- One could restrict campaigns, e.g. only allow campaigns that pay out in Bitcoin or another cryptocurrency that has an independent blockchain and is not an ICO token. This has been suggested before, this is the first location I found back: I think if it become rule that all bounties will be paid in bitcoins only (or any established list of Altcoins.) I do like this suggestion. "Tokens" have no value to me. Meanwhile, they abuse Bitcointalk to hype the centrally controlled cryptocurrency Ethereum. Tokens are created for free out of thin air, while having to pay actual Bitcoins means the campaign needs to have actual real funding. I'm not much for taking away freedom, but I can imagine setting a minimum payment amount would force campaigns to abandon spammers. With payments in made up tokens, there's no real cost for the campaign. Who's going to pay a spammer a dollar per post? - Stricter control of Bounty managers. I'd like to see that implemented, but I don't think it's likely to happen. I addition I'd like to see signatures removed from Newbie and Jr. Members. Most of the copy paste bots I report are Jr. Members enrolled in an ICO bounty signature campaign. If they have to buy a Copper Membership to wear a signature, they have a bit more to lose than just 30 Activity created by spamming. We need to give the bounty managers some tools to help them to regulate their spammers.
They don't need tools, they need inentives to do so. I'm sure that's true of most managers, but it seems there are a few who are prepared to pay extra for quality posting.
Correct. But spamming is much easier and cheaper, and barely gets punished.
|
|
|
Lots of members here are posting reports for their bounty works. I wouldn't call spamming "working".
|
|
|
I want to know the explanation what can an attacker gain if he has more than 50% computing power and how it is outweighed by what he can gain if he plays by the rules. Let's assume the attacker finds 75 blocks per day. That's currently worth about $6.5 million. If he plays fair, he'll have that income for a very long time, and can use it to earn back the high cost of the hardware he had to buy. For an attack to be successful, it will need to deliver more than $6.5 million per day on average. I can't really think of a method to quickly cash out or trade thar much money anonymously. There's this article that says a 51% attack on Ethereum Classic would cost $55 million, and earn you $1 billion profit, but it doesn't say how you can get $1B profit from a coin with just $1.5B market cap. I can't imagine that's possible, as it would mean you have to sell the majority of all coins, and take them back.
|
|
|
I think I'll keep the messages up for possible psychological analysis ![Grin](https://bitcointalk.org/Smileys/default/grin.gif) If any of the posts are plagiarism, you risk getting banned. It's better to clean up, make all your posts yours again.
|
|
|
I was just asking... how normal is this?
It happens a lot, for financial gains. It can be caused by a weak password after the 2015-hack, phishing sites, or probably other means too. Just delete everything, and welcome back! What's not normal, is that an account thief doesn't change your password! Normally, you wouldn't be able to log in anymore.
|
|
|
I always love how bounty spammers come to Meta and make one post other than just Facebook and Twitter links, only to complain they don't get merit for their spam.
Guess what: that's exactly what the Merit system was designed to do!
|
|
|
I see a business opportunity, but I'd need a bot to send the PMs.
Are you being sarcastic? No. I think you've overlookd Jet Cash' quote: "somebody should start an opt-in mailing list". I will instantly report any PM coming from a bot. Me too! That's why all PMs will show a link to the opt-in thread. To opt-out, simply delete your own post from that thread. I can imagine services would be willing to pay for this. Scraping an opt-in thread is easy. If someone can recommend a PM-bot, I'll create an opt-in for airdrop PMs. That's even worse. Basically, you will be paid for spamming PM's with unsolicited advertisements. It won't be unsolicited of course. I didn't turn into a spammer after reporting thousands of spam bots. Is it spamming if you are sending messages to an opt in list By definition it's not spamming after an opt-in. @Loyce - The best way to do it without a lot of programming would be Selenium Web Drivers. Thanks, I'll look into that. My ideal solution would work from the command line though, as it gives me most flexibility.
|
|
|
Bump I'm now also looking for a PM bot.
|
|
|
Maybe somebody should start an opt-in mailing list for new airdrops then.
