Bitcoin Forum
May 25, 2024, 07:57:31 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 194 »
1821  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 19, 2015, 05:13:26 AM
What is interesting is that this technical pattern can still survive a fair amount of bear activity. The bears need to make a strong stand below 0.0009 to break the pattern.

It is funny that you apply technical analysis and EW analysis to something that is literally so small that one determined person without outlandish funds can easily prevent it from breaking 0.0009.

Nevertheless, I believe the analysis is correct. Once everyone willing has sold their coins to that one person at the all-time low, yet the person is still ready to buy and price does not therefore go down, then it snaps up violently.

Coming from someone that has way more Monero than the 20 btc necessary to drop the order book 50% and keep it there, you guys have no idea what you are talking about.

You guys collectively barely have enough bitcoin to buy Monero at firesale prices if I chose to do that, the auto dumping miners would simply hop in front of the remaining parts of my gigantic sell order at .0005btc and keep this downtrend going, while somebody makes an off hand comment about emission schedule

And lets not forget about the upside, anybody want to form a syndicate and get the price back up with a stabilizing bid? PM me

What I find really interesting about this market is that there are multiple large players on both sides of this market each waiting for the others to make a move.  So the size of this market is actually very deceiving.  What is important to recognize here is the fact that someone can make a move does not mean they will actually make the move. I also suspect many are not aware of the actual size of the hidden market particularly those waiting to buy. Like 20 XBT worth of XMR to get to 0.0005 in a matter of hours becomes 140 XBT worth of XMR to get to 0.0005.
1822  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 18, 2015, 10:34:56 PM
It's now 15k XMR per day, which is $3,000.

It's $100k per month, and barely absorbed. But when things change, they change quickly. As I've been saying, one person getting interested will turn the tables Smiley

This would support my technical scenario of a failed bear market with a truncated 5th Elliott Wave. https://bitcointalk.org/index.php?topic=753252.msg10493881#msg10493881. This type of pattern if broken to the upside would typically lead to a very sharp upward move. What is interesting is that this technical pattern can still survive a fair amount of bear activity. The bears need to make a strong stand below 0.0009 to break the pattern.
1823  Alternate cryptocurrencies / Speculation (Altcoins) / Re: [XMR] Monero Speculation on: February 18, 2015, 10:08:15 PM
Quote
14.9.2015   9 357 075   12 500


Half coins mined and emission rate halved. Seems like a good time for XMR to take-off proper  Grin

actually, it's a few weeks earlier:

Quote
3.9.2015   9 218 626   12 690

but certainly, emission halving is big Smiley 





Emission halving is significant because of its psychological value, given that many XMR traders have an extensive experience with XBT trading. There is however in principle nothing special here because of the continuous emission curve. It is not as if the XMR emission curve is some propriety secret.
1824  Alternate cryptocurrencies / Speculation (Altcoins) / Re: [XMR] Monero Speculation on: February 18, 2015, 01:53:06 AM
My take is that we are still in a bear market, but one where the bears are getting really tired and running out of steam. One the technical side there is a falling wedge developing. This actually supports my sub-wave count for wave V, since it supports the overlap between sub wave 1 and sub wave 4. This triangle is the one exception to keep this Elliot Wave count valid. No one has called me on this yet. A falling wedge is also an indicator of a turnaround.

The danger for the bears lies in the database that is already out there combined with the silence from the devs. My take is that if there is a breakout to the upside it will sudden and sharp.
1825  Alternate cryptocurrencies / Speculation (Altcoins) / Re: [XMR] Monero Speculation on: February 18, 2015, 01:02:55 AM
I don't think this coin has sustained one single sideways motion since its inception, not even once.

So if you see it moving sideways, expect it to shoot downward a few days later.

Actually sideways for the next couple of weeks would be bullish, since this would mean breaking the downward trend line and strengthening the case for failed bear market with a truncated 5th wave. My take is that the bears have to make their case sooner while the bulls have a bit more time.
1826  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 18, 2015, 12:52:37 AM
any idea when the price will be going back up ?

I posted my thoughts in the speculation thread. https://bitcointalk.org/index.php?topic=753252.msg10493881#msg10493881
1827  Alternate cryptocurrencies / Altcoin Discussion / Re: Which ALT coins do have BlockChain.info type API service provider ? on: February 17, 2015, 10:59:06 PM
Monero has https://mymonero.com which allows for the creation of online XMR wallets. 
1828  Alternate cryptocurrencies / Speculation (Altcoins) / Re: [XMR] Monero Speculation on: February 17, 2015, 09:58:21 PM
I see two possibilities:

1) UP
2) DOWN

Call me dumb but why can't it go sideways?

