Why oh why oh why do I not have any money in an exchange right now!!!!!!!! Every single time!
Because you never have money in an exchange maybe? Interesting how he was arrested BACK in July and the site was still running. Uh oh...
|
|
|
Remember not to gamble for profit, just for fun And always get out while you're ahead But continue while you're down? Sounds like you have a problem with gambler's fallacy.
|
|
|
From the stats page it looks like things are turning back on. I don't have 200GHs so I can't ask for private server so I'm just watching the public stats page. Can anyone confirm if things are indeed moving?
Things are starting to come back online after 12 hours of fighting with DNS and proxies. Luck has been terrible all night (not just from DDoS, just bad luck in general), which isn't helped by the pool speed dropping 50% during the attacks. Are the attackers trying to contact pool owners? Any demands, or is this just an attack?
No demands, no gloating, nobody even taking credit. I'm responsible for the attacks. Eleuthria didn't send me a silver usb miner, so I said, everyone will pay!
|
|
|
Slush 50BTC BTC Guild GHash.io All DDoS'd at the same time. Will P2Pool save us? This is *very* suspicious and calls for attention This has happened quite a few times over the last couple of years. In the end rollover to solo mining to keep the network safe. (And this is good opportunity to install and play with pool software if you're running an ASIC, since the client, of course, won't cope). Don't worry. I've got my i5 hashing away as security for the network while the attacks are going on.
|
|
|
"Deployed" does not mean sold. It means it's hashing for AM. According to a well-informed source, the 500TH deployed does include units sold, franchised and/or hashing for AM. It's all inclusive. Not at liberty to name the source, but I really have nothing to gain or lose by stating this information. Just throwing it out there. Right...
|
|
|
Nonono. Unlock the sim card. I'm wondering if it's possible to unlock it with any service out there that makes it usable for any GSM carrier. I realize you can't do it, but maybe you know of someone else?
I don't sorry. If the manufacture date is after what is mentioned in the first post, it is illegal to do that in the United States as well. I understand it is an Ireland network, but that will reduce those willing to dabble in the grey area. In combination with smaller service provider, you'll probably have a hard time getting it unlocked
|
|
|
oy vey, and I thought it was just me
Yeah, I thought it was just me too. Then I noticed that BFGMiner 3.2.1 was available so I downloaded that assuming some error had afflicted 3.2.0. Then when it loaded up it seemed that the error was something to do with my ports, so I then struggled to figure out how to get the all the ports to recognise the usb block erupters. Finally it seemed that there wasn't anything else to fix, but I couldn't get connected for longer than a few minutes. It was then that I looked here. Glad I checked and found out about the DDos attack over the last few hours. In retrospect, there was probably nothing wrong with BFG 3.2.0, my ports or anything else... all that energy and hassle for nothing Good luck on the fix Eleuthria. ------ "Did you hear about the DDoS attack on BTC Guild?" "No, what's all that about?" "Difficult to say but word is that it's coming from Virginia." "Virginia...?" I thought my miners were screwing, so I completely reformatted the sd card with raspberry pi, reconfigured pools, and started from scratch before I realized it was the pool. btcguild isn't the only one being hit, I was dead in the water.
|
|
|
Any idea of how the SIM CARD slot of a Sprint iPhone 5 can be unlocked? Is this even possible?
I can't do Sprint phones. But are you talking about how to unlock the sim card or simply pop the sim card out?
|
|
|
wtfvanity 101345
I'll start with a bonus.
|
|
|
Thanks Mike. You posted that shortly after I raised my question. Good read though. I guess the part that I think you could go into more, is if, NSA has access to the root key, how does that effect Bitcoin's implementation of invoicing? Would that give them enough authority to spoof an invoice request? They wouldn't have access to any keys to make a transaction, but they could potentially be that MITM attack, no?
|
|
|
Is anyone concerned about root authority, now that it is being discussed that NSA may have access to them with sealed orders like the Verizon records?
|
|
|
Who cares what anyone says , that effects you ? Add all the btc flaws up and you get a very problematic crypto"currency . In my opinion .