Second that I see a business opportunity, but I'd need a bot to send the PMs. I can send 120 PMs per hour, 1200 per day, to 30 recipients each. That's 36,000 recipients. If I get my LoyceBot a Copper Membership, I can have 14 recipients per PM, 80 per hour and 600 per day (total 8,400 recipients). I can imagine services would be willing to pay for this. Scraping an opt-in thread is easy. If someone can recommend a PM-bot, I'll create an opt-in for airdrop PMs.
|
|
|
Were those really real captchas or you painted them? I doubt they were real and if by any tiny chance then I need to hire an alien to read them ![Tongue](https://bitcointalk.org/Smileys/default/tongue.gif) Those were real.
|
|
|
The thing with reCaptcha is the more of them you do the more difficult Google makes them to solve.
Wrong.Where did you get that information from? (Being someone who constantly keeps digging deep in their new 'I'm not a Human' AI stuff, I'm pretty sure it doesn't work that way) I have the same experience as TheQuin: captchas get worse and worse if you use them more. I registered on this forum to post this: - > Basically, the first verification from a particular browser/IP/human checks which are ran through the risk-analysis engine decides if that IP should be white-listed. The first few reCAPTCHAs per day, I can just click "I'm not a robot", and it's done. I have Gmail logged in (on the same browser). If I try this a few times, I have to solve it, and if I try it more often, it becomes harder. The logic behind it seems to be that humans shouldn't be solving that many captchas per day, and if you do it anyway, it's suspicious. If I try the same from a private window, I instantly have to solve the captcha at first try.
|
|
|
The reason why is that the forum has so many threads and not all participants in other Airdrops will see it. So it might be good idea to send message to them privately because there is no public tagging system here..
That's called spam, and it is the reason Newbies can now only send 2 PMs per day.
|
|
|
![Cheesy](https://bitcointalk.org/Smileys/default/cheesy.gif) funny guy Typical scammer tactics, just deny everything, play dumb, and wait for the next victim. btw, any chance the signed message will be posted here? I'm eager to hear what he would say about it I won't post it, it's up to tobericher to post it in public. I've asked Vod to confirm the Letter of Guarantee, as I don't appreciate my credibility being questioned by a scammer. Vod confirmed: I have read the letter of guarantee so I can confirm that an address posted by bitmixcoin.io was sent 16+ btc.
Good luck arguing Vod works for ChipMixer:Now let's see how red this scammer's account can get! TL;DR: BITMIXCOIN.IO is a SCAM!See BITMIXCOIN.IO scam confirmed: 16+ Bitcoin stolenPlease remove "PROTECTION/SUPERLIST" from the title to make it correct.
|
|
|
We haven't received those 16 bitcoins.
Quoted and archived!
|
|
|
please tell him to post screenshot. He did: It is so funny, all of your replies you're trying to make us look bad and in the first opportunity you're jumping and accusing us. Sure, let's ignore the signed message that proves 16 Bitcoin disappeared. We are being very honest here. Lol.
|
|
|
We will fix everything with the user, strange that he haven't sent any email to support and first time opened here account to report this mistake/glitch Oh really? I have sent a email to them. They still dont answer me. On our first two months of operations were hacked by our hosting company, we hope this isn't the case again. We are working to fix this error. And you didn't bother to share a crucial security breach on your mixer?
|
|
|
The funny thing I didn't understand is how can a member send 2 sMerits for different posts within period of 6 seconds.
I've done that within 0 seconds: I open the Merit-button in a new Tab, and when I'm done reading, I merit all open Merit-tabs.
|
|
|
Is zazarb (your ex-escrow) also your competitor? Because he left you a negative trust ![Cry](https://bitcointalk.org/Smileys/default/cry.gif) I've sent a PM to Vod if he's willing to verify the Letter of Guarantee. I figured that makes more sense than zazarb, as Vod is on DT2.
|
|
|
You're posting this on the wrong board, but I'll answer anyway: your only chance will be to recover deleted files from your hard drive. Every second you keep the newly installed Windows running, reduces the chance of finding back your keys.
So: turn off your PC now, and continue your search for recovery software from another computer.
|
|
|
It prevents bots from registering, or logging in automatically, and spamming up the joint. Judging by the number of spambots I've seen (and had banned), it doesn't stop the bots. I don't understand why people have a problem with this. I would have thought that with my erretic mix of network connections, and variety of computers, that I would hit this a few times. I don't remember ever having had a captcha request with this site. A "normal" internet connection shouldn't have much problems with it, reCAPTCHA is terrible when you use Tor. I've basically giving up trying to access sites with reCAPTCHA through Tor. It can take up to 10 minutes, and you'll still end up with a time out after clicking many captchas that load very slow.
|
|
|
|