Anything can happen but sideways implies a break of a downward trendline that goes back to June of last year.  The fundamentals also tend to support a break in either direction especially when one considers. 1) A database that has been stable for over a month. 2) No Missives for over 5 weeks.
1829  Alternate cryptocurrencies / Speculation (Altcoins) / Re: [XMR] Monero Speculation on: February 17, 2015, 08:54:19 PM
Elliot Wave analysis of the Monero bear market since June on an log scale. I see two possibilities:

1) A failed bear market with a truncated wave V if the bulls can break out above the exponential trendline. The would lead to a very sharp move to the upside.
2) Continuation of the bear market with possibly an extended wave V if the bears can break below 0.0009. This would require relabelling the sub waves in wave V

1830  Other / Politics & Society / Re: NSA hid spying software in hard drive firmware on: February 17, 2015, 05:53:20 PM
Why does this surprise you? I was actually expecting something like this. The NSA just forces things like this on manufacturers.
You could prevent this from happening though, if you block the right outgoing traffic.

No the NSA does not force this on manufacturers. The manufactures do this because they believe they can get away with spying on their customers and selling the fruits of their spying for profit to marketers. Another very common motivation for manufactures to spy on their customers is DRM and "intellectual property protection". Agencies like the NSA come in much later. They realize the manufactures have valuable data and make a deal with the manufactures for access to that data.  

As for blocking the outgoing traffic yes on can do this but one must take over control of one's network and computing devices. The best way to do this is using Free Software. What actually happens is that one can build a Free Software jail around the propriety software "appliance". This can allow the owner to then use the appliance while blocking or controlling the malicious features in the appliance’s propriety software. It then becomes a battle for control between the owner and the appliance with each one trying to control the other.

Edit1: This process is completely voluntary. The iSheep for example provide data to Apple on a voluntary (they clicked I agreee on Apple's EULA) basis. Apple also provides the data to the NSA on a voluntary basis to the NSA via the PRISM program. https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29. This is why many libertarians simply do not understand the real nature of the threat.

Edit2:
https://bitcointalk.org/index.php?topic=948636.msg10387510#msg10387510

Quote
There is no big business without national interest. If you have a tech company and make millions, you are making part of national security already. Intel IS part of the national security since the 70s. You think Bill Gates would have sold his OS, if he refused the offer from the guys in the black suits back in the days?

Same with Seagate, IBM, WD, Samsung, Sony, GB, MSI and a lot more.

Bill Gates did not just sell out to the United States. He also sold out to China and Russia among others. Ever wonder where all that Chinese hacking of Windows that has been traced back to the PLA came from? It is hardly surprising that Microsoft Windows has become such a cesspool of malware.
1831  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 17, 2015, 03:07:53 PM
LED Spy Cams:

http://gizmodo.com/newarks-fancy-new-led-lights-have-little-spy-cams-insi-1525066594

Want to buy some?

http://www.aliexpress.com/promotion/electronic_light-bulb-hidden-camera-promotion.html
1832  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 17, 2015, 05:31:09 AM

Companies must be complicit in this. Cell phones spy on us, Smart TVs spy on us. Smart Appliances spy on us, Smart Meters spy on us. It just keeps going. Hell even a LED light can now spy on you.

https://www.youtube.com/watch?v=hliHBeC1sco

If it runs propriety software one should not trust it and assume that it will spy. If it supports DRM then it is almost guaranteed to spy.
1833  Other / Politics & Society / Re: NSA hid spying software in hard drive firmware on: February 17, 2015, 05:20:16 AM
Quote
Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.

"There is zero chance that someone could rewrite the [hard drive] operating system using public information," Raiu said.

They could get the hard drive firmware source code by approaching a key manager or employee directly, using traditional incentives of blackmail, extortion, bribery, sex, false flag, appeal to patriatism, etc. or by infiltration with a qualified agent.



... or simply by making a deal with the manufacturer. No fancy spy techniques needed at all.
1834  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 17, 2015, 05:03:47 AM

Yeah, I read the entire document and I can't help but want to ditch Win.
Too bad I love to play a few games that only run on it.
VM's?

