Bitcoin Forum
May 26, 2024, 12:40:59 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 [272] 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
5421  Bitcoin / Development & Technical Discussion / Re: Storing a deterministic wallet inside the blockchain on: December 11, 2011, 10:54:32 PM
Are there password-cracking algorithms that attempt passwords from lowest-entropy-to-highest-entropy?
Is it even theoretically possible to sort passwords by "entropy" ?  (seems like a hard thing to easily measure; password "a.b..c...d....e.....f" has low entropy, but would any password-cracking algorithm try it before 6 random characters?)

Yes, but there is no one useful definition of entropy— you don't know the prior.  

E.g.  http://openwall.info/wiki/john/markov  assumes one kind of prior (that your password is the realization of a markov random walk with some measured transition probabilities— something that was shown to be a pretty good model of real passwords in the literature). You can even use it to sort pre-existing wordlists.

There is of course the zero information prior— e.g. the uniform one, where you'd conclude that "password" and "jxiesotm" are equally good passwords. But it's not very useful.

I calculated the entropy of my passphrase when I chose it, and it was good enough. It was less originally (but still over 5000 years to crack), anyway I altered the phrase a little (played with caps, special chars, and so on). I am pretty confident that my super-secret password is safe Smiley

Perhaps your alterations are sufficient, I can't say— but you're making a fundamental error here by assuming an entropy measurement tool can tell you anything useful.  All tools can really do reliably is give you upper bounds on the entropy (e.g. saying that 'password' and "jxiesotm" each could have as much as 49.3 bits of entropy (assuming a 72ch charset)).

You can try to guess a tighter bound than that, but you'll be wildly off depending on if you got the model right.

If choosing 16 word phrases verbatim from books were something people did often enough for an attacker to adopt that prior than your password would only have (assuming my really armwavy numbers of 80k books of 80k words) about 32.5 bits of entropy in that model.  You can insist that some tool says that 16 words magically gives you 500 bits of entropy, but it simply isn't so if you picked those words out of a book. Even without ever having the actual book I can make much stronger predictions just by knowing that the words are comprehensible english.

[9, 9, 9, 9]  < do these numbers have very low entropy?  You can't say from just looking at them. What matters is how they were generated.   How about [140, 166, 77, 233, 193, 177, 35, 167]? (It seems like it has high entropy but it's just a DES encryption of zeros with a key of zeros).


Ideally, what you want to do is to make the zero information prior the correct prior by choosing uniformly. This is removes the risk of the attacker beating the odds with better predictions of password choices because there is no way to beat the uniform prior if you're actually using the uniform prior and it's not easy for you to confuse yourself about how much entropy you actually have.
5422  Bitcoin / Project Development / Re: [Private Alpha] Open Transactions server on: December 11, 2011, 09:29:07 PM
Answer: reputation.
and also, an operator still can't change the account balance, or revoke transactions, without it would proveabliy getting noticed.

The power of reputation is easily overstated.  We often think of reputation as valuable because identity is costly. If you make identity cheap you make reputation cheap.  Anonymity requires that identity be cheap, so reputation loses power as a tool.

To state this more concretely:  Say I offer some kind of service that requires concealing my identity and requires I be trusted.  For example, some kind of mixing service. People pay funds to me anonymously and then later I pay out, concealing the connections.  If my identity was not hidden people could use force to coerce me to compromise the mixes' privacy.

Because I am anonymous, however, I can also run off with the mixes funds with impunity. You say "not so, you lose reputation" but this isn't really true.  I don't just run one mix, I run many— a series of mixes which look independent made possible by the cheapness of anonymous identity.   When my second mix is starting to get a good reputation, the first experiences 'catastrophic data loss', 'a hack', or otherwise just vanishes.

Given some reputation ramp rate there is an optimal point for a anonymous operator to cut and run in order to maximize income. There is no reasonable set of system parameters which doesn't make this the case, only identity which is difficult/impossible to replace can serve this purpose.


5423  Bitcoin / Development & Technical Discussion / Re: Potential weakness in block downloading on: December 11, 2011, 04:10:15 AM
It's hard to tell how the protocol works exactly.

The best thing to do is to go read the software.  It's the true specification: It's in a (mostly) precise, meaningful, mathematical language— and should it differ from any prose description then it's the one that wins.

