Do you think that the bot could be profitable on long term?
There is no profitable system for a long term, the betting sites have a house edge, they are made to win in the long term. But with the right luck, you can get some nice profit with the bot.
|
|
|
How much i will pay you for this bet setting in imacro? dogecoin base bet: 0.01 %bet: 9 add %after loss: 11 after win: return to base bet no of bets: infinite/loop Some days ago i create a bot for bet on 999dice: https://bitcointalk.org/index.php?topic=658328.0But the bot was on Bash Script for linux, and most of the people dont understand it. Then i decide to make the 999dice bot 2.0, and these time on java script. Its hard to make a always win bot... I lose a nice btc amount with the bots test. But at last i find a nice configurations, like my martingale 5% to win... it can make 100 bets with 0.002968 btc: [windows@localhost ~]$ x=0.00000001; y=$x; for a in $(seq 1 100); do x=$(echo "$x+($x*0.08)" | bc -l); echo "0$x" | cut -c1-10; y=$(echo "$y+$x" | bc -l); done; echo "Total gastado"; echo $y #0.003 0.00000001 0.00000001 0.00000001 0.00000001 0.00000001 0.00000001 0.00000001 0.00000001 0.00000001 0.00000002 0.00000002 0.00000002 0.00000002 0.00000002 0.00000003 0.00000003 0.00000003 0.00000003 0.00000004 0.00000004 0.00000005 0.00000005 0.00000005 0.00000006 0.00000006 0.00000007 0.00000007 0.00000008 0.00000009 0.00000010 0.00000010 0.00000011 0.00000012 0.00000013 0.00000014 0.00000015 0.00000017 0.00000018 0.00000020 0.00000021 0.00000023 0.00000025 0.00000027 0.00000029 0.00000031 0.00000034 0.00000037 0.00000040 0.00000043 0.00000046 0.00000050 0.00000054 0.00000059 0.00000063 0.00000068 0.00000074 0.00000080 0.00000086 0.00000093 0.00000101 0.00000109 0.00000118 0.00000127 0.00000137 0.00000148 0.00000160 0.00000173 0.00000187 0.00000202 0.00000218 0.00000236 0.00000254 0.00000275 0.00000297 0.00000321 0.00000346 0.00000374 0.00000404 0.00000436 0.00000471 0.00000509 0.00000550 0.00000594 0.00000642 0.00000693 0.00000748 0.00000808 0.00000873 0.00000943 0.00001018 0.00001100 0.00001188 0.00001283 0.00001386 0.00001497 0.00001616 0.00001746 0.00001885 0.00002036 0.00002199 Total gastado .00029684276960502502 [windows@localhost ~]$
If you have luck and dont lose 100 consecutive times, it is the perfect bot for you: var y = 0.00000001; while(true) {
var macro1; macro1 = "CODE:"; macro1 += "SET !EXTRACT_TEST_POPUP NO" + "\n"; macro1 += "TAG POS=14 TYPE=SPAN ATTR=CLASS:BetControlTitle" + "\n"; macro1 += "WAIT SECONDS=3" + "\n"; macro1 += "SET !EXTRACT NULL" + "\n"; macro1 += "TAG POS=1 TYPE=SPAN ATTR=ID:LastBetInfoProfit EXTRACT=TXT" + "\n"; iimPlay(macro1);
var s = iimGetLastExtract(); var extract = s.charAt(0); var j = 0.08; y = y + (y * j) var k = (y).toFixed(8) var macro2; macro2 = "CODE:"; macro2 += "TAG POS=1 TYPE=INPUT:TEXT ATTR=TYPE:text&&CLASS:StandardTextBox&&MAXLENGTH:15&&ID:BetSizeInput CONTENT="+ k + "\n"; macro2 += "WAIT SECONDS=2" + "\n"; var macro3; macro3 = "CODE:"; macro3 += "TAG POS=1 TYPE=INPUT:TEXT ATTR=TYPE:text&&CLASS:StandardTextBox&&MAXLENGTH:15&&ID:BetSizeInput CONTENT=0.00000010" + "\n"; macro3 += "WAIT SECONDS=10" + "\n"; if(extract == "-") { iimPlay(macro2); } if(extract == "0") { var y = 0.00000001; iimPlay(macro3); } }
WARNING:Befor start the bot configure the manual bets 0.0000001 and 5% And if you have luck: Variables to change: var j = 0.08; (Increment after lose) var y = 0.00000001; (start bet)
But wath the code do? 1.-Make a bet 2.-Read bet result 3.-If lose, bet more, if win start again from 0.0000001 How can you run it? These JavaScript Code is for Imacros for Firefox Install Imacros: https://addons.mozilla.org/es/firefox/addon/imacros-for-firefox/The next screen shot show us the Addon: For run the bot, join to 999dice, configure the manual bets 0.0000001 and 5%, copy the source code on a new iMacros file, and save it like 999dice.js. Run the JS from iMacros. Im working now on diferen BTC and % configuration. All ideas are wellcome and if you like the code, consider makeing a donation: 1GEomkEsQcPoaPDUGQU2L78b2YEFRikUxw VIDEO: https://www.youtube.com/watch?v=5KCo3_I59Uo Hi eneyardi, i can do that bot for 0.075, if you want it send me a PM.
