Bitcoin Forum
June 17, 2024, 07:44:31 PM *
News: Voting for pizza day contest
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 [36] 37 38 39 40 41 »
701  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 10, 2014, 04:51:32 PM
Is it really possible to do this with brute force? I mean a ruby or python script won't do you any good, that's sure... they're interpreted languages. I guess it totally depends on the size of your key then.... A GPU could do this. But of course it is still futile for a real bitcoin private key! They're safe!

You're right, Bitcoin keys cannot be feasibly brute-forced.

But this thread is talking about brute-forcing the password on wallets. If the password is weak enough, or if you know enough about the password, it's certainly feasible (and a GPU can help, depending on the wallet).

As far as using a scripting language goes: yes they are slower, but many scripting languages implement the time-consuming portions (e.g. SHA) in native code, so using a scripting language isn't as big of a performance hit as you may think (btcrecover is written in Python, for example, but most of the crypto uses native code libraries (not written by me) or OpenCL for GPU acceleration).

Moral of the story is: use strong passwords. Smiley
702  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 10, 2014, 04:38:18 PM
Quick Questions in the cmd i understand everythings ETA 11 means 11 hours to go

But[###-----------------------] is written there at the momemt, should this my pw at the end, i am confused it was never so long

It should look something like this:

Code:
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
116668178 of 642544812 [#####--------------------------] 0:06:26, ETA:  0:29:01

In this example, it's been running for 6 minutes so far, and it has 29 minutes before it's tried every combination.

If it finds the password, it will look like this:

Code:
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
116668178 of 642544812 [#####--------------------------] 0:06:26, ETA:  0:29:01
Password found: 'Passwd'
Press Enter to exit ...

Or if it tries every combination and the password is something else (e.g. maybe it's longer, or has numbers), it will look like this:

Code:
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
642544812 of 642544812 [#######################] 0:35:27, Time: 0:35:27
Password search exhausted
Press Enter to exit ...

Does that answer your question?
703  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 10, 2014, 02:06:21 PM
@btcchris
Big Thanks and Respect....12 hours to go....and i will not forget you, when i got lil bit more coins in my pocket, you get a lil thank you, a share

I just hope it find the pw

I hope so too. If not, but you remember something new about your password, we can always try again.
704  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 10, 2014, 01:38:13 PM
So if you know 4 words out of 8 characters is that possible to crack or not?

I'm not understanding you... can you describe in more detail? A bunch of examples would help.

It also depends on which wallet you're using.
705  Other / Beginners & Help / Re: Ten Minute Delay vs POS on: August 10, 2014, 01:24:35 PM
This does not solve the problem. Services like BitUndo can reverse Tx within 10 minutes even if Tx fee is paid.

Services like BitUndo can attempt to reverse a tx before the next confirmed block, but they remain very unlikely to succeed (even as per their own FAQ). BitUndo depends on miners running a customized version of bitcoind, and thus far the interest in doing so has been pretty low.
706  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 10, 2014, 12:58:36 PM
No I surrender. Python wants not open. But i found out i can idle this.This is Monster about all wallets, but nothing where it wrotes there is your password.

For a butterflly i could toke a picture, maybe you understands why pyton do like me



I should have caught this sooner, but now I see the problem.

You have Python 3 installed. btcrecover only works with Python 2. (They are similar, but different programming languages.)

You can have them both installed at the same time, but it's probably safest to:

  1. Uninstall PyCrypto
  2. Uninstall Python 3
  3. Install Python 2.7.8 Windows X86-64 Installer from here.
  4. (optional) Install PyCrypto 2.6 for Python 2.7 64bit from here.
707  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 09, 2014, 11:17:56 PM
Thank you for the picture, it is very helpful.

I understand what the problem is, but I can't fix it tonight, sorry about that.

I'll post an update tomorrow sometime...
708  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 09, 2014, 08:46:14 PM
The different languages thing is hurting us... but I'll try.

From the Quick Start, follow Step 1 to install everything.

