I think the fact that Cryptsy finished selling their coins 450K+ DASH sold over the last year took a lot of artificial sell pressure out of the market Is it known that the coins were sold ? (As opposed to yet to be sold).I think you were trying this trolling angle yesterday as well. Of course they weren't mixed on Dash's blockchain, because Masternode Blinding is still a 'work in progress' or whatever. Mixing 450k Dash-coins with Darksend would take at minimum 2^7688 years. The last quark would decay into strings and branes eons before they finished. The only alternative is using cross-chain mixing via different exchanges, which is exactly what your post illustrates. Any proof the coins went to different owners, or are you just assuming the hackers didn't sell to themselves as a cross-chain mixing/plausible deniability scheme? Has Mullick "the wallet manager" been doxed ? Is he Paul Vernon's sock or simply a useful idiot/ patsy/scapegoat ? Yes, see -> https://www.linkedin.com/in/nicholas-mullesch-46b5a784Cryptsy.com is an Internet startup operated by Project Investors, Inc. focusing on the exchange of Crypto-Currency commonly known as “BitCoin” and it's derivatives. Cryptsy currently services more than 300 different types of crypto-currency.
The Cryptsy.com exchange opened on May 20th, 2013 and since then has seen rapid growth in both customer base and trade volume. Cryptsy currently has over 300k registered users with a volume of over 150k trades per day.
My responsibilities at cryptsy grew from a summer internship to Head of IT and Director of Crypto Currency over 2 years while the company grew. I maintained the network, infrastructure and operating systems for the entire production network which was up to 50 physical machines and even more virtual machines. I coordinated and implemented a point of presence in Boston, Ma as well as implemented new security standards across our entire infrastructure.
I was also responsible for maintaining the "Hot" wallets for the company. Three hundred resource intensive applications requiring maximum up time and security. These applications were storing millions of dollars worth of customers funds and needed to process up to 1.5 million requests per day from the frontend servers. This required me to design a completely new infrastructure. Starting at hardware selection, all the way to installation, configuration and deployment. The infrastructure included 12 physical machines and 300 virtual machines. In the year since it was implemented in January 2015 it has seen 100 Terabytes of external network traffic, 75 Petabytes of disk writes and has processed over 650,000 customer withdrawals of crypto currencies.
|
|
|
Since I am a little disappointed in Monero's RAM usage since version 0.9 (it is so low that my VPS is way overkill with it's meager 512mb RAM), I think that running a Monero node on a cheap Raspberry Pi 2 model B gets really interesting again. On https://getmonero.org/downloads/ the status is soon tm. However the recent Hydrogen Helix, Point Release 1 (0.9.1.0) has some interesting release notes, next to the urgent fix for the ' block 913193 attack' of course. Someone with more insight than me can shine some light on the status of development for building on ARM? - Bug fix for the block 913193 attack, plus checkpoints - Restored CMake 2.9 support - Added --password-file option to simplewallet - Various fixes for building on ARM- Fixed importing with verify off [1] It should be working on your VPS, even with such a low amount of RAM. Bear in mind that LMDB only takes what it can get during syncing and after it completes it only takes around 50-100 MB of RAM. Perhaps your VPS host is killing your process due to high CPU load? [2] You can try this guide for Raspberry Pi 2 -> https://forum.getmonero.org/5/support/360/bitmonerod-node-on-rpi2-working[3] I'll let someone with more knowledge elaborate on ARM.
|
|
|
monerodice is not working properly is it?
What is the issue / problem?
|
|
|
OK, it's time to upgrade my monero software... OK, let's convert the blockchain... Better to sync from scratch, it's way faster than converting the blockchain. Furthermore, I think there were some minor bugs with converting the blockchain which could result in getting an error (such as in your case).
|
|
|
I think the question on who is active is valid.