I put it in a sandbox. VMs can work in some cases. The key here is to never trust it.
1835  Other / Politics & Society / Re: NSA hid spying software in hard drive firmware on: February 17, 2015, 04:06:47 AM
Here's some relevant work: http://spritesmods.com/?art=hddhack&page=1

It's not the exploits themselves that are surprising, but the sophisticated deployment often years prior to specimen disclosure or similar research.  Docs indicate there are implants across the board that target free software OSes aplenty.

Very interesting site. It does add to the how of the NSA exploit. It also shows how this could also be used for another nefarious purpose namely DRM (preventing disk cloning). Yes this could be used to re install malware after the server was cleaned up, and this attack could work on a GNU/Linux system. The practical reality is that the attacker would need either root on the server / and or physical access to the hard drive. So it come down to the question how does the attacker get root in the first place? It is at this point where propriety operating systems provide a huge advantage to the attacker. Microsoft regularly provides access to the source code and advance knowledge of vulnerabilities to agencies such as the NSA, PLA and FSB. This creates a hugely uneven playing field since the attackers have access to the source code and vulnerabilities while the defenders do not. Stuxnet is a prime example of what can happen. In addition operating systems that support DRM must have hidden and obtuse parts to support the DRM. We must not forget that DRM and malware are in reality accomplishing the same thing. It is easy to spy on a user of say Windows, OS X or IOS  when those operating systems by design treat that same user as an adversary not to be trusted.  With GNU/Linux everyone has access to the source code creating a level playing field, and the operating system does not treat the user as an adversary not to be trusted. Big difference.
1836  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [XMR] Monero - A secure, private, untraceable cryptocurrency - 0.8.8.6 on: February 17, 2015, 02:49:58 AM

Here is a link to the actual .pdf http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2015/02/Equation_group_questions_and_answers.pdf. My response is very simple: Ditch MIcrosoft and ditch Apple should be the first step.  https://bitcointalk.org/index.php?topic=958270.msg10485500#msg10485500
1837  Other / Politics & Society / Re: NSA hid spying software in hard drive firmware on: February 17, 2015, 02:39:09 AM
I have read the .pdf and none of the malware works on GNU/Linux. It does work on Microsoft Windows, OS X and IOS. The simplest way to mitigate this risk is to: Ditch Microsoft, ditch Apple and run Free Software.

Here is the relevant part of the .pdf.

Quote
22
13.   Have you seen any non-Windows
malware from the Equation group?
All the malware we have collected so far is designed to work on Microsoft’s
Windows operating system. However, there are signs that non-Windows malware
does exist. For instance, one of the sinkholed C&C domains is currently receiving
connections from a large pool of victims in China that appear to be Mac OS X
computers (based on the user-agent).
The malware callbacks are consistent with the DOUBLEFANTASY schema, which
normally injects into the system browser (for instance, Internet Explorer on
Windows).
The callbacks for the suspected Mac OS X versions have the following user
agents:
•    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_2) AppleWebKit/536.26.17
(KHTML, like Gecko) Version/6.0.2 Safari/536.26.17
•    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:21.0) Gecko/20100101
Firefox/21.0
•    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/536.28.10
(KHTML, like Gecko) Version/6.0.3 Safari/536.28.10
This leads us to believe that a Mac OS X version of DOUBLEFANTASY also exists.
Additionally, we observed that one of the malicious forum injections, in the form
of a PHP script, takes special precautions to show a different type of HTML code to
Apple iPhone visitors. Unlike other cases, such as visitors from Jordan, which does
not get targeted, iPhone visitors are redirected to the exploit server, suggesting the
ability to infect iPhones as well.

In order for the malware to get at the propriety hard disk firmware it needs Microsoft Windows or OS X. There is a reason why Edward Snowden uses GNU/Linux for his personal computing.

Edit:

Is there an actual way to buy non NSA infected hardware or its a pipedream?

It is way simpler to avoid NSA infected operating systems and the hardware will not get infected in the first place. Focusing on the hardware ignores the real risk which is operating systems which by their very nature are very friendly not just to the NSA but also to the PLA and FSB.
1838  Alternate cryptocurrencies / Mining (Altcoins) / Re: is there any future of bytecoin ?? on: February 15, 2015, 04:02:29 AM
In case you weren't aware, there was a massive ninjamine. It's basically a huge scam. Read this thread for more information: https://bitcointalk.org/index.php?topic=740112.0
If you want to mine a Cryptonote coin, Monero would be your best bet.

