My qt wallet was stolen today, but that only had 0.001 on it.. my inputs wallet wasn't. I already reformatted and changed my passwords, is there anything else I should do?
Ouch, sorry to hear that! I suggest looking if you have any unrecognized signed in sessions to be sure: https://inputs.io/sessions
|
|
|
Well you could make Bitcoin clients relay transaction with or without fees, you wouldn't need any private key at all because the 51% would decide who the coins rightfully belong to and include it in a block. We could also give the miners an additional fee for the dispute in order to reward them and make propagation more rapid. Computer code cannot detect which is the "legitimate" double spend or which is the "attacker" double spend. They only know which transaction they themselves heard first.
|
|
|
You also get free advertising on Inputs.io if you implement our API
|
|
|
Betsofbitcoin is biased for BFL. Be careful.
|
|
|
You are no longer anonymous
|
|
|
Maybe with the new commission Dooglus can finally add Inputs withdrawals
|
|
|
Yes, just like how other Bitcoin finance sites are just for educational purposes (btct.co), takes no responsibility (bitfunder), or is just for a MMORPG where miners are gold farming bots (MPEx).
|
|
|
Why does the site footer say Logged in as '' when I'm not logged in instead of simply saying Not logged in or saying nothing?
Changed, thanks for the.. feedback?
|
|
|
Done Thanks for this BTC address also in sig Well its actually been two months now I dont remember receiving anything Downloading the chain now Nothing yet. Whats the word on this? Sorry for missing you, sent you payment for 2 months (same thing as 1 month as it wasn't from Inputs)
|
|
|
Anybody with "Jake" in his name will almost always be a scammer.
This is actually surprisingly accurate.
|
|
|
There are only 22,953 shares outstanding
|
|
|
FYI, Inputs.io has much stronger security features. An attacker signing in from a remote location would need to also compromise your email and PIN which is very difficult to keylog.
|
|
|
I'll change that by returning only ASCII from the server and formatting/deleting <>s within the script I didn't find anything in greasemonkey that checks SSL certs so I can't use them for now, I'd prefer though so I'll continue to search for it I don't think that the current low number of people using this script would interest anybody anyway
You just add https. Your browser checks the cert for you. An attacker vector is an attack vector, there's no reason to not fix them, and one can be use to chain another.
|
|
|
I need an address for me to receive coins to be generated and displayed when a user clicks a button. That's it. I don't need QR codes or any fancy stuff. What's the easiest way to do so (with code examples, since I'm quite clueless)?
If you're OK with using Inputs:
|
|
|
Don't forget coinchat.org, we have referral contests in addition to 0.03 BTC per whitelisted referral you bring.
|
|
|
I have 3160 PMs
|
|
|
Third, and most importantly, headline growth numbers obscure underlying risk. As the original post indicates, that's why an entire cottage industry has put analysts to work evaluating skewness, kurtosis, Sharpe ratios and other measures to distinguish good investment management from bad. Three extremely different portfolios might all generate the same returns over a given period of time, but they might do so with entirely different risk profiles. Would you rather have 10% per annum while risking a 50% chance of a 50% loss per annum, or 8% per annum with the same level of risk of a 20% loss; how about 12% per annum with the same level of risk of an 80% loss? If you're merely 'benchmarking' you would probably go for the 12% and be happy; for my part, I'd take the 8% without a second thought. There's this alternate stormy investment fund that aims for 52%/year but has managed to lose 23% in one week, while claiming they are "performing quite well."
|
|
|
Nonwhitelisted users now get half rewards
|
|
|
|