Long time not play here, how are you, Micon? My previous bct account was lost, i have to use the new one. I remember micon was sued by US gorv long time ago, any progress?
For real? Long time not read news here either, eh? Micon and the govt reached some kinda settlement. As far as I know he's staying away from online poker stuff cos he rightfully needs to think about how to protect his family and maintain his freedom to do so. With respect to all this other drama, I sorta wish you guys would just give it a rest. I've read through TwitchySeals many many pages of complaints and while I agree that some of the issues weren't handled gracefully, as far as I can tell, betcoinag isn't trying to cheat anyone. Now it just looks like they're going to be trolled to death by Twitchy and co for as long as they try to exist. My own experience there has been so-so. I'm glad that their poker room kinda works (on one browser, and only some of the tabs work ...), so that's better than nothing, which is what I've currently got from SWC. If SWC's new strategy is to try to troll competitors rather than improving their own product, then I think that's bad news for anyone who enjoyed bitcoin poker on any site. Let's not continue this race towards the bottom. Bitcoin poker needs to improve, and trolling competitors doesn't help with that.
|
|
|
I'm having trouble connecting to the poker room site.
|
|
|
Everyone having the same temper tantrum induced connection issues?
Pretty much. I guess there's no more grindabit thread or any other? good question, I haven't been to the grindabit forum in forever, or this one really. I hope this ddos costs money to accomplish. I like the idea that the idiot is paying money to be a d*ck. Welcome to bitcointalk, Telera! Anyway, I agree, hopefully this dick move is expensive. They have to know that eventually the DT will rearise, I think it's basically the oldest still-functioning bitcoin biz (could be wrong). So, even if they manage to take out DT for a while, eventually their funds run out and DT comes back.
|
|
|
Well I have to say, this place is better than any reality show and most organized ones.
Yeah this section is usually some of the most entertaining stuff on the board, and scam accusations.. I admit that I used to find Quickseller's trolling and drammatic shenanigans pretty entertaining until I found myself to be the victim of it. Nowadays I find it a lot less funny.
|
|
|
1. Personal information must be confined to the new "investigations" board (under Scam Accusations), ... 2. It is not allowed to post someone's dox ...
I assume there's an exception here if you're posting your own dox.
|
|
|
For those who aren't otherwise aware: gorgon666 (the OP) is an alt of Quickseller. This thread seems to be part of QS' current shenanigans.
|
|
|
For fun, here's where QS tries to rationalize taking stolen money to sue Vod: https://bitcointalk.org/index.php?topic=1179238.msg12414083#msg12414083Thanks! I was going to look this up but you beat me to it. It seems that Lauda has inherited the unfortunate roll of brunt of Quickseller's massive alt army attacks. After me, the crown fell to dooglus, now it seems it has passed to Lauda. Lauda, hang in there, eventually QS gets burnt out and moves onto smearing someone else. It is sorta hillarious that he's now using his alt to say that people shouldn't take money from TF, seeing as he's practically thumping his chest about it in that other thread.
|
|
|
Just want to make sure I watch the new thread. I understand returning members do not need to reapply. Cheers!
|
|
|
Anyone an idea how i can get the compressed address???
