
Dear Fellas! What a joyous time we have got! So many changes! At such a fast pace! Wonderful! đ
The question everyone keeps asking themselves is whether The Old Wizardđ§ himself got hacked. The short answer is:Â Not at all.
By reading on youâll get to know about:
- the difference between authentication and encryption
- what was the surprise we have been preparing about
- what exactly were the issues the surprise functionality attempted to address
- How did the OldWizardâs hack-jokeđ come to be! đľď¸ââď¸
If you are not interested in some of the medium-level introduction to cryptography related constructs, feel free to skip these through.
Encryption
If you are reading this, chances are, you have most probably at least got a feeling what encryption is about. It is used to âhideâ information from the ones who are not supposed to see. That would be quite accurate. Not quite so. Got you! Thatâs what Steganography is all about – concealing a message within another message. With encryption weâre doing reversible transformation on the input data itself. GRIDNET OS employs multiple types of encryption. That depends on the current task at hand and especially upon the Threat Model which had been a priori designed to handle it. In short, threat models involve describing what security/anonymity assumptions are we willing to handle under all the possible conditions and actions agents involved in the system may undertake. Describing all the methods here would require academic-class article, which is not what this one aims to be. Do not however that very soon weâll be releasing here a discussion and rationalization about our Elliptic Curve X25519 signature construct that is heavily used throughout GRIDNET-OS and that in itself requires explanation as Curve25519 is usually not being used for cryptographic signatures but rather for Elliptic Curve Diffie Hellman handshakes.
When it comes to encryption, we have usually got two choices:
- symmetric encryption – here the very same key is used both for encryption and decryption
- public-key encryption – one key (the secret/private key) is used for encryption and the other corresponding (public key) is used for decryption
Let us now take a short glimpse of some of the constructs that are used throughout the system. Hint: Do not get overly scared, it is meant to be shortđ.
- Elliptic Curve Integrated Encryption Scheme (ECIES)

The ECIES encryption scheme
The infographics above depict what used quite often within GRIDNET OS for encryption – the ECIES encryption scheme. When exactly? When we are to encrypt data to a peer who is known by a public key. Nothing more is needed. Pretty cool, huh? You might know recipient solely by his public key and still deliver him securely encrypted information. We use it a lot. Lots of details come into play here and itâs very easy difficult not to make a mistake (like encryption to same public key twice without a proper IV vector),the reason why you have probably heard multiple times never to implement cryptographic constructs on your own. Certainly Wizards know what they are doing so we are all safe đ
The system employs various variances of the above, including some exotic scenarios where an ephemeral session key is derived as a side effect of performing the Elliptic Curve Diffie Hellman handshake in ECIES and treated as a session key. These topics are worthy of separate lengthy articles.
Let us take a short glimpse at yet another interesting construct.
Authenticated Encryption with Associated Data (AEAD).
AEAD = encryption + authentication
The point of AEAD is to provide authentication of the ciphertext. Without it, the ciphertext could be mangled with during data transit and the recipient would have no way of knowing. In cryptography we never want the recipient to even attempt decryption should it contain data prepared by an attacker. Allowing for this may open the system up to a variety of Side-Channel attacks. The latter might allow an attacker to infer some information in regard to the encryption key by doing timing analysis while the recipient attempts decryption. Usually constant-time algorithms are used to mitigate these, but these decrease performance and we should always be using the most proper tool at hand which in this case undeniably is – authenticated encryption. The resulting ciphertext assures the recipient that the data wasnât mangled with and in case of our protocols, quite often that the data indeed originated from the presumed source.
In short: AEAD = encryption + authentication.
You encrypt your plaintext after also including a couple of bytes which assure integrity of the plaintext. Of course it is better use use an AEAD scheme like the one below which can authenticate the ciphertext itself, thus allowing mitigation of decryption at all should the prior be modified by attacker.
![PDF] Security Analysis of ChaCha20-Poly1305 AEAD | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/daee5d0adfca325e9be9b4352f8dd91f08d95eec/7-Figure2.1-1.png)
The ChaCha20 + Poly1305 construct
The above is one of the hotties in the current applied cryptography. AEAD schemes may employ a variety of encryption methods and functions used to generate the âauth-bytesâ. Here, ChaCha20 is a very efficient stream cipher, which works in software almost as fast as hardware accelerated AES. We didnât go with AES as we wanted full interoperability across mobile devices and web-browser and the latter are assumed at least for now not to provide hardware accelerated crypto-schemes to JavaScript.
-
Authentication With a Cryptographic Signature