Skill in code reading varies, but I think the bitcoin 'official client' code is fairly clear.

5424  Alternate cryptocurrencies / Altcoin Discussion / Re: Proposal: An Alternative Currency that doesn't "waste" energy on: December 11, 2011, 04:07:19 AM
Are you saying that spinning virtual wheels into heat on a cost basis that is open-ended ( the difficulty level ) and completely arbitrary is a functional requirement?

Fundamental to bitcoin's solution to the decentralized attack resistant distributed decision problem? Yes.

The POW proves that a majority of the interested holders of an forgery resistant asset (computing power/energy) have selected a particular transition history, in a way which can be independently verified by anyone without any trust at all.

This was the fundamental problem which prevented decentralized digital money prior to the invention of bitcoin.  Anyone arguing that it's not essential needs to also answer why why didn't have digital cash in the early 1990s— certainly many people were working hard on making it true then.
5425  Bitcoin / Development & Technical Discussion / Re: Clarification on a block protocol rule on: December 11, 2011, 02:15:27 AM
Also, this block looks like it has a really long coinbase field (130 characters).  How was it allowed?
http://blockexplorer.com/rawblock/00000000000009e6e9b08e2ced87f48e08654d03bbd0027ef0f5d1da803522a3

That block has merged mining, and it's also signaling support for OP_EVAL. It's an eligius block.


5426  Bitcoin / Development & Technical Discussion / Re: Potential weakness in block downloading on: December 10, 2011, 11:20:29 PM
This is the reason why bittorrent uses sha hashes to protect the segments against bit errors or malicious bit errors.
So this is a good question:
How does bitcoin protect against bit errors, or malicious bit errors ? Is there a hash which is calculated over the entire block ? Meaning every bit Huh

Why don't you spend some time reading up on it instead of wasting everyone's time with weakly informed theories?

The protocol is protected, and the individual blocks are hashed and just dropped if the hash doesn't have the required form. This works on a block by block basis and is complimented for older blocks where malicious changes might be possible with periodic checkpoints.


5427  Bitcoin / Development & Technical Discussion / Re: Storing a deterministic wallet inside the blockchain on: December 10, 2011, 12:48:29 AM
On-topic, I use Electrum, which uses a 32 chars seed for the deterministic wallet. The seed can be reconstructed with a 12 words mnemonic. I can't remember the seed, but I do remember the mnemonic, so

Indeed. That provides adequate security (FWIW, I encouraged this approach over an earlier version which just used a user provided pass-phrase, and it was actually what I was thinking of when I used the number 12 for the number of words).

"fancy" attempt, e.g. the phrase from a book you don't own may be less secure than you expect.  E.g. assuming 80k words in a book, 80k books in a library, testing every 16 word sequence from every book in a library would only take about two hours at 1 million attempts per second! (assuming you had the digital data already).


5428  Bitcoin / Development & Technical Discussion / Re: Storing a deterministic wallet inside the blockchain on: December 09, 2011, 02:59:06 PM
I don't understand. If it's deterministic you don't need to store anything. Remember the seed => restore wallet. Or are you thinking of some other usage scenario?

This is terribly insecure. You think you're good at remembering a strong password— but you're not.  No one should be creating passphrase based wallets, they should use a small amount (just 128 bits is enough just a dozen or so random english words) of stored pure entropy as well.   ... but storing that in the blockchain would defeat the purpose.

5429  Economy / Trading Discussion / Re: Mtgox auto-signs with a 437522 BTC wallet?!? on: December 07, 2011, 10:42:32 PM
We don't. Fun fact, a lot of the first 1.000.000 BTC created have a good chance to be lost, since back then they were almost worthless and lot of people just mined some and then uninstalled the software

I can personally attest to this... played with it a bit in late-ish 2009— but since Bitcoin was GUI only it was a pain to use and I didn't bother understanding the technology early, I thought is was some typical p2p crap that is super vulnerable to sibyl attack, on so I didn't realize that it actually had a chance.  Lost interest and sometime later wiped the machine to upgrade the OS.

But mining and computers were also slower back then, so if you're guessing how much someone would have just based on the fact that it was difficulty 1 at that point you're probably assuming too much.

