Is SHA-256 bad because of the NSA?
-
“[url=https://en.wikipedia.org/wiki/Sha-256]SHA-2[/url] is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the U.S. National Security Agency ([b]NSA[/b]) …”
Bitcoin uses SHA-256.
Litecoin used Scrypt.Should we use this as an argument to prefer Feathercoin over Bitcoin?
-
(shrug) in my opinion it isnt a problem.
Not for us at least.
-
[quote name=“Radacoin” post=“15620” timestamp=“1371372051”]
“[url=https://en.wikipedia.org/wiki/Sha-256]SHA-2[/url] is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the U.S. National Security Agency ([b]NSA[/b]) …”
Bitcoin uses SHA-256.
Litecoin used Scrypt.Should we use this as an argument to prefer Feathercoin over Bitcoin?
[/quote]No, because it’s in the public domain, which means there’s no royalties. A hashing function has it’s own set of parameters it should be judged by… the governing body who declares it a standard not being one of those parameters.
-
[quote name=“Kevlar” post=“15823” timestamp=“1371433451”]
[quote author=Radacoin link=topic=1937.msg15620#msg15620 date=1371372051]
“[url=https://en.wikipedia.org/wiki/Sha-256]SHA-2[/url] is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the U.S. National Security Agency ([b]NSA[/b]) …”
Bitcoin uses SHA-256.
Litecoin used Scrypt.Should we use this as an argument to prefer Feathercoin over Bitcoin?
[/quote]No, because it’s in the public domain, which means there’s no royalties. A hashing function has it’s own set of parameters it should be judged by… the governing body who declares it a standard not being one of those parameters.
[/quote]I think the issue is more of intent rather than capability.
-
[quote name=“d2” post=“15626” timestamp=“1371372648”]
[quote author=Smoothie link=topic=1937.msg15624#msg15624 date=1371372530]
(shrug) in my opinion it isnt a problem.Not for us at least.
[/quote]Until they fund a $40 billion covert mining project to steal all the coins!
[/quote]Solution:
1. Change hash algorithm
2. In the meantime instill checkpointing to give them the virtual middle finger. =)
-
NSA are some of the best friends you never knew you had ;)
-
[quote name=“Mogumodz” post=“15929” timestamp=“1371481933”]
NSA are some of the best friends you never knew you had ;)http://anony.ws/i/2013/06/17/T52ms.jpg
[/quote]hahahaha
-
[quote name=“zerodrama” post=“15894” timestamp=“1371462085”]
I think the issue is more of intent rather than capability.
[/quote]Definitely!
I picture some of the NSA guys, sitting in their ivory tower, watching down on Bitcointalk forum and having a ball. One day, when Bitcoin would become a serious thread, they register a newbie account, and their first posting are just 3 lines of code: Code that allows everybody to break the SHA-256 algorithm. ;)
Edit: Wanted to share this (must see!): Obama in 2007: http://www.youtube.com/watch?v=Fd3Iht7JNwE&t=0m18s