Show Posts
|
Pages: « 1 2 3 4 5 [6]
|
1. http://explorer.etherzero.org/home the point of a fork is that it branches off of an existing blockchain, right? 2. Um...trades look fine to me, only thing is you can't deposit or withdraw to a wallet at the moment, look here: https://yobit.io/en/trade/ETZ/USD3. You go to myetherwallet.com and follow the instruction here by connecting to a custom node: http://cryptocoindaddy.com/how-to-claim-etherzero-coins/4. Make a transaction like you usually do with ETH via MEW interface. 5. I am not that tech-savvy, however, since the project is rather raw, it might be that it is the way their node is connecting and interacting with miners, which makes you think it's actually another coin, when it's not. If you give me a detailed instruction on how you came to this conclusion, I can check it out P.S. After writing all this, I think now I should seriously consider applying for a job with the ETZ team as their English-speaking public relations officer I'm just kidding, we are all here just trying to figure out if it's a worthy project or not.
|
|
|
Well it is not an easy job to do a fork, let's not jump to conclusions. Many scammers are out there, hunting for new ICO or fork to get their hands on other people's money. I prefer to judge people by the work they have done, and the promises they have made. The source code is not out yet, but it will be by the end of the month. So far, let's sum up what is done. 1. Blockchain is online. 2. Yobit credited the coin to their ETH holders. 3. MEW can be connected and all the wallets are credited as promised - 1:1 ETH to ETZ. 4. The transactions run fine with MEW, as long as the sending wallet contains 0.1 ETH or more. 5. Mining pool is working and people are receiving mined ETZ (I am also one of them). If there were no miners mining the transactions, as you claim, then how on earth MEW to MEW transactions are getting through to the explorer? http://explorer.etherzero.org/tx/0xe0cbd88547286158772c07e6074c7cf4a98b65080df2b7a119f0b4c909064b78This one, for example. If I was not sure that the ETZ I was selling would 100% be transfered to my buyer, I would not post a sale. I believe that any community should live in a safe and stable environment, where people's reputation and the work they have actually done count.
|
|
|
I'm willing to sell direct only, from MEW to MEW wallet. Many people want to buy lower than Yobit and hold on to ETZ for the future. The price might go up after more people get Yobit wallets. I would just prefer to get money now, since I'm a miner. I will send ETZ only to the wallet from which 0.3 ETH is deposited, very easy deal.
|
|
|
Thank you, I wish I knew how to compile C++ Is there an already compiled exe for this? Also tried contacting macbook-air, no replies, probably because I still get a "newbie" warning in my personal messages.
|
|
|
What is the best tool to send it manually to nodes? Connect with bitcoin -cli or learn some other way with straight python tools? Thank you all for replying.
|
|
|
Hi, I am wondering if there is a a place out there to push a tx with non-standard inputs. The transaction is fine, no double-spending, the script sigs are all good, however I cannot seem to find a place to push it to the network. Please help There used to be Eligius to do this, however it does not work now and I dont have a referral code to f2pool. The others dont seem to work with non-standard txs.
|
|
|
I was browsing through blockchain today and I noticed new - weird looking adresses like this bc1qdl753ur9ucwa3cgfrud2nqvu7k69dykk3cwwx6g64a5szn3xw92sp8mc7a. What type are these??? How would you create transactions with those? They are some sort of witness adresses? Each address has a private key, the ones start with 3 have 2/3 private keys, what type of a private key would have this one? Are they more secure? I'm sorry I could not find any information online, maybe someone could direct me to a new manual on this
|
|
|
That earlier version suits my purposes just fine, I wanted to look at how it actually was, when I was too young to understand it But for some very odd reason bitcoin.org used to have that version "bitcoin-0.1.5.rar" and its just nowhere to be found. I mean the code is there, but the already built version just vanished from the whole internet, I couldn't find it in any of ftp sites, or software resources, etc. It's a conspiracy theory I say
|
|
|
Thank you I suppose it's better than nothing. Still not the 0.1.5 version I was looking for
|
|
|
Hi, I have been looking all over the internet to find that very first bitcoin release "bitcoin-0.1.5.rar" with bitcoin.exe. Can't find it anywhere! If anyone has the original file, would you please please please please very very please send it to me! Thank you
|
|
|
Hi, I hope I got the right site. It gave me a referral link for the contest: http://vy.tc/dvNr328Did I get this correct?
|
|
|
https://bitcointalk.org/index.php?topic=977070.0The R-scan was in this thread. Now the more you tell me about it, the more I am curious, somehow people have done it though? I mean scanned the blockchains script signatures, if they were not using a script, then they used malware? Its not possible to scan the blockchain by personally looking at all the transactions, and obviously there is an output script like on the website I provided in my original post. Or was this done by the developers and they have some special tool for it? Update: Thank you so much for pointing me in the right direction! I was able to run the script under Python 2.7 after installing simplejason dependencies, now I get another error: Traceback (most recent call last): File "E:\rng-scanner-master\rscan.py", line 44, in <module> print "hash: " + str(addrdata['txs'][y]['hash']) IndexError: list index out of range this is so frustrating, if you could give me any advice, I would appretiate it, thank you.
|
|
|
I run Python 3.5
|
|
|
I tried to run Rscan with python in cmd Windows. I always get the error "SyntaxError: Missing parentheses in call to 'print'" Maybe I'm doing it wrong?
|
|
|
Hi, I have been thinking about investing a sum of money into bitcoin, so I have been reading about its vulnerabilities. As I understand, blockchain sometimes gives repeated R-values which makes some bitcoin wallets vulnerable to hacks. I wanted to find a tool to scan for such vulnerability, but seem to find none. I found R-scan, unfortunately it does not run under Windows, and I tried to run it in pythonanywhere, but to no success. Is there a tool to do this in Windows? Is there a tool to do this for the whole blockchain, so there is some output script like this http://www.want2pay.com/bad_randoms_bitcoin.html ? Please help, I want to make sure I can search for the vulnerability myself, instead of waiting for someone else to post it when its too late. Thanks in advance for your help!
|
|
|
Thank you for the links, but that's not exactly what I wanted. Let's say I have the transaction from { to }, already signed and all that. I want the form to completely take my json text and convert it to hex like paste ->hex. These all make me fill in blanks and create the json text for me. createrawtransaction - if I input the script, it says that there is invalid syntax.
|
|
|
I wanted to ask, why is there no tool to convert json format of transaction into hex? Why not? Is it that difficult to implement? For example, I want to edit my transaction by hand, instead of going through it from some program step by step. There is a decode hex to json on blockchain, why is there no tool to reverse this process? I'm a bit new to bitcoin, so please don't be mad if I'm asking a stupid question, I was just curious.
|
|
|
|