-
Notifications
You must be signed in to change notification settings - Fork 42
/
README
111 lines (85 loc) · 4.48 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
Decentralised Information Black Market
==================================================================
"Darkleaks: Decentralised Cryptographic Information Black Market"
Scheme by Peter Todd
Code by Amir Taaki
*Trustless provably fair information marketplace
###############################
# WORK IN PROGRESS #
###############################
* Distribute an encrypted file to the world.
* Reveal some random section of the contents to prove
the legitimacy of its contents using an algorithm for provably
fair random selection to all parties.
* People bid on the remaining parts.
* Leaker redeeming funds automatically releases the decryption key
allowing people to unlock the remaining parts of the file.
* NO CENTRAL OPERATOR.
* NO IDENTITY NEEDED.
* NO INTERACTION WITH LEAKER REQUIRED.
NOTE: Python bindings available! See python/example.py for more info.
See EXPLANATION. Imagine once this is a simple piece of software for
anyone to use (leaker: import file, add info, prove possession,
bidder: verify, bid on chunk, unlock) of course running all over Tor
with a nice use interface.
Decentralised way to leak and get paid for any FILE or information:
proprietary software, opensource software, corporate documents, firmware
drivers, movies .etc
I want to put out information and get $$$
$ dl_start TESTFILE 100
58 chunks created.
Choose a future block height and a number of chunks to release.
Announce them to the world.
Announce the HEIGHT to the world.
Make the _public_chunks/ directory publically available for download.
"At block HEIGHT 341000 (Expected Nov 11 2014), I will prove
possession of the files encrypted at this location:
<torrent:...>
by releasing 18 of the 58 chunks." -Leaker
Once block hash becomes known:
$ dl_prove TESTFILE 100 0000000000000000251ed5ba6bc475c13e15550475e4049e153a06b78b5a8a50 10 > proof_file
$ cat proof_file
20 03e9fc6592798125ede112430e0b8beb30dacd9787f061883bf0bfa43e2ca8d378
34 036675c1d13a0112f28956e61475551c4bc53b8b5f6a8c0799fd9bb9f968cfc8ce
26 02267eeac444549d63836ff1d098de2b045d0f897849c50120645d6982463d0aa4
26 02267eeac444549d63836ff1d098de2b045d0f897849c50120645d6982463d0aa4
4 02096ec2b83982ddef77ce2e1628e90ff51ac04eaa9870326a38b3f15112577843
26 02267eeac444549d63836ff1d098de2b045d0f897849c50120645d6982463d0aa4
5 034633adfee376bed397acaa576196fff39fa8257080be0914e22cb92c2c90fe26
19 030c6624306007688c3f27e86b6add811c4a83f1bde2e728e62458c631f76359e5
21 028e3f035d4ec79e6afa3a8a90a95dda4f2ced04d1e5bb77321254bea3e5545ec5
33 03dd42d8d4134491aee30de991350547e87f100ac9d4e0a1ac6b94150cd2e2d2b8
39 023a9a24584ddd2788136128d2c9d84bf4fae9d8063fb691b16eaf62d55193d6b7
14 02c920dbd95487749ea8cd602ffe00c6f54f396e4e2a3c2cb0ee8507a761f7505f
5 034633adfee376bed397acaa576196fff39fa8257080be0914e22cb92c2c90fe26
Reveal these to your audience by distributing proof_file. They can use this
file to unlock chunks and verify their authenticity.
$ dl_unlock_all proof_file TESTFILE_public_chunks/ 0000000000000000251ed5ba6bc475c13e15550475e4049e153a06b78b5a8a50
Which is just a bash script that repeatedly calls for each line in the
proof_file:
$ dl_unlock TESTFILE_public_chunks/CHUNK.20 0000000000000000251ed5ba6bc475c13e15550475e4049e153a06b78b5a8a50 03e9fc6592798125ede112430e0b8beb30dacd9787f061883bf0bfa43e2ca8d378
// Creates CHUNK.20.decrypted
The leaker can choose to reveal subsequent blocks by spending money send
to the addresses in _public_chunks/ADDRS file.
Spending money from those addresses, reveals the public key which is used
to decrypt other chunks.
To do that, the leaker simply needs to import these keys into his wallet
and spend any funds at those addresses:
$ dl_secrets TESTFILE 100
L265LXaXqh5TX97voQjz4Wo7Qpyoj8aCxotZYoYsG1vA72oiRTRN
L4qJhBVQhHVWQDznzaUoiBkBBpZubJAoLuwhNGW1AdgUoLmXpZSC
L37xPybVaSmBKdL6s3SgKUzsmAuBDRsws6oUjXKzz8TgNiypcsvi
L2ob4c74UB6rbH7YPA1s6ATDLgrDHNtRB8rUhjL2xzqrXNztQzH6
KywiFkzENUKvuMrFGnbSN3PemGHM555QtXhRXAk3D8b1VJwRrc4X
...
To find the pubkeys for an ADDRESS, use the tool dl_check_addr:
$ ./dl_check_addr 1Ksv3HoCAn75uMfXtyWLgauUQv3gEa389A
Fetching transaction...
02e1746dc1da27a5d4be9be4855016fc6fdd6f29b5a198239978dafdf7dd647656
Merge the decrypted files back together again using:
$ ./dl_merge TESTFILE_public_chunks/ 58
(where 58 is the number of chunks... it's a simple bash script.)
===============
note: there is now a UI located in app/
run this using `python2 app/main.py`
this requires PyQt4 and Qt4 libs installed.