In addition to the commits you see on github (mostly moneromooo, fluffypony, recently some from hyc, occ. others), other people regularly involved with testing, code reviews, debugging, and design decisions are myself, warptangent, tacotime, luigi, and othe, plus occ. others. Shen is actively developing the ringCT stuff (currently working on C++ code for it). NoodleDoodle does, well, whatever amazing things he feels like doing such as a the massive optimization rework that took months. He seems to prefer working independently. Wolf recently did some miner development but I think that is winding down.
All are welcome.
I agree it is a valid question, just posted a general remark. Wolf's miner development is nearly done as far as I know, his unofficial (not pushed on github yet) miner even outperforms that of claymore if I recall correctly. Also, I think tewinget is doing or did some work on cleanup and documentation.
|
|
|
... If you can round up such people I am sure the dev team would be more than willing to accommodate their "testing/hacking" of testnet versions before release. Do you know such volunteers that would do it for the accolades?
Possibly, I don't doubt a thread looking for a security position on the team would not go unfilled. Maybe we should ask BTCExpress? ... I look forward to your first pull request, and thanks for offering to help!
Nice to see you back in the thread, been awhile. I know it's frustrating after all the work you guys put in but this edge case seems so basic. I'm guessing you guys don't have someone that's position is Project Manager? I can see how many people working on various parts of a project can allow these things to slip through but this is not a website we are talking about where people are buying tic-tacs. This has been in the works and delayed for quite awhile and the reason for that was because Of the testing going on, correct? AFA helping, well that's not possible, 20 years ago yes but not these days unfortunately. Could you answer my question on which devs are actively participating in the project currently? BTW, does anyone have that link for voting on craptsy? I think it's about time we got added right? Ohh and good job on the quick response guys. We got added a while ago lol -> https://www.cryptsy.com/markets/view/XMR_BTCAlso, as a general remark to your post, bear in mind that most people working on Monero are merely volunteers and got day jobs, and/or companies to run as well. Therefore, their time is mostly limited. On top of that, resources are kind of limited.
|
|
|
I can see only 27K DASH on the sell side on Poloniex. Was it always this way? I didn't pay close attention before.
Around 20-25k when it was in the 0.00525-0.007 range for a while. After that "pump" it shot up to 40-50k.
|
|
|
@Melech & Minotaur26, someone analyzed the DASH and DOGE wallet(s) in another thread: I monitored Cryptsy Bitcoin and other alts wallets through blockchain analysis and it is pretty hard to me to believe that theft is caused by trojan virus infiltration to cold wallet. First of all Cryptsy cold wallet then was not cold at all,otherwise how virus jumped to it from server? Blockchain analysis gave me information that theft began not at 13:37:26 as posted on Cryptsy blog,but 5 hours earlier,through attack on hot wallet.Incident occured at 