What's hash comparison ? the hash of the authentic file ?
This guide 'll help you.
|
|
|
How to check SHA256 checksum ? and what should I expect ? I and to check my client right now .
in linux type: sha256sum filename.zip In Window 7 ? Download HashTabWhat should I expect when run the file ? There 'll be a new tab when clicking right-mouse -> properties ![](https://ip.bitcointalk.org/?u=http%3A%2F%2Fcloud.addictivetips.com%2Fwp-content%2Fuploads%2F2011%2F12%2FYasir-Jawad-Reidi-Gul-Properties.png&t=663&c=hNYHd5LSFjrZlQ) Also, you can select required checksum algorithms: ![](https://ip.bitcointalk.org/?u=http%3A%2F%2Fcloud.addictivetips.com%2Fwp-content%2Fuploads%2F2011%2F12%2FHashTab-Settings.png&t=663&c=a08r74tkqvJoWQ)
|
|
|
How to check SHA256 checksum ? and what should I expect ? I and to check my client right now .
in linux type: sha256sum filename.zip In Window 7 ? Download HashTab
|
|
|
Isn't the party line not to use the word 'official' any more? ![Cheesy](https://bitcointalk.org/Smileys/default/cheesy.gif) Ignoring official download locations may lead to heart-attacks and loss of trust.
|
|
|
Nobody prepend now, but with additional login field, they 'll be forced to prepend.
And they'll be entering 1234 into the login field all the time ![Smiley](https://bitcointalk.org/Smileys/default/smiley.gif) Most people 'll not. Better than nothing ![Smiley](https://bitcointalk.org/Smileys/default/smiley.gif) Requires only UI JS changes.
|
|
|
So, even password "Alisa" 'll be quite secure when using with login "mrbober777", so the final password is "mrbober777Alisa" which is much more protected thay plain "Alisa". Attacker should spend MUCH more resources for brute-forcing passwords with a login added to the password field.
CfB ?
We can start prepending "Alisa" to our passphrases right now. (Need to create a new account though. And don't use "Alisa" plz.) Nobody prepend now, but with additional login field, they 'll be forced to prepend.
|
|
|
Finding the latest client from this thread is difficult. I think CFB should start another thread just with client update download links
Last client is always available for download at info.nxtcrypto.org , we receive the file and SHA checksum directly from developers and it's hosted on our secure server and not some 3rd party file sharing service.
|
|
|
OK, look, I'm not a heavy hitter coder to pitch in and help here, and I wish I was. But this security stuff is serious with major psychological/political overtones for the acceptance of NXT. I really want to get a consensus here on a proposed course of action. Many pages back on this thread there was a prioritized list of what was to be added to NXT in the way of features. Where does my proposed account withdrawal freeze code idea (or something similar) rank on this in the eyes of the community, and what is the path we take to either reject it from consideration as an add-on or agree that yes, it will be implemented?
Not trying to be pushy, I just think this is too important to let it fade out when we go off chasing the next squirrel topic ten pages from now (an allusion to the dog in Up).
Would your solution help from keyloggers and trojans? It's very easy to add a special KEYFILE additional to password, which 'll be used against keyloggers. Once again, protocol change is not required.
|
|
|
I've got PaulyC's password. It's uncrackable and matches the account. If he is not trolling then we have 4 explanations:
- Someone cracked SHA256 and Curve25519 (why then multi-million accounts not hacked?) - Someone distributes modified NRS (someone should decompile PaulyC's software) - Keylogger - He used online node that records entered passphrases
He should calculate the SHA256 Hash of the class files, no need to decompile. So, keylogger or sniffing node or modified NRS. 1. Keylogger NXT is too young to understand for hackers that random password for 127.0.0.1 is something good. I am sure it was not because of keylogger. 2. Sniffing node Lets ask victim - which node did he use to access his account? Did he ever use 3rd party online wallet atleast once to access his account? 3. modified NRS Send your copy of NRS to CfB or me and we 'll check each file's SHA/CRC against the stock version.
|
|
|
offline mining of all NXT accounts in parallel problem gets worse the more NXT accounts there are this attracts more hackers the more NXT is worth This will create an equilibrium effect like a boat anchor to a hot air balloon. The more NXT succeeds, the more it will be hacked.
