I have two questions:
- ¿How are you supposed to laundry bitcoins if only tainted coins owners use your service? - If you want to mix coins: why perfectly clear bitcoins users should use your service?
Because "If you've done nothing wrong, you've got nothing to hide" is a load of BS. Do you really want your boss (who pays you in bitcoins because we're imagining a hypothetical future in which bitcoins are mainstream) finding out that you're spending your paycheck on porn? Is that the sort of future you really want?
|
|
|
Are they still available?
Nope. (I didn't take them, they were already gone when I got there. ![Cry](https://bitcointalk.org/Smileys/default/cry.gif) ) What kind of site is it?
Looks like an Instawallet-type E-wallet running as a Tor hidden service.
|
|
|
Yeah, Firefox Portable can be a pain like that. Hmm. Why don't you just configure your regular browser to connect through Tor? Just tell it to use a proxy at 127.0.0.1 on port 9050. eg, in Firefox, go into Preferences -> Advanced -> Network -> Settings then select Manual proxy configuration -> HTTP Proxy: 127.0.0.1 Port: 9050 and select "Use this proxy server for all protocols". Verify that this proxy setting works by trying to access a .onion domain (or the fact that you can now access sites which were blocking your IP address). Don't forget to change your proxy settings back when you're done (unless you enjoy slow connections and exit nodes spying on you).
EDIT: Forgot to mention that Vidalia has to be running when you do this (since it's the proxy server that you're connecting to).
|
|
|
Edit: I also tried copying/pasting flashplayer.xpt and NPSWF32.dll directly into my plugins folder under torbrowser/firefoxportable/data/plugins and that didn't work.
Damn, I was just about to suggest this! Do you also have NPSWF32_FlashUtil.exe in your C:\Windows\System32\Macromed\Flash\ folder? If so, you'll need that to copy that into your plugins folder as well.
|
|
|
Correct, Tor Browser Bundle, TorK, and probably every other Tor-ready browser package disables addons and plugins in all browsers they support for exactly this reason. If you're using Firefox, go into Tools -> Addons (or enter about:addons in the address bar), then under Plugins, find Flash and click Enable. For most sites that use Flash you will also need to enable Javascript under Preferences -> Content. Problem solved. New problem created: your browser is no longer anonymous, since Flash and Javascript can create network connections which bypass Tor, revealing your IP address. You're not "psuedo-anonymous", you're as non-anonymous as if you were not using Tor at all. I'm using Vidalia Tor Bundle. Basically, I simply want to bypass websites in which a particular IP (mine) has been restricted. Now, Tor does that no problem, but there are flash features on some of these sites that I want to use. I'm not really concerned if someone figures out who I am. It's not a legal issue. Vidalia uses Firefox for anonymous web browsing. You should be able to enable Flash and Javascript using the above instructions. Just don't forget to disable them again when you really do need to be anonymous!
|
|
|
Correct, Tor Browser Bundle, TorK, and probably every other Tor-ready browser package disables addons and plugins in all browsers they support for exactly this reason. If you're using Firefox, go into Tools -> Addons (or enter about:addons in the address bar), then under Plugins, find Flash and click Enable. For most sites that use Flash you will also need to enable Javascript under Preferences -> Content. Problem solved. New problem created: your browser is no longer anonymous, since Flash and Javascript can create network connections which bypass Tor, revealing your IP address. You're not "psuedo-anonymous", you're as non-anonymous as if you were not using Tor at all.
|
|
|
Cette monnaie qui peut être utilisée pour réaliser certains achats sur le web se présente comme une alternative au système monétaire actuel avec des avantages comme la gratuité des transactions, l'absence d'intermédiaires et la stabilité qui fait actuellement défaut aux autres devises.
Basé sur un logiciel libre et sur la cryptologie asymétrique, ce système n'est cependant pas à l'abri des bugs, ni des attaques de pirates informatiques.
Le visage, rencontre de paume.
|
|
|
With the exception of software that requires you to register your purchase online, all the verification is done by software itself. Meaning it has to contain the code needed to verify its own serial number (which cannot be encrypted for the same reason DRM relying on encryption doesn't work). Reverse engineer the code and you've got yourself a key generator.
|
|
|
Bitcoin doesn't try to prevent copying (which is physically impossible), it tries to prevent double-spending, which is a completely different beast. There is no need to prevent copying since there is nothing to copy: bitcoins are not actual pieces of data and do not even exist in their own right, instead what you have is a list of transactions. Since all Bitcoin transactions are public, any transaction which spends coins which are already spent will be detected and rejected by the network. Mining prevents transactions from being fraudulently removed or altered by hashing each block of transactions (and making that hash difficult to calculate, but easy to verify), and making each block dependant on the previous block's hash, which makes it (practically) impossible to alter a block without invalidating all the blocks that came after it, causing the altered block to be rejected by the network. DRM, on the other hand, is fundamentally flawed: In DRM, the attacker is *also the recipient*. It's not Alice and Bob and Carol, it's just Alice and Bob. Alice sells Bob a DVD. She sells Bob a DVD player. The DVD has a movie on it -- say, Pirates of the Caribbean -- and it's enciphered with an algorithm called CSS -- Content Scrambling System. The DVD player has a CSS un-scrambler.
