30559 entries in 0.097s
mod6: but... hitting some issues with getting the private key back out -- hopefully I can whip up something different.
mod6: what i have code for now, and was trying to make work successfully was getting these three keys into a KeyStore for use as needed
mod6: and your MPEx private key should be vastly important to you -- so trying to give the user a layer of extra protection
mod6: oh for sure. it'll be risky to probably keep any large amts on a mobile device
mod6: currently to trade @ mpex you must be able to clearsign,and enrypt a message - decryption is helpful too!! - this requires the 3 keys I was talking about
mod6: nope. just your 1 regular account.
mod6: and then you can say, "THANKS MOD6!" instead of "FUUUUUUUUU MOD6!"
mod6: i could write that in also... anyway. then the key will be safe... at least it'll be encrypted if the device is hacked/stolen
mod6: or the user could do it if so desired
mod6: 4) notify the user to delete unencrypted private key file
mod6: 3a) encrypt private key and save output to localfile store
mod6: 3) set the seperate password for the private key
mod6: 2) start BitOTTer and enter the path's to the keys.
mod6: yeah, in this situation that im setting up for the user, the user will have to do this: 1) copy the 3 pgp keys onto the device
mod6: im using spongy castle to read in the PGP keys, I then have to convert them to be able to use them outside of its context, it gets hairy
mod6: then when the user goes to trade, they'll need to enter their passphrase to decrypt the encrypted private key stored on the file system so the application can decipher the return tx statements from mpex
mod6: i don't want to replace the gpg passphrase... im saying that the user can set a seperate passphrase to encrypt the unencrypted privatekey file on the filestore
mod6: huh? i think we misunderstand eachother
mod6: use that... maybe in a future release i can get the keystore thing working better, or change it so the user might be able to select from a variety of different algos to use
mod6: what I was thinking about using is currently a class that implements 256bit AES
mod6: hmmm... well, this wont be a 6 digit pin like that
mod6: yeah, im not sure whatever Jan or whomever was talking about. just want to be clear about that I'm doing :)
mod6: the code can read them in either keyring format or ascii armor'd output format
mod6: the users PGP PublicKey and MPEx PublicKey can stay as they are. no need to do anything with those at all.
mod6: ok. to be a bit more spacific, and the documentation will reflect this... i'll encrypt the private key on the local file store.
mod6: anyway guys, I gotta run along to something else quick. i'll try to save the elaborations on that for #BitOTTer in the future. thx.
mod6: its really getting close. i don't wanna let this damn keystore hold me back when I can just use something else.
mod6: this will take some time, but I want to get this into the hands of a few people who'd like to test it before the end of the year.
mod6: everything will be well documented in BitOTTer so the users will know what they are setting and what stuff means in the application
mod6: i've already got a java one written actually. heck, its even open source.
mod6: i have a screen now where the user goes in and sets the private key for the KeyStore, etc. but now I think I'm just gonna make that be the symmetric key for like AES or something
mod6: I wanna make sure that if anyone uses BitOTTer that they know their key they put on the device is safe at lesat if the device is stolen or hacked
mod6: jurov: hmm! i didn't know that. they really should be just to save a guy if his device gets stolen or hacked.
mod6: right on. no matter what happens, I'll make sure the PrivateKey ring file will be protected
mod6: just some technical bs about my bikeshed
mod6: haha, see. its all good kakobreklaaa you don't need to worry.
mod6: then just decrypt into memory when needed, but never writing it to disk.
mod6: so... im kinda thinking, this is way to much effort for just a first release, can I not just use a symmetric key algo to enc the privkey on the local filestore?
mod6: lol, joke is on mod6
mod6: many examples show how to makes this work, but not anylonger because the main way to do this is now deprecated
mod6: anyway... its all technical stuff basically but... im having a hard time getting the private key back out for use
mod6: basically takes a PublicKey and PrivateKey and stores them in a KeyPair object, when then can be used to create an X509 cert that can be then inserted and extracted from the KeyStore itself.
mod6: or at least, its been a bit harder than I expected. i've done a bunch and it now creates a keystore (or loads an existing one)
mod6: kinda not so ciked about the way this KeyStore thing is working out
mod6: well, i've been workin on it quite a bit.
mod6: i figure, it'll keep my spam out of these trade channels :]
mod6: err, nm... anyway. I also made a #BitOTTer channel for technical discussion
mod6: RELEASE MY NICK?! WAIT DID SOMEONE TRY TO HAXoR ME?!
mod6: i was like, "Ummmm"
mod6: im glad some of us are good this irc thing
mod6: it was like, your 30 seconds are up mod6. *BLOOOOOP*
mod6: yeah, its all good. i forgot about the nickserv 'release' command
mod6: kinda lead me to watch the old 65 version of that movie. was worth the 3 hours, it did the novel justice... which of course is fantastic
mod6: i read all these classic type books over the last four to five years -- i was talking with mircea about it a while ago
mod6: I forgot how in older movies that many of the credits are in the beginning of the movie.
mod6: oh hey, i finally watched the '65 version of Doctor Zhivago -- it was pretty great actualy
mod6: just about everything else though
mod6: vircurex didn't ever allow exchange of buttcoins i see
mod6: lol. UofA is a pretty good school actually.. the real party school is ASU
mod6: looks like that is probably las vegas?
mod6: haha. i used to have cox i think ... it was either that or Charter? out there in tucson
mod6: be back in a min here...
mod6: yeah, that'll be awesome
mod6: food for thought i guess. right now though, it works pretty krad. :]
mod6: i dunno, just a thought of a different way to get everyone auth'd on the same host with their keys without having to rely on a bot or 3rd party app
mod6: haha. i thought perhaps some of the auth stuff could be built into a sortof OTC login model we're doing with gribble...
mod6: hhaha, ikr! like 100,000,000 internet years
mod6: anyway, there are other ways if that's the overall goal though
mod6: yeah, i guess I was using it like prior to 2004
mod6: i'd have to look quick --- haven't looked at it in some time... there might be something better if that's kinda what you were gettin at.
mod6: im not sure it was weak -- per-se...i remember it being based on asymmetric algos
mod6: could be an interesting multi-node network or something that could be apart from openprojects
mod6: we all liked it a lot -- its all encrypted by default, etc
mod6: i used to run a silc server back in the day.
mod6: thats regular intarweb tho
mod6: not just text either, and then seals with clubs
mod6: and yeah, .onion bitcoin casinos were pretty awesome in mid-2011, at least playable anyway.
mod6: lol first bitcoin casino on the internet my ass
mod6: oh anyway, just saying how there are so many random attacks from bots etc. many winders machines get pwned if not updated on the regular