Sounds like a dump scam coin inspired by 42.
Which was inspired by Onecoin (nobody seems to remember, bunch of noobs)..
|
|
|
Longterm perhaps Qubitcoin, having new algos and being a bit fairer than quark and stuff.
|
|
|
^thx, syncing!
|
|
|
Someone type getpeerinfo into console and post result plz for some nodes...
|
|
|
Interest check: If somene would release a wallet that made the premined blocks invalid, would the majority use it?
|
|
|
Well aslong as there is not a shitton of giveaways and bounties, I'll stay sceptical and all the points the naysayers list are valid. Just wanted some for my collection. btw: What about a community takeover that makes the premined coins invalid? I'd throw 500 into the pot.
|
|
|
@ 0btc: qQyLA here, I'm mining with 800kH (AMD fx 8350), but your pool only reports 70. Payouts seems to be right though.
|
|
|
Super secure hashing: 9 rounds of hashing from 6 hashing functions (blake, bmw, groestl, jh, keccak, skein). 3 rounds apply a random hashing function. - 247 million FairQuarks will be mined in ~ 12 months, after that ~ 1 million FRQ annually
- Block average time: 60 seconds
- Difficulty retarget time: 1 hour (max. 10% up or 50% down)
- Block reward: 2048 at first, halving every 42 days approx
- Network port: 8008
- RPC port: 9008
QRK specs https://bitcointalk.org/index.php?topic=260031.0 : * Super secure hashing: 9 rounds of hashing from 6 hashing functions (blake, bmw, groestl, jh, keccak, skein). 3 rounds apply a random hashing function. * CPU mining * Quick block generation: 30 seconds * 2048 QRK per block (halving every 60480 blocks ~ 3 weeks) * Block reward will never drop below 1 QRK * Total of 247 million QRK will be mined in ~ 6 months, after that ~ 1 million QRK p.a. (~ 0.5% p.a inflation) * Difficulty retargets every 20 blocks (maximum 10% up or 50% down) If you feel Quarkcoin, which had a totally fair start without any premining, was an unfair instamine, why did you chose to only double the block halving time? Also WTF @ premine.
|
|
|
The amount of scamming pools surrounding the launches of coins in the last few weeks is astounding. The reason for that is obviously the high rate of new coins, attracting only few known pool operators. I think we need a list/wiki of known scamming pools, be it in the past or ongoing.
|
|
|
Yay, can't wait for the "You are a zionist shill!!" and "Everyone who mines this coin is a nazi!" posts! Complicated topic, will get interesting. Maybe the obernazi Le Pen himself will say yes to this coin and all his minions will want to buy it? Read the wiki article posted by OP: http://en.wikipedia.org/wiki/Dieudonn%C3%A9_M%27bala_M%27bala
|
|
|
Anyone mining with a GPU miner already?
|
|
|
I still can see the coins in the transactions page, wallet seems to be empty...
|
|
|
Guess it's him: Jan 14 00:51:56 server sshd[211810]: Accepted password for root from 66.87.95.20 port 33982 ssh2 Jan 14 00:51:56 server sshd[211810]: pam_unix(sshd:session): session opened for user root by (uid=0) Jan 14 00:51:57 server sshd[211810]: subsystem request for sftp by user root Jan 14 00:52:01 server CRON[212231]: pam_unix(cron:session): session opened for user root by (uid=0) Jan 14 00:52:01 server CRON[212231]: pam_unix(cron:session): session closed for user root Jan 14 00:52:01 server sshd[212176]: Accepted password for root from 66.87.95.20 port 54132 ssh2
First occurence of similar ip in log: Jan 12 08:26:23 server sshd[154626]: Accepted password for root from 66.87.92.21 port 33172 ssh2
left a message? Jan 13 12:53:35 server sshd[103395]: Invalid user xkcd^777^xkcd&99starfive792***$$$$# from 66.87.94.161 Jan 13 12:53:35 server sshd[103395]: input_userauth_request: invalid user xkcd^777^xkcd&99starfive792***$$$$# [preauth] Jan 13 12:53:38 server sshd[103395]: Failed none for invalid user xkcd^777^xkcd&99starfive792***$$$$# from 66.87.94.161 port 58427 ssh2 Jan 13 12:53:39 server sshd[103395]: Received disconnect from 66.87.94.161: 13: Unable to authenticate [preauth] Jan 13 12:53:51 server sshd[104648]: Accepted password for root from 66.87.94.161 port 47277 ssh2 Jan 13 12:53:51 server sshd[104648]: pam_unix(sshd:session): session opened for user root by (uid=0)
exact time of theft would be useful.
|
|
|
When will you have it fixed?
|
|
|
getpeerinfo: [ { "addr" : "222.174.212.250:7788", "services" : "00000001", "lastsend" : 1389667678, "lastrecv" : 1389667678, "bytessent" : 16108, "bytesrecv" : 146373, "conntime" : 1389667355, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5453, "banscore" : 0, "syncnode" : true }, { "addr" : "114.233.139.165:7788", "services" : "00000001", "lastsend" : 1389667678, "lastrecv" : 1389667679, "bytessent" : 4034, "bytesrecv" : 20166, "conntime" : 1389667390, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5453, "banscore" : 0 }, { "addr" : "[2001:0:9d38:90d7:457:3538:c24e:dc25]:7788", "services" : "00000001", "lastsend" : 1389667678, "lastrecv" : 1389667679, "bytessent" : 7411, "bytesrecv" : 19399, "conntime" : 1389667405, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5453, "banscore" : 0 }, { "addr" : "220.176.48.178:7788", "services" : "00000001", "lastsend" : 1389667678, "lastrecv" : 1389667678, "bytessent" : 1486, "bytesrecv" : 12078, "conntime" : 1389667458, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5453, "banscore" : 0 }, { "addr" : "148.251.11.18:7788", "services" : "00000001", "lastsend" : 1389667677, "lastrecv" : 1389667678, "bytessent" : 596, "bytesrecv" : 14993, "conntime" : 1389667495, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5455, "banscore" : 0 }, { "addr" : "78.128.22.144:7788", "services" : "00000001", "lastsend" : 1389667678, "lastrecv" : 1389667677, "bytessent" : 2132, "bytesrecv" : 16188, "conntime" : 1389667555, "version" : 70001, "subver" : "/Satoshi:0.8.3.15/", "inbound" : false, "startingheight" : 5456, "banscore" : 0 } ]
|
|
|
I'm still missing about 600 coins on my balance. It's still zero. Such scam pool. PS. User id 28 plz fix. Well, http://qbt.mypool.cc/ went down just now... 502 Bad Gateway Also only the first payout worked, last time I saw (literally 2 min ago) I had 600 confirmed coins although the payout treshold is at 100. edit: https://bitcointalk.org/index.php?topic=414347.0we have some db error. but no scam, no one lost coin
|
|
|
Honestly the drama around these three letters is stupid. One of them will change their code or not, it doesn't matter. Should an exchange accept one or both they'd surely find a solution. That said, the new one atleast brought something new to the table, not just a girl avatar.
|
|
|
Funny, the worth compared to Bitcoin is almost the same.
|
|
|
|