It has been compromised in the past, so it likely will again in the future. You should simply just not use StartCom, especially after you've been hacked yourself. StartCom should have been completely blacklisted in browsers.
Comodo, USER-TRUST, and even Verisign have also been compromised in the past, and there's no chance that they'll be removed from browsers because they're so popular. Lots of governments also have their own probably-insecure CAs which are accepted by all browsers. The CA system is a lost cause. Tell me what isn't a lost cause then. Please.
|
|
|
It's extra money, everyone loves extra money. Also, he considers it a 'challenge', and I agree that it is one. It's called anonymity and being careful. Your life is only ruined if you dox yourself and reveal everything to FBI lul
How is it a challenge? what he did takes no intellectual ability at all. ". Your life is only ruined if you dox yourself and reveal everything to FBI lul" What does that even mean, it's highly naive of him to think that he is untraceable. Zeus is not compatible with Linux, and most malware isn't either, because Windows is fail and idiots use Windows (double fail)
Most malware isn't compatible with linux because the vast majority of users use windows. Creating a botnet with linux bots isn't harder than targeting windows machines but the turn over won't be as great. Also most desktop linux users are poor communists so it's not worth stealing their financial details. Windows users are able to enjoy the largest selection of software, when I buy a new tv card I don't have to spend 10 hours compiling drivers and kernels, I simply pop a disk in and install. Who are the real idiots? On another note if my machine was compromised I much rather it be used for bitcoin mining than key logging. That doesn't justify his actions though. 1. Go trace him down 2. Bitcoin mining does more hardware damage than keylogging.
|
|
|
Which IRC chan are we talking about here? bitcoin-otc?
|
|
|
I am looking for miners that support the widest range of computers (highest driver/card compatibility etc.) for both CPU and GPU. Recommend me some. Don't tell me CPU mining isn't worth it anymore.
|
|
|
Yes, I think you should do that too. What is the point of this thread? You answered your own question.
|
|
|
Unfortunately it is no longer worth it.
|
|
|
Are there any settings besides intensity that can increase my hash?
Get more GPUs.
|
|
|
MagicPID is better
MagicPID is old AstroPID, silly. No longer for sale, I already have enough orders.
|
|
|
So.. $5 for a rubber wristband? PM me please
|
|
|
Subscription Levels - MSDN Operating Systems - $699.00 ($499.00 Renewal) https://msdn.microsoft.com/en-us/subscriptions/buy/buy.aspxTo get Win 7 Ultimate for free you need access to some organization that has paid for a subscription already. I wonder how much Windows 7 Ultimate would cost in ⊅BTC? You can buy 'cheap legal' Microsoft keys from various people who own badly designed online stores, make occasional grammar mistakes and have good reputation on various technology forums. Real computer users don't need antiviruses. AV is completely useless, and is easy to bypass if you have money or you can code. Malware removal tools (malwarebytes etc.) will be more useful.
|
|
|
If the transaction is small, or the service or goods must be delivered in a manner of longer than 1 hour, it does not matter you attack it or not.
That is 100% right if I understand you.
|
|
|
We have been quietly notifying the largest exchanges, merchant service providers and mining pools about this issue, and waited until they upgraded or patched their code to go public with this:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
CVE-2012-2459: Critical Vulnerability
A denial-of-service vulnerability that affects all versions of bitcoind and Bitcoin-Qt has been reported and fixed. An attacker could isolate a victim's node and cause the creation of blockchain forks.
Because this bug could be exploited to severely disrupt the Bitcoin network we consider this a critical vulnerability, and encourage everybody to upgrade to the latest version: 0.6.2.
Backports for older releases (0.5.5 and 0.4.6) are also available if you cannot upgrade to version 0.6.2.
Full technical details are being withheld to give people the opportunity to upgrade.
Thanks to Forrest Voight for discovering and reporting the vulnerability.
Questions that might be frequently asked:
How would I know if I am the victim of this attack?
Your bitcoin process would stop processing blocks and would have a different block count from the rest of the network (you can see the current block count at websites like blockexplorer.com or blockchain.info). Eventually it would display the message:
"WARNING: Displayed transactions may not be correct! You may need to upgrade, or other nodes may need to upgrade."
(note that this message is displayed whenever your bitcoin process detects that the rest of the network seems to have a different block count, which can happen for several reasons unrelated to this vulnerability).