Now, let's take stock of what's a secret here: the cipher is well-known. The ciphertext is most assuredly in enemy hands, arrr. So what? As long as the key is secret from the attacker, we're golden.
But there's the rub. Alice wants Bob to buy Pirates of the Caribbean from her. Bob will only buy Pirates of the Caribbean if he can descramble the CSS-encrypted VOB -- video object -- on his DVD player. Otherwise, the disc is only useful to Bob as a drinks-coaster. So Alice has to provide Bob -- the attacker -- with the key, the cipher and the ciphertext.
Hilarity ensues.
|
|
|
What do you mean "slipping away"? The Golden Opportunities are just emerging!
|
|
|
Oh, in that case, let me add an important detail: the change address can be any Bitcoin address, including an address that signed an input.
So, A sends 10 to X, remaining 40 to A.
Bingo! Talk about a technicality o.O Just to be sure, can anyone confirm this will work without some other technical catch? There's no technical catch, just a privacy catch: by using a different address for change, there is no way to know with absolute certainty (though you can make an educated guess) which address is the recipient and which is the change; sending change to the original address removes the guesswork involved in determining who the recipient is.
|
|
|
Given the cyberattack last month in which thieves made off with $90,000 in Bitcoins–that’s €71,738 euros, by the way
Gah! Why can't reporters ever understand how significant figures work? ![Angry](https://bitcointalk.org/Smileys/default/angry.gif) What if the USD/EUR exchange rate happens to change by 0.0017488%? ![Roll Eyes](https://bitcointalk.org/Smileys/default/rolleyes.gif)
|
|
|
bitcoinmaster and whittles, you guys should realise that testnet bitcoins are just pretend bitcoins used to test Bitcoin-related software and services without putting real money on the line. You can't send them to real Bitcoin addresses or use them in real Bitcoin transactions. (Real bitcoin addresses start with a 1, testnet addresses start with either m or n.)
|
|
|
I'm confused here. The only reason Armory uses the registry is to tell the operating system that it knows how to open bitcoin URIs, so that when you click on a bitcoin payment link you don't have to select what program you want to use to open it every single time, or worse, be confronted by an unhelpful error message saying you don't have any program on your computer that can open it even though you do. That hardly seems clean and efficient to me. The Windows registry exists for a reason, and while some programs pollute the registry by using it for purposes that are better served by configuration files, Armory isn't one of them, and it uses the registry for exactly the sort of thing the registry is supposed to be used for and nothing else.
|
|
|
What's the velocity of the Star Trek economy? Zero. They don't trade anything at all. Everything they want is just replicated out of thin air. That's important to keep in mind.
What about all the gold-pressed latinum and Federation credits used to trade things which can't be replicated, such as real estate and professional services?
|
|
|
HTTPS would be good I guess, but its not uncrackable and might give a false sense of security. People there use PGP encryption to encrypt all their communication (at least the non retarded ones do).
It always amazes me how rude the internet is. For those that are "retarded", what is PGP and how can I hook it into the tor browser? For the record I'm not selling. PGP (or, more precisely, OpenPGP - "PGP" is actually a commercial product by Symantec implementing this protocol; there is a free open-source implementation called GPG) is a public-key encryption protocol, used mainly for email. It is not related to Tor in any way, and can be used with any email service. Note that PGP only encrypts messages, so that nobody other than the intended recipient can read them; it does not make you anonymous. Be sure to use an anonymous email account if you plan on using it for things that... require anonymity. All Linux distros come with GPG already installed (though you may want to install a GUI front-end such as KGpg (for KDE) or Seahorse (for GNOME) if your distro doesn't already have one). For Windows, I recommend Gpg4win.
|
|
|
Can someone point the thread to chapter and verse for this? I'm curious.
And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.
|
|
|
You had the HD double density Fujis? Weren't you the Mr. Fancy Pants!
That's a high density, double sided disk. Although the double sided part is redundant, since all high density formats are double sided. Kids these days. Can't even recognise a floppy disk. ![Roll Eyes](https://bitcointalk.org/Smileys/default/rolleyes.gif)
|
|
|
i have found quite a few sites that promise to send bitcoins for clicking links or visiting but i have yet to receive anything from any of them =(
Has your Bitcoin client finished synchronising with the network yet? You will not be able to see or spend your bitcoins until it has. Try searching for your address on blockchain.info; if you have been sent bitcoins you will be able to see them there (but you won't be able to spend them until your client has finished synchronising).
|
|
|
|