Bitcoin Forum
May 27, 2024, 01:31:48 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 65 »
61  Alternate cryptocurrencies / Altcoin Discussion / Re: TexaiCoin Pre-Release Development Diary on: September 21, 2014, 09:21:26 PM
What has not been explored AFAIK, is what if the nomadic mint's KSI calculation had a publicly visible component that could be cross-checked by any client?  I.e. if the hash function had to mix in a widely observable source of chaos, such as the S&P 500 index closing price or solar flux index.  People might relax about cooperation if the public could "trust, but verify" the calculations of the population of nomadic mints subject to attack by a powerful adversary.  KSI + chaos could be immutable in the past (cannot reconstruct a historical hash with KSI) and the future (chaotic processes are immune to time series forecasting).  


Scumby,

What you say is very interesting. Satoshi designed the current Bitcoin proof-of-work system to prevent an adversary from presenting a forged blockchain as legitimate. My approach makes that difficult by having only one canonical version of the blockchain, in which the current hash is widely known, in which participants are identified by certificates, and in which misbehavior is detected by verifying peers.

Quote
KSI + chaos could be immutable in the past (cannot reconstruct a historical hash with KSI) and the future (chaotic processes are immune to time series forecasting).  

This is a desirable property for the blockchain or agent logs. I want to understand the circumstances allowing an adversary to forge such a blockchain. I seem to comprehend how a KSI + chaos blockchain could be tamper-evident, but the forgery attack is one in which the adversary replays transactions from some point in the history, with some change in their own favor, recalculating the merkle trees and block hashes at each step. The forged block chain is thus internally consistent with no evidence of tampering unless compared with the final block hash of the legitimate blockchain.

Does KSI as you understand it somehow make replaying of the blockchain building process impossible - as I described that process above?

Even if not, your mentioning of a public chaos value is a good idea for convincing observers that the blockchain was not constructed prior to the timestamp associated with the public chaos value. I could use the daily radio flux at 10.7 cm as reported by the U.S. Dept. of Commerce, NOAA, Space Weather Prediction Center, or can anyone suggest something published and archived by a more international source?
62  Alternate cryptocurrencies / Altcoin Discussion / Re: TexaiCoin Pre-Release Development Diary on: September 21, 2014, 08:56:32 PM
I have only a basic understanding of Bitcoin's internals, so if there is nonsense here due to my own ignorance I apologize.  I think you are doing a tour-de-force job of assimilating a wide cross-disciplinary breadth of ideas here, but I am concerned that the TexAI/Cyc ontology stuff is so alien to most developers that it could torpedo your adoption if you make it too front-and-center.  The AI integration into the CPOS "stew" feels a bit forced; it's evidently a treasured ingredient in your own intellectual "refrigerator" and provides you continuity with your AI work, but you're going to have a hard enough time getting mindshare without having to also persuade engineers that symbolic programming with ontologies is worthwhile for cryptocurrencies.  My .02.

Indeed.

For reason you mention, I have stripped out the work-in-progress, natural language dialog and face-recognition aspects of Texai from the code that I am committing to GitHub for TexaiCoin. When I talk with coin developers at the Hasher's United conference in Las Vegas next month, I will be talking about a multi-agent software system which can cooperate to mine coins with no effort and still be as secure as Bitcoin.

My approach to artificial general intelligence is to follow Alan Turing's advice back in 1950, which is to create a system capable of being taught skills and then to teach it. My implementation uses the robotic-inspired architecture described by James Albus, in which his hierarchical control network of software agents has been elaborated by me to model a human organization. For TexaiCoin, I have 27 simple agents which cooperate and will check each other to operate an altcoin network with no trusted third parties.

I could have implemented these agents for TexaiCoin using any one of several agent frameworks, but it was the security aspects that motivated me to repurpose my existing AI code. Concerned about the need to ensure Friendly AI in a distributed network operated by anyone downloading the code, I designed the AI code years ago to be secure against intruders and hackers. I incorporated X.509 certificates for that purpose. Currently, I plan to use tamper-evident logs and remote attestation to strengthen Texai against attackers.

