According to whom? I think they might feel like they've uncovered some potential issues. You demanded forced evolution.
I don't recall reading anything indicating that the dev team was ready to start licking each others' popsicles and throwing a victory party. Certainly, that attitude exists, but, shit, trolling is everywhere. Hard to demand forced evolution of the user/speculator base.
Try this.~BCX~ Its over. TW attacks will never again work against XMR. If you read the last commit on github, you'll know the whole answer. ANN here: https://bitcointalk.org/index.php?topic=583449.msg8961211#msg8961211XMR Dev team rose to the challenge of forced evolution in the time available. They have crafted a polymorphic bitmonerod+client that adds checkpoints at will and with no dev team intervention needed. Its a decentralized self-maintainable solution that scales as needed. Even if you DDoS github, checkpoints can still be deployed. Thanks are due to BCX for initiating the game. I hope it was rewarding, even though he was outplayed, this time. If there are also some other anon-busters, but that don't rely on defanged TW, they're probably rested and ready for a rematch by now. You said you were attacking before that was said so how can something that happens after you say you are doing something be the cause for you doing it? As this line ended here I would like to inform you that you have completed the aptitude test. You are eminently qualified to be a politician. Congratulations.
|
|
|
another 4 blocks in the last minute.
By my math, with 1 block per minute mean rate, one should see 4 blocks in the same minute about once every hour or so. Is this correct? After your postings you're asking us about math? I can only do arithmetic. I have seen it happen in the pre attack days, frequency unknown to me.
|
|
|
Maybe I'm missing something but I just checked the blockchain and I see 33 blocks in 39 minutes
|
|
|
According to whom? I think they might feel like they've uncovered some potential issues. You demanded forced evolution.
I don't recall reading anything indicating that the dev team was ready to start licking each others' popsicles and throwing a victory party. Certainly, that attitude exists, but, shit, trolling is everywhere. Hard to demand forced evolution of the user/speculator base.
Try this.~BCX~ Its over. TW attacks will never again work against XMR. If you read the last commit on github, you'll know the whole answer. ANN here: https://bitcointalk.org/index.php?topic=583449.msg8961211#msg8961211XMR Dev team rose to the challenge of forced evolution in the time available. They have crafted a polymorphic bitmonerod+client that adds checkpoints at will and with no dev team intervention needed. Its a decentralized self-maintainable solution that scales as needed. Even if you DDoS github, checkpoints can still be deployed. Thanks are due to BCX for initiating the game. I hope it was rewarding, even though he was outplayed, this time. If there are also some other anon-busters, but that don't rely on defanged TW, they're probably rested and ready for a rematch by now. You said you were attacking before that was said so how can something that happens after you say you are doing something be the cause for you doing it?
|
|
|
So what was your reason for attacking Monero and refusing to allow devs to fix your exploit?
They claim they've already TW proofed XMR and do not need any help. ~BCX~ You said you were attacking before the dev team said that they applied some fixes. Why are you attacking Monero?
|
|
|
Then why not attack it instead of monero? What is your reason for attacking monero and refusing to allow devs to fix your exploit?
Hey, They're the ones saying it's not possible. So nothing to worry about right? ~BCX~ So what was your reason for attacking Monero and refusing to allow devs to fix your exploit?
|
|
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ And (192298, 192299), (192326,192327), (192357, 192358) ... diabolical ... you've been at this for weeks!! Edit: Months even! (122604, 122605), (122614, 122615) - what's up with THAT? You sneaky devil. Would those blocks just happen to coincide with when BCX first came out on here and said there was a potential exploit a couple months back now? Blocks that are close together happen all the time.
|
|
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ boring ... just do it, or piss off What part of 22 day process do you not understand? Multiple people have explained it. ~BCX~ The following person seemed to indicate sweet chaos starting in a couple of days. Maybe he was mistaken.Yawn.. this isn't nearly as entertaining as I thought it would be.
Is Monero being attacked or not? If someone is performing a TW attack is there any way to tell?
From my experience with time warps attacks it takes a couple of days before the symptoms start to occur, but when they do....the chaos is sweet. ~BCX~
|
|
|
Yesterday I did notice a few times, when looking at it, that my miner software was reporting periods where blocks were being found ad little as 15 seconds apart some times 3-4 in a row. I thought it was odd at the time, now after BCXs last post maybe it was more than just odd.. I guess we shall see.
I would look at recent blocks (235525,235526) (235532,235533) (235542,235543) Coincidence, I think not. If I were the guessing type, I would call this symptoms of an "Anonymint inspired modified ArtForz Time Warp Attack" Just an observational opinion from a casual observer LOL ~BCX~ My miner for months has shown blocks detected very close together and sometimes 4 in a minute.
|
|
|
Personally I am ready to donate as soon as my monero wealth grows in a significiant level in value (I want higher purchasing power for my moneros so that smaller donation will count more).