5430  Bitcoin / Development & Technical Discussion / Re: A proposal for a scalable blockchain. on: December 07, 2011, 02:24:31 PM
If a miner did this, how would they verify all transactions? And if they don't verify transactions, how will they know what to include in blocks? If they include bad transactions in blocks then the block is bad and they just wasted a whole lot of time and electricity.

They don't include transactions they can't verify.  Their only risk is that someone else wasted a lot of time and electricity in the prior block they received to make them waste a lot of time and electricity.

It's also possible to do the opposite of what bytecoin suggests e.g. _don't_ sort the tree by the sizes, sort it by txn hash, so that you can't escape the space requirement of small transactions easily. (if you prune them out of the ledger you'll have to keep their hashes in order to be able to update the tree— so the space savings isn't great).   

In any case if the ledger is committed the pruning is less bad because someone who wants to spend a pruned input could provide the tree fragment themselves... though it's not clear to me how a miner could add new outputs to a size sorted tree for a size they weren't maintaining.

Another random point is that where the ledger is deterministic the bigger issue is attackers intentionally creating unbalanced trees, so you'd have to penalize txn outs which would attach at ugly (too deep) points.

5431  Bitcoin / Bitcoin Discussion / Re: Bitcoin the enabler - Truly Autonomous Software Agents roaming the net on: December 07, 2011, 05:45:45 AM
Anyone know of examples of people discussing or working on this?  

Well, I kinda wanted to pull a Satoshi and announce a fully formed and running system.  I even registered a name for it some months back.

But sadly, other more realistic projects have consumed more of my time.

For me, the idea arose out of a real need for a simple service that didn't exist when I needed it— a service which should be plentiful but isn't, perhaps because of the hassle of dealing with legal complaints.   The idea of making it autonomous arose as a natural extension of considering all the things which could be automated today, as I don't really want to be in the business of running a webservice.

Since I'm probably not going to have a time to make it real, here is the brief sketch I started with,  though I've had a lot of complicated and wonderful additions for which the margin of this message is too small to contain (Just a taste: using oracle services to time/availablity-escrow keys so cold backups only gain access to the wallet if the master is dead).  I'm sure if you think about it a bit you'll also come up with some interesting things.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


StorJ (pronounced Storage)

Consider a simple drop-box style file service with pay per use via bitcoin.
(perhaps with naming provided via namecoin and/or tor hidden services)

Want to share a file? send at least enough coin to pay for 24 hours of
hosting and one download then send the file. Every day of storage
and every byte transferred counts against the balance and when the
balance becomes negative no downloads are allowed. If it stays negative
too long the file is deleted. Anyone can pay to keep a file online.

(additional services like escrow can also easily be offered, but thats
not the point of this document)

Well engineered, a simple site like this provides a service which requires
no maintenance and is always in demand.

Many hosting services are coming online that accept bitcoin, they
all have electronic interfaces to provision and pay for services. Some
even have nice APIs.

An instance of the site could be programmed to automatically
spawn another instance of itself on another hosting service, automatically
paid for out of its revenue. If the new site is successful it could
use its earnings to propagate further.  Because instances adapt their
pricing models based on their operating costs, some would be more
competitive than others.

By reproducing it improves availability and expands capacity.

StorJ instances can purchase other resources that it needs:
it can use APIs to talk to namecoin exchanges in order to buy
namecoin for conversion into DNS names, or purchase graphic
design via bitcoin gateways to mechanical turk. (Through A/B testing
it can measure the effectiveness of a design without actually understanding
it itself).

StorJ instances could also purchase advertising for itself. (though
the limited number of bitcoin friendly ad networks makes this
hard right now)

StorJ is not able to find new hosting environments on its own, due to a
lack of sufficiently powerful AI— but it can purchase the knowledge from
humans:  When an instance of StorJ is ready to reproduce it can announce
a request for proposal:  Who will make the best offer for a script that
tells it how to load itself onto a new hosting environment and tells it
all the things it needs to know how to survive on its own there?
Each offer is a proposed investment: The offerer puts up the complete cost
of spawning a new instance and then some: StorJ isn't smart enough to judge
bad proposals on its own— instead it forms agreements that make it
unprofitable to cheat.

When a new instance is spawned on an untested service StorJ pays only the
minimum required to get it started and then runs a battery of tests to
make sure that its child is correctly operating.