Could this bug be used to steal my wallet?
No.
Could this bug be used to install malware on my system?
No.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Darwin)
iQIcBAEBCgAGBQJPsTpaAAoJECnZ7msfxzDB76cQALBqcEb40dQOtopbsk7vHDuL FL4xd56B1/s3idyHGeCuwJX5bgxGD9b3svayXhDiLo9O+5E3sxsLY1HehTXnU8KV BGpIQ7I+XLDcmarGYrDLMNMDLFOp/1hTipi08X3cr6oHNdYOxGbdtqCQR8xxtdfh Mmo07ReYYWamlF+QbwoXIJQOEka2UVeWWgmk1C+WW1phI3P3Of5EvWvkmOurZsY1 zew7G3sk0Lu8glxSt8qq1SKlDXOaSqTBPxs+2FtgkUplNrAIyufu0vCTsnC44oie ndJD6XZAaG6cYr3adGQKmUjRR+oyZarMtBdDHBvYHkrQI4uQclL1aS7DhkLtH8kp fBRHdqmbBJpmpWOcs+OZeaQCzrArKihuVVZqP4HYbHgGHLV3Ls1bebyWm5eLZH6Z C5l3B4Hz/lp50gJpVsIZI291l3KWfoBW2qGyQv51U4uByLU8tPzgr5bdyo6YCo4N XQZHveNInMDI8jSimGyHg7WNm0YjkSAM8PEIJhQuL+RaHKgN/ghLPR+1K1YZnMjq BPdJZVDpP2bgClyj6P+UkhAplEoenxZUsjyRmcs9EWjHZo3UUI9MLZW96vkR0Wlv UBgq0/jSNQ6s3U3YwKM8CDFJ4OB7Mu1Ln6sn+Tu5sl3xtPyapARA5K67FYSpvqVX GNIME8aiNjICQmtIFiuX =9L8G -----END PGP SIGNATURE-----
Isn't Bitcoin meant to be public or something, not 'public when you want it to be'?
|
|
|
-18547.66867623? Shouldn't it be just 18547.66867623 (positive coins)? Correct me if I'm wrong or just ignorant.
|
|
|
13-20 Ghash/s means his mining botnet earns him approx. $1.100-1.700 per month.
Now, I don't want to condone his actions, but putting myself in his skin, that seems hardly worth it to me. That's less than a cleaning lady earns where I live. Why doesn't he just get a real job? Why risk going to prison for such a modest amount of income?
I assume that selling the CC information is a lot more lucrative than mining, and the mining is just a side project of his.
Either that, or his is doing this for reasons other than money. Prestige? Power?
He seems to think he is invincible, but even Tor is not 100% safe, and all it takes is a second of carelessness and your anonymity is blown, and your life is ruined.
It's extra money, everyone loves extra money. Also, he considers it a 'challenge', and I agree that it is one. It's called anonymity and being careful. Your life is only ruined if you dox yourself and reveal everything to FBI lul It might even help the PCs living longer having their fans run nonstop so there is less dust buildup! +1 I'm tell you guys, this stuff is going to be the end of bitcoin.
I think you have it backward…this stuff is going to be the end of the traditional banking system. At least with Bitcoin you have a fighting chance of securing your assets. With the traditional banking system, the theft just gets subsidized and no one cares or will care until entire companies (or nations that bail them out) start to collapse. Unfortunately, by that time, it will be too late for that system. I find it interesting that these criminals are using a superior (and ultimately less vulnerable) system like bitcoin to exploit an antiquated system that is rife with insecurities. I have to agree with that. I kinda want my own bitcoin botnet now. Send me a PM bro, I can work something out for you Something important for Windows users...Notice in the pics, W7, VS, XP. Every machine listed in the pics are Windows boxes. He also said he binds programs uploaded to usenet. At the beginning it happened, my crypter got flagged and I had to rearrange the code to re"FUD" it. Now everything is automated, every victim gets a regular update, just for him. And because the polymorphism happens on my side, AV vendors can't get a detection for all modifications, it's game over for them. I wonder if he has compromised any linux boxes? Zeus is not compatible with Linux, and most malware isn't either, because Windows is fail and idiots use Windows (double fail)
|
|
|
I think, 50btc.com will remind us about this good time, when the grass was greener, the reward was larger...
When the value of Bitcoin was lower...
|
|
|
|