I used this script when I was studying this stuff. Some of these functions are from a blog (url in the comments, a few others were written or modified by me): #!/usr/bin/python # for my education, following along with bitcoins the hard way blog post: # http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html import random import hashlib import ecdsa import struct
b58 = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
def base58encode(n): result = '' while n > 0: result = b58[n%58] + result n /= 58 return result
def base58decode(s): result = 0 for i in range(0, len(s)): result = result * 58 + b58.index(s[i]) return result
def base256encode(n): result = '' while n > 0: result = chr(n % 256) + result n /= 256 return result
def base256decode(s): result = 0 for c in s: result = result * 256 + ord(c) return result
def countLeadingChars(s, ch): count = 0 for c in s: if c == ch: count += 1 else: break return count
# https://en.bitcoin.it/wiki/Base58Check_encoding def base58CheckEncode(version, payload): s = chr(version) + payload checksum = hashlib.sha256(hashlib.sha256(s).digest()).digest()[0:4] result = s + checksum leadingZeros = countLeadingChars(result, '\0') return '1' * leadingZeros + base58encode(base256decode(result))
def base58CheckDecode(s): leadingOnes = countLeadingChars(s, '1') s = base256encode(base58decode(s)) result = '\0' * leadingOnes + s[:-4] chk = s[-4:] checksum = hashlib.sha256(hashlib.sha256(result).digest()).digest()[0:4] assert(chk == checksum) version = result[0] return result[1:]
def privateKeyToWif(key_hex, compressed=False): if compressed: key_hex=key_hex+'01' return base58CheckEncode(0x80, key_hex.decode('hex'))
def privateKeyToPublicKey(s, compressed=False):
sk = ecdsa.SigningKey.from_string(s.decode('hex'), curve=ecdsa.SECP256k1) vk = sk.verifying_key
if compressed: from ecdsa.util import number_to_string order = vk.pubkey.order # print "order", order x_str = number_to_string(vk.pubkey.point.x(), order).encode('hex') # print "x_str", x_str sign = '02' if vk.pubkey.point.y() % 2 == 0 else '03' # print "sign", sign return (sign+x_str) else: return ('\04' + vk.to_string()).encode('hex')
def pubKeyToAddr(s): ripemd160 = hashlib.new('ripemd160') ripemd160.update(hashlib.sha256(s.decode('hex')).digest()) return base58CheckEncode(0, ripemd160.digest())
def makeRawTransaction(outputTransactionHash, sourceIndex, scriptSig, outputs): def makeOutput(data): redemptionSatoshis, outputScript = data return (struct.pack("<Q", redemptionSatoshis).encode('hex') + '%02x' % len(outputScript.decode('hex')) + outputScript) formattedOutputs = ''.join(map(makeOutput, outputs)) return ( "01000000" + # 4 bytes version "01" + # variant for number of inputs outputTransactionHash.decode('hex')[::-1].encode('hex') + # reverse OutputTransactionHash struct.pack('<L', sourceIndex).encode('hex') + '%02x' % len(scriptSig.decode('hex')) + scriptSig + "ffffffff" + # sequence "%02x" % len(outputs) + # number of outputs formattedOutputs + "00000000" # lockTime )
import sys private_key = None if len(sys.argv)>1: if sys.argv[1] == "-x": private_key = sys.argv[2].zfill(64) else: private_key = '%064x' % int(sys.argv[1]) else: private_key = ''.join(['%x' % random.randrange(16) for x in range(0,64)])
print "A private key: ", private_key print "The uncompressed WIF: ",privateKeyToWif(private_key) print "The WIF: ",privateKeyToWif(private_key, compressed=True) public_key = privateKeyToPublicKey(private_key) cpublic_key = privateKeyToPublicKey(private_key,compressed=True) print "The uncompressed bitcoin pubkey: ", public_key print "The bitcoin pubkey: ", cpublic_key print "The uncompressed bitcoin address: ", pubKeyToAddr(public_key) print "The bitcoin address: ", pubKeyToAddr(cpublic_key)
You can see that this script takes a private key as a command line arg, and it takes hex if you specify -x, otherwise it just generates a random private key. After that, it spits out the addresses and WIFS for that private key, both uncompressed and compressed. See the functions themselves for how it's done, specifically, look at privateKeyToPublicKey. Uncomment the debugging "print" lines if you want some further output.
|
|
|
OH no, it's the return of the "does martingale really works?" thread!!
Why this thread has to come back to life once a year and generate a million useless comments on a completely solved discussion, I don't know. Anyone know actually doesn't know the answer to "does martingale really works?" should just read the wikipedia page and let this thread die plz.
|
|
|
Dear sir,
I want to know, is the all user can give the trust to all member? Example, if I still junior member, can I make trust to higher level than me like legendary member? Can I give trust frequently to one user?
AFAIK, yes you can give trust ratings to any member even Satoshi, theymos or any default trust member. For your second question, you can give multiple ratings to a member but I'm not sure if it does have a timer before you can proceed in adding a new rating. There are some examples of ratings being removed when they were just spam. For example, if some angry user leaves the same rating over and over again too many times on a trust page, the duplicates can be removed because it's just unnecessary clutter and spam. I think these are the only examples of the trust system being "moderated".
|
|
|
This thread is going insane, please OP close it since the title is misleading and is not true. If Lauda is a bad mod, theymos would notice and take actions against him, which he doesn't do so everything should be allright. Don't be pissed at him for a unknown reason.
