Avatar
jared
b726e71bce585201181ace89326ae428406cee071395f9bf12b62b62d0449b23
Cybersecurity. Identity. Powershell. Class of 2013. Degree in Bending from Bending State.

I can’t believe it’s been ten years since Daft Punk dropped Random Access Memories! Great album!

Ps>return ($silence -eq $violence)

$false

Not legally the same. One is an attack on a concept, the decentralized protocol, the other is on an asset owned by an individual (or org). The CFAA prohibits unauthorized access to an individual’s or company’s computers or systems. Blockchain / protocol vulnerabilities can be exploited without the unauthorized access

Yes, when you ā€œhackā€ someone else’s server you are performing ā€œunauthorized accessā€. Not so with a contract or protocol weakness that can be exploited by, say, submitting (malformed?) transactions to your own node, so you never did any unauthorized access. That’s the difference

ICANN/Verisign Proposal Would Allow Any Government To Seize Domain Names

https://m.slashdot.org/story/413388

Apparently Satoshi’s work of art is fine to dump on our storage without permission but U2’s work of art is not?!?!

Yeah that checks out

I’m trying to build a powershell client which might help. Focus right now is porting a reference bech32 library to powershell

This is why I proposed a ā€œburn noticeā€ event to @nostr.build. Anyone with the private key for an npub should be able to issue a ā€œburn noticeā€ event that includes a reason, say ā€œkey_compromiseā€ or ā€œmigrationā€. If nostr / npub+nsec will be used for authentication, then key revocations must be made possible. In bring-your-own identity models, the user is the credential issuer (not a centralized identity provider) so the user (or private key holders) should be able to notify the nostr network (via the nostr signed event) that the key should not be used or treated with extra care. Nostr clients could warn appropriately for interactions with burnt nbups and websites using auth like described above could also handle appropriately.

With proper client handling decisions around burn notices, it could be made only attractive to the real user to issue a burn notice, and disadvantageous for an attacker with the private key to burn it intentionally.

For example, the burn notice event should include a hint to the new npub but clients should be careful about allowing interaction with new npub. NIP-05 verification could enable smooth transition to the new npub since control of the dns domain is demonstrated in addition to having the private key. Attackers would also need to gain control of the nip05 domain to abuse burn notices in their favor.

Also, npub / nostr authentication to websites should add TOTP codes (not passwords!) on top for mfa

šŸŽ¶Tide is high but I’m hodling on

šŸŽ¶there’s only gonna be twenty one

šŸŽ¶million

šŸŽ¶million

Right now it’s adhoc ā€œhey, here’s my new npub, everybodyā€

For self-reporting key compromises and publishing what your new npub is