Most of these websites provide very small amount of bitcoin. so they are not useful to test large number of transactions, That faucet I linked you to provides 0.089 per request (and currently has 8.something). I'm sure you can turn up another one or two of these testnet faucets pretty easily. If you have 0.2-0.3 testnet coins, surely that's enough to test a large number of transactions. For one thing, is there some reason why you don't control the receiving addresses? If not, you just send coins back and forth as you're testing whatever you're testing. Even if you can't recover them, at 0.3 testnet BTC you'll have 30000000 satoshis to play with. Surely this is enough. Anyway, I don't resent you posting here to look for testnet coins, I'm just saying how I got them when I needed them and what I did with them when I was done.
|
|
|
I don't know what you should be investing in. I think CLAMs distribution was a good attempt at a fair distribution but unfairly rewarded those who spread their coins out over the most addresses which is pretty arbitrary.
Having coins spread out over the most addresses is (apart from the CLAM distribution) finanically de-incentivized since you pay for each of those inputs when you try to spend something in the way of more-inputs->larger-transaction->larger-fees. I also realize that you could have lots of inputs at the same "address" but having a value spread across many addresses means you're definitely going to have separate inputs for each when/if you try to spend them.
|
|
|
@achow101: where I can read about the pruning implementation (obviously I can study the source, but I suppose there's a writeup somewhere)?
AFAIK, there is no write up of how pruning is implemented. You will have to look in the source code for that. Since manual pruning is now available via an RPC command, I would recommend that you start looking there to see what it does to prune: https://github.com/bitcoin/bitcoin/blob/master/src/rpc/blockchain.cpp#L849Thanks! I also rhappened to re-look over the original whitepaper and I noticed (for the first time) the section on "reclaiming disk space". I guess I'm trying to figure out what the disadvantages are (if any) over running a pruned node vs non-pruned. EDIT: I found some further notes about pruning in the release notes for 0.11: https://github.com/bitcoin/bitcoin/blob/v0.11.0/doc/release-notes.md#block-file-pruning
|
|
|
Grear, but where can I find the check box option to hide garbage posts? Those are what is really bothering me. Not so much looking st the sigs and avatars.
Have you tried DannyHamilton's ignore list? It probably needs an update (last jan 2016) but it's a good start: https://bitcointalk.org/index.php?topic=973843.0
|
|
|
I was away from following development on core for some time. Last time I was up-to-speed pruning was just starting to be implemented. @achow101: where I can read about the pruning implementation (obviously I can study the source, but I suppose there's a writeup somewhere)?
|
|
|
So, in your firewall, are you doing nat to map 18333 to 8332? If one program is listening on a different port than the other is sending on then that seems like the place to look.
Again, sorry this is so general, I don't know your script. On GNU/Linux, you generally find logs for system programs in /var/log/. I've used apache more than nginx, so /var/log/apache2/ for those logs. nginx may be in /var/log/nginx (that's where I'd look). I suppose I was thinking more about just debugging using echo >> somelogfile in your php program. And, since it's been a while since I messed with bitcoin rpc, I can't remember if/where rpc logs are but maybe in ~/.bitcoin/debug.log
|
|
|
Fascinating. I wonder if somebody played with opposite case - steganography related to blockchain. Hiding a private key inside a picture or using picture as a seed to generate key it would be interesting...
The latter is trivially easy, right? $ cat dispicture.jpg | sha256sum | privkeytowif.sh
|
|
|
Absolute nonsense. Read my post before spamming (nothing surprising for an (ex)sig. spammer and account farmer).
No reason to think he isn't still sig spamming and account farming. He's definitely still doing all the other stuff he used to do.
|
|
|
I'm not familiar with this market script. But did you check the port your bitcoind is listening on is the same one that your market script is sending on? (I guess I'm assuming a tcp/ip communication channel)
In general, can you create (or read from) logs on both ends to see what's going on? If your bitcoind isn't responding at all to the market script, can you log whether you got any reply at all?
Just some ideas.
You say you can issue bitcoin-cli commands all day, so double check the port password, rpcuser, etc from your bitcoin.conf are the same values your market script is using.
|
|
|
Love how every single QS "rebuttal" in this thread ends with "are you Lauda?". It's just that our own favorite sockpuppeteer can't help but thinking that everyone else works the way he does: an army of sockpuppets to try to keep bumping and echoing. QS: you've been caught at it again and again, do you remember when you said you were going to leave the forum?
|
|
|
Okay, I'll bite, I'm curious.
I see this in OP RETURN:
"jLN Augustana College Old-Main.jpg Reconstruct with data preceding redeemscripts"
So I guess you've got the jpeg file in there somewhere (I didn't look at the whole raw transaction or try finding it).