The most awkward part of this thread is that it's another attempt by QS to troll someone into oblivion using many accounts and trumped up accusations. It seems like defcon and Lauda really do have some issues that they need to sort out, it also seems like they're working on that. QS isn't going to close the thread because he's after Lauda for some reason. Who knows what that is? Most likely, Lauda refused to be bullied by him sometime or another and that got QS mad and the rest is what we have here in this thread. Be on the lookout for new threads by other alt accounts as QS typically tries this multiple times.
|
|
|
I actually just replied to him in PM, but I think the answer to his question is on the order of 400BTC. He needs to double check the rate and the actual value of the reward. But if it really is 8BTC and he has 50% done and he's getting (for example) a 1% rate, then he'll need to wager 400BTC to get to 100%.
Are you guys serious ?? 400btc !! WTF !! To wage that and get what ? 8btc reward ? This is crazy for a game or anything for that matter , this is massive amounts of money omg !! I had no idea this "game" was so popular. I hated it. Btw you use to be able to drink drinks... What does it do ? Drinking drinks, like everything else in this game, is a bet. Different drinks have different payout tables, different variances. Basically, you win or lose your bet a few minutes after your avatar buys the drink, you'll either find money in the bottom of the cup, or you'd find the drink to be "tasty and satisfying". BTW, my account is still for sale.
|
|
|
I also vote neither. Dorian was merely an accidental name collision. CW, if he were Satoshi, wouldn't have had any trouble proving his identity. That one almost got farcical at the end with that "I can't take the pressure" letter. Both were sorta lol.
|
|
|
In case it helps, my experience: when I got locked out of an account due to a hack, theymos helped me recover it pretty much right away. When I lost the password to an account, theymos pretty much ignored my request.
|
|
|
he's getting paid by the post by betcoin, who cares if he has more krill than veganhippie
I've been using sealswithclubs.eu from approximately 2013 until it closed. Since it closed I've been a regular part of this discussion. Betcoin sponsored me about 2 months ago. That's not really relevant to what I'm talking about but if you really want to gripe about it then you may as well take it in context.
|
|
|
What would stop people from creating multiple addresses on multiple VPNs from taking all the BTC available at that location?
Some part of this might also have to be allievated by simply making it very onerous for small reward. Imagine that in principle it's possible, but say that you're dealing with hundreds of satoshis per, well, that's a lot of work to cheat for fractions of a cent.
|
|
|
lol u never played daily on this site. you didnt even have enough krill to play the lowest krillroll i dont think they care about your play
You can assert that if you want. It doesn't make it true. Fact is that I *did* play daily for approximately 2 years. But if you're not interested in facts then feel free to make wild claims with no evidence. Cheers! please tell me how much krill u had? i know it was no more than 1k krill and if you played for 2 years u must have only played freerolls It's been over a year and a half since I had access to my account, so I don't really remember. I remember that I had access to the lowest two krillrolls. I don't know why this matters so much to you.
|
|
|
lol u never played daily on this site. you didnt even have enough krill to play the lowest krillroll i dont think they care about your play
You can assert that if you want. It doesn't make it true. Fact is that I *did* play daily for approximately 2 years. But if you're not interested in facts then feel free to make wild claims with no evidence. Cheers!
|
|
|
Does anyone else think that Lauda should not be a moderator?
Lauda proceeds with her opinion when moderating the board. Lauda does not follow the rules of the board the same way other moderators do. Lauda is not open to ever being wrong or mistaken. Lauda does not understand what it means to moderate the board. Lauda does not bother to explain reasons behind actions in a friendly way. Lauda likes to be abrasive with people she is moderating. Lauda is power hungry.
I move to have Lauda removed from being a moderator effective immediately.
What's up with you and Lauda, did she delete so many of your posts? Get used to getting your posts deleted as a newbie, I had more than 20 posts deleted when I was a newbie. By the way it wasn't Lauda who did it. gorgon666 is Quickseller. This is actually his standard attack. He uses a newbie account to open an outlandish accusation. Then, somewhere downthread, he shows up with his main account. He may also use other accounts, idk. You can see this in how he used his account newton1 to attack dooglus in two threads at once. He also did the same thing when he was attacking me, he used at least 4 accounts in that attack.
|
|
|
|