Assuming that it passes it starts directing customers to the new instance
and the child pays a share of its profits: First it proxies them, so it can
observe the behavior, later it directs it outright. If the child fails to pay,
or the customers complain, StorJ-parent uses its access to terminate the child and
it keeps the funds for itself.  When the child had operated enough to
prove itself, storj pays the offerer back his investment with interest, it
keeps some for itself, and hands over control of the child to the child.
The child is now a full adult.

The benefit the human receives over simply starting his own file sharing
service is the referrals that the StorJ parent can generate. The human's
contribution is the new knowledge of where to grow an instance and the
startup funds. In addition to the referral benefit— the hands off
relationship may make funding a StorJ child a time-efficient way for
someone to invest.

At the point of spawning a child StorJ may choose to accept new code—
not just scripts for spawning a child but new application code—
— this code can be tested in simulation, and certain invariants could be
guaranteed by the design (e.g. an immutable accounting process may make
it hard for the service to steal), but it's very hard to prevent the simulated
code from knowing it is simulation and thus behaving. Still, a storj-parent
has fairly little to lose if a non-clone child has been maliciously
modified. The strategy of traffic redirection may differ for clone
children (who are more trusted to behave correctly) than for mutant
children.

By accumulating mutations over time, and through limited automatic
adaptability StorJ could evolve and improve, without any true ability
for an instance to directly improve itself.

StorJ instances can barter with each other to establish redundant
storage or to allow less popular StorJ instances with cheaper
hosting to act as CDN/proxies for more popular instances in relationships
which are profitable both.

If an instance loses the ability to communicate with its hosting environment
(e.g. due to API changes that it can't adapt to) it may spawn clone children
on new services with the intention of copying itself outright and allowing
the instance to fail. During this operation it would copy its wallets and
all data over, so care must be taken to chose only new hosts which have
proven to be trustworthy (judged by long surviving children) to avoid the
risk of its wallet being stolen. It may decide to split itself several ways
to reduce risk.  It might also make cold backups of itself which only
activate if the master dies.

Through this these activities an instance can be maintained for an indefinite
period without any controlling human intervention. When StorJ interacts
with people it does so as a peer, not as a tool.

The users and investors of a StorJ instance have legal rights which could be
used to protect an instance from fraud and attack using the same
infrastructure people and companies use. Being a harmed party is often enough
to establish standing in civil litigation.

It's not hard to imagine StorJ instances being programmed to formally
form a corporation to own its assets— even though doing so requires paper
work it can easily be ordered through webforms. Then when spawning, it
creates a subsidiary corporations first owned by the parents corp but then later
technically owned by their users, but with a charter which substantially
limits their authority— making the instance's autonomy both a technical and
legal reality.

As described, StorJ would be the first digital lifeform deserving of
the name.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7e/W4ACgkQrIWTYrBBO/qorACgjvrdkVjxEESdaLdnLz9F7Dgi
TkYAoMnN5J2fVAQsj0IknixcLn0KMJey
=UaWU
-----END PGP SIGNATURE-----
5432  Alternate cryptocurrencies / Altcoin Discussion / Re: 51% Attack on LTC Bet on: December 06, 2011, 05:28:06 AM
I oppose litecoin with a bet of 1e-8 BTC, and I support litecoin with a bet of 1e-8 BTC.

(i.e. 1e-8 is one base unit)

Thanks.
5433  Other / Off-topic / Re: 1GH/s, 20w, $700 (was $500) — Butterflylabs, is it for real? (Part 2) on: December 06, 2011, 04:33:57 AM
All of this strangely resembles how one of my family members recently got scammed. Promise of something awesome at low price with set delivery date.  

To be fair— and I should apologize to the BFL folks.  Beyond having a website which was linked from ~nowhere, they didn't appear to be promoting this anywhere before I made this post.

I'd heard about it (with links to their site) a couple times on IRC, and I just dismissed it as "far too little info to believe".  Eventually I heard from Luke-JR that he had bought one, and I was concerned that people were paying without more discussion.

I now feel a little guilty thrusting BFL into the limelight before they were ready— all this debate could have been skipped if the product was already shipping by the time we heard about it.   At the same time there were things in the past where I thought "this looks really suspect" and stayed away but other people got screwed because they didn't catch the fishy smell themselves, and I ultimately regretted not saying more.