08:27:48,when someone took 500 BTC through 5 txs of 100 BTC each - https://www.walletexplorer.com/wallet/Cryptsy.com-old?page=1202These txs were: https://www.walletexplorer.com/txid/e68f52a38f58e71b951a08650e20aea3f62f7331a3f548e99181f6dbf1cc1d51https://www.walletexplorer.com/txid/48721871b11f716688fcf80a91a5c7586a1dddee83d90b84b564f3f29e11504chttps://www.walletexplorer.com/txid/790aa7ec2678552c88cf95110c0df4bcc16a72b8f7e6f331292b977cc6e481dfhttps://www.walletexplorer.com/txid/e8bb46bc6ea5f4580dd2b73f5d6a116e9023c84eb7c0fd4f34bcef3aca606fadhttps://www.walletexplorer.com/txid/f3998a7e2e8b451106327d2c6e7f73ba58c2fd54b4bb3595b18a2d76e7d15f44Cryptsy employees did not notice that their hot wallet was robbed for 5 hours,when big hack happenned to cold wallet. One thing is interesting - these 500 BTC did not move at all after it - just like 1000s after big hack.In all BTC hacks till now,hackers never wait more than few hours to put stolen BTC in to the mixer.Except in this case. Also I found Cryptsy DASH and DOGE main wallets.Cryptsy said that they did not hacked,but what happenned with coins in them.In DASH wallet was 456K DASH.Wallet was formed on 27.July.2014: https://bitinfocharts.com/darkcoin/tx/ba798890d98936115001f69333956b558a4856c162516cb3ab46a6455de7a1ebIt is not hacked and from one of his big direct branches came 8433 DASH sent from Cryptsy on 5th.Oct.2015 to big DASH owner known as Otoh( https://i.imgur.com/Cb2ygx7.png): https://bchain.info/DASH/tx/964716df9d475449a7abae56a57536d46bf466a1407a81e7d5ff5457d87827d9, pay attention on address Xqi7sWthYKFPCK3KHcKq8BqY9vMcWy4r3t probably biggest direct branch from main DASH wallet DOGE main wallet was also formed on the 27.July.2014 - https://bitinfocharts.com/dogecoin/address/DN27P1saQQ1fYesKP1LHT5MdSXBpgqka85 - there was 9.5 billions of DOGE in it On 5th.Aug 2014,DOGE was removed from that wallet in multiple 1 billion txs(like BTC in the hack,but as we know DOGE wasnt hacked) : https://bitinfocharts.com/dogecoin/tx/ed788feeef777fedc20fa761e4ae40aa0be9da05a3fd312d5347c5bddad50941https://bitinfocharts.com/dogecoin/tx/b84e8b04cdd002d029f630bf4aa12814a2a9c33e0b2d58686cea7544d91b8180https://bitinfocharts.com/dogecoin/tx/b36b8e35d6dd4a738d5dc1059b9e9d9f1f7a7be063a77556d607778c77cef34ehttps://bitinfocharts.com/dogecoin/tx/ea1da0bea33f2f7a34ddaeb922b822c2faf43659ac2f4de15386bfc17f4c27c1https://bitinfocharts.com/dogecoin/tx/5c4a79c212d1ab5f8da3f4939ebf7ea0d8244fc3b9ddfd3db1b3de018757b44chttps://bitinfocharts.com/dogecoin/tx/27250d554170ab262924ab812295b11610158b52b17122b37b7877b99fc50db6https://bitinfocharts.com/dogecoin/tx/1b2ef19cd8d61cbc9706acfed594f2894f3653a52fa37e418fc8d4087ca4ad97https://bitinfocharts.com/dogecoin/tx/6946e22733fd1565416fae48b33442a924ee1efaa39d204947f44ceba7c832c0https://bitinfocharts.com/dogecoin/tx/412433cad0ec9348984f33ab3088850acaf439d69262082688170738deff016ahttps://bitinfocharts.com/dogecoin/tx/71dd761230463b85ca5c9d780ff30feda415ce34c3a81b03e1568e5e31be9dfaPlus this withdrawal taken place after Cryptsy lockdown wallets - https://www.walletexplorer.com/txid/85a5d1dfb7fd4589cf43321f65a9ed300e994b4e156653063a1c5912f908c18bSo there are a lot of mystery what is really happened with Cryptsy wallets
|
|
|
So who is the culprit based on the blockchain trail? If these are really stolen coins in the first place.
