I had no issues connecting before now you changed something and I can't connect either.
|
|
|
I can confirm your client is configured correctly as I can make rpc calls to it. Try using this curl variant http://pastebin.com/vREuHVr5, if it doesn't work then I'm out of ideas as to why it fails.
|
|
|
A federal judge in New York on Tuesday upheld a government policy that permits officers at U.S. borders to inspect and copy the contents of travelers’ laptops and other devices without reasonable suspicion of wrongdoing.
In his ruling, U.S. District Judge Edward R. Korman dismissed a lawsuit by a university student and a group of criminal defense lawyers and press photographers challenging regulations adopted by the Department of Homeland Security that allow searches of passengers’ electronic equipment at the nation’s borders, including at airports and on trains.
The plaintiffs, who were represented by the American Civil Liberties Union, allege that the policy violates their rights to privacy and free speech.
Korma, a judge in the Eastern District of New York, said that the policy permits searches with or without suspicion, and cited case law that held that “searches at our borders without probable cause and without a warrant are nonetheless ‘reasonable.’”
He said that “there is about a 10 in a million chance” that a U.S. citizen or foreigner’s laptop will be searched. Two federal appeals courts have held that searches of electronic devices are routine border searches. One appeals court has held that some searches may require reasonable suspicion.
One of the plaintiffs, university student Pascal Abidor, had his laptop inspected and taken by Customs and Border Protection officers while he was on an Amtrak train from Montreal to New York in May 2010. It was returned 11 days later. Abidor could prove no injury from the laptop’s confiscation and in any case, Korman said, the officers had reasonable suspicion to inspect it.
Abidor, an Islamic studies scholar and a dual French-American citizen, had images of rallies by the militant Islamist groups Hamas and Hezbollah on his laptop.
Catherine Crump, the ACLU attorney who argued the case in July 2011, expressed disappointment at the ruling.
“Suspicionless searches of devices containing vast amounts of personal information cannot meet the standard set by the Fourth Amendment, which prohibits unreasonable searches and seizures,” Crump said in a statement. “Unfortunately, these searches are part of a broader pattern of aggressive government surveillance that collects information on too many innocent people, under lax standards, and without adequate oversight.”
The ACLU is considering an appeal. http://www.washingtonpost.com/world/national-security/judge-upholds-search-of-passengers-laptops/2013/12/31/f5b39022-726a-11e3-8b3f-b1666705ca3b_story.htmltruecrypt
|
|
|
Did you try running with txindex=1 ?
|
|
|
The National Security Agency's bulk collection of data from phone companies is legal, a federal judge has ruled, dismissing a significant court challenge to the practice and setting the stage for a bigger legal battle over secret surveillance programs.
U.S. District Judge WIlliam H. Pauley III in Manhattan sided with the government in his decision Friday, calling the collection program a "vital tool" to combat terrorism and deeming it "the Government's counter-punch."
The ruling stands in conflict with a decision issued earlier this month in a separate case by a federal judge in the District of Columbia who said the program "almost certainly" violated the Constitution.
The New York case was brought in June by the American Civil Liberties Union, which claimed that the NSA was violating the group's constitutional rights by collecting metadata from the ACLU's phone calls. It was among the first big legal challenges against the NSA program after it was disclosed in June.
The group sought a court order declaring that the mass call logging violated federal law governing foreign intelligence surveillance as well as constitutional free speech and search-and-seizure protections.
Judge Pauley disagreed. "The right to be free from searches and seizures is fundamental, but not absolute," he wrote.
"Every day, people voluntarily surrender personal and seemingly-private information to trans-national corporations, which exploit that data for profit. Few think twice about it, even though it is far more intrusive that bulk telephony metadata collection."
During arguments last month, Judge Pauley appeared receptive to the idea that Americans enjoyed some level of privacy in their phone records. But in his ruling, the judge said he found no evidence that the government used any of the bulk metadata for any purpose other than investigating and disrupting terrorist attacks.
"No doubt, the bulk telephony metadata collection program vacuums up information about virtually every telephone call to, from, or within the United States. That is by design, as it allows the NSA to detect relationships so attenuated and ephemeral they would otherwise escape notice," he wrote.
"As the September 11th attacks demonstrate, the cost of missing such a thread can be horrific."
The ACLU said on Friday that it was "extremely disappointed" with the decision. "We intend to appeal and look forward to making our case in the Second Circuit."