|
|
|
Thanks for the payment. Renewing. Twitter account: https://twitter.com/btcb0ssBitcoin Address: 1BtcBoSSnqe8mFJCUEyCNmo3EcF8Yzhpnc Recent Bet: Pending Weekly Bonus: No Avatar Bonus: No
|
|
|
No payment. You have failed to either retweeting 7 LuckyBit tweets or making 5 tweets about LuckyBit. You can still renew and keep your spot in the campaign. Don't forget to sign up for the LuckyBit Silver Wallet Promo and win one of our limited edition LuckyBit silver wallets!Please review again my twitter account. I made 12 RT to luckybit tweets. from 28 Dec. to 4 Jan. By the way i would like to re-enroll Twitter account: www.twitter.com/btcb0ssBitcoin Address: 1BtcBoSSnqe8mFJCUEyCNmo3EcF8Yzhpnc Recent Bet: http://luckyb.it/check?txin=f4802cd7ebe74c140a863689b43f642ef5a0eb5e0758d1876c7a0a534f26bbe9:0Weekly Bonus: no -----------------------UPDATE---------------------------- It was my fault, i made the RT but don't post the 5 tweets about luckybit now i know about the new rules and will not fail again.
|
|
|
i wrote this hack some time ago, it works in dice and in roulette. its simple, take a coin and choose head or tails and stick with what you pick. Now flip it calling tails and see how many time you lose. The fact is to lose 10 times in a row the odds get higher of losing. so if you just double up until you win then you never lose. example bet like this 10-20-40-80-160-320-640-1280 . now that is 8 times losing you will bet .the chances of you losing 20 times in a row flipping 50/50 is not 50% even though math says you still have 50%. It is possible but not probable. good luck I added a video of me doing it for ten min without losing in the link below http://bitcoinfaucetrelay.com/bitcoin-faucet-hackalso if you know any other hacks please explain for us. This hack isn't new, his name is MITM (man in the Martingale)
|
|
|
I'm in! 1BtcBoSSnqe8mFJCUEyCNmo3EcF8Yzhpnc
|
|
|
Man in the middle attack isn't a problem for luckybit because:
1.- MITM is a LAN attack. That mean the only users who will be affected are those who are on the local area network of the attacker. Users access point is users responsability, if you are on a not secure network better don't use bitcoin, because if you are under MITM attack, the hacker will not change the betting addys, he will get your blockchain.info wallet access information.
It depends on the wallet. blockchain.info uses an HTTPS conection, so it's unlikely to be affected. Even if you're affected, the HTTPS conection will be gone and the lock in address box of the browser won't appear. Please read the point 3.About the LAN attack, well, you can take care about your network, but when this goes to your ISP, international routes and so, you lose the control of what goes on. If you lose control of what goes on your network, there is not much luckybit can do for you.2.- MITM can be detected by users with tools like wireshark. But is responsability of the user to verify if the network is secure. Do you really expect average people to use wireshark in order to detect if there's a MITM happening? If people is paranoid about the attack, then they should find a way to avoid it.It's much more simple having an HTTPS website. If it isn't encrypted, there will be lock on the browser. If it presents an invalid certificate, you'll receive an alert. Again please read the point 3.3.- MITM have a tool called sslstrip to bypass the SSL connection, so, change the site to SSL will fix nothing about the attack.
sslstrip turns HTTPS traffic in HTTP. But to be effective, the user needs to go further and ignore the lack of HTTPS. Aside of this, there are tools and settings to avoid these types of downgrading, like HSTS. You should learn a lil more about sslstrip, it really works fine to make the MITM to SSL connections.Make a man in the middle to change luckybit addys, is one of the worst things you can do with this attack. Because if the users don't see the bets rolling they will ask to support what happen?, then we will ask for the TX ID, and in that moment we will see the fake addy. How much the hacker get? 0.005? 0.01?... not really a big lost. So, that attack is just a waste of time if some one is thinking about use it that way.
