PM

    "This is why the bitcoins sent in this special transaction are unspendable, as the addresses are being generated from the document's hash fragments instead of from a private ECDSA key."

    I hadn't realised before that this means that you can provably "destroy" bitcoins. That is, you can "prove" that a certain bitcoin amount will never be spent again by anyone including yourself...

  • by daviddoran on 11/29/13, 2:38 PM

    I've been interested in the benefits of something like http://www.guardtime.com/ for a while. Using a distributed network like Bitcoin seems perfect.
  • by Thiz on 11/29/13, 3:13 PM

    Can a coin survive without a ledger? I rather see a coin with proof-of-exchange without a ton-of-gigs blockchain at all.
  • by JulianMorrison on 11/29/13, 3:38 PM

    Bitcoin would be an awesome "dead drop" for untraceable communication of small data.