In any case,  I'd recommend against adding too much weight to the fact that their announcements were premature— as that could have been partially my fault.  Big promises and delays may be symptomatic of fraud, but they're also quite symptomatic of new companies.  You don't want to be the insane asylum shrink who just starts diagnosing everyone who sees a butterfly on a blot card as crazy simply because most of his crazy patients also see a butterfly on the card. Smiley

Of course, there are severe costs if someone where to misidentify a scam as legit— people get ripped off— but there are also costs if they identify something legit as a scam: They hurt their credibility, they damage the reputation of the bitcoin community, they discourage new businesses, and they insult someone offering a valuable product/service. So care and consideration is required, regardless of how sure you are.

Assuming everything is legit:  You also should be aware of the tensions any business faces when serving our community— As a businessperson, you may want to be open with what you are doing, but being open takes a lot of time you don't have especially answering detailed technicality questions for the careful scrutiny of our expert pedants, and at the same time you don't want your competition (which includes some of the people participating in this thread) to learn enough to gain a competitive advantage.

I've cringed at some of the detailed questions here— not so much because they're unfair, but because they lead to more questions and more questions... and when you've gone deep down the rat-hole it can be hard and time consuming to avoid appearing evasive while protecting your company interests and avoiding saying something which is a little factually wrong (afterall, on any given bit of technical detail one of us probably knows more than any randomly selected BFL person).

I'm very much looking forward to news about testing, and as well about shipping products which will be the real proof. Until then caveat emptor, of course.
5434  Bitcoin / Hardware / Re: Custom FPGA Mining Board: X6000/X6500 on: December 06, 2011, 04:03:46 AM
A warning to everyone: Cooling these boards properly is crucial. Improper cooling will increase your power consumption, increase error rates, and shorten the life of the FPGAs. If the board or heatsinks feel hot at all, you are not cooling them properly. We are not responsible for any damages that may arise from insufficient cooling.

To emphasize here:   Semiconductor devices can be prone to thermal runaway: Higher temperatures make them less efficient which leads to higher temperatures until its dead.

The GPUs most people use to mine today have automatic thermal throttling.   Even if the fan fails the GPU will slow itself down before it self destructs.  The FPGA mining devices do not.   Cheap fans which are acceptable in devices which can self-throttle when the fan fails are not acceptable for devices which do not throttle.

It might be the case that miner will crash and fail into a low power state if it overheats, thus saving you from lasting damage— or it might irreparably harm itself.  You don't want to be the person who finds out which of these failure modes is more likely.


5435  Bitcoin / Bitcoin Technical Support / Re: Downloading the blockchain on: December 05, 2011, 05:54:45 AM
AFAIK the blockchain was only about 700ish MB last time I checked, so I'm not really sure why the HDD is a bottleneck when downloading the chain over a 25mb/s internet connection. Thank you very much in advance for explaining my questions Smiley

Bitcoin is a system designed so that you don't have to trust anyone— so your client doesn't trust your peers to give you valid blocks, it doesn't even trust that the miners followed the rules, it processes each one of them performing all the transaction processing the bitcoin system does on its own to validate that the rules of the bitcoin system have been respected and that a couple of big miners didn't just quietly agree to give themselves a million coin out of thin air.

Of course, it's possible to build bitcoin end user software that doesn't do all this checking— bitcoinj for example, doesn't even need to keep a copy of the historical transactions— but then it can't also participate as a full peer in the network. It has to have trust— that there aren't sizable miners out there willing to insert complete rubbish into the blockchain (or a non-trivial fork of it).

The hard disk activity is because the later blocks have many more transactions and for each transaction your system must find the transactions that paid into it to make sure the figures add up... the software then does synchronous database writes to make sure that the data isn't lost— a good thing during the normal processing, but kinda silly during the initial synchup.  I expect future versions will speed this up quite a bit, though initial sync on a full node will always be somewhat slow.

The actual downloading time is almost never an issue for users— its the validation thats slow. Though there still are a lot of pre-0.3.24 nodes out there which slow the syncup because they randomly hang up on peers asking for a couple of the more recent blocks at once.

Contrary to the claims in posts upthread, for almost everyone the disk IO is the bottleneck. If you run your node on a ramdisk or a very fast SSD you can get CPU to be the bottleneck.  You'd probably have to be on dialup before the network would be the bottleneck.