Next, open Notepad, and then copy and paste this into Notepad:

Code:
#--pause --no-dupchecks --wallet multibit.key
%ia%0,5a

Next, save the Notepad file into the btcrecover-master folder you unzipped from Step 1. The file name must be btcrecover-tokens-auto.txt

Next, follow Step 5 from the Tutorial Quick Start. After you find your Multibit .key file, copy it into the same btcrecover-master folder, and then rename the .key file to multibit.key

Finally, double-click btcrecover.py, and it should start.

If you installed PyCrypto in Step 1 (optional), it will take an hour or two to finish. If you didn't install PyCrypto, it will take around 6 - 24 hours to finish.

This will test every password from 1 to 6 letters long. The first letter is upper or lower case, the rest are all lower case. No numbers or symbols.

Good luck!
709  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 09, 2014, 07:49:38 PM
I'll try but it is to complicated. I thought a bruteforce was build like bloodpatch or serial.exe, you click the button then you got it.

Bitcoin wallets all (that I know of) use strong encryption. The point is to protect you from hackers. This also means that if you lose your password, you could be in trouble.

If you describe everything you remember about your password, I can try to help. You don't have to use specifics -- for example you could say "I know my password contained 3 - 5 of these words below, and then a 1 - 2 digit number" and give example words, but not the actual ones you had in mind.

If you want to use Bitcoin in the future, look into a "deterministic" wallet, such as Electrum or Armory. They have easy backup-to-paper and recovery mechanisms that can help.
710  Other / Beginners & Help / Re: GPU brute forcing an encrypted wallet on: August 09, 2014, 03:09:59 PM
Sorry guys to bother you. And sorry for my bad english. I get straight to it. One year ago, in was interessed in BTC and i bought 1,0 for reasonable price. My Programm was Multibit because in the other boards, they told me it is most user-friendly and i can subcribe. So i thought 1,0 Bitcoin would raise and raise, but did not. So i want to sell it.
Problem i can remember the password and iam very desperated.Okey, its not the end of the world.
I google a lot and the majority said your pw is gone.
Some mentions Brute Force, Scripts atc. But i do not know how to use it. What i need is an exe.progamm where i put the pw-wallet, i wait a couple of hours. And i got my PW back.
Only thing remember, it was not jibberish, it was short 6 words and german.
Could you help me or is the case closse?
Best Regards

btcrecover might help, but only if you remember a decent amount of your password. It does support Multibit, although it doesn't support non-ASCII letters, so if your password had any umlauts it won't help. There's a tutorial with a quick start here (in English, sorry).

This thread has a lot of good information related to password recovery, but some of it is specific to Bitcoin Core (Bitcoin-Qt) wallets.

If you have any specific questions about btcrecover, let me know and I'll try to help (I'm the dev).
711  Bitcoin / Development & Technical Discussion / Re: Wallet designs - dangerous path emerging on: August 08, 2014, 08:35:55 PM
I'm going to generalize here, but it's not that far from reality.

Let's divide all Bitcoin users into two categories:

Computer knowledgeable: individuals who are either computer enthusiasts, professionals, or who are neither but have made a real effort to educate themselves on basic computer security.
Not computer knowledgeable: not trying to be condescending, but everyone else...

Likewise, let's divide malware into two categories.

Simple Trojans: written by beginner programmers typically in a scripting or bytecode-compiled language, such as AutoIt, Java, .Net, etc., and does simple things such as scan for wallet.dat files in well-known locations and uploads them to FTP servers; is thwarted by wallet encryption with anything but simple passwords.
Advanced malware: written by professional black-hats and sold on the black market to individual who customize and deploy the malware; is capable of exploiting one or more OS or application vulnerabilities, attempts to hide from anti-malware products and security sandboxes, and will patiently search for a variety of information to steal (or encrypt for later extortion) from a variety of locations (including typed passwords, screenshots of on-screen keyboards, and who knows what else).

