TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A censorship resistant deadman's switch

184 点作者 heelhook大约 7 年前

14 条评论

danShumway大约 7 年前
This is interesting, but runs contrary to my understanding of how Etherium works. I&#x27;m clearly missing something, any chance you (or anyone else) could elaborate more?<p>My understanding was that the decentralization of Etherium would mean that everyone watching the contract would need a copy of the decryption key. If that&#x27;s the case, what prevents someone from publishing keys early? Or is it that the key isn&#x27;t stored in Etherium, and Etherium is only being used as the consent to publish?<p>If the key is being stored somewhere else and just waiting for the contract to validate, how do we prevent a censor from just attacking that system?<p>If the key is being stored somewhere else and just waiting for the contract to validate, why not also store the contract on the same machine and do checkins directly into that? Would that be significantly less secure&#x2F;reliable?
评论 #16926496 未加载
评论 #16925473 未加载
评论 #16923206 未加载
rojoroboto大约 7 年前
Hey Gang. Author of killcord here. I&#x27;m honored and humbled this was submitted to HN and I&#x27;ll be reading through the comments to answer questions and respond to feedback. I started this project after a thought experiment in using newer decentralized tech for internet activism.
评论 #16926548 未加载
ofcourseianal大约 7 年前
Censorship resistant, until someone takes down the “publisher tool meant to run autonomously on a trusted system”.
评论 #16923081 未加载
评论 #16923341 未加载
评论 #16923074 未加载
评论 #16926604 未加载
gnode大约 7 年前
Given that the trusted party is required for this to work, is there any point at all in having it depend on the Etherium blockchain, other than perhaps a weak form of anonymity network?
评论 #16926762 未加载
评论 #16924775 未加载
s17n大约 7 年前
As far as I can tell, Ethereum isn&#x27;t actually doing anything interesting here - it&#x27;s just being used to transmit pings to the server, which could just as easily be done with, for example, tcp&#x2F;ip.
dogma1138大约 7 年前
Anyone who would think of using it you need to consider at least 2 threat models.<p>1) The key castodian can decrypt your Information either willingly or through coercion. If you use the same key to sign and encrypt the message or if you do not sign it then they may also be able to impersonate you.<p>2) A third party who would gain from the information being disclosed can force its release through a denial attack.<p>Never use a deadman switch as a bargaining or as an insurance policy if you do not intend the information to be released to the public and if you are not comfortable with the information being released the moment the switch is set up rather than when it would be activated.<p>The only manner in which this or any simmilar setup does not expose you to additional risk is if you only use it to ensure the release of said information in a timely manner and there is no adversarial motive to release it sooner.<p>@the creators you might want to look at the possibility of implementing <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Chaffing_and_winnowing" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Chaffing_and_winnowing</a> over a blockchain.
XR0CSWV3h3kZWg大约 7 年前
There is a lot of hate for the trusted party set up of this, which seems reasonable.<p>It seems like you could create a dead man&#x27;s switch using arbitrary participants. You distribute a secret to every participant and then to attempt to activate the dead man&#x27;s switch they raise k to the power s mod p and pass it to the next participant. As long as you act as a participant each time and raise the passed value to some invalid s then the answer that is arrived at won&#x27;t be the final secret.<p>As long as you participate every round the wrong answer will be arrived at, but as soon as you don&#x27;t participate the right answer will be arrived at.<p>Any singular party refusing to cooperate would destroy the deadman&#x27;s switch so malicious activation would be tough.<p>Designing it so it can tolerate failures would be the hard part.<p>EDIT: I am wrong, this isn&#x27;t that great. It&#x27;s really hard to hide information that can be recovered without a secret being revealed.
评论 #16925011 未加载
评论 #16924965 未加载
tshannon大约 7 年前
So a lot of these comments seem to be criticisms of potential vulnerabilities (which is par for hacker news really). I&#x27;m curious if there are better alternatives out there that aren&#x27;t vulnerable to the same issues, like a single point of failure or attack?
评论 #16924539 未加载
robert-wallis大约 7 年前
What if the miners deny check-in transactions to force the killcord to execute?
评论 #16924380 未加载
评论 #16924293 未加载
everdev大约 7 年前
Have any legal systems weighed in on a dead man&#x27;s switch?<p>I get the premise, where typically it&#x27;s illegal to take an action that releases confidential or censored information.<p>But, to governments, especially ones that want to keep information secret or censored, I&#x27;m not sure that negating that sequence and failing to stop the release of information (that you willingly put in a dead man&#x27;s switch) will get you out of trouble.<p>Unless you&#x27;re dead of course. But, I&#x27;ve seen this process promoted for living people to release information and I&#x27;m not sure it&#x27;s any better than just posting the content anonymously, but with the added risk of accidentally releasing the information.
TekMol大约 7 年前
Better and simpler solution: Create a Bitcoin address and send one Satoshi to yourself every month.<p>When the transactions stop, people know you are dead.<p>This way you need no trusted third party, no special software, no special contract.
评论 #16926421 未加载
评论 #16926803 未加载
bowmessage大约 7 年前
Why is everyone suddenly spelling Ethereum with an &#x27;-ium&#x27;?
fareesh大约 7 年前
Does this take into account network congestion and such?
评论 #16926630 未加载
评论 #16924774 未加载
arisAlexis大约 7 年前
if someone puts a gun and steals your private key he can continue checking in after he kills you right?
评论 #16923930 未加载
评论 #16926666 未加载