I will be able to market TexaiCoin as having genuine artificial intelligence, thus helping this altcoin and its innovations to be distinguished from other thousand-plus altcoins. I do not plan to say much initially about the OpenCyc knowledge base that is part of each deployed container.

TexaiCoin ideally will become a platform upon which third-party developers can add vetted skilled agents, and receive payment in TexaiCoin for the benefits gained by the collective infrastructure, or from the proceeds of services for sale, e.g. an API. I will start with the document timestamp service as a demonstration.

I will add a high level goal to the system to pursue self-improvement, e.g. to increase revenue and coin value via tasks performed by paid developers. Humans will be able to perform tasks specified in the same manner as for software agents, but with a secure web form or secure email as the communication channel. I think that the system paying one person to perform the task, and paying two non-affiliated others to check the work should be safe.



63  Alternate cryptocurrencies / Altcoin Discussion / Re: TexaiCoin Pre-Release Development Diary on: September 21, 2014, 04:58:28 AM
[Lurker decloak]
This thread has reached the point where it could use an injection of keyless signature infrastructure, as invented by Ahto Buldas of Guardtime (I am not associated with them):

http://en.wikipedia.org/wiki/Linked_timestamping

Some forms of global coordination, such as a stochastic cooperative signal that is widely observable, are compatible with decentralized paranoia.  Just ask neurons and ants.

Perhaps Mr. Reed might reconsider his resignation to PKI and central servers with this information.
[/Decloak]

Thanks for the help, Scumby!

I wanted to offer a document timestamping API which would not necessarily be evidence in a court of law but would provide a distributed, robust service implemented with micropayments. This is an excellent implementation suggestion for this skill, which is required by the nomadic mint which timestamps incoming transactions. I would then be easy to expose this skill as a money-making microservice API. Apparently the Bouncy Castle cryptography library I use has a time stamp protocol server that I will evaluate.

Keyless Signature Infrastructure is interesting. I understand Merkle trees and this is similar. I will stay with self-signed X.509 certificates for identification, digital signatures for messages, and message channel encryption.

64  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: September 16, 2014, 11:48:38 PM
I was under the impression that the whole point of VIA was to recreate Counterparty. I'm not sure what they plan to improve upon though.
But seriously, my impression is that they are pushing the ball forward on side-chains, big-time.  I haven't tracked it, but that's what they paid Peter Todd to do.  Getting all that work out into the public, so that people can innovate on it, is super helpful.

In a recent video interview on VIA, PT sounded surprisingly pessimistic about whether tree-chains could be made to work. It's possible that's just false modesty, though.
I did not see the interview, but be careful to distinguish between side-chains and tree-chains. The former is a method of funding a new crytpocurrency from sequested bitcoins. A side chain is not mined rather it gets its value from the sequestered bitcoins. The sidechain is a public ledger but is not the bitcoin blockchain and can accept different sorts of transactions that does bitcoin. A tree chain is a method of mining bitcoins such that attacks are more difficult. Tree chains use the bitcoin blockchain and no other. Peter Todd is most interested in tree chains. Adam Back is most interested in side chains. Both ideas require changes to Bitcoin Core and those developers are conservative with regard to radical changes unless their paid staffing increases - I think.

Accelerating Bitcoin’s Transaction Processing, Fast Money Grows on Trees, Not Chains
65  Economy / Economics / Re: Stephen Reed's Million Dollar Logistic Model on: September 16, 2014, 11:36:03 PM
At what point south of -0.8 log delta does the model need to be adjusted?

I would wait until the next bubble peak to adjust the model, or 2015 whichever is first. The left end of the logistic function is constrained to fit through the first recorded price. The right end of the model, I try to fit so that the recent variation is balanced above and below the line. If I were to fit the line today, I would balance the current price against the peak last November, and the trend line would likely pass through the low price in April 2014.

Thanks to all of you for watching this model unfold.
66  Economy / Speculation / Re: rpietila Wall Observer - the Quality TA Thread ;) on: September 16, 2014, 02:36:36 PM
Here is the chart of adjusted number of bitcoin transactions. I chose a two-year duration, with seven day smoothing, and with a log scale. Note that the current value is now higher than all but a few days at the November 2013 peak. Should this trend in transaction volume continue, I expect that bitcoin prices will rise also.