CfB, tell me there is a solution that is more effective than the user needs to not be unlucky
James
I can tell you some ideas. Currently there is only a password. Lets also add login field when registering for account access. This 'll require NO changes in protocol: FINALPASSWORD = [LOGIN][PASSWORD] So, even password "Alisa" 'll be quite secure when using with login "mrbober777", so the final password is "mrbober777Alisa" which is much more protected thay plain "Alisa". Attacker should spend MUCH more resources for brute-forcing passwords with a login added to the password field. CfB ?
|
|
|
Well. Thought for sure it couldn't happen to me. but just had all of NXT stolen out of my account. yey..
something is ODD here??
thanks
Well, did you scan your PC with antivirus? Where do you have your node hosted? Is this shared nore or your own? Who else have access to your email / node server? Did you check node server log files? Did you see some stange behavior or errors near to this?
|
|
|
Transfer of colored NXT coin 'll also have 1 NXT min fee?
|
|
|
CRYPTOPARADOX ![](https://ip.bitcointalk.org/?u=http%3A%2F%2Fs22.postimg.org%2Fe1iai58x9%2FCRYPTOPARADOX.jpg&t=663&c=C5COTW0wr1uU2Q) ![](https://ip.bitcointalk.org/?u=http%3A%2F%2Fdec.imghost.us%2FyDbQ.png&t=663&c=_TUCfx018hQ2ZA)
|
|
|
![Grin](https://bitcointalk.org/Smileys/default/grin.gif) Well, guys. Something should be fixed in Nxt protocol to attract more girls. I would pay 1K for a good idea. ![Smiley](https://bitcointalk.org/Smileys/default/smiley.gif) Girls like shopping, we better open more online shops, possibly, attract offline ones! 13792774143018875909 Right! 1K sent to 13792774143018875909. Would you pay if i 'll say that i've referred one REAL hosting provider and they ALREADY accept NXT payments in automated (instant) mode? LoL
|
|
|
Just tried to send a small amount to account = X , but money was sent to absolutely another address. Twice!
WTF!
When you withdrew Nxt from your NxtChg account, it was sent to a Nxt address you didn't specify? I didnt speak about NxtChg (it's still a fantasy exchange) , i sent money from NXT Wallet. how much did you send? Not much, few coins only.
|
|
|
Just tried to send a small amount to account = X , but money was sent to absolutely another address. Twice!
WTF!
When you withdrew Nxt from your NxtChg account, it was sent to a Nxt address you didn't specify? I didnt speak about NxtChg (it's still a fantasy exchange) , i sent money from NXT Wallet.
|
|
|
Pretty sure this is incorrect:
28937 17962290264019847957 Monday, December 30, 2013 10:28:15 PM 3 0 + 3 413 B 1 14710313170398198640 36296 %
All my VPSs have this.
I tried on one deleting the blockchain and resyncing and it synced to this.
Same here. Instead of developing such functions as voting, core developers should make the wallet itself stable. I cant even transfer funds safely! WTF x times.
|
|
|
Just tried to send a small amount to account = X , but money was sent to absolutely another address. Twice!
WTF!
|
|
|
It's pure shit about 51% voting that can freeze or destroy coins.
Hacker can transfer funds every 10 minutes to a new account and pay for this 144 NXT per day.
You 'll never be able to force all people to do this in such timeframe, of course if you are not owner of 51% already.
Should i also include that i'm against such feature at all? Terrible news.
pm me link Read few pages ago, there was a discussion about voting and it's power to freeze and destroy coins. Developers are seriously looking to implement such thing!
|
|
|
Does anyone know details about the API cryptocurrency uses to display NXT info? I'm writing a NXT ticker for the Mac and haven't heard back from Degex on my query.
GCInc/Graviton? Anybody?
http://dgex.com/API/trades.json
|
|
|
|