User Type Likely to be infected by advanced malware? Likely to encrypt their wallets? Likely to follow your advice? Likely to be infected by simple malware?
Computer knowledgeable Yes Yes Maybe, but they know it wouldn't do them much good. No
Not computer knowledgeable Yes Maybe No, even though it would help them. Yes

In other words, I would argue that the type of user that this sort of security-through-obscurity would help (those who get infected by simple Trojans) is the same type who wouldn't know enough to implement this advice (or for that matter, to even encrypt their wallets in some cases which would help against simple Trojans).
712  Economy / Service Announcements / Re: GreenAddress: open source multisig wallet service on: August 08, 2014, 03:35:20 AM
The one thing that's keeping Google Authenticator a bit unsafe is that the same code can be reused (if it's within the same 30s window).
<snip>
I don't think it should be optional, I agree that it can be safer it GA codes can't be reused not even within the window so we'll definitely make this change.

Glad to hear it, this was the only major concern I had.  Smiley

Second, how about an OTP option for 2fa?
<snip>
In a few words, do you want multiple GA? I don't think it makes sense to create them without asking you to confirm them. Too risky.
Or is this one GA plus some one time code to recover 2fa?

Just so that you know, we are also working on a paper 2fa, which shall contain a number of columns and rows and each with a number and a random series of these gets requested as 2fa.

I really should have made it clear what I was looking for, instead of suggesting some sort of solution first. I was mostly talking about a simple recovery mechanism for a lost 2fa that didn't involve email or one's phone. You're already considering a paper-based 2fa, which sounds like an even better way to address this, so that's great!

Next, have there been any thoughts on 2fa hardware tokens, e.g. YubiKey NEO (which would work nicely with the mobile app w/o the silliness of having the second factor be on the same phone as the app)?

Lastly, how about an option to require 2fa during the initial login? The intent would be to prevent a loss of privacy in the event the mnemonic were compromised (e.g. via malware).

I look forward to your thoughts, thanks!

Yubikey neo seems reasonable, I don' t have experiences with them but we'd have to check if they have some open API we can use and which apps to support unless it should be used with android only.

I'm not sure what an "open" API is (please excuse my ignorance), but they do publish their API online. One method they support is OATH-HOTP based (very similar to Google Authenticator, except instead of the time they use a counter which is incremented after each new code). The only reason I thought of them is because I use them with LastPass (on my desktop). I was thinking they could be both a desktop and a mobile solution, but I don't really know anything about their mobile integration (it's NFC based).

In terms of 2fa for login i would say that an option could be added for it although once they have the mnemonic the attacker can derive almost all addresess and find out information anyway.

To work around this hw wallets are best. We already support one and plan to support all major manufacturers.

I should have realized that, thanks for correcting me. Adding such an option would only lead to a false sense of security, please pretend I had never mentioned it in the first place.  Smiley

For what it's worth, I've been really impressed with your overall approach. I really hope GreenAddress gets the attention it deserves!
713  Bitcoin / Development & Technical Discussion / Re: Feature Request for Bitcoin Core: Replace by Fee on: August 07, 2014, 11:09:42 PM
I did forget about jdillon's solution. Assuming it takes 13 seconds for a transaction to propagate through the network, and a block is found once every ten minutes (600 seconds), there's less than a 13/600 chance (oversimplified, but you get the idea) of a double spend getting into a block before the victim sees it, then another less than 13/600 chance of the transaction being included in a block before the scorched earth transaction is seen (if the scammer has a miner friend then all bets are off anyway remember). The merchant doesn't need to do any of this manually; their software will do it for them.

OK, I'll buy that. So there's a non-zero chance that the scammer will get away with it scot-free (get their btc back), but in every scamming attempt, the scam attempt will result in a 587/600 chance that the receiver doesn't receive any btc (unless they want to try a cat-and-mouse game of some sort with the scammer up until the next block is found).

A rational scammer will only try this scam if their expectancy is > 1, in other words if the refundable fee is < than some smallish %. But a scammer who places value on the thought that the receiver will not get paid can execute the attack at will (albeit in return for the surcharge), with the added bonus that they also might get their btc back.

This means that the vendor needs a higher refundable fee to discourage such practice, and they also need to add a non-refundable surcharge to cover their losses. As long as this surcharge is less than 3-ish percent, it will be comparable to credit cards (which removes an advantage of Bitcoin from a vendor's point of view).

