My numbers with current difficulties:
245Mh/s => 0.164 BTC per day
vs
265kh/s => 182 LTC per day => 0.001075 LTC per BTC (bid price right NOW) => 0.196 BTC per day => 19% more
Of course there would be a percent or two of friction in the exchange but the difference is still quite a bit. Obviously at my miniscule mining numbers, it doesn't make much difference but I see no reason it wouldn't scale.
I think GPU mining might end up helping Litecoin rather than hurting it because it will act as a stabilizing force as miners switch back and forth between LTC and BTC depending on which is currently the most profitable.
That's assuming that everyone doesn't do it. in which case, the exchange rate will plummet, and your initial calculations will be useless. If you're keeping an eye on LTC -> BTC prices on a daily basis, and you're exchanging coins on a daily basis, it should be relatively risk free.
|
|
|
i might be interested in having a read, but am generally sceptical of most people's definition of 'anonymous'.
also... what is the price, in bitcoins?
the price is pegged to 0.5 g of gold, so that works out to around $27, or 5.2 BTC
|
|
|
can you stop shitting all over my threads?? thanks. BTW, i have never even used or talked about using the silk road... where do you get your facts?
Still doesn't cover up the fact that you were insulting forum members. also, deleting your own posts in a sad attempt to cover your bad history doesn't look good either. ps. it's it's "their house", not "they're house"
|
|
|
wow
Why post a link to a different product?
i guess he is implying that your selling fake skull candys... which doesn't make sense because they are not even expensive enough to copy. it wasn't because of the price of the headphones, i just found it strange that he was selling brand name products at 50% discount.
|
|
|
If I was tasked with the job of taking down the Armoury the first thing I would do is fill it with bogus listings and ship RFID tracked packages and pick up the buyers, spreading uncertainty in the market so nobody trusts it. To get at old sellers order their stuff, and trace the serial numbers and match it up with their shipping locations to narrow it down.
RFID tracked packages? good luck detecting them from more than 10 m away
|
|
|
Upon purchase you shall recieve the reciept from amazon,and you will recieve an image of the keys within 10 minutes of the game release!
Is there some weird Russian key trading service going on? how can you get an image of the keys well before the game is released?
|
|
|
2: if the administrator of my vps, or a hacker hacked in my vps, he got the access of all my files, he saw my source code with the password, then he can steal all my coins with the password right? any other ways to improve the protection of such accidents? (because there are always new vulnerables found, for apache, for linux etc..)
Yes, the only way the prevent it is with multi-sig transactions, which is coming soon. 3: how can i know about the translation fee before send bitcoins? ie, if a client has 15btcs in his account, and he send 15btcs out, how can i know how much is the fee of this translation before process it? because it might be free, it might be 0.01btc, it might be 1btc, i need to calculate the amount available before process his request. btw, i don't really get the definition of translation fee, is that obligatory or voluntary? if you pay, your request get faster process by btc network,if not, your request will still be processed, but just slower, right?
You can set it to 0, but if the transaction is too "spammy", the client will still send it with the fee.
|
|
|
Java/Python/Ruby/Lisp buffer overflows simply don't exist... a huge class of exploit eradicated by language choice. And there's a long list of languages immune to buffer overflows (this is mostly a glaring hole in C/C++). Look up US military/intelligence mandates about language choice. C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_. Why do you think computer security is such a disaster (it was all C/C++ until the recent xss/xsrf/sql havoc - and that too is a design flaw).
I tried looking it up, but I could only find some random articles about switching to ada, but nothing stating that "C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_" . Can you point to the article claiming that?
|
|
|
so all the 0.4.* versions are still safe, right?
|
|
|
Half the number of SP in 7970 -> ~280-350MH/s, 130W TDP
4 of these in a rig will do >1GH/s at ~500W TDP
The MH/$ is barely better than a 5870 or a 6970, though one can argue the power consumption is worth the high cost.
|
|
|
-anti-glare coating (like it or hate it)
so it's the non-shiny kind right?
|
|
|
grue please reply to my PMs
already did
|
|
|
why won't the current binaries work?
|
|
|
protip: if you want to make your pictures more believable, write your forum name + today's date beside your phone. that way, people will know you didn't scrape the image off the internet. ok can you explain how does that work?
1. Buyer sends me the coins 2. I notify you that he has sent the money 3. You send the goods directly to the buyer 4. Once the buyer says it's ok, I release the funds to you. Otherwise, I act as an arbitrator to the dispute or 1. Buyer sends me the coins 2. You send the goods to me 3. I receive the goods, give you the money 4. I ship the product to the buyer, and film myself shipping it like some other forum members suggested
|
|
|
Hello, it appears a malicious users has logged in to 22 different accounts. Because of the limited nature (vs all 4000+ accounts) I believe the hacker either used some brute force method, or an existing leak of usernames/passwords to try and log into accounts. For example, the MTGox leak a while back. I've temporarily disabled all PIN, Address, and Payout changes, so you will not be able to change your password at the moment (but neither will any hacker.) I sent an email out to the affected accounts that I know about at the moment. Once the malicious user got into an account, he brute forced address change attempts by trying different PIN numbers. If he was successful, he then sent a manual payment to the new address. So far, this appears to have only happened once (but could have been a couple more, still looking), as he could only try one PIN per second due to server restrictions. I'll be working on changes to make this attack not possible in the future, and account changes will be disabled until then. Malicious user information: IP: 79.172.242.141 Malicious address: http://blockexplorer.com/address/17JuYfk8bWUHvAfRv5eF7zUic1g3qrDobz I believe this represents the majority of any bitcoins stolen from this attack. is it possible to allow manual payouts for people who haven't changed their payout addresses?
|
|
|
|