My guess would be the Craptsy account which owns these Dash addresses: Xqi7sWthYKFPCK3KHcKq8BqY9vMcWy4r3t XbwDPCTNhtodqqmRCYEAT2YTadJkeydQa5 XwceLMAKYDUgimYzvBMywRHFFmcegU9WUd However, I don't have access to their account info, so they would need to track down the owner (I have already sent them this info) Has anyone looked into alerj78? That's the btc talk account used to post the virus on the forums... Maybe it's the same person who sent to cryptsy (most likely is). Mellech... Your name is too similar to mullick... Gives me a bad feeling lol. I hate that asshat! Also, I think I found the stolen LTC tx: (247,501 LTC) http://explorer.litecoin.net/tx/61e61a63f35c951a16870df9e0a34df462ee473fde819d134da9485d2e7d8f44Literally 3 minutes after the BTC tx Vern posted... I still believe this to be Dash/DRK stolen 4 hours later: (456,501 Dash) http://explorer.dash.org/tx/ba798890d98936115001f69333956b558a4856c162516cb3ab46a6455de7a1ebBoth addresses were storing coins in 10k, 25k, 50k units, and both were started with a single 1 unit coin: 2014-05-20 05:44:45 + 1.0 LTC 2014-05-25 20:55:13 + 1.0 DASH If they were indeed running every coin's "cold" wallet on the same server, it is highly likely that all other coins got stolen as well (including DASH). Therefore, they might have been running a fractional exchange since their alleged "hack". I personally don't buy his story though. I agree. The bottom line is that if you've hacked in to cryptsy and can steal that quantity of LTC and BTC then it's completely illogical for the attacker to NOT clean out the whole lot, including all other crypto cold wallets. It's the old Californian saying 'go big or go home'! You steal as much as you possibly can. simple as that! Walter Yeah it just doesn't add up. You can't convince me they were running BTC, LTC and luckycoin (or whatever it was called) on the same server/instance, and all other alts on another server/instance. Only running BTC and LTC on the same server seems plausible, but then the luckycoin backdoor shouldn't have affected those wallets.
|
|
|
Updated to 0.9.1 - no problems so far. Do we have an updated list of pools that are running 0.9.1? I'd rather not send my (meager) hash power to a pool operator that isn't paying attention.
All pools listed here seem to be on the correct chain -> https://monerohash.com/#networkI manually checked if they were on the same (block) height as moneroblocks.info, of whom we know is on the correct chain.
|
|
|
So who is the culprit based on the blockchain trail? If these are really stolen coins in the first place.
My guess would be the Craptsy account which owns these Dash addresses: Xqi7sWthYKFPCK3KHcKq8BqY9vMcWy4r3t XbwDPCTNhtodqqmRCYEAT2YTadJkeydQa5 XwceLMAKYDUgimYzvBMywRHFFmcegU9WUd However, I don't have access to their account info, so they would need to track down the owner (I have already sent them this info) Has anyone looked into alerj78? That's the btc talk account used to post the virus on the forums... Maybe it's the same person who sent to cryptsy (most likely is). Mellech... Your name is too similar to mullick... Gives me a bad feeling lol. I hate that asshat! Also, I think I found the stolen LTC tx: (247,501 LTC) http://explorer.litecoin.net/tx/61e61a63f35c951a16870df9e0a34df462ee473fde819d134da9485d2e7d8f44Literally 3 minutes after the BTC tx Vern posted... I still believe this to be Dash/DRK stolen 4 hours later: (456,501 Dash) http://explorer.dash.org/tx/ba798890d98936115001f69333956b558a4856c162516cb3ab46a6455de7a1ebBoth addresses were storing coins in 10k, 25k, 50k units, and both were started with a single 1 unit coin: 2014-05-20 05:44:45 + 1.0 LTC 2014-05-25 20:55:13 + 1.0 DASH If they were indeed running every coin's "cold" wallet on the same server, it is highly likely that all other coins got stolen as well (including DASH). Therefore, they might have been running a fractional exchange since their alleged "hack". I personally don't buy his story though.
|
|
|
This morning I got an unsuccessful login attempt from Cryptsy...
IP Address: 146.185.200.34
1) I have not logged into Craptsy in several months. 2) My login ID is a non-word that is not going to be found by guessing 3) 3 months ago, I asked them to close my account and delete any personal info (they said it was closed but would not delete info)
Speculation: Cryptsy had their database compromised. Someone has my login ID, but thankfully my password was hashed in their database.
Quite plausible if you ask me, remember the phising mail(s) from a few days back?
|
|
|
|