Now that Bitcoin is gaining some public traction, explaining all this from a PR point of view would be just about disastrous, if you ask me. To consumers: you have to pay an extra 10%, but it's refundable. To vendors: any consumer who wants to can rip you off, even though they aren't likely to benefit financially, so it probably won't happen much.

But more importantly, what is it that we'd be left with? A more complicated system (both technically and PR-wise) that that accomplishes the same thing as what we had before: instant payments still aren't guaranteed, and so they cost the receiver. So where's the advantage?

If anything, I'd prefer a Pay by Fee that didn't include scorched earth. At least there I see some small advantage: nobody should trust zero-conf transactions (although I still don't like it).
714  Economy / Service Announcements / Re: GreenAddress: open source multisig wallet service on: August 07, 2014, 06:53:59 PM
Hi tryexcept, I have a couple of suggestions re 2fa I'm hoping you can consider.

The one thing that's keeping Google Authenticator a bit unsafe is that the same code can be reused (if it's within the same 30s window). This is something that could be abused by malware, and one of per-tx-2fa's biggest draws for me is safety from malware. I'm wondering if an option could be added to prevent the reuse of GA codes? I understand that some users would prefer not to have a once-per-30s rate limit, hence making it optional might be better than forcing it on everyone (although for myself the rate limit wouldn't bother me).

Second, how about an OTP option for 2fa? For example, I enable OTP as a 2fa method, and then ask GreenAddress to generate two or three OTPs which I store on Post-Its. I enable Google Authenticator, but I don't enable any of the other 2fa options because I consider them less secure. Now I've got a few OTPs that I can use to disable 2fa (or for any other 2fa-required action) if at some point in the future I lose my Google Authenticator, and at the same time I don't have to enable any other 2fa method.

Next, have there been any thoughts on 2fa hardware tokens, e.g. YubiKey NEO (which would work nicely with the mobile app w/o the silliness of having the second factor be on the same phone as the app)?

Lastly, how about an option to require 2fa during the initial login? The intent would be to prevent a loss of privacy in the event the mnemonic were compromised (e.g. via malware).

I look forward to your thoughts, thanks!
715  Other / Beginners & Help / Re: Best wallet on: August 07, 2014, 05:24:14 PM
Which wallet is the best and why?

The best place to start looking is the official choose-your-wallet page here: https://bitcoin.org/en/choose-your-wallet

There's also a beginner-friendly chart that I've put up here which might be helpful: http://gurnec.github.io/btc-wallet-comparison. If you have any questions on why I rated something the way I did on that chart, just ask.

I'm using bitcoin core, but pisses me off because it is using 24gb on my SSD  Angry
can we move bitcoin transaction data to hdd drive?
i want to try bitcoin core, but 24 GB in my ssd are really waste of space
i can install 3-4 good games with that amount of spaces

Yes. Before starting Bitcoin Core for the first time, create a new folder on an alternate drive, and then modify the shortcut in the start menu (right-click, properties) so that the Target includes the newly created folder, like this:
Code:
"C:\Program Files\Bitcoin\bitcoin-qt.exe" -datadir=D:\Bitcoin

Also, by placing a "bootstrap" file into this folder before staring Bitcoin for the first time, you can significantly speed up the initial download process (from days to hours). This bootstrap file can be downloaded via BitTorrent with this torrent: https://s3.amazonaws.com/bitcoinarmory-media/bootstrap.dat.torrent.
716  Bitcoin / Development & Technical Discussion / Re: Feature Request for Bitcoin Core: Replace by Fee on: August 07, 2014, 03:23:59 PM
(I can't believe I'm letting myself get dragged into this, I should know better...  Roll Eyes )

Linux - never made it to mainstream users. The general public uses OS X.
You should know how many times you use linux or take advantage of Linux each and every day without you even knowing it.

Let's see, how about:
  • this server we're all posting to
  • Google
  • the phone in my pocket (IDC says Android has a 78% market share as of 4Q13)
  • the TomTom in my car
  • the wireless router under my desk (and possibly your wireless router too)
  • 485 out of the top 500 supercomputers (as of June 2014)
  • the International Space Station (where it replaced Windows in 2013)

It really is all over the place these days, despite it's low desktop OS adoption rate.