The massive ninjamine the market has confirmed by comparing the 24 hour volume. 764 USD for Bytecoin vs 23,133 USD for Monero. http://coinmarketcap.com/
1839  Bitcoin / Bitcoin Discussion / Re: Hackers steal 300-900 million! on: February 15, 2015, 03:20:44 AM
The article is missing a critical fact. What operating system were the banks that were victimized running? My guess is that the operating system that was infected with malware was some version of Microsoft Windows. In this case the issue is no different than the many Bitcoin users who have had their Bitcoins stolen because the used the same operating system.

The real issue here is not Bitcoin vs fiat but rather the choice of Microsoft Windows over GNU/Linux that has made the banks victims in this case for the very same reason that many Bitcoin users have also been victimized

Some of the largest hacks in Bitcoin history have all involved services running on Linux.  Security is a mindset not an OS.  MtGox, BitStamp, Coinflor, MyBitcoin, Bitcoinica, Slush, the Bitcoin faucet (the original), etc.  What did they all have in common?  They all ran on Linux and they were all robbed blind.

Sure but they have more often than not involved poor password security, overall poor server security and not OS specific malware. Yes of course security is a mind set but it begins with picking the right OS. The types of attacks that targeted the banks and many hacking attacks involve planting malware on Windows desktop computers that is then used the steal credentials. These stolen credentials may actually be used to attack, a GNU/Linux server, but even in this case the fault lies with Microsoft Windows. This is possible not only due to both the design of Windows but also because of how Windows is marketed particularly to consumers. The latter is what makes possible the massive fertile ground of vulnerable Windows computers that allows Windows malware to breed. How many Windows computers are sold to consumers that treat security as an up sell? The economic incentives in propriety software distribution actually encourage the end user to seek the Internet for gratis alternatives. They also make it easy to install software on Windows, while forcing users and administrators to have to seek software from all over the Internet. I have seen very experienced Windows administrators get fooled into installing malware. The alternative to this malware cesspool that is provided by Apple and Microsoft is an Orwellian lockdown where only applications approved by big brother can run. This leads to yet another problem since it encourages users to break the security of the OS wide open to get the freedom they deserve.

Now compare this with GNU/Linux where users and administrators are provided with a trusted software repository with 99% of the software most users will need is available gratis. Getting software to run from outside the trusted repository is possible but nerdy. It invloves in many cases compiling the software from the source code. Even if an executable is available and it matches the right distribution it still involves manually changing a set of permissions on the executable file. So Joe novice tries to install a malware executable on GNU/Linux. The most likely result is that he gets an obscure error and contacts technical support who promptly sets him right.

Security is not just about the user or the OS, it is also about the entire ecosystem.

Edit: GNU/Linux is about source compatibility since it is designed for FLOSS. Microsoft Windows is about binary compatibility since it is designed for propriety software. Malware does not spread very well if it has to be compiled by hand.
1840  Bitcoin / Bitcoin Discussion / Re: Hackers steal 300-900 million! on: February 15, 2015, 02:34:30 AM
The article is missing a critical fact. What operating system were the banks that were victimized running? My guess is that the operating system that was infected with malware was some version of Microsoft Windows. In this case the issue is no different than the many Bitcoin users who have had their Bitcoins stolen because the used the same operating system.

The real issue here is not Bitcoin vs fiat but rather the choice of Microsoft Windows over GNU/Linux that has made the banks victims in this case for the very same reason that many Bitcoin users have also been victimized

Linux is more secure than windows typically , but your assumptions are dangerously wrong as all OS variants are effected...

http://threatpost.com/versatility-of-zeus-framework-encourages-criminal-innovation/106638

Quote
PLXsert says it expects further adaptations and enhancements of the Zeus malware toolkit, including hybrid payloads with other crimeware kits targeting multiple platforms, including Windows, Mac, Linux, Android, and iOS.

http://securelist.com/blog/research/67962/the-penquin-turla-2/


Quote
The newly discovered Turla sample is unusual in the fact that it's the first Turla sample targeting the Linux operating system that we have discovered.

There is no silver bullet. Good security is difficult and complex.


It is about risk mitigation pure and simple. Yes there exist a few proof of concept GNU/Linux malware. Now compare this with the literally millions of Windows malware in the wild. I do not claim that GNU/Linux is immune to malware but the risk factor is lower by many orders of magnitude.

O and has Turla actually been found infecting systems in the wild? According to the article quoted above apparently not

Quote
Although Linux variants from the Turla framework were known to exist, we haven't seen any in the wild yet.


Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 194 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!