My account : KingZee
I'd like 15 free spins, thanks!
|
|
|
Looking a bit further into it, this domain does not seem hacked. It seems to have been deliberately registered for this purpose:
I was just going to say that, it's a 404 on the main page, fresh domain, hacked my ass. I can't think of any way to prevent this from happening to your typical user. If someone thinks that it's possible for an addon, to monitor other downloaded addons, before they're installed, to check for patterns, then it might be possible to make a quick solution to prevent this in the future. You should all remember that the perpetrator is constantly promoting his scam here using newbie accounts, and probably reads all of this, so hello scammer, we're trying to stop you
|
|
|
Just for fun, I'd like to make an additional prediction: Jan 8 for the date of the highest price.
Wait, you're saying that Jan 8 will be the ATH throughout the whole duration until BAKKT launches +17? That's an awful guess if you ask me
|
|
|
He clearly mentioned he wants to do it on a hardware-level, exactly 2 posts above yours:
I know! Did you check the link I shared? It's just painstakingly more effort. So I explained to him that if in the end he decides to do it on a software level, the limitations he's going to go through. And even if he does change it on a hardware level, in the end, it could still be formatted. So what solution he chooses is going to depend on his usecase. I he afraid his sd card is going to be intentionally tampered with? Sure, try hardware-level. Does he know the sd card is going to be with him at all times? Or is it somewhere where no one will intentionally try to mess with it? Software-level would probably be fine and prevent himself from making any unintentional mistakes.. But yeah like you said, depending on what he wants to achieve he could go for different solutions
|
|
|
That's what I have been reading about as well, and when you actually start to do your own research, the insider trading accusations start to become more than obvious with the connected market activity.
Some coins have been pumped out of nothing before Coinbase announced they were considering listing them, and later you find out that these coins have been added to Coinbase.
It's pretty shocking that one of the most important fiat entry points is participating in this shady business, because no one gives a shit about coins as 0x and ETC, especially not after the investors are done dumping.
That makes far more sense than the argument that coinbase just want more markets to benefit off exchange fees.. After reading the article from @o_e_l_e_o it looks like the "Digital Currency Group" basically has a massive say in the choice of names being added to Coinbase... I tried to find more information about them, but it looks like they own CoinDesk too? The majority of other blogs are sourced from it.. Their "portfolio" includes a hell of a lot of projects not just limited to coins : https://dcg.co/portfolio/ Even if it doesn't include all the coins coinbase announced, but that might just be because the ones that are included like XRP, Augur, Decentraland are going to be pumped sooner than the others Pretty interesting finds overall.. Good catch o_e_l_e_o
|
|
|
So it seems there isn’t a way to do it then?
I’m trying to do it hardware level so a seed doesn’t end up being stored anywhere on that drive.
I tried to fiddle around as much as I could, found this funny interesting gem : https://hackaday.com/2014/01/18/the-tiniest-sd-card-locker/No idea if that thing is effective, the comments are very interesting too! But regardless, it's really hard to achieve what you want to achieve on a software level. No matter what you try to do software-wise, any knowledgable user is going to be able to change the permissions on the files of your sd-card. If you're sure that no one else will have access to it, or if anyone that will have access won't have a reason to overwrite the files, then you can go ahead and just write lock it using linux/windows. You should probably know that even if you make the SD card read-only, it could still be completely re-formatted.
|
|
|
Ok, I misunderstood. I pick 3475 unless already taken. Is there a list? I can't read 7 pages right now.
You should know that if the price ever breaks 3475 from here onwards you lose, that's an awfully low pick, PoolMinor got burned on his 3390$ choice. I don't judge you for being bearish, but there's at least a threshold.. 3390 PoolMinor 3475 Arriemoller 3499 stelee68 3550 HairyMaclairy 3568 jojo69 3675 Majormax 3729 Biodom 3800 somac. 3866 3acaga 3910 bones261 3950 kurious 4155 mfort312 4200 Last of the V8s 4227 asche 4269 lulucrypto 4284 supertee 4422 vapourminer 4500 serveria.com 4590 figmentofmyass 4678 DeathAngel 4777 Kylapoiss 4835 Laeltin 4906 mindrust 5025 d_eddie 5050 itod 5090 squatter 5220 VB1001 5340 exstasie 5501 Wilhelm 5665 jadenunderhill 5720 julian071 5750 dandannn 5800 Yaplatu 5937 kenzawak 6245 LFC_Bitcoin 6315 goldkingcoiner 6479 Potato Chips 6612 khufuking 6666 sirazimuth 6841 Bitcoinaire 7000 Lambie Slayer 7200 _javier_ 7215 Totscha 7411 ivomm 7550 RivAngE 7654 xhomerx10 7777 Crypdon 7999 Febo 8231 infofront 8250 BobLawblaw 8654 Maicol792 8695 KingZee 8888 buwaytress 9001 ChinkyEyes 11119 bitcoinPsycho 12500 Paashaas 12546 Ludwig Von 14682 EatonABooger 20000 bitebits from NOW price put on the list is irreversible only icygreen still have to put a valid price.... can't put in something that wasn't live from the start LIST UPDATE
|
|
|
In an MITM attack, the attacker would likely be able to control what you can see and what you can't. They can lead you on a separate network and they can send you blocks and transactions that are different from the mainchain. You won't be able to see any other blocks if the attacker can isolate you away from the others.