Firefox - surpassed in usability and security by Safari and Chrome. Apple's new web services don't even support Firefox anymore.
You mean chrome, the browser built on top of the open-source chromium project?

Or maybe Safari, the browser built on top of the open-source (though Apple-backed) WebKit project?
717  Bitcoin / Development & Technical Discussion / Re: Feature Request for Bitcoin Core: Replace by Fee on: August 06, 2014, 11:34:20 PM
TL;DR: the main point is that Pay by Fee isn't a simple issue, and it’s as much a technical issue as it is one of human nature.

Replace-by-fee, combined with child-pays-for-parent, seems to make 0/unconfirmed transactions much more secure for small transactions. Just read the thread where Peter Todd describes the proposal; he has a very well thought-out argument for why, which I'll summarize:

To be fair, I think (but am not sure) it was luke-jr who initially decribed this, and jdillon who expanded on it.

Also, I don't think you have the description quite right.

Current system:
- If a scamer manages to send out a double-spend transaction at the same time as you send the actual transaction, 50% chance yours is confirmed 50% theirs

I think you mean, "If a scammer tries to double-spend their own Bitcoin by sending out two transactions, one legit and one back to themselves, there is some chance they will succeed and the receiver/vendor will be none-the-wiser until it's too late."

I don't understand where the percentages you go on to quote come from, though. There is some chance that the receiver/vendor will see the legit transaction in their memory pool, and some chance they will see the scamming transaction (and react accordingly), but it's not 50/50. Likewise with the chances that one transaction will end up succeeding over the other.

Replace-By-Fee system:
- If a scamer sends out a double-spend transaction at the same time as you send the actual transaction, you send another transaction paying the output of your transaction to a transaction fee. Scamer receives nothing, but neither do you.

I think you mean, "If a scammer sends out two transactions, one legit and one back to themselves, the receiver/vendor will eventually (assuming a significant majority of the network/miners is using Replace by Fee) see the scam transaction, which is good for the receiver/vendor, so the receiver/vendor can send another transaction paying 100% of the output of the transaction to a transaction fee (to a miner). Scammer receives nothing, but neither does the vendor.

No arguments from me here.

As you can see, there's no longer any motivation to scam. The only reason there would be motivation to scam is if the scamer has a vendetta against you

You're assuming that all receivers/vendors will be smart enough to check for this situation and react to it quickly (which might be the case one day, but the reality is that there will be a transition period while this is not the case). You're also assuming that the scammer is choosing to act rationally.

Even if the scammer only has a low likelihood of success, I don't see why a scammer wouldn't try anyways. Some percentage of the time the scammer would fail and would end up paying for their merchandise (although they'd be paying a miner instead of the vendor). Some other percentage of the time, the scammer would succeed and get their btc back. It seems to me that the scammer, at least during the transition period, has nothing to lose by trying, and is guaranteed to at least deprive the receiver/vendor of their payment.

To be fair, jdillon also had a clever solution to this problem (linked above), but it involves requiring all senders/consumers to overpay for their merchandise/service, and then trust the receiver/vendor to refund them the difference after the tx has been confirmed, which seems unfriendly at best.

The bottom line is that Pay by Fee seems likely to completely eliminate zero-conf transactions, or at least during the transition period. Some would argue that this would be a good thing, but I'd rather let receivers/vendors have the choice to make their own risk/benefit analysis.
718  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 10:38:05 PM
I uploaded the file in question (https://mega.co.nz/#!6cAxzBjT!KVntyW_y8j4QVwobEHROrRhpuKnX_2uxd-KML_S4ips) to virustotal.com

That's not the file in question. As far as I can tell, that file seems clean (but again, unless it's compiled via Gitian, it's very hard to tell).