Yes I have heard you say this before with a price of 0.1btc/XMR before you donate. May I suggest you donate something now as it will increase the likelihood of it reaching that level. Also by the time the Monero economy grows to the point of 0.1btc/XMR I imagine funding might not be as much of an issue.
|
|
|
No problem. please take care.
|
|
|
Note afaik or afaics the two simultaneous equations was not addressed in this thread. I would have to look to see if the traceable ring signatures prior art had the same issue. If not, the line of argumentation Catherine Erwin used may not be entirely watertight. I have since looked a bit more at how those two equations might be factored. An example of a new breakthrough doesn't directly apply but conceptually it shows how a large NP space can be reduced to P by using localized randomness to act as a proxy for the large search space. The key was an amplification trick on the relationship that enable the localized random recombinations. As animorex stated, we can't get into a mathematical discussion or debate in this layman's thread. Also that official response doesn't mention that they improved (fixed) XMR to add decentralized, real-time checkpointing as a precaution. Also that official response doesn't mention that in the process an new algorithm was explored for de-anonymization and mitigation.
One thing that kind of hurts in that official response is the implication that I might have been helping to spread a rumor to drive the price down or force the hand of the devs. Or perhaps they were referring to others who were posting rumors in other threads in the altcoin forum. Remember it was jl777 who urged me to get involved and if you could see my PMs with him, I was trying to not get involved but he was concerned about the threat and wanted to motivate me to try. I will of course feel ashamed if my attempts to find the exploit end up being duds and or if I helped to further any panic. All along I was telling everyone to be calm. Even in my PMs I was urging everyone to be calm. Some of you who received PMs from me can confirm that. Okay I hope this issue is over, unless devs need any more assistance from me on what they paid bounty for. I wish all parties the best. As that "official" response came from CryptoNote's communications manager and not from Monero. They only addressed the original threatened attack of BCX as it related to CN ring signatures. CN isn't going to mention XMR even if they made changes in response to a second threatened response. I see no mention of you in either the "official" response or the article.
|
|
|
The other part of the decision not to use bounties is that the incentive is to do the minimum required to collect the bounty with no further development or support. This isn't always the case with the windows GUI being one example.
|
|
|
Maybe I had too many beers but I am at my 5th try and seem not be able to find a working 64 character string that doesn't give me "payment ID has invalid format expected 64-character string ".
sorry for OT but it's driving me crazy.
I need more beer.
Payment ID info below<><><> For the ignorant the hex characters are the numbers 0 through 9 and the letters a through f. Is that correct? Are the letters case dependent?
Yes that is correct. I don't know if the letters are case dependent (they certainly aren't for hex in general just not sure about payment ids), but the common practice is to use lower case. _______________________________________________________________________________ ___________________ Are you aware that there is a space between the d and the n (at the end) in the adress posted at 1.1? I don't know if that's meant to be, just notifying before someone sends to the wrong adress. Will soon send mine.
Yes the space is there, this is what you get when you copy and paste an address from the CLI wallet as the address wraps. PLEASE CORRECT IN OP. What address are people sending to?
|
|
|
Does any one know how long it would take for a TW attack to start to manifest itself?
BCX said 2 days. I don't know when the clock started, some time yesterday? but with what has been done it shouldn't manifest itself. Time warp attack? What is this? Like the Soviet Union going back to kill Einstein or an aged admiral Janeway coming out of the Nebula to save the Voyager?
BCX is going back in time to kill that Rptiela Finnish dude whatever his name? Does this effect our timeline continuum or does it create a new timeline continuum we don't know about?
May I suggest you ask Billy Pilgrim.
|
|
|
Wish that's all of these will be behind soon, and monero dev could work on the final GUI and the DB !! (eat my RAM Yes, please! I have windows 8, pentium chip, 4GB RAM. I am currently running a full node, mining, (not with wallet), with both threads = 100% cpu, on bct forum on chrome, watching video on IE, while playing poker on the intertubes. Yes the DB will be finished soonŽ If you would like to donate to the dev fund any amount would be appreciated.
|
|
|
daily freeroll 0.1? without bot play on gridpoker?
There have been no 0.1 btc freerolls for quite a while. Presently there are a few 0.0003 btc (yes that is the correct # of zeros) and 0.0002 btc freerolls daily some of which are only good for tourney entries. So you see these are an improvement as they are free for both the players and the site. No bots
|
|
|
Yawn.. this isn't nearly as entertaining as I thought it would be.
Is Monero being attacked or not? If someone is performing a TW attack is there any way to tell?
From my experience with time warps attacks it takes a couple of days before the symptoms start to occur, but when they do....the chaos is sweet. ~BCX~ Why is it sweet?
|
|
|
Yawn.. this isn't nearly as entertaining as I thought it would be.
Is Monero being attacked or not? If someone is performing a TW attack is there any way to tell?
From my experience with time warps attacks it takes a couple of days before the symptoms start to occur, but when they do....the chaos is sweet. ~BCX~ Why is it sweet?
|
|
|
|