You do realize that with deterministic wallets, you will only have to backup once, right? So all of this discussion is pointless. No they don't. They only seem to fail randomly because of confirmation bias (vocal minority crying they lost their data) You just said they fail randomly! learn to read. i said them only seem to fail randomly. only if you buy some shitty chinese 8 GB flash drive for $4. Sandisk Cruzer Pop 8GB failed on me 1 week after I bought it. and none of my flash drives ever failed for me. your point? (hint: anecdotal evidence sucks) InkJet printers are awful because you either print every day or your ink dries up. Having a LaserJet printer in your house causes lung cancer.
That's why I said laser printer. Also [citation needed] on laser printers causing lung cancer.
|
|
|
can u please! please! post a step-by step solution to exactly what you did. i am having the same problem with XFX7990. hash rate keeps dropping from 500MH/s to 100KH/s after 4-5 minutes after i get a " Communication Problem" message. I am not a programmer so I'm kinda not familiar with hotkeys..thanks
use cgminer
|
|
|
I've actually USED SSLStrip before. Had you watched the demonstration, you would have noticed that SSLStrip does just what its name implies, that is, feed the victim HTTP data while connecting to the victim's intended destination using HTTPS to get the data. It works on PayPal, which is why they started fucking with Marlinspike.
How dense are you? Did you even read my argument? Bitcointalk's traffic is in https. HTTPS traffic can not be tampered with in transit, nor can it be downgraded. SSLStrip only intercepts http pages, and replaces any https references. The only attack you can do is intercepting a http bitcointalk request and preventing https upgrade. You can intercept any embedded http image requests, but the tampering will be limited to the image. Your claim of using SSLStrip are red herrings, so is your claim of being able to hack paypal because they do not refute my central point (SSLstrip is limited to http traffic). If you read the fucking documentation for sslstrip instead of glancing over the name, you would know that.
|
|
|
I will give it a try later today.. Sure it was done through the form and not through FTP?
Nearly positive. I was told by the hacker it was done through the login form. First he modified the login page, then probably grabbed my SQL login through a similar manner. Or... that's just a red herring. I highly doubt a SQL exploit can modify web pages.
|
|
|
Give them 24 hours...
I think 24 days is more realistic. ticket #56x Being Processed since last 85 days 4 hrs
|
|
|
Awesome, have these always been here? Why have I only found out now.
The "/me" command, at least, has been around since 2011.
|
|
|
Why don't you backup your wallet in the cloud? just upload an encrypted copy to several cloud storage sites. Didn't Google use some kind of tape to store their data, even today in 2013?
Those are tape drives, which are great for backups. But they are unsuitable for anything else because they have insane seektimes Well I am pretty sure it will be worth the wait considering the data will be just 30-40 bytes for a single key and not a lot more for 100 or 1000. Too bad no one has tape drives.
|
|
|
Didn't Google use some kind of tape to store their data, even today in 2013?
Those are tape drives, which are great for backups. But they are impractical to use because tape readers are rare. They are also subject to the same problem as VHS tapes: they deteriorate over time. Every major storage medium has a flaw in it.
Hard Drives are known to fail randomly. Also it would be ridiculous to have a 1TB hard drive for only 1MB of data.[/li][/list]
No they don't. They only seem to fail randomly because of confirmation bias (vocal minority crying they lost their data). Flash Drives are a nightmare when it comes to reliability.
only if you buy some shitty chinese 8 GB flash drive for $4. CD-Roms are known to "melt" over time, after ~10 years they might fail. Also inefficient to have a 700MB CD for just 1 file.
10 years is pretty damn good Paper wallets are perfect, but many power users don't have a printer since it is becoming an outdated device. Also some printers may "save" the data printed making it unsafe.
wait what? why wouldn't you have a printer? you can get a back and white laser printer for under $100.
|
|
|
You clearly have no idea what you are talking about, because I've done it before. An attacker can strip out HTTPS. You should have checked out Moxie Marlinspike's SSLStrip before making yourself look like an idiot.