A cryptographic Private Key is used to provide authentication.
The infographics above illustrate how a special, secret value called the Private Key, together with a secure one way function, are used together to produce what we call a signature. It is assumed that only the person who came into possession of a private key could produce a signature verifiable by a corresponding public key.
Cryptographic signatures are used in decentralized systems like a lot. That is the main tool used to prove that you were the one issuing a transaction. Were it not for authentication and thus cryptographic signatures anyone could be spending assets from the account that you own. Remember when you generated the GRIDNET OS wallet in the mobile app? In that very moment, the private and public keys got generated. The private key is stored securely on your mobile device. The public key may be given away. Others may be using it to encrypt data to you etc. Most often what you use, however, is your walletâs address. What is it? Well, the public key is a pretty long value as may see by switching the Settings View of your GRIDNET Token. The address is generated based on a truncated portion of the public key and also encoded in a way which makes it less prone to mistakes when typed by human and also includes a checksum. What is a checksum? A couple of bytes that allow for automatic detection of typos.
GRIDNET OS employs Wizardsâ implementation of X25510 Elliptic-Curve crypto-signatures that became part of the Botan crypto-library.
The Old Wizard got hacked (notđ!)
From time to time we like to surprise you with new functionalities. We also love listening to your input and opinions so that we may improve the system as itâs in the best interest for all of us. All meaning who? The entire humanity. We are after creating the very first 100% decentralized operating system that can accomplish anything imaginable, just in a decentralized fashion. Decentralized YouTube, games, communicators, EVERYTHING.
Anyway, as you may know, GRIDNET OS even through the Decentralized Command-Line interface boards some cool functionalities. One of these certainly is the Global Chat. To access it, simply press CTRL+Q when connected over SSH. So, recently we were having the Wizardsâ party within it, many of you have joined. While reading the transcript weâve noticed a couple of things. Let us now walk through these one by one.
- some of you had trouble with setting a custom nickname
When connecting to GRIDNET OS over SSH you are automatically assigned a random nickname which usually goes as something like âanon123â. To set a custom identifier, one needs to execute the ânickâ command from the Commands View (CTRL+E) ex. ânick Old wizardâ. It is all it took to feel like TheOldWizardđ§ at least for a moment! đ
- as it obviously quickly turned out, itâs easy to spoof somebody elseâs identity

TheOldWizard hacked(not)
Indeed. Thatâs the thing we decided to address ASAP, the Wizardsâ way. The Wizards style. There are a couple of things to note. First off, thereâs no way to achieve full end-to-end encryption in case of an SSH connection IF the recipient i.e. human is to read the data directly from the screen as ASCII codes. When the data is scanned as an QR Code thereâs no problem as the mobile app can interpret the resulting binary data with ease even if encrypted. But we would need some decryption chips in our brains đ§ . or be scanning each message with the mobile app. It would be crazy and useless. So. To sum up. EVERYTHING you type within the Terminal Interface is encrypted. Itâs just the full-node which is serving you the Terminal Interface can see everything. If a government agency spies on your connection, they cannot see a thing. In a moment you will see how we solved the problem of spoofing oneâs identity.
By the way. The above screenshot did not happen during the party. We have noticed the problem ourselves and announced a competition, guiding you several times to the problem that we aimed to solve. One of our followers hit it right on the spot. Congratulations! Reward has been issuedđ°.
- some of you asked how to utilize the Friendly ID which you have already established on the chain.
Previously identities registered on the chain were not used in chat. Random ephemeral nicknames were generated upon connection and that was about it. With the possibility of setting a custom one with ânickâ command. Surely reusing the on-chain registered identities within the Global Chat began to be tempting enough. The thing was, how to achieve ease of use and (solve the 1st problem and 2nd one.. the wishful thinking in the 3rd case). We wanted to kill three birds with one stone đŚđđ.. well Wizards. You know how they are.
Let us now look the final result in action:

First authenticated personality.
Little bit later.
As you may see now, you may employ your on the chain registered Identity Token. If you login into the system (đ¤Ż) the shell would automatically retrieve ID from ID Token if youâve got one registered on-the-chain. The ID would be used within the Global Chat as well.
So how to âlog-inâ?

See the bottom line?
That is right simply type ‘logmein’ within the Terminal and see the magic happenđ

QR Intent instructing the mobile app to provide credentials
Now, once you pull out GRIDNET Token from your pocket.. you may see the real magic happen.
What exactly?
The mobile app would show a screen looking like the one below. Hats down folks. Some state-of-the-art technology, actually some of the most advanced technology known to humankind, is about to be triggered.

Now how cool is THAT…
Indeed. What is about to happen once youâve used the Virtual Fingerprint Scanner?
- The scanned QR intent contains an ephemeral public key generated by the GRIDNT OS VM which was spawned for you specifically, the one which youâve been accessing over SSH
- The mobile app would retrieve the private key from its local storage and also the ephemeral public key from QR Intent
- It would use the private key to sign some of the pseudo-random data which was delivered within the QR Intent
- It would Onion Route (end-to-end encrypted! The response besides being network-layer encrypted while Onion Routing is also end-to-end encrypted to the very Terminal Session you are accessing from the full-node through ECIES encryption done to the ephemeral public key contained within the QR Code) that very signature to the full-node which has spawned the Remote Decentralized Terminal (SSH) session for you.
- The full-node upon receiving the signature would attempt to verify it and notify you both within the Terminal Session AND also by delivering an Onion Routed response directly to your mobile device.

Quick and easy ~ already in your Home-directoryđ¤
In a few seconds – you are logged in. Felt the Magic?
The above article was written by Majorđ
One of the Wizardsđ§ââď¸đ§