67  Economy / Economics / Re: Stephen Reed's Million Dollar Logistic Model on: September 16, 2014, 02:34:07 PM
Here is the chart from Blockchain.info showing the Number of transactions excluding popular addresses. It is for a two-year duration, with a log scale, and includes the data points. Note that the latest value is higher than any preceding point except for a few days at the peak last November. Should this data series continue to climb, I expect that bitcoin prices will also move upwards, perhaps within a couple of months.

68  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: September 15, 2014, 04:25:53 PM
Here is the one-week resolution chart for Litecoin vs Yuan from the liquid OKCoin exchange. Note that the rightmost candle, which just started its week, is relatively close to the resistance line that I drew from the December 2013 peak. It would be notable if LTC punches up through this trendline as did Dogecoin recently.

69  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: September 14, 2014, 07:13:39 PM
Here is the one-week resolution chart for Dogecoin vs CNY as presented by Bitcoin Wisdom. Note the strong upwards breakout from the bubble collapse resistance trendline that I drew from the January peak. Merged mining with Litecoin appears to have convinced speculators that the risk of a 51% attack has greatly diminished.

70  Alternate cryptocurrencies / Altcoin Discussion / Re: rpietila Altcoin Observer on: September 14, 2014, 04:08:43 PM
If a coin is developed for outsiders, with the developer intent of receiving value out of it, instead of augmenting value to it, it will experience the initial pump and then die.

Thanks! This thread has numerous nuggets of wisdom for cryptocurrency developers.

My latest thinking is a coin with the same parameters as Bitcoin. Verified turn-taking replaces proof-of-work. Block rewards are shared among high-availability full node operators, who must join the Bitcoin foundation, ultimately as voting members, or local equivalent in order to support Bitcoin Core developers.
71  Alternate cryptocurrencies / Altcoin Discussion / Re: TexaiCoin Pre-Release Development Diary on: September 14, 2014, 04:00:47 PM
Don't you need special hardware to do remote attestation? The common known remote attestation schemes use a central service to certify the hardware.

I will not be performing remote attestation at the BIOS and kernel level until such time as the project is successful enough to employ a specialist.

TrouSerS FAQ

Rather, my approach is to perform remote attestation at the application level. Peers inspect each other's tamper-evident logs verifying expected good behavior and detecting faults.

How can you detect tampering with logs on remote peers? I mean a peer not controlled by yourself could send you anything as logfile.

I currently also fail to see how remote attestation on application level could work. As far as I know, remote attestation is only reliable, if there is more or less sealed hardware envolved, that acts as a root for a chain of trust up to the application. So the user performing the remote attestation has to trust in the inability of the attestee to change the sealed hardware and employ his own root. Do you have any ressources to point me to, where remote attestation on application level is explained?


Here is the link to the academic reference used in my white paper: Remote Attestation on Program Execution . Essentially, the idea is to embed digital signatures of the log's hash to that point by attesting remote peers into a given peer's own log. The researchers call this technique entanglement, but I understood it more readily as peer-notarized logs that prove whether or not a particular log has been tampered with.

What about sybil attacks? In satoshi's Bitcoin a single node either has the economic power to lift a 51% attack or it doesn't. It doesn't matter over how many nodes this is distributed. A counter measure to sybil attacks would be to have signed each node by a CA. The other nodes verify this signature and won't allow more than one node with the same identifier. But then again the system is centralized.

Note that Bitcoin Core allows TLS and X.509 certificates already for RPC calls and for the new Payment Protocol. Texai does not need certificates for nodes to ensure third-party verification of the association of a public key with either a web domain name nor an operator's real name. The certificate is used to contain and publish the public key and to permit TLS authorization and encryption of the network traffic. Each operator, indeed each communicating role in the network has a unique UUID that is its identity. The certificate guarantees that whoever uses it has the private key in their possession. I believe that each user could hypothetically create a self-signed certificate and the Texai system would still work OK.

But if each user can create his own certificate (more ore less for free), doesn't this open the door for Sybil attacks?

