If they had control over Bitcoin they would not be taking measures like this.
(twitter.com)
😷 DEM PANIC 💉
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (229)
sorted by:
Normally I would agree, but I don't see how that's currently possible with bitcoin. It would be easier to hack into the Pentagon.
I dont think bitcoin needs to be hacked. Having the ability to print money means that the FRB could buy, sell and manipulate the price of BTC to screw over the little guy.
Apples to oranges...all that takes is one person with the right log information to be able to see information coming and going. Bitcoin doesnt operate that way because of the 1000s of miners worldwide verifying transactions...all the individual computers have to agree on what the transactions are for it to be verified...you have to hack at least 51% of the miners for any fraudulent changes to take place...not being condescending please go look up how bitcoin works before you assume its just like all computer networks. Its not
As far as Bitcoin is concerned it cannot be taken from you. They can ban access to exhanges, ban apps, ban all the ways you can use it, but they can never remove it from he Bitcoin network, it is still there on the public ledger as belonging to your address unless you willingly, accidentally, or negligently give them your private key. And keep in mind some people dont even write their private key down they just memorize it and thats the only place it can be accessed
If you're accessing your Bitcoin wallet on a Windows, Apple, or Google OS, you're easily hacked, and there's a reason Microsoft, Apple, and Google are contributing to Linux and flooding distros with Flatpaks.
taps forehead
Hacking someone's wallet is not the same as hacking the Bitcoin protocol. Bitcoin itself has never been hacked in its ~12 years existence. And now with the amount of hash power on the network it's pretty much impossible.
Do you think that was easy? Does it happen often? Did they do it without getting caught?
Manipulating bitcoin would be orders of magnitude more difficult. Like hacking every computer in the world simultaneously. Good luck. I agree that nothing is "impossible" but there are things that are so difficult to do that it's not even worth it.
Uhh I didn't deny it happened. If you know how bitcoin works, you might see the point I'm trying to make. Also, government "taking" someone's bitcoin is much different than fucking with the way bitcoin works.
Ya know what? Nevermind. You're right about everything. What would you like to teach me next?
"no, you're wrong. I don't know the answer, but there is an answer, but you're not smart enough to find it"
That's what your comment sounds like.
Here is something that we do know: it’s easier for anyone to find and steal your hidden precious metals than is for them to find, steal, identify and decrypt your cold storage crypto.
Even consumer grade metal detectors now a days can identify gold and silver from a pretty significant distance.
NSA’s automated hacking engine offers hands-free pwning of the world With Turbine, no humans are required to exploit phones, PCs, routers, VPNs. by Sean Gallagher - Mar 12, 2014 3:20pm EDT
Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald in The Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale.
Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream.
Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked.
Blade Runner Game Director Louis Castle: Extended Interview The “selectors” that analysts can use to target victims through Turbine are significant. Using Turmoil as a targeting system, Turbine can look for identifying cookies from a number of Web services, including Google, Yahoo, Twitter, Facebook, Hotmail, and DoubleClick, as well as those from the Russian services Mail.ru, Rambler, and Yandex. Those cookies are all available for targeting purposes, as is user account information from a whole host of services.
Enlarge / The NSA's collection of selectors. Turmoil can also key in on Windows Update identifiers, software serial numbers passed over the Internet, and signatures from physical devices such as phones’ International Mobile Station Equipment Identity (IMEI) numbers and Wi-Fi MAC addresses. All of these things can be indexed as metadata by Turmoil and tied by other metadata to a specific target.
Once installed, implants give the NSA and GCHQ a way to extract data from the target, monitor its communications, or launch attacks against the network the target resides on. Turbine implants have even allowed the NSA and GCHQ to hack IPSec VPN connections by inserting an implant on routers that break VPNs’ key exchange process, opening virtually any VPN to direct surveillance.
Hammer time The documents published today include slides from the NSA’s Turbulence team detailing the “phases” of the NSA’s capabilities to monitor VPN and Voice over IP (VoIP) traffic using a set of attacks known as Hammerstein and Hammerchant. Previously, it was known that the NSA could exploit the older Point to Point Tunneling Protocol (PPTP) for VPNs. But the new documents show how Turbine and Turbulence can be used to attack VPNs using the more secure Internet Protocol Security (IPSec) standard.
At the most basic level, Turbulence simply captures metadata from Internet Key Exchange (IKE) messages between systems connecting over an IPSec VPN. The NSA can apparently perform a “static tasking” against an IPSec VPN based on its IP addresses using the Hammerstein implant. (Hammerstein is a piece of malware injected into a router sitting in the path of the VPN traffic, which forwards key exchanges and encrypted data to a Turbulence system.)
Hammerstein allows the NSA and GCHQ to tap into networks that don’t pass through the Turbulence checkpoint. The data can then be pushed through a specialized VPN-cracking “blade” in the Turmoil server hardware to decrypt the content.
Enlarge The Hammerchant implant does roughly the same thing with digital voice calls and video conferences that Hammerstein does with VPNs. It can intercept call traffic based on the SIP and H.323 protocols, allowing “call surveys” that collect metadata or capture the actual voice content.
Turbine added the capability of “dynamic tasking” to these attacks. It can send identifying information on the fly to Hammerstein or Hammerchant automatically based on a set of parameters set by an NSA operator with a few mouse clicks.
Enlarge Search and destroy Other man-in-the-middle and “man on the side” attack systems are also tied into Turbine. Quantum Insert, the attack tool used to hack the networks of OPEC and the Belgian telecommunications company Belgacom, can also be controlled by Turbine by using webpage request data collected by Turmoil to automatically trigger an attack. Turbine can push an HTML request posing as a response from a visited site back through a Quantum Insert implant on a server or router closer to the server the request is sent to. It does this because of a microseconds-long response time advantage to convince the target’s browser that it’s the response being sought out. It then delivers malware that allows the NSA (or GCHQ) to poke around the target’s computer and network.
Enlarge / Turmoil finds, Turbine fires, Quantum exploits. It's just that easy. These capabilities give the NSA’s Tailored Access Operations (TAO) unit the ability to conduct not just tailored attacks, but multilayered, massive operations that can scoop up vast amounts of data not accessible via XKeyscore. As if that’s not enough, there’s also an attack tool designed for wholesale exploits of traffic passing through a specific Internet “choke point”—a peering point for a specific Internet Service Provider, an Internet exchange at a national border or at a submarine cable meeting point, or any other routing point on the Internet that could host an implant.
Called SecondDate, the capability was described in a 2012 NSA document as a tool “to influence real-time communications between client and server.” It has the ability to redirect Web browsers to the NSA’s FoxAcid malware servers, and it may have been used as part of an attack on Tor users. SecondDate can serve as part of a targeted attack, but it can also be used, according to NSA documents, for “mass exploitation potential for clients passing through network choke points.” In other words, SecondDate can be used in concert with the NSA’s other systems to attack whole swaths of the Internet, infecting systems with surveillance malware.
All of these capabilities give the NSA and GCHQ considerable reach. But they also run the risk of allowing others to stand on the agencies’ shoulders and take advantage of the exploits the NSA has already seeded into parts of the Internet’s infrastructure. Regardless of the scope of the NSA’s ongoing surveillance, the chance that someone else could hijack or repackage a capability like Hammerstein or SecondDate for criminal or other malicious means poses a risk to the entire Internet.
Listing image by Trevor Paglen