And all alt currencies using the same base as btc somehow become better?
|
|
|
Haven't heard of mcx, so I went to check it out, and the first thing I see is: realsolid: chowderman: gavin andresen, leader of bitcoin, is introducing centralized certificates into bitcoin, so thats the trojan horse Okay, never visiting that site again lol. Glad to know realsolid is in charge and just spreading FUD about bitcoin. What's funny, is the exchange's backbone is btc... I hate the OP! Now they are saying that bitcoin is the mark of the beast and you've sold your soul. Please I hope my computer crashes and the hard drive erases and I never make it back there. Too hard not to watch this prime time chat room comedy.
|
|
|
Haven't heard of mcx, so I went to check it out, and the first thing I see is: realsolid: chowderman: gavin andresen, leader of bitcoin, is introducing centralized certificates into bitcoin, so thats the trojan horse Okay, never visiting that site again lol. Glad to know realsolid is in charge and just spreading FUD about bitcoin. What's funny, is the exchange's backbone is btc...
|
|
|
Friedcat: Could you please specify where in the production cycle you are with the Gen2 hardware and what your current time projections are?
• The size of the Gen2 order will be decided as appropriate, according to the network difficulty when it is time to finalize the order size
Was this supposed to be the answer? I wanted to know how far the design is, possibly projected energy usage, hashing power per Watt and chip, if similar delays as with gen1 can be expected or if it will go smooth and so on, not something like: we haven't yet decided on the order size, that's it. Why didn't you ask that? All I read was a question about the production cycle and time projections, and they are not being produced and the order size has not yet been finalised. Huh. It sounds to me, like they haven't even pushed the gen2 design to fab yet. Sounds like AM is being stomped by bitfury, knc, cointerra, who else? They probably were about to push out a new design around what, 45-65 dies and then realized their head is about to be crunched by 22 dies and had to make a change. AM defined BTC ASIC's, however, unless their power is very cheap and they get to the market quickly, the are about to become meaningless. At least IMO anyway
|
|
|
to suggest that this is in any way better than a normal password, especially from an entropy standpoint, is downright misleading.
Just one more example why I think this is different to passwords and possible a lot more user friendly:
I said it was different, not better. I suppose the main question about this approach is whether it can be brute forced in some way? Could you take the encrypted data and somehow brute force it backwards to the original unencrypted key? I don't think it could be, but I'd be glad to hear what others have to say.
I never said I published a paper in "Encryption Monthly" proving this was a scientific fact. I thought about it, tried to explain the idea and then invited people's opinion on it. Where did I mislead anyone? gavin does an excellent job of not being rude to people.
i, however, am not as buddha-like.
An endearing quality. Your mother must be proud. Look, now I'm being rude! Does that mean I can be elevated to Senior or Hero member status? Naw, I'd rather not be considering how most of them replied to me in this thread. Even when Gavin replies nicely, you want to argue that you're a genius. I don't think anyone will be able to convince you otherwise.
|
|
|
We all think we're very clever at coming up with unique ways to obscure our data.
We are wrong.
We tend to think alike, so pretty much any process you can think up is likely very similar to a process somebody else will think up.
In short: humans are really bad at creating randomness (aka entropy). And we're even meta-bad, because we THINK we're good at it.
Gavin is the man. If you like your super secret ninja password protection method, here is one additional step that you have forgotten that goes right with Obfuscation. Obscurity. Don't tell everyone what you're doing. Of course, that's about as good as Obfuscation, but why not combine them? And not bother everyone else?
|
|
|
empty page for me :\ anybody with the same issue?
Site is under DDOS, if you are continous issue (try F5 it once in a while). email admin@ glados.cc Just when I need my coins. It's my spending wallet. Lmao. You're a liar. No one actually spends their BTC.
|
|
|
Today I can announce start of the production of the Worlds fastest ASIC Bitcoin mining generators.
Operation will be 2 Tera Hashes per second each. Our glorious engineers of the Democratic People's Republic of Korea have managed the process of developing and mass producing the marvellous technology milestone.
We will announce a share model soon, so Western citizen of underprivileged countries may join into the glorious activity of mining the Bitcoin on the world's most advanced ASIC technology systems.
Sincerely, Kim Jong Un, Supreme Leader of the Democratic People's Republic of Korea
Is this going to be "real" like when you photoshop your missle launches because they fail?
|
|
|
|