As a result of my rewarding conversation with CIYAM above, I recently decided to have each node operator be their own certificate authority. My scheme does not rely on a chain of trust from a central certificate authority, indeed I want to preserve that part of the Satoshi Social Contract which says there are no trusted third parties in Bitcoin. I need X.509 certificates to identify a peer solely by their published public key, and to encrypt traffic between nodes via TLS 1.2.  I do not need a chain of trust to tie a real name and address to the system nor to the certificate holder.

There is a security concept called Trust On First Use (TOFU), which allows peers to record received self-signed certificates and trust them from that point forward. That is a relatively weak method which I plan to eventually augment by providing an easy to use method of emailing peer self-signed certificates from the peer to an archiving Texai software agent before first use. To identify a peer in the Texai network, I would  use the certificate, which cannot be forged due to the public/private key math, together with the IP address of the peer and to use encrypted email for out-of-band communication with the peer. For example a peer operator should receive a periodic digitally signed email from the system detailing their fair share of the  mining reward paid to their supplied address. This manual oversight by the operator precludes man-in-the-middle attacks that would divert the reward to another address.

Sybil attacks may occur in Satoshi's Bitcoin . . .

Weaknesses

Quote
Sybil attack
An attacker can attempt to fill the network with clients controlled by him, you would then be very likely to connect only to attacker nodes. Although Bitcoin never uses a count of nodes for anything completely isolating a node from the honest network can be helpful in the execution of other attacks.

This state can be exploited in (at least) the following ways:

The attacker can refuse to relay blocks and transactions from everyone, disconnecting you from the network.
The attacker can relay only blocks that he creates, putting you on a separate network. You're then open to double-spending attacks.
If you rely on transactions with 0 confirmations, the attacker can just filter out certain transactions to execute a double-spending attack.
Low-latency encryption/anonymization of Bitcoin's transmissions (With Tor, JAP, etc.) can be defeated relatively easy with a timing attack if you're connected to several of the attacker's nodes and the attacker is watching your transmissions at your ISP.
Bitcoin makes these attacks more difficult by only making an outbound connection to one IP address per /16 (x.y.0.0). Incoming connections are unlimited and unregulated, but this is generally only a problem in the anonymity case, where you're probably already unable to accept incoming connections.

Looking for suspiciously low network hash-rates may help prevent the second one.

Full nodes in Satoshi's bitcoin identify themselves only by IP address. In the Texai network, that weak identity is strongly augmented by X.509 certificates. Software agents keep track of the uptime and verified good behavior of the network nodes.

Satoshi's proof-of-work method makes it hard for an attacker to obtain 51% of the hashing power to attack the network. I plan for the occasional voting among Texai peers to be weighted according to respective peer stakes and each such vote shall be paid for by the system in proportion to the stake. Thus an attacker would have to obtain 51% of the aggregate stake, which has been proven to be more expensive for the attacker than obtaining 51% of the hashing power in a proof-of-work coin. To my knowledge, no proof-of-stake coin has been compromised in a 51% attack, in comparison ...

List of Historical 51% Attacks on Altcoins


72  Alternate cryptocurrencies / Altcoin Discussion / Re: TexaiCoin Pre-Release Development Diary on: September 12, 2014, 09:22:27 PM
I am working on the minimal set of Texai software agents that will operate a bitcoind instance on my Ubuntu laptop for hallway demonstration at the Hashers United Conference to be held in Las Vegas in October.

Meanwhile, I learned about the Raft distributed consensus algorithm that provides an off-the-shelf solution to how to robustly select the mint agent from among the set of candidate peers. There is an implementation in Java at GitHub that I linked in the OP. And here is an animated illustration of the algorithm as prepared by Ben Johnson ...

http://thesecretlivesofdata.com/raft/

This algorithm is robust against failing nodes and partitioned networks, but not against byzantime, e.g. malicious peers. I will handle the latter using Nick Szabo's method of remote attestation of peer behavior by inspecting their respective tamper-evident log files.
73  Economy / Speculation / Re: rpietila Wall Observer - the Quality TA Thread ;) on: September 12, 2014, 04:03:07 PM
Sounds interesting. Could I have a link to the whitepaper?