Given that the client does not always go back to use its blockchain after the initial synchronization and building of the chainstate, it is possible for only the chainstate to be modified and the client would not notice this at all.
I understand what you mean but I can't see the danger.. Mainly because even if bitcoind can't figure it out by itself because it's going to be connected to a network of forked nodes all controlled by the attacker, all it takes is for the user to view "getblockchaininfo" or "getblock someMainChainHash" to see that his client isn't on the main network... Thanks a lot to you for trying to explain but it's just that I'm trying to think of the rationality behind an attacker doing such a thing, and how feasible it is in real life.. The amount of effort for an attacker to pull off something like this, and the possibilities of him being figured out are so massive, that I can't see any reason why I would be worried at all..
|
|
|
Depends on how you see it. The attacker can easily fabricate a blockchain that has thousands of low difficulty block and that they could trick you into accepting transactions which are otherwise invalid with a simple MITM attack with sybil nodes. Transactions can be valid but they can be valid only on specific forks on the chain. You aren't validating the blockchain that you've received so the UTXO database could easily be fabricated still.
No. It is simply impossible to verify its authenticity based on hashes of the file since the files are likely to have different hashes from various sources, though they may all not be malicious. The only way for you to verify is to verify each and every block by yourself.
I didn't mean verification of the files, but to see if the blockchain I'm working on is the same as every other node. Let's assume I downloaded a "fake" chain from another user. Let's also assume he knows my IP and that it's running as a forked node using his modified chain, if he sends me "fake" transactions and blocks, am I not going to be able to instantly see it? The difference between the future blocks that I'll be synchronising with and the blocks that are broadcasted by the hundreds of miners are impossible to be the same... So I really don't understand what you mean by your explanation. This is the point I'm trying to make, if I download a pruned chain, and it can't validate the same blocks that every other node is validating, then it's fabricated. The latter fact can be easily verified, and once it is, further down the line becomes impossible for an attacker to send me "poisoned" txes...
|
|
|
Thanks @aliashraf and @darosior. I wasn't planning on downloading the pruned version from someone, but I did plan to start multiple full nodes and didn't want to go through the full process of verifying the chain again.
I see the point in being a new "honest" node, but I don't see the need of creating the chainstate from scratch, I'm sure that with thousands of nodes on the network, there isn't really a security risk. What's the worst case scenario? If a transaction is invalid it's going to be ignored, if a node has a different copy of the blockchain then it won't be able to verify any of the current blocks...
If I were to download a pruned copy from someone it would be very easy to see if it's legitimate or not, right?
|
|
|
i hope this list is gonna get as REKT as the bottom list ..... from down to UP come on corn
Everyone lower than 4k is going to lose before 2019 even enters due to nothing but single buy-in spikes and dead cat bounces... Only if bitcoin stops going sideways and spikes further below 3k can those numbers make more sense... But hey, since this is still open until the 14th then I guess there's still room for new people to make better decisions.
|
|
|
I wont wonder why the campaign is always looking for people. Its payment is ridiculous low, less than $2
Are you sure about that? You should read better The prices displayed are per post. I don't think anyone would like to be paid 2 bucks weekly..
|
|
|
I just recently decided to start running a full node, I get the long process of setting it up because bitcoin core has to download the full blockchain (~200GB?) to verify.
But I had a question, since we can run pruned mode, and limit the size of the data to the 550 latest blocks, isn't it hypothetically possible to bypass the whole verification process? Can't someone run bitcoin core, let it finish synchronizing with the network, and then just store the final state of bitcoind an replicate it on other machines? Thanks.
|
|
|
BitcoinTalk username: KingZee YOLOdice user id: 202452 Forum rank: Senior Member Current post count: 666!
|
|
|
if no launch highest price @ end of 2019
its al been written watch and change price THX
That's a bit too far don't you think Months are only a social construct and life is ephemeral or some jibberish.. End of June maybe? If anything it might give you another reason to open a different competition next year in case you feel like it, cheers dude!
|
|
|
EE~ }yvT�g^�tV�� ��r 9Ԓ`k@< ?
This is a decrypted wallet encryption key, why is it in this form?
Where did you get that output from? What ETFbitcoin said is true, you're displaying something in utf-8 that should be displayed in hex. Quote from : https://en.bitcoin.it/wiki/Wallet_encryption This master key is then encrypted with AES-256-CBC with a key derived from the passphrase using SHA-512 and OpenSSL's EVP_BytesToKey ... If you explain what you tried to do to get that far maybe we can help out
|
|
|
Reserved I guess ?? what do you mean ? I just made a blank post I don't forget to post here later : 8695.652 $The exact price required for the prize to be worth exactly 1k USD for me. Thanks for this game dude!
|
|
|
I looked around a bit but couldn't find anything in the bitcoinj documentation. https://bitcoinj.github.io/networkingSince you're not using bitcoinj yourself the only thing I can think of is that the "via 127.0.0.1:8333" is a part that's just sent from the connecting peer, which means it could be set to any value depending on their client and probably means nothing. I can't figure out more than that and you'd probably have more information if you asked around the bitcoinj community rather than here. Or since you already know his IP you could like, just ban him. :p
|
|
|
|