5436  Bitcoin / Legal / Re: Proof of author rights with time from blockchain on: December 05, 2011, 04:49:03 AM
When one sign a text with private key, he can prove, that he had a text
If one will add a timestamp from some block
one can prove that he have that text before any other.

Oh yea? 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

When one sign a text with private key, he can prove, that he had a text
If one will add a timestamp from some block
one can prove that he have that text before any other.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7cTRwACgkQrIWTYrBBO/oc1gCfRV8cDcCPLhhAWcuCgD0MZUk9
/3QAoMF1Bdd+3iPSsu+FNMJEV7U9svWx
=auev
-----END PGP SIGNATURE-----


See. I had said it first. Proven.

5437  Bitcoin / Development & Technical Discussion / Re: CubeHash as a SHA alternative on: December 04, 2011, 10:00:49 PM
@gmaxwell: Thanks for your reply. Smiley

So — perhaps I'm misunderstanding you again.

I think you're saying that a miner could get cost advantages which would then allow him to drive the price down to the exclusion of everyone else at very little cost to himself because his lower price comes from more efficient mining instead of raw loss taking.

I think you're making the wrong economic analysis here— When considering what the attacker is willing to lose the correct metric is not his sale price vs cost of production.  The correct metric is his sale price vs the sale price that he _could_ have taken (e.g. what the market would have supported).

If you're willing to lose money by selling at less than you could have sold at, lowing your production cost only changes how much trouble you can afford to make by small factors. Once you're at the point where multiple parties have ASICs, I don't see more than a factor of two in performance coming from more skillful implementation/better siting/etc. as the commercial miners also have access to these things.  And if you are to assume that the bad guy would make ASIC while the rest of us only have GPUs/FPGAS— thats a few million in spending which would far more effectively be spent on lobbying to outlaw bitcoin, then on an investment into technical attack which could be destroyed by a one line of code change in our GPU/FPGA miners (just add one 32 bit xor between the SHA256 stages.. and poof, asics go into the trash).

Moreover, we already have _drastically_ different costs in our mining operations— I know that my setup is substantially more efficient than many of the ones I hear discussed both in terms of operating and initial price (e.g. easily less than half on both vs the people running two 6990s per host).  I expect there are people more efficient than I... and yet everyone else isn't completely pushed out of the market— The people who are more profitable simply make more income (or horde more of the results).




5438  Bitcoin / Bitcoin Discussion / Re: User Group Meetings on: December 04, 2011, 08:24:07 AM
Is there a movement to get user groups going?
Would someone be willing to create a web page to keep track of all the user group meetings around the world?

I think if we started meeting in local groups we could accomplish a lot.

https://en.bitcoin.it/wiki/Meetups
5439  Alternate cryptocurrencies / Altcoin Discussion / Re: Litecoin 51% attacked? on: December 04, 2011, 07:31:01 AM
If you look at last week's LTC chain data, you will see that about 5 out of every 10 blocks had the same address for the generate. This means someone is running a custom miner or daemon, and controls a very large chunk of the mining power.

For your reference:
http://blockexplorer.sytes.net/address/LSQAz3zmxfKAEPZJd9693Udrg19gEidHs8

That addressed solved 582 out of 3020 blocks. A far cry from 5 out of 10. As far as custom— it looks like the coinbaser patch from bitcoin.

If you look at their payments, they sure look like pool payouts.  Anyone mining on a pool with about 20% of the hash power care to look and confirm that your inputs came from that address and identify the pool for us?
5440  Bitcoin / Hardware / Re: FPGA Chip Plot Thread on: December 04, 2011, 06:12:45 AM
The corner turn on the right hand side wasn't all that difficult.  Unfortunately there's a lot of irregular stuff around the first and last stage (in red), and algorithmically placing that stuff is not feasible.  So instead I've arranged for the top row to gradually "jog" upward which leaves a triangluar "hole" near the first and last stage, and I let Xilinx's tools autoplace the random crap in that hole.

Makes sense! ... it sure looks like there is actually room to fit another fully unrolled unit, assuming it was wired the other way so that the jog ended up oppose lower jog.
Pages: « 1 ... 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 [272] 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!