I want to make emphasis on the point of; This has never happened to luckybit and isn't something to worry about.
Well, a more sophisticated attack can try to replace the entire game too. A sophisticated hacker know how stupid is the idea of edit the gambling site with MITM to change addys and catch some satoshis if he have luck.And again, the "this never happened" isn't a good reason. You need to consider the possibilities and risks, not the "it never happened". We consider possibilities and risks... Chance to get a user hacked to change the betting addys, zero. Risks, only one user hacked because some one vuln his network. But it seems you think it's more simple to deal with an eventual problem than fixing the origin of it. OK, it's your choice. A bad choice, I think, but, well... The only problem here is all this trash talk, and we are working on it.I will say it clear because you are confusing our customers. Luckybit is not worried about a MITM attack.Because the MITM attack goes for one target, the target must be in the same attacker local network, and if users got hacked with this attack we wasn't the reason or the vuln and we are not the target. If the hacker have a success attack to one of our users, other users will be not affected, and we are a gambling site not a Internet Security Service. Of course we care about out customers security, but only for problems relevant to luckybit. If a random guy on internet get hacked by this attack should be our problem? if that guy use windows and some one use a trojan to hack it, should be our problem? i think not. For all the luckybit users: *This is not a luckybit security problem. it's the user responsibility to be on a secure network. *This is not a problem because it will not happen, to have the hacker in the same local network is really hard. And if you have a hacker on your LAN change the addys of luckybit to take the user bitcoins isn't a smart idea, as i say before if the users send one bet and it don't roll, support will ask for the tx id, and there we will see the fake addys. *In a fantasy world this is possible, but in the real world, this is almost impossible, is a bad idea, hard as hell and a waste of time.
|
|
|
A MITM attack against LuckyBit could - at worst - replace the game addresses with malicious ones. This is a sufficient reason to put HTTPS. The attacker has a financial incentive to repllace those addresses. There has never been a report of MITM attacks against LuckyBit.
Until it happens. But why wait until an incident happens if you already can fix the issue? SSL implementation is not a simple process. Getting a signed certificate, implementing security across the site and filtering for non-essential services such as the LuckyBit Community Hub are not a quick-switch option. These things take time and money that aren't justified by a "potential" threat that hasn't been realized and can be easily avoided by customers. Most of our players don't even depend on the site to provide the addresses; the information is available elsewhere and the majority of wallets also provide address-book services that would make this attack ineffective. tl;dr: not worth the effort for an attacker, not worth the effort for us Man in the middle attack isn't a problem for luckybit because: 1.- MITM is a LAN attack. That mean the only users who will be affected are those who are on the local area network of the attacker. Users access point is users responsability, if you are on a not secure network better don't use bitcoin, because if you are under MITM attack, the hacker will not change the betting addys, he will get your blockchain.info wallet access information. 2.- MITM can be detected by users with tools like wireshark. But is responsability of the user to verify if the network is secure. 3.- MITM have a tool called sslstrip to bypass the SSL connection, so, change the site to SSL will fix nothing about the attack. Make a man in the middle to change luckybit addys, is one of the worst things you can do with this attack. Because if the users don't see the bets rolling they will ask to support what happen?, then we will ask for the TX ID, and in that moment we will see the fake addy. How much the hacker get? 0.005? 0.01?... not really a big lost. So, that attack is just a waste of time if some one is thinking about use it that way. I want to make emphasis on the point of; This has never happened to luckybit and isn't something to worry about.
|
|
|
In trump we trust.... http://webm.host/18ea6/That guy is a Joke, and we know it. He doesn't deserve to be a topic on this forum.
|
|
|
Hope you all have fun with these memes
|
|
|
Maybe if they stop spending $150,000 a month, they can survive
|
|
|
|