The file in question was allegedly originally available here, but as I said has since been remove: https://mega.co.nz/#!JAoyiajC!0ND16g-6qVDRGVuxnNBZmd-NInXzpbdaW9Pe9dDlDUo

The suspicious file, which as far as I can tell was first referenced by user oreoeater in this post: https://bitcointalk.org/index.php?topic=721306.msg8198136#msg8198136  is still available here: https://mega.co.nz/#!L1IBwTzB!sHUsuf3fLQ-PJrtScL7IZaT99DPNesSSrUfJ_ehFjkg. It's definitely malware, see here: https://bitcointalk.org/index.php?topic=721306.msg8201918#msg8201918. I think oreoeater may have uploaded at the request of others looking to investigate it, but I haven't read the whole thread so I'm not sure.

The link cited doesn't exist. (Was it removed as it was a virus?) The CryptoCoinTalk.com forum post is by Admin. It's a popular Bitcoin Forum, so they have a reputation to keep. I think they posted it on the ZIPCoin dev's behalf. Did someone have a vendetta against ZIPCoin or did someone hack the forum or Admin account?

Or did the admin simply copy and paste the link from somewhere else? Those are the questions, and I hope the admin will respond (over here).

The admin over at cryptocointalk has responded here: https://cryptocointalk.com/topic/13908-zipcoin-zipc-information/?p=116770.

Given the choice between believing an admin over at cryptocointalk versus a newbie here... well, I'll let everyone come to their own conclusions...

The only thing I can imagine is that OP posted the legit link, waited for bitointa.lk to cache it, swapped it for the malware link for a period of time, and then swapped in the legit link again (or there's some sort of conspiracy against OP). Without a mod to check all this, we'll never know for certain how it happened, but in the mean time, I'd avoid this coin like the plague.
719  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 10:04:41 PM
Yeah Dude oreoeater is a noob

I doubt that  Wink

The suspicious file, which as far as I can tell was first referenced by user oreoeater in this post: https://bitcointalk.org/index.php?topic=721306.msg8198136#msg8198136  is still available here: https://mega.co.nz/#!L1IBwTzB!sHUsuf3fLQ-PJrtScL7IZaT99DPNesSSrUfJ_ehFjkg. It's definitely malware, see here: https://bitcointalk.org/index.php?topic=721306.msg8201918#msg8201918. I think oreoeater may have uploaded at the request of others looking to investigate it, but I haven't read the whole thread so I'm not sure.
so I uploaded the file that I hadn't emptied from the recycle bin so people could run it on a virtual machine and see how the trojan worked...if anything I hope some coder can figure it out so we can prepare ourselves for future etc...

Thanks for clarifying.
720  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Zipcoin [ZIPC]- X13 PoW/PoS - NO Premine - 7 days PoW - Ninja on: August 05, 2014, 09:55:52 PM
I uploaded the file in question (https://mega.co.nz/#!6cAxzBjT!KVntyW_y8j4QVwobEHROrRhpuKnX_2uxd-KML_S4ips) to virustotal.com

That's not the file in question. As far as I can tell, that file seems clean (but again, unless it's compiled via Gitian, it's very hard to tell).

The file in question was allegedly originally available here, but as I said has since been remove: https://mega.co.nz/#!JAoyiajC!0ND16g-6qVDRGVuxnNBZmd-NInXzpbdaW9Pe9dDlDUo

The suspicious file, which as far as I can tell was first referenced by user oreoeater in this post: https://bitcointalk.org/index.php?topic=721306.msg8198136#msg8198136  is still available here: https://mega.co.nz/#!L1IBwTzB!sHUsuf3fLQ-PJrtScL7IZaT99DPNesSSrUfJ_ehFjkg. It's definitely malware, see here: https://bitcointalk.org/index.php?topic=721306.msg8201918#msg8201918. I think oreoeater may have uploaded at the request of others looking to investigate it, but I haven't read the whole thread so I'm not sure.

The link cited doesn't exist. (Was it removed as it was a virus?) The CryptoCoinTalk.com forum post is by Admin. It's a popular Bitcoin Forum, so they have a reputation to keep. I think they posted it on the ZIPCoin dev's behalf. Did someone have a vendetta against ZIPCoin or did someone hack the forum or Admin account?

Or did the admin simply copy and paste the link from somewhere else? Those are the questions, and I hope the admin will respond (over here).
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 [36] 37 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!