Looks good to me! Your local-dead-on-arrival rose, to a more realistic level of 10%. I was about to ask how it comes your local-dead was less than 2% on your first screenshot!
Incoming connections as well, so you probably have a static IP?
Ente
|
|
|
I have big problem now, after install AMD 12.3 for windows, all looks ok but in run_p2pool.exe (0.10.3) shares are still 0, efficiency . What do you mean with "still"? Did you restart p2pool after upgrading? How long did p2pool run since then? Does it report a local hashrate from your miners? Do your miners report any problems? Ente
|
|
|
May not be properly seeing your external address, also takes a day to get conncetions.
I forwarded port 9333, the p2pool instance is reachable from outside, but noone ever connected to it (except one for testing). This is around one, two weeks now. Some people suggested that a node has to be "reliable" for people to connect to it. The node is running 24/7, but the internet connection reconnects every 24 hours. Maybe this is the reason. Ente
|
|
|
Ha! Found a funny error message. 2012-03-31 21:52:02.374120 Peer 127.0.0.1:9333 misbehaving, will drop and ban. Reason: was connected to self 2012-03-31 21:52:02.374464 Peer 127.0.0.1:47778 misbehaving, will drop and ban. Reason: was connected to self
But why would it connect to itself in the first place? ..to have a higher connections count? Bored of the 10 only, with zero incoming! Ente
|
|
|
Thanks for that! - P2Pool didn't handle resubmittal of a share solution well. Fixed in commit d3c794ac7.
After so many questions, I'm happy to have been of any help! :-) Ente
|
|
|
That's not what the article says, it says before 1870, not many people knew or cared about diamond, no matter how "rare" it was.
Fix'd that for you ;-) Try to find a decent sized ruby or emerald in the quality (clarity) of a off-the-mill diamond. If you do succeed, compare the pricestickers. Will be like comparing prices of a bicycle to some seriously expensice sportscar. Once you wake up again from stickershock, that is. ;-) Not ranting to bitcool, or let alone Roger! Ain't even mad! Now, if you want some seriously extravagant stone: Go for alexandrite! One of the rarest stones (when in gem-quality), unlike the warehouses full of diamonds. It frickin' changes its color under sunlight and artificial light! And you probably wont meet anyone in your life who ever saw such a ring face-to-face. Oh, you quickly will see there are synthetics available. Which might be an option for some people. Anyway, the price varies dramatically with how dramatically the color-changing effect and clarity is. http://www.alexandrite.net/assets/images/attachments/35237/alexandrite-guide-banner-colors.jpgWell, being a geek, I like diamonds. Hardest stuff on earth, ridiculous heatconductance, and they look sparkly too.. heh Ente
|
|
|
Whoops, just updated to the newest p2pool version.
Interestingly, when restarting p2pool (the version before), I got an exception, p2pool continued, and showed -1 orphan. I still have the output if you would like to see it.
Ente
|
|
|
P2pool is at 390 GH/s now, nice job!
Nice! So its finally speeding up again! OT: Anyone likes to explain that "alternate universe" graph? Also, the green "found blocks" and red "hashes hashed" look similar, but are spreading. Is that from the ~10% stale/orphans etc the whole p2pool has in average? Then it will continue just like this, and wont converge again. Its hard to believe that the diverging is just the variance? Ente
|
|
|
It would be a fun hack to use that android, and physically destroying its ability for mobile, wifi, bluetooth, IR etc. It surely would look gorgeous! Ente
|
|
|
It depends on your approach. If all you want is a "one passphrase --> one privkey" approach, the original way was/is to simply hash the phrase with sha256. The output is automatically a valid privkey. The pubkey can be calculated from that privkey. You could use different hashing algos, or a combination of them (bitcoin uses at least ripemd160 and sha256), This would not generate more security, though. Sure, if someone knew the phrase (or has a wordlist), the exact combination of algos is an additional security, but computers have no big problem to test a dozen combinations of algos per phrase. The problem, of course, is to not only remember "mY Beetcoins are oh-so-safe!!1!" but now "mY Beetcoins are oh-so-safe!!1!" "sha256-ripemd160-sha256-sha256-ripemd160". Now if your approach is to have one passphrase which generates more than one key, without compromising all keys when one key becomes public, I dont know. Clients already are able to do this, but I didnt read how they do it and if its the same way for all of them.