Whitepaper: Bitcoin Cooperative Proof-of-Stake Stephen Reed

Note that the May 2013 whitepaper above describes a hard fork of bitcoin. That cannot possibly happen unless TexaiCoin is successful and subsequently convinces the Bitcoin community that a good alternative exists for the current industrial mining method. Furthermore, the current approach is not proof-of-stake. Now the block rewards are used to pay for network infrastructure, developers and community support, e. g. through institutions such as the Bitcoin Foundation.

I will briefly speak, describing my approach, at the Hashers United Conference in Las Vegas next month on the mining algorithms panel.




You should take to Larimer about DPOS and maybe you can gain insight on a non proof of stake approach working in the field.. or maybe he can learn some things from your approach.. he is keynote on day 3 i believe
I was not aware that Dan will be at this conference. Awesome. Good that the conference organizers are reaching out to altcoins and treating cryptocurrency infrastructure provisioning and operation as an industry segment, e.g. at current prices, bitcoin mining revenue is $1.7 million daily.

I shared ideas with Dan a few months ago and look forward to meeting him in person as well as Charlie Lee (Litecoin), Phil Mayer (Mastercoin), Poramin Insom (Vertcoin) and Vitalik Buterin (Ethereum).
74  Economy / Speculation / Re: rpietila Wall Observer - the Quality TA Thread ;) on: September 12, 2014, 01:58:35 AM
Sounds interesting. Could I have a link to the whitepaper?

Whitepaper: Bitcoin Cooperative Proof-of-Stake Stephen Reed

Note that the May 2013 whitepaper above describes a hard fork of bitcoin. That cannot possibly happen unless TexaiCoin is successful and subsequently convinces the Bitcoin community that a good alternative exists for the current industrial mining method. Furthermore, the current approach is not proof-of-stake. Now the block rewards are used to pay for network infrastructure, developers and community support, e. g. through institutions such as the Bitcoin Foundation.

I will briefly speak, describing my approach, at the Hashers United Conference in Las Vegas next month on the mining algorithms panel.


75  Economy / Speculation / Re: rpietila Wall Observer - the Quality TA Thread ;) on: September 12, 2014, 12:41:30 AM
The most basic reason why Bitcoin cannot and will not persist long term is that it requires large processing power as well as storage capacity but offers a tiny number of transactions per second at 7. The exponential nature of technology doesn't concern me when it comes to the processing power and storage requirements. What concerns me is how little it delivers for so much consumption. Meanwhile NXT which is an early 2.0  is over there featuring 100tps right now and eyeing 1000tps. SPV nodes don't really offset this either.
I wrote a whitepaper back in May describing a simple solution to this problem that also has the advantage of providing instant acceptance of transactions. One nomadic mint agent creates the new blocks on a non-branching blockchain. Peers verify the result and copy new blocks to their own copies of the canonical blockchain. A single writer to the immutable blockchain should be very fast. Full nodes share the block rewards without proof-of-work mining effort. Fewer than one hundred lines of code are modified in Bitcoin Core, provided that suitable software agents operate the distributed network.

All core devs I speak to are skeptical, but some encourage my project anyway to see if there is a better way than Satoshi's proof-of-work.
76  Economy / Speculation / Re: rpietila Wall Observer - the Quality TA Thread ;) on: September 12, 2014, 12:27:31 AM
I also believe that the biggest problem will be Apple loading off the fees on the credit cards company. They can't do this with Bitcoin. CC-companies will be gladly paying their share if they can be part of that potential revolution. Who will pay that for Bitcoin? Maybe Satoshi? The Foundation? Cheesy
NFC bitcoin payment applications from mobile devices will likely be paid for, directly or indirectly, by the merchant. Even considering the cost of currency exchange, BitPay, for example, is less expensive for merchants than say Visa. Once a tipping point is reached after which merchants prefer to retain bitcoin revenue to pay some of their own expenses with bitcoin, then exchange to fiat is not required.
77  Alternate cryptocurrencies / Altcoin Discussion / Re: [ANNOUNCE] Bitcoin Cooperative Proof-of-Stake - CPoS on: September 11, 2014, 08:23:49 PM
Don't you need special hardware to do remote attestation? The common known remote attestation schemes use a central service to certify the hardware.