What was the point here? What am I missing?
|
|
|
bitcoinuasf.org has been supported by core devs like Lombrozo and Luke.
uasf.co has been supported by investors like Trace Mayer and Rodolfo Novak.
Are the softwares from these two sources different?
Thank you
Can you download them and then do sha256sum on them? That will answer your question definitively (at the level of bitwise difference between your downloaded binaries).
|
|
|
You can see the "technical specs" of the passphrase in BIP39: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawikiSpecifcally: To create a binary seed from the mnemonic, we use the PBKDF2 function with a mnemonic sentence (in UTF-8 NFKD) used as the password and the string "mnemonic" + passphrase (again in UTF-8 NFKD) used as the salt. The iteration count is set to 2048 and HMAC-SHA512 is used as the pseudo-random function. The length of the derived key is 512 bits (= 64 bytes).
So any passphrase you choose, gets concatenated with "mnemonic" and is used as a salt. ie. if your passphrase was "Th1sI5mYp@ssphr@se"... it would be "mnemonicTh1sI5mYp@ssphr@se" being used as the salt and an iteration count of 2048. Also, as mentioned in the BIP, ANY passphrase provided will generate a valid seed... so an attacker would then need to check addresses for every generated/tested passphrase for coins further slowing down any attack. As long as your passphrase isn't "abc123" and/or the attackers aren't using huge computing clusters then even if your mnemonic gets compromised, you should have plenty of time to move your coins. I thought OP was talking about the time to break symmetric encryption on a file containing the mnemonic. I just learned something.
|
|
|
If someone stole your recovery seed but they are protected with additional passphrase, how many guesses can they make per second and how strong must password be to protect until you notice your seeds were stolen (few day max)? I am talking about passphrase that Trezor and other hardware wallets give you.
I can't answer all of this question, I don't know what kind of symmetric encryption algorithms trezor is providing. I can tell you that the number of guesses per second depends on the implementation of the cracking script and the hardware it's running on. Now, assuming your additional passphrase is sufficiently random (not something that could be found in a rainbow table), and assuming some modern encryption procedure, like, say AES 256 ( https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) then unless these hypothetical ppl are throwing tons of resources at cracking your wallet, it should be pretty difficult. On the other hand, if they have huge, dedicated compute clusters then maybe they'll find your password really soon. It's all about resources.
|
|
|
I get it, Troll is a self-proclaimed close-to-the-metal ninja coder. This makes him very useful in his niche, and his advice could be taken if it is truly not just trolling. But when you're very intimate with hammers, every problem starts to look like a nail, and you wonder why other coders don't just do as you would do in their place. A broader perspective may turn up some valid reasons.
And when each response to "show us something you've worked on" or "why don't you take this on and join the project" is replied to with "You fools! MWA HAHA", then that self-proclamation starts to look incredibly weak, imo.
|
|
|
At this point it's pretty clear to me that Troll Buster is just here to spew bile. It's really striking how puffed up he is about his skills and badassery and then when someone asks him to point to a project he's worked on or generally to prove his talk with something more than a google search his reply is all 'hey, look over there!'
Troll Buster is pointing out poor decisions that can be improved upon and people here are trying to find something of their's to be able to bash. This is typical Core tactics, whereby they fail to address the issue being highlighted and instead attempt to launch person attacks on the person stepping forward. My reading was that Troll Buster's points were all replied to by gmaxwell. Once you cut away all of the "stupid", "worthless", etc, invective there were a few criticisms in there and I'm pretty sure they were addressed. Then, when Mr. Buster continued with the "you're all so stupid" style posts, I think people naturally respond with "ok, can you, like, show us why you're so smart", to which Mr. Buster sorta ran away screaming: Like they said, "I could tell you but then I'd have to kill you." Too much hassle.
This is exactly why bitcoin development fragmented under the fifth column attacks that forced out the best and brightest, leaving us with the cesspit we have today.
Go on, fire up some BIP148 hashing power. I double-dare you.
Hardly seems unreasonable to reply with technical answer to the few bits of detail in Troll Buster's post (which gmaxwell did) and then to address his invective and screaming by asking him to show something more productive than insults.
|
|
|
This should be an easy one for someone here. I was thinking about turning on pruning to save some disk space. Do I need to recompile? I don't recall seeing any options for pruning when I ran last time I built bitcoind. Alternatively, is this something I stick in my .conf file?
|
|
|
looks like you have to import bitcoin wallet.. distribution seems to be based on the number of non-dust addresses you controlled in 2014.. 4.6 CLAMs per address (non-dust) you controlled.. seems like a bizarre way to distribute an airdrop.
CLAMs were also distributed to Litecoin and Doge wallets, just for the record. You guys remember Doge?
|
|
|
|