I am all for a standart! At the moment it should be relatively easy to have, there arent too many clients around and the community is quite centralized. So maybe its as easy as create a draft, find a good standart, ask client-authors and exchanges to implement it? Oh, then get a standart of both (single-key and multi-key) approaches, and give them a name too! :-)
Ente
|
|
|
I guess the printing part will be more complicated than the key-generating part :-) You could also take the pywallet implementation (which didnt have qr codes last time I checked though), or write a different implementation in any language in a few dozen lines of code. Since linux will run on the pi, both printing and creating should be easy. Get one of those tiny "party"-printers (as long as the used printing technology is longlasting), use the pi, and connect a single pushbutton. Hack a small enclosure to get everything neat and compact. Get paperwallets by a buttonpush!
Of course you might have to think about secure backups.. Like a second copy of the exact same key, to be buried or goes in a vault.
Heck, I am sure there is a niche marked for complete walletprint-boxes!
Go for it, the pi is seriously tempting.
Ente
|
|
|
MMS? I like your thinking!
I suggest you create a bounty thread for this? It shouldnt be too difficult to create a draft for someone knowledgeable. The idea itself will appeal to many. Maybe others add to the bounty too. I hope this works out nicely!
Ente
|
|
|
GG is more of a proof-of-concept and toy for bleeding edge ideas. No currency to be used for shopping. I already gained a lot by merge-mining GG. Not in $ or BTC, but in knowledge about that whole crazy mining, mergemining, protocols and real-life obstacles. There seem to be a low number of active nodes, not? A pitty!
Ente
|
|
|
I'm waiting for someone to suggest making up your own private key and then calculating the public key by hand with pencil and paper...
Watch out, there are calculators with wifi or bluetooth already! Eventually there will be malware for those, when Bitcoin finally skyrockets! :-) (yeah, you said paper and pencil.. but just because you're paranoid doesnt mean they are not out to get you..)
|
|
|
You forgot to purge the printer's memory after you print and burn a blanking document (to prevent people from looking at the next document that comes out of your laser printer with a microscope).
If you guys want to go that far into the depths of paranoia, your printer is a huge security hole that most people don't do anything about.
Whoa! Thats news to me! I only knew about printers marking printouts with tiny yellow dots to make them uniquely identificable, and that some typewriters and needle-printers (oh, and labelprinters too!) have a printing ribbon where you can read exactly what was printed.. Talking about paranoia, huh? Hmm.. I will have to investigate in that ghost-images on the next printout some day. Interesting. Paranoia: this reminds me on the cold-boot-attack, where you reboot a computer with your own OS (USB-drive) to read out the still readable data from the RAM, or simply pry out the RAM modules after supercooling them and read out the data on another computer.. If its that far, you probably wont like the idea to print/write the priv key, walk to a jeweller and give him that key to engrave in some metal piece. Do it quick, before Bitcoins and keys are widely recognized! :-) Ente
|
|
|
An Ironkey is easy enough, secure enough, strong enough.
Id trust it up to atleast 5 figures. Personally.
Every byte of flash ever created will eventually fail that is an absolute guarantee. well, "eventually" is quite open, not? But I agree, flash stands no chance to survive as long as plain (acid-free) paper written with a pen. A laserprinter-print should work fine for several lifespans too. Pro-mode: engrave a metal plate with the privkey. Should survive much about anything, including mould, water, fire. Use steel for high temperature resistance, copper/brass for high corrosion resistance, silver for being cool! :-) Ente
|
|
|
My GPU makes 300MHash/s in solo (2 threads) and 285MHash/s in p2pool (1 thread). Thats 5% slower. Does that mean I lose 5% revenue compared to solo mining?
I always had this loss when comparing a centralized pool and p2pool. Now, with the newest miner version (poclbm here, cgminer soon), both number are now the same and even a little higher than before! So, what miner and which version are you using? Used options? Ente
|
|
|
..or eject the linux-live-cd or delete the virtual machine file.
/paranoia off
Ente
ah, screw that! /paranoia on
|
|
|
|