If they had control over Bitcoin they would not be taking measures like this.
(twitter.com)
😷 DEM PANIC 💉
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (229)
sorted by:
If someone created it, it can be gamed whether people want to admit it or not.
Normally I would agree, but I don't see how that's currently possible with bitcoin. It would be easier to hack into the Pentagon.
I dont think bitcoin needs to be hacked. Having the ability to print money means that the FRB could buy, sell and manipulate the price of BTC to screw over the little guy.
Apples to oranges...all that takes is one person with the right log information to be able to see information coming and going. Bitcoin doesnt operate that way because of the 1000s of miners worldwide verifying transactions...all the individual computers have to agree on what the transactions are for it to be verified...you have to hack at least 51% of the miners for any fraudulent changes to take place...not being condescending please go look up how bitcoin works before you assume its just like all computer networks. Its not
If you're accessing your Bitcoin wallet on a Windows, Apple, or Google OS, you're easily hacked, and there's a reason Microsoft, Apple, and Google are contributing to Linux and flooding distros with Flatpaks.
taps forehead
Do you think that was easy? Does it happen often? Did they do it without getting caught?
Manipulating bitcoin would be orders of magnitude more difficult. Like hacking every computer in the world simultaneously. Good luck. I agree that nothing is "impossible" but there are things that are so difficult to do that it's not even worth it.
"no, you're wrong. I don't know the answer, but there is an answer, but you're not smart enough to find it"
That's what your comment sounds like.
NSA’s automated hacking engine offers hands-free pwning of the world With Turbine, no humans are required to exploit phones, PCs, routers, VPNs. by Sean Gallagher - Mar 12, 2014 3:20pm EDT
Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald in The Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale.
Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream.
Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked.
Blade Runner Game Director Louis Castle: Extended Interview The “selectors” that analysts can use to target victims through Turbine are significant. Using Turmoil as a targeting system, Turbine can look for identifying cookies from a number of Web services, including Google, Yahoo, Twitter, Facebook, Hotmail, and DoubleClick, as well as those from the Russian services Mail.ru, Rambler, and Yandex. Those cookies are all available for targeting purposes, as is user account information from a whole host of services.
Enlarge / The NSA's collection of selectors. Turmoil can also key in on Windows Update identifiers, software serial numbers passed over the Internet, and signatures from physical devices such as phones’ International Mobile Station Equipment Identity (IMEI) numbers and Wi-Fi MAC addresses. All of these things can be indexed as metadata by Turmoil and tied by other metadata to a specific target.
Once installed, implants give the NSA and GCHQ a way to extract data from the target, monitor its communications, or launch attacks against the network the target resides on. Turbine implants have even allowed the NSA and GCHQ to hack IPSec VPN connections by inserting an implant on routers that break VPNs’ key exchange process, opening virtually any VPN to direct surveillance.
Hammer time The documents published today include slides from the NSA’s Turbulence team detailing the “phases” of the NSA’s capabilities to monitor VPN and Voice over IP (VoIP) traffic using a set of attacks known as Hammerstein and Hammerchant. Previously, it was known that the NSA could exploit the older Point to Point Tunneling Protocol (PPTP) for VPNs. But the new documents show how Turbine and Turbulence can be used to attack VPNs using the more secure Internet Protocol Security (IPSec) standard.
At the most basic level, Turbulence simply captures metadata from Internet Key Exchange (IKE) messages between systems connecting over an IPSec VPN. The NSA can apparently perform a “static tasking” against an IPSec VPN based on its IP addresses using the Hammerstein implant. (Hammerstein is a piece of malware injected into a router sitting in the path of the VPN traffic, which forwards key exchanges and encrypted data to a Turbulence system.)
Hammerstein allows the NSA and GCHQ to tap into networks that don’t pass through the Turbulence checkpoint. The data can then be pushed through a specialized VPN-cracking “blade” in the Turmoil server hardware to decrypt the content.
