Devs, I've got a question.
Let's say I invested 10 BTC. Does it count as 13 BTC because of 30% bonus or as 10 BTC? The thing is I'm investing for me and several friends and I don't want to be refunded because of 2% limit.
With 750 BTC max cap investment limit is 15 BTC (2%). Or 15 BTC minus 30% because 30% will be added as bonus?
Devs, could you please answer this. Look at Bter, someone invested 15 BTC. Will you refund him 30% or not? How does it work? It seems like simple math to me. If 15 BTC is more than 2%, then the amount above 2% will be refunded. Then the bonus will be added to that amount.
|
|
|
Couldn't the thief just launder the coins bit by bit and get away with it scot-free?
For example: You could just trade some of them for another virtual currency on some random exchange, and then convert what you bought back into BTC, and voila, clean bitcoins. Or use a laundering service. It seems really easy to get around if you're smart?
Actually, the best way to clean the coins is to send them to an exchange, then cash it out to your bank account. Then use all that fiat to buy back the coins on the same exchange. Untraceable This would actually be very traceable as once it is discovered which exchange the coins were sent to then you could subpoena the exchange to provide the identity of the user who deposited the coins. An exchange would provide only temporary cover to your identity. Faceplam!
|
|
|
There was some confusion among forgers suddenly forging less blocks than expected. For these people (and others) we've added a stats page to the blockexplorer that shows what account forged how many blocks in a period. http://explorer.fimk.fi/blocks/stats/0/0If you are suddenly forging less blocks than expected/normal it is advised to delete your blockchain and restart the FIM client. Yea, I forged a block last night. Is there a forging calculator available?
|
|
|
Please add a password when the wallet is unlocked for every transactions I don't want to be Kleened Does Qora have account leasing? If so, that basically resolves this issue.
|
|
|
This sucks, and I feel bad for the OP, but since so many people say that BTC is not truly anonymous, with this much money at stake, with such a large bounty, I suspect we'll be learning soon whether or not using BTC can be truly anonymous.
If he tries and cashes it out, he'll get caught easily. However, the stolen BTC from silk road is still sitting in that bitcoin account. It hasnt been moved yet, so they're(the hackers) are probably waiting until everyone forgets about the major hacking etc, and then theyll try and cash out the btc slowly under the radar. However that probably wont work either, since they can still be caught easily by any exchange they try cashing the BTC out to. I dont know what the hell they plan to do, maybe trade the BTC to north korea in exchange for yuan? I dont fucking know.. Local bitcoins. Find some noobs and sell to them for fiat.
|
|
|
it is still generating blocks. and as i look at it, it is actually catching up, just insanely slowly. now i'm about 75 blocks behind. so it gains a block every few mins. seems like that isnt synching right. perhaps i'll restart my machine and the console.
im at block 16539 as of this writing, about 75 blocks back.
edit: 16539 ID: 14799672264195579729
i also did a small test transaction to another FIM account i have. that transaction DID show up in the live blockchain, so i think thats a good sign?
Sounds like you are fine. Are you having network issues? Yea, restarting the server won't hurt.
|
|
|
Am I on a fork?
I'm stuck 80 blocks behind and dont seem to be catching up. I just stay 80 behind. Also my balance and forging are reading higher than the reporting at the Fimk blockchain site
Any thoughts on this behavior?
Thanks
What was your last block, and what id was the generator?
|
|
|
Address / Bter tId BTC Spend Fraction of Stake Crypti Received Bonus 14fgnit6kxH9GNzGpr9WeWfnYcb7xU4mTn 0.055 0.018 1368504.678 30% 14j25L31fmQZL3hB7LfKbmKZdb6EPQg6qm 0.3 0.099 7464570.970 30% 164YLVQYm9Kfu4hpxjkBFKjiePx9mFrCU9 1 0.066 4976380.647 30% 185qk9Vk4HPvTdv2uKoStXeK86Xqqzqh8H 0.25 0.083 6220475.808 30% 18vNj8vN1dE5EzhoU9ns1NHJi5PN6Fa7LE 0.101 0.033 2513072.226 30% 1DD1Z8VQpcT7RbPzZhRCW7QRbQTLnikEHy 1.31066366 0.434 32611806.359 30%
Just does not look correct. Would not want to be the one who invested 1 BTC in the table above.
Yep, agreed. Are we trusting devs who's website can't do basic math to create a viable crypto currency?
|
|
|
Read my post again, I have added the important part everyone so far missed (damn lamers, it is no wonder so many of you end up scammed on every step).
I already addressed that in my original escrow posting, did you read that? • After the pre-sale has ended, you will have to sign a message with the private key of the investment address you sent the Bitcoins from. This message will include your Crypti account number and allows the Crypti team to securely link your investment to your Crypti account number.
I will definitely make sure the Crypti team will implement it this way. Correct, my mistake there. no problem. We will refrain from name calling.
|
|
|
Read my post again, I have added the important part everyone so far missed (damn lamers, it is no wonder so many of you end up scammed on every step).