I will not be performing remote attestation at the BIOS and kernel level until such time as the project is successful enough to employ a specialist.

TrouSerS FAQ

Rather, my approach is to perform remote attestation at the application level. Peers inspect each other's tamper-evident logs verifying expected good behavior and detecting faults.

What about sybil attacks? In satoshi's Bitcoin a single node either has the economic power to lift a 51% attack or it doesn't. It doesn't matter over how many nodes this is distributed. A counter measure to sybil attacks would be to have signed each node by a CA. The other nodes verify this signature and won't allow more than one node with the same identifier. But then again the system is centralized.

The Texai system works as you describe it as each node has an X.509 certificate. The system has a self-signed root certificate and is its own certificate authority. De-centralized Intermediate certificates are used to create the end-entity certificates for the nodes/roles. These intermediate certificates are widely distributed in the system. Each node has a copy of the root certificate, but not its private key.


Note that Bitcoin Core allows TLS and X.509 certificates already for RPC calls and for the new Payment Protocol. Texai does not need certificates for nodes to ensure third-party verification of the association of a public key with either a web domain name nor an operator's real name. The certificate is used to contain and publish the public key and to permit TLS authorization and encryption of the network traffic. Each operator, indeed each communicating role in the network has a unique UUID that is its identity. The certificate guarantees that whoever uses it has the private key in their possession. I believe that each user could hypothetically create a self-signed certificate and the Texai system would still work OK.

When generating x509 version 3 certificates I use RSA with a key length of 3072 bits and SHA256 with RSA as the signature algorithm. This works on Java 1.8 with the high encryption strength policy enabled, and also works to encrypt websocket traffic to Android and IOS clients. As certificate validation is entirely in my control, e.g at both endpoints of a TLS version 1.2 connection and with all the entries of the certificate available, I believe that the Texai network is resistant to Sybil attacks.
78  Other / Meta / Re: How to deactive my Bitcointalk account? on: September 06, 2014, 04:13:15 AM
5000 posts is a lot of man hours. I have written only about 1200 and been logged in 26 days, 23 hours and 27 minutes since 2010. Wow.

In your position I would follow the advice given to effectively deactivate your own account by faking the email and randomly changing the password.

Regards and best wishes on your projects!

-Steve
79  Economy / Speculation / Re: rpietila Calling the Bottom on: September 06, 2014, 03:47:13 AM
The rise in popularity of SPV clients with hierarchical deterministic wallets using change addresses has nothing to do with it?

Correct me if I am wrong, but unique change addresses have been used for a while with the bitcoin-qt wallet to help preserve anonymity. The rise in popularity of a particular wallet indicates some sort of economic progress, minimally an improvement in ease of use.

Metcalfe's Law, as interpreted in the context of the Bitcoin network, says that the network is more valuable to each user as more nodes are added. Accordingly, the network now with more SPV client users is more valuable to bitcoin purchasers than was the same network back in April at $339 on Bitstamp.

Do you rent your lodging now? Just curious.
80  Economy / Speculation / Re: rpietila Calling the Bottom on: September 06, 2014, 03:20:22 AM
I see a bottom at 430, does this look accurate?

Here is the Blockchain.info chart for the number of daily unique addresses appearing in transactions, smoothed with a 7-day moving average. It also suggests, given that recent numbers are similar to those in March, that the bottom is behind us. I do not watch this data series as much, as perhaps gambling transactions are not filtered out.


A higher number of new addresses being used isn't a measurement of new money coming in...

The number of unique daily addresses used does measure a degree of economic activity, making it a fundamental measurement rather than a technical trading measurement. The amount of new money coming in is unfortunately proprietary information kept by exchanges.

The importance of the two fundamental indicators of adjusted transaction quantity and daily unique addresses, as calculated by Blockchain.info, is that there is a good fit between the square of these fundamental indicators and the bitcoin price. We may be witnessing Metcalfe's Law of network effects unfolding before us. Thanks to Peter R whose charts appear here.

And by the way, you might explain whether you are serious about your byline "Sell your house to short BTC". Short position margin calls at Bitfinex could be ruinous if you are all-in.
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 65 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!