A spokeswoman for the NSA deferred comment on the case to the Justice Department, which said it was "pleased" with the decision. http://online.wsj.com/news/articles/SB10001424052702304483804579284373529865520
|
|
|
Aren't you mixing bytes and bits there? Bps normally means bits per second, not bytes. And 8 bits only for the hashes seems too low. You only get 256 different values, with 200tps you'd have lots of collisions. 8 bytes on the other hand is even more than the poster you replied to was talking about (he mentioned 32 bits, so 4 bytes).
My mistake I was thinking he meant 32 bytes.
|
|
|
If you are connected to 125 nodes, then for 200 TPS only the hashes already are 0.8 MBps:
125 * 32 * 200 = 800000 = 0.8 MBps
People often forget that.
Even if they can teleport the blocks and the transactions. The hashes alone are > 0.5 MBps.
At maximum hashes would only need to be 16 8 byte first bits, likely even less. 125 * 8 * 200 = 200000 = 0.2 MBps
|
|
|
2) What are some good reasons I can advise to accept bitcoins for his software that he sells? No chargebacks
|
|
|
Thanks for the reply! Actually, substring(i, (i + 2)) isn't inclusive of i + 2, so the result is just the two consecutive chars. I'm no Java developer so that was just an incorrect guess ![Tongue](https://bitcointalk.org/Smileys/default/tongue.gif) Are you sure that is all you did? I got the following: I'm 100% sure "2b9f3fd09cf042ce9eb019b72ac356db63121c1f56ad6af6cbd401bdf0d51f16" (little endian) is the correct double sha256 hash of "d49b95849c87b8a405acb8b161465910415d55ce9c0e107dd29fb4c4b4b10e0d" (little endian) EDIT: std::cout << functions::double_sha256( functions::hexTostring( functions::endian_swap( "0d0eb1b4c4b49fd27d100e9cce555d4110594661b1b8ac05a4b8879c84959bd4" ) ) ) << std::endl;
|
|
|
For reference
"0d0eb1b4c4b49fd27d100e9cce555d4110594661b1b8ac05a4b8879c84959bd4"
Endian swapped and double sha256: "2b9f3fd09cf042ce9eb019b72ac356db63121c1f56ad6af6cbd401bdf0d51f16"
EDIT:
Shouldn't this be 1? String output = hex.substring(i, (i + 2));
|
|
|
Very few people have the time and resources to even attempt to do something like this. It's not as simple as just filling out some paper work you will have to hire a law firm to help you through the process. The cost is essentially guaranteed to pass six digits.
The more realistic alternative for majority of us would be to pursue a stock exchange that, like Bitcoin, could not be shut down.
|
|
|
As long as there is enough demand for a product there will be someone to fill the supply, irregardless of whether it's legal or not.
|
|
|
An over reaction to silk road news. Bitcoin isn't compromised; DPR was just sloppy by posting an email with his real name right on this forum.
|
|
|
for( $i = 1000; $i < 10000; ++$i){ ... } ?>
Why are you skipping the case where the digits can be between 0000 and 0999 ? Plus, there is no need to download additional things since he has bitcoin-qt already. (See my previous answer) I quickly threw that together and made a mistake ![Tongue](https://bitcointalk.org/Smileys/default/tongue.gif)
|
|
|
Download JSON-RPC Light php: http://jsonrpcphp.org/?page=download&lang=enExtract jsonRPCCLient.php to some folder. IN THE SAME FOLDER where jsonRPCLient.php is extracted create a new text document. Copy the following code, enter the url user and pass, and rename the text document to index.php ( the file extension needs to be changed to php ) <?php
include 'jsonRPCClient.php';
$url = "127.0.0.1:8332"; //enter the url and port of bitcoin rpc server $user = ""; // enter the rpc user from the bitcoin conf file $pass = ""; // enter the rpc password from the bitcoin conf file
$bitcoin = new jsonRPCClient("http://".$user.":".$pass."@".$url);
$base = "sTrOnG"; for( $i = 0; $i < 10000; ++$i){ if( $i < 1000 ) $i = sprintf("%04s",$i); try { $bitcoin->walletpassphrase($base.$i, 10); } catch (Exception $ex){ continue; } echo $base.$i; break; } ?>
Download php http://windows.php.net/download/#php-5.5 ( if you're on linux download from the apt-repository ) Drag and drop index.php on php.exe ( on linux simply type "php <path to>/index.php in terminal ) A terminal will pop up where php is executing the code. If the correct passphrase is found, the execution will stop and the password will be printed in the terminal. It should take under an hour to brute force this password.
|
|
|
Sounds as if your out of memory try adding even more swap space.
|
|
|
|