You clearly have no idea what you're talking about. A quick search of "SSLStrip" on google reveals: It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. Too bad bitcointalk's traffic is in https. Next time, actually read your references so you don't end up looking like a dumbass.
|
|
|
[...] i imported my private keys from Electrum and deleted all the files. when i reopened the bitcoin client all of my addresses are gone. the client is 49 weeks behind on the blockchain. could this be the reason my addresses don't display(since they were created long after the block chain record my client has so far?)[...]
No, if it's in your wallet, it should appear under the "receive" tab. also, one more detail if i try to reimport the private keys again it says couldnot import private key error code 4
according to bitcoin.it wiki, error code 4 is insufficient funds. you can always create a new wallet and try importing the keys again.
|
|
|
Type out the passphrase in notepad or some other editor to check if it really comes out the way you think it does. Capslock and accidental keyboard-layout-swaps can cause this type of confusion.
better yet, type it in notepad, then copy+paste into bitcoin-qt.
|
|
|
I'm not tech savvy. When you say I have to execute "such and such" code I have no idea how to do this. Is this something I type into a certain file somewhere or in command line? Where exactly is this coding done? Thanks.
You said you were using linux, so I assumed you were knowledgeable enough. Anything in code boxes are to be executed in a terminal (type it in, hit enter). The commands are assuming you're in the directory where bitcoind is installed.
|
|
|
Strange.
PayPal Gifts are only disputable for a 45 day time period or 90 days on my transactions.
regardless of paypal policies, he can call his credit card company for 180 day chargeback.
|
|
|
You gave me your definition of scam: "A confidence trick (synonyms include confidence scheme and scam) is an attempt to defraud a person or group after first gaining their confidence." And I showed you how Viceroy& co. met the criteria. So how so is it very different? I'm also not slandering anyone. I'm defending myself by explaining to people what's truly going on.
A scammer is a person who has defrauded (intentionally deceive for personal gain) someone after gaining their confidence. You argue that: He's trying to deceive others by slandering my name so I appear less credible when I expose him on his threads A scam (by definition) requires an entity to be defrauded after their confidence was gained. You can argue that slandering you is "fraud", which is a stretch. But even that were true, it would not constitute a scam because he did not gain your confidence. The best you can do is call him an attempted scammer, but even that's a stretch unless you can show he is deceiving someone. In addition, if your logic were true, it would mean political attack ads are "scams", which is absurd.
|
|
|
You registered 2 days ago and you're selling a paypal account. Just so you know, the chances of you finding a buyer is slim. No one has any idea whether the account is stolen or not. Even if it's yours, there's no guarantee that you won't try to reclaim the account. I'm not saying you're a scammer, but there's little assurance that you will hold your side of the bargain.
|
|
|
Okay, again, who cares? If you have a MITM on your connection, he can modify an image. Oh, noes! You know what he can also do? He can proxy your connection, and connect using HTTPS to the site where you want to go, then send you HTTP data. No browsers will warn, it just won't show that the site is HTTPS, and most users won't notice.
You clearly do not understand how https works. Since the page is loaded with https, all references to external resources will be secured against tampering. An attacker won't be able to modify the image link to a "proxy". The best he can do is intercept the request, but since he doesn't have the certificate, the browser will show a warning.
|
|
|
I'm going to guess that it's a formula that theymos will tell us about later.
Edit: I'm winning so far with 532
728 reporting in. Also, the top user in this thread is Transisto, with 854.
|
|
|
[...] Tell me, how did Viceroy/buyer intentionally deceive you for personal gain after gaining your confidence?
He's trying to deceive others by slandering my name so I appear less credible when I expose him on his threads. I notice all his hostility started when I begin selling moneypaks thus threatening his idiotic startup. Then you're only accusing him of slander. That's very different from "scammer". It's ironic how you're accusing him of slandering, yet you're slandering him yourself.
|
|
|
|