I already addressed that in my original escrow posting, did you read that? • After the pre-sale has ended, you will have to sign a message with the private key of the investment address you sent the Bitcoins from. This message will include your Crypti account number and allows the Crypti team to securely link your investment to your Crypti account number.
I will definitely make sure the Crypti team will implement it this way. I assume they just didn't update their .md file on github.
|
|
|
Read my post again, I have added the important part everyone so far missed (damn lamers).
Just wow. No need for the ad hominem attacks. Your steps weren't all that clear because they didn't include the read me text. I had to go back and read that, then read yours. But, as I said, I see what you are saying. I fully expect that when you "provide the CRY address, it must also be signed, but they don't say that". Seems like they are adding an un-needed step.
|
|
|
That is not like it is supposed to work, check my post you quoted.
Yes, I see what you are saying: Step three Once the pre-sale is over, browse to the online issuance system at http://crypti.me/issue (will be online towards the pre-sale end) and copy the confirmation message posted there. Sign the message with the address you used to send BTC (for example: http://imgur.com/a/nUmZ0), and copy & paste the signature to the online issuance system. The online issuance system will match your signature against your sending BTC address. Once matched successfully, the system will ask for your Crypti address, so it can issue the Crypti coins. Yes, that's borked. Unless the second bolded statement there is also signed with your PK. They don't say it should be. The whole "sign a confirmation step" isn't needed OR it is in that message that you also must provide your CRY address.
|
|
|
UPDATE:
I HAVE FOUND THE HACKER, HIS IN THE BACK OF MY SUV. WE'RE DRIVING HIM TO THE JAIL NOW, WE'RE OFFERING HIM A QUICK CIGARETTE FIRST THO BRAH
#DOGTHEBOUNTYHUNTER
CAN WE HAZ BOUNTY OP?
Um, no. He said the bounty was a percentage of returned BTC, not capture of the hacker.
|
|
|
1. I send you BTC using address for which I have a private key 2. I sign message by Crypti team using private key and reedem Crypti coins to address X 3. I complain to you that I have not received my Crypti coins to address Y
1. I send you BTC using address for which I have a private key 2. I sign message by Crypti team using private key and reedem Crypti coins to address X 3. Crypti team instead reedem coins to address Z
In above cases, you have no way to prove that either me or Crypti team cheated.
Just what? How do you do step 2? 1. You sign a message using your donation BTC address's PK that contains your Crypti address. 2. Crypti confirms the signature and sends CRY to that address 3. The Crypti is sent to that address 4. It is provable in the Crypti blockchain.
|
|
|
Everyone should retweet this or send a tweet to Roger Ver about it. ^^ Agreed. Everyone tweet it and copy Roger. Lets show them how this community supports itself. And lets show the clueless public that Bitcoin is the first public ledger of account. Therefore safe. Thanks for helping everyone! It worked: Retweeted by RogerVer. Wish some more of the news sites would have picked it up. Maybe this helps. I'm skeptical about the Dropbox route. One would have to figure out where the wallets are. Then where the password file is - and even in plain text which word the password is. Sounds still tricky - let alone to get in first. Keylogger is way more occamish. You don't type in your BTC private key (yes you do your NXT password), so how would a keylogger have got it? I do think the hacker got hold of this text file somehow.
|
|
|
Basically informative. wrt to dilution worry. It seems to me that if there is a high pre-sale amount of BTC then Crypti could have a soft cap, say of 750 BTC, and every thing over that cap could be put back onto BTER as buy orders, say in blocks of 1000 (or whatever a good BTC round price would be) increasing buy price say 100 sat for each block. This would provide buy support for the currency and raise the price at the same time, also adding buy pressure because people on BTER will see the GREEN up arrow and take a look and possible grab some. The CRY bought could be added to the foundations balance for future investment in the coin.
|
|
|
Any details on how this works. Since it is one way? Is there one channel that the full blockchain will be transmitted on over and over, and another that will just send updates? So, you listen to one, get the full block chain, then listen to the other for updates?
|
|
|
Wow... that's a freaking theft... The wallet was online I assume?
Electrum - dropbox was compromised (with plain txt for the pwd, I know I know..) plain txt .... and on dropbox ... I am sorry to hear this but good luck buddy ! plain txt... so it was all essentially sitting in a dropbox with no 2FA... just a single dropbox password? how was the dropbox compromised? I'm not convinced that is what happened. Someone brought it up on NXT forum that he hadn't changed his password since they updated their cert after that heartbleed scare of 2014. But, that doesn't mean it was the attack vector. But, if it was, dropbox logs will show it. Of course if someone at dropbox went to work in a new Ferrari today, then well, there you go.
|
|
|
frozen funds in Bter cover the community funds. But we also know about 100 Bitcoins sent from bter
I had 4000 NXT stolen from me by ShareXCoin exchange. It someone recovers them, they can have half. But wait, if someone recovers them, don't they have 100%? Well... I hope for an honest finder.
|
|
|
|