create account

IOTA vs MIT - A deep dive - Programmer explains by ivanli

View this thread on: hive.blogpeakd.comecency.com
· @ivanli ·
$15.17
IOTA vs MIT - A deep dive - Programmer explains
IOTA has had significant security vulnerabilities - this is what MIT claims. IOTA doesn't agree and instead tells us that MIT misunderstood the whole situation. Let's discuss what happened and what each side claims. Who do you agree with? Let me know and let's discuss in the comments below!

https://www.youtube.com/watch?v=QsdZVnq4G60

MIT also bring up concerns about other cryptocurrency projects not being vetted when it comes to secutiry. Do you guys agree?

MIT article https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367

IOTA Response https://medium.com/@mistywind/iota-cofounder-sergey-ivancheglo-aka-come-from-beyonds-responses-to-the-ongoing-fud-about-so-ea3afd51a79b

🍻 Join the crypto discussion forum - https://thecrypto.pub
πŸ“Ί The best crypto content in one place - https://cryptochannel.tv
πŸ“š Get my free e-book on Bitcoin and Blockchain - http://eepurl.com/c0hyc9 you will receive the book in your inbox once you sign up 

πŸ‘«πŸ‘­πŸ‘¬Social:
Steemit: https://steemit.com/@ivanli
Facebook: http://facebook.com/ivanontech/
Slack: http://slack-invite-ivan-on-tech.herokuapp.com
Exclusive email list: http://eepurl.com/c0hyc9

πŸ€‘ Buy cryptocurrencies: https://www.coinbase.com/join/529bab0ab08ded7080000019

πŸ’° Secure your Crypto with Hardware Wallets:
Ledger: https://www.ledgerwallet.com/r/4607
Trezor: https://trezor.io/?a=rvj3rqtje3ph
πŸ‘  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 17 others
properties (23)
authorivanli
permlinkiota-vs-mit-a-deep-dive-programmer-explains
categoryiota
json_metadata{"tags":["iota","cryptocurrencies"],"image":["https://img.youtube.com/vi/QsdZVnq4G60/0.jpg"],"links":["https://www.youtube.com/watch?v=QsdZVnq4G60","https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367","https://medium.com/@mistywind/iota-cofounder-sergey-ivancheglo-aka-come-from-beyonds-responses-to-the-ongoing-fud-about-so-ea3afd51a79b","https://thecrypto.pub","https://cryptochannel.tv","http://eepurl.com/c0hyc9","https://steemit.com/@ivanli","http://facebook.com/ivanontech/","http://slack-invite-ivan-on-tech.herokuapp.com","https://www.coinbase.com/join/529bab0ab08ded7080000019","https://www.ledgerwallet.com/r/4607","https://trezor.io/?a=rvj3rqtje3ph"],"app":"steemit/0.1","format":"markdown"}
created2017-09-17 14:38:36
last_update2017-09-17 14:38:36
depth0
children4
last_payout2017-09-24 14:38:36
cashout_time1969-12-31 23:59:59
total_payout_value12.183 HBD
curator_payout_value2.989 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length1,364
author_reputation37,421,541,932,318
root_title"IOTA vs MIT - A deep dive - Programmer explains"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id15,141,988
net_rshares5,874,250,051,897
author_curate_reward""
vote details (81)
@ahmermalikajjguu ·
nicely done by you i like it and upvoted
properties (22)
authorahmermalikajjguu
permlinkre-ivanli-iota-vs-mit-a-deep-dive-programmer-explains-20170920t140721605z
categoryiota
json_metadata{"tags":["iota"],"app":"steemit/0.1"}
created2017-09-20 14:07:24
last_update2017-09-20 14:07:24
depth1
children0
last_payout2017-09-27 14:07:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length40
author_reputation135,100,125,953
root_title"IOTA vs MIT - A deep dive - Programmer explains"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id15,426,254
net_rshares0
@luisneira ·
$0.69
I didn't know the advantages of MIT
πŸ‘  
properties (23)
authorluisneira
permlinkre-ivanli-iota-vs-mit-a-deep-dive-programmer-explains-20170917t213646335z
categoryiota
json_metadata{"tags":["iota"],"app":"steemit/0.1"}
created2017-09-17 21:36:48
last_update2017-09-17 21:36:48
depth1
children0
last_payout2017-09-24 21:36:48
cashout_time1969-12-31 23:59:59
total_payout_value0.682 HBD
curator_payout_value0.003 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length35
author_reputation1,669,851,356,537
root_title"IOTA vs MIT - A deep dive - Programmer explains"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id15,171,349
net_rshares270,122,971,114
author_curate_reward""
vote details (1)
@nodeboy ·
$0.07
The biggest red flag that makes me question the competence of the IOTA developer(s) is that they "removed a part of the copy protection mechanism which became useless once details of its work had become known to others". That sounds like they were relying on "security through obscurity". An absolute no-go. Another one is that they claim something is impossible in practice because it requires the user to be tricked into running arbitrary code... that happens all the time.
πŸ‘  , ,
properties (23)
authornodeboy
permlinkre-ivanli-iota-vs-mit-a-deep-dive-programmer-explains-20170917t203131677z
categoryiota
json_metadata{"tags":["iota"],"app":"steemit/0.1"}
created2017-09-17 20:31:33
last_update2017-09-17 20:31:33
depth1
children1
last_payout2017-09-24 20:31:33
cashout_time1969-12-31 23:59:59
total_payout_value0.054 HBD
curator_payout_value0.015 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length475
author_reputation1,478,884,337
root_title"IOTA vs MIT - A deep dive - Programmer explains"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id15,167,805
net_rshares27,685,757,232
author_curate_reward""
vote details (3)
@dreid ·
>That sounds like they were relying on "security through obscurity".

The system was never insecure by this copy-protection mechanism, because all transactions are currently routed through the Coordinator which checks for this specific attack (by design). Someone who copied the open source IOTA protocol code would not have the Coordinator to protect them, so their protocol would have been vulnerable to this type of attack (hence why this was a copy protection mechanism). 

Once the MIT team discovered and revealed the details of the attack, there was no need to leave that mechanism in place since anyone copying the protocol would now know to check for the vulnerability.

>Another one is that they claim something is impossible in practice because it requires the user to be tricked into running arbitrary code... that happens all the time.

Their point isn't that it makes the attack impossible but that it makes the attack impractical. If you can trick the user into running arbitrary code then there is no reason to create fake transactions - you can just steal their seed and move the funds regardless.
properties (22)
authordreid
permlinkre-nodeboy-re-ivanli-iota-vs-mit-a-deep-dive-programmer-explains-20170920t182028496z
categoryiota
json_metadata{"tags":["iota"],"app":"steemit/0.1"}
created2017-09-20 18:20:27
last_update2017-09-20 18:20:27
depth2
children0
last_payout2017-09-27 18:20:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length1,114
author_reputation0
root_title"IOTA vs MIT - A deep dive - Programmer explains"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id15,448,393
net_rshares0