Enlarge The Hammerchant implant does roughly the same thing with digital voice calls and video conferences that Hammerstein does with VPNs. It can intercept call traffic based on the SIP and H.323 protocols, allowing “call surveys” that collect metadata or capture the actual voice content.
Turbine added the capability of “dynamic tasking” to these attacks. It can send identifying information on the fly to Hammerstein or Hammerchant automatically based on a set of parameters set by an NSA operator with a few mouse clicks.
Enlarge Search and destroy Other man-in-the-middle and “man on the side” attack systems are also tied into Turbine. Quantum Insert, the attack tool used to hack the networks of OPEC and the Belgian telecommunications company Belgacom, can also be controlled by Turbine by using webpage request data collected by Turmoil to automatically trigger an attack. Turbine can push an HTML request posing as a response from a visited site back through a Quantum Insert implant on a server or router closer to the server the request is sent to. It does this because of a microseconds-long response time advantage to convince the target’s browser that it’s the response being sought out. It then delivers malware that allows the NSA (or GCHQ) to poke around the target’s computer and network.
Enlarge / Turmoil finds, Turbine fires, Quantum exploits. It's just that easy. These capabilities give the NSA’s Tailored Access Operations (TAO) unit the ability to conduct not just tailored attacks, but multilayered, massive operations that can scoop up vast amounts of data not accessible via XKeyscore. As if that’s not enough, there’s also an attack tool designed for wholesale exploits of traffic passing through a specific Internet “choke point”—a peering point for a specific Internet Service Provider, an Internet exchange at a national border or at a submarine cable meeting point, or any other routing point on the Internet that could host an implant.
Called SecondDate, the capability was described in a 2012 NSA document as a tool “to influence real-time communications between client and server.” It has the ability to redirect Web browsers to the NSA’s FoxAcid malware servers, and it may have been used as part of an attack on Tor users. SecondDate can serve as part of a targeted attack, but it can also be used, according to NSA documents, for “mass exploitation potential for clients passing through network choke points.” In other words, SecondDate can be used in concert with the NSA’s other systems to attack whole swaths of the Internet, infecting systems with surveillance malware.
All of these capabilities give the NSA and GCHQ considerable reach. But they also run the risk of allowing others to stand on the agencies’ shoulders and take advantage of the exploits the NSA has already seeded into parts of the Internet’s infrastructure. Regardless of the scope of the NSA’s ongoing surveillance, the chance that someone else could hijack or repackage a capability like Hammerstein or SecondDate for criminal or other malicious means poses a risk to the entire Internet.
Listing image by Trevor Paglen
Maybe you can't game the chain itself but without trillions of retail dollars you can manipulate prices by owning a large chunk of the total cupply of a coin such as BTC, and since most other coins follow BTC, if you control the price of that, you control the price of the entire space
When you actually find out what Bitcoin is and how it operates youll realize why thats not true
Sure, ok
Im being serious...here ill help.
https://youtu.be/bBC-nXj3Ng4
That's all great and all in explaining HOW bitcoin and cryptocurrency as a whole works, but as long as those who have digital currency do not outright OWN the internet that it is being run and stored on themselves, it can AND will be hacked.
I am not saying that it will be easy at first, but it will get easier and easier as hackers break into it or hell, even shut down their access to their data completely. This is all too similar to when atm/debit cards and even bigger access to credit cards came out and people were told they would be very hard/limited to hack. We know how that all worked out.
If it is digitalized, it CAN, and WILL be be hacked. There are many methods in which those who wish to take control or limit the control of by others, can do so when it comes to the digital world. Bitcoin & crypto may be newer to the majority of the population, but they have been working on this behind the scenes for a LONG time, which also means that there are groups of people who have been working behind the scenes for a long time to also crack and/or control it if they ever wish.
It is far too easy to take the route of believing that this digital system is unhackable. There is a reason it is being pushed so hard for everyone to switch over to.
whew.. because those of us who served in the military know that stuff has NEVER been hacked before roll eyes
Hey, it's your digital money to lose.