Bitcoin Forum
May 24, 2024, 05:25:27 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 [47] 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 122 »
921  Alternate cryptocurrencies / Mining (Altcoins) / Re: [ANN] cudaMiner - a new litecoin mining application [Windows/Linux] on: August 20, 2013, 09:11:37 PM
any qlue what this is all about Huh



Solo mining? or using a proxy?
hes too stupid to use --help to get the parameters, he just starts the binary with no parameters. welcome to win Smiley
922  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] [QRK] Quark | Super secure hashing | CPU mining on: August 20, 2013, 07:17:03 PM
any calculator coming? I'm at about 0.14 megahashes but have no idea if that's even good.
thats good enough, just wait Wink
you will get a block from time to time
923  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] [QRK] Quark | Super secure hashing | CPU mining on: August 20, 2013, 06:06:08 AM
Just wanted to report back. Left a VPS on for 10 hours mining and got 6 blocks, I mined with the CPU miner for 5 hours and only got 1 block. Interesting thing is that I got some odd debug outputs with -H added but got a higher hash-rate.
Please remember that now the difficulty (200+) is much higher than before (~100)...
Right, however, some of them were when it was high.
Time for coinchoose.com to get a page for CPU-only coins. Would be nice to compare profits generated by Quark, Primecoin and Memorycoin.

ssshhhhh - http://www.coinchoose.com/cpu.php
well, diff calc is totally wrong as difficulty of primecoin isnt in correlation with difficulty of any ohter coin
924  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Official AnonCoin thread - Client Update!! (Native I2P, TOR nodes) on: August 19, 2013, 09:34:17 AM
I read those before coming to this thread.

I am trying to warn you that I2P does not have high latency delays yet. It is planned for version 3.0.

And without those high-latency delays, the NSA can know who A is.

This is not yet an anonymous coin.

The I2P one-way paths and (on top of I2P) application protocol delays doesn't protect against the sophisticated timing analysis. The delays must be put into the I2P peers who are relaying the packets.
a truly anonymous coin isnt possible anyway due to the existing blockchain.

EDIT: there are also small latencys before relaying the block wich are variable, *coind has to validate a block before it relays it to other nodes, now depending on the speed of pcs, this may differ (tough only in fraction of seconds aslong we dont have blocks with alot of txs). are you interested to hop onto freenode/i2p #anoncoin if you want to submit ideas or just discuss such things? we'r kinda spamming this thread.

I hope the developers are aware of such issues.

I don't know how to access "freenode/i2p #anoncoin". Is that an IRC channel?
yes it is, #anoncoin is accessible with freenode or irc2p (i2p irc) and is relayed between.
925  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] [QRK] Quark | Super secure hashing | CPU mining on: August 18, 2013, 11:55:44 PM
On P2pool you see often blocks being found but that does not mean its a valid block, it can take a while before its accepted or orphan/not valid
Especially the high timeouts can produce lots of rejected
Thats why i have quit using P2Pool along time ago, all together lost several hundred of btc because of this failures ofcourse it has been improved a bit but i sure as hell never use it again.
 

Did that happen on a p2pool network, or on a p2pool running as standalone pool?

Edit:
Also something weird is happening, since a certain point today, in the stats page, all shown block hashes are just the wrong ones.
Looking in the block explorer under the block number i see different shares, and also corrext payouts.

Maybe i need to reset the database.
If i will do that, than i will announce it way before. It shouldn't affect earnings.
Or maybe i just leave it, since it works, it's just the stats page that shows the wrong hash, the block number itself and the payouts are corrext
no, he just dosnt understand the basics. what he sees as block is simply a p2pool sharechain share/block.
926  Economy / Computer hardware / Re: {WTS} my 3x Jalapeno (In-Hand) on: August 18, 2013, 11:52:39 PM
Just asking to keep thread alive

Make me a offer true PM

lol  
yea its sad, i already made several offers. all i got is "someone is going to pick them up maybe, will inform u later"
927  Other / Beginners & Help / Re: Mining newbie: BFL Monarch Pre-Order or KNC Mercury? on: August 18, 2013, 06:48:42 PM
KNC Mercury: $1,995.00 (plus ATX PSU and shipping) 100GH Standalone unit running linux - expected by late Oct 2013
https://www.kncminer.com/products/mercury

vs.

BFL Monarch: $4,680 (plus shipping)  600 GH/s PCI-E card - expected by late Dec 2013
http://www.butterflylabs.com/monarch/

BFL would allow for more than one card per computer and take up less power and space.

So go with KNC (unproven) or BFL (proven to be late at best)Huh

make it summer 2014 at best and you should be closer to reality Tongue
928  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] [QRK] Quark | Super secure hashing | CPU mining on: August 18, 2013, 06:45:20 PM
@Neisklar: still waiting for a true p2pool src Tongue are you working on it or is this no goal?
929  Economy / Service Announcements / Re: [Trading Bot]... iTrader ... Cryptsy, Mt.Gox, BTC-e, Vircurex & More supported! on: August 18, 2013, 06:40:25 PM
I'd personally wait until everyone was was scammed so far posts back that they received the product and/or the scan accusation thread is closed.

Yeah, kind of why I was bumping the thread as well, see if anyone does post back.

No harm in a free trial though.
wrong, he can use your funds to manipulate market and therefore buy/sell coins leading more interest for him
930  Alternate cryptocurrencies / Altcoin Discussion / Re: Zerocoin is like Bitcoin, Except It's Actually Anonymous on: August 18, 2013, 06:28:05 PM

Zerocoin is like Bitcoin, Except No One Is Using It.
Zerocoin is dead, they arent even answering messages/emails from devs wanting to integrate zerocoin; as they say, "you should contact us"
931  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Official AnonCoin thread - Client Update!! (Native I2P, TOR nodes) on: August 18, 2013, 06:21:10 PM
I read those before coming to this thread.

I am trying to warn you that I2P does not have high latency delays yet. It is planned for version 3.0.

And without those high-latency delays, the NSA can know who A is.

This is not yet an anonymous coin.

The I2P one-way paths and (on top of I2P) application protocol delays doesn't protect against the sophisticated timing analysis. The delays must be put into the I2P peers who are relaying the packets.
a truly anonymous coin isnt possible anyway due to the existing blockchain.

EDIT: there are also small latencys before relaying the block wich are variable, *coind has to validate a block before it relays it to other nodes, now depending on the speed of pcs, this may differ (tough only in fraction of seconds aslong we dont have blocks with alot of txs). are you interested to hop onto freenode/i2p #anoncoin if you want to submit ideas or just discuss such things? we'r kinda spamming this thread.
932  Economy / Computer hardware / Re: {WTS} my 3x Jalapeno (In-Hand) on: August 18, 2013, 06:15:32 PM
U want to buy one or more ?
so you totally forgot about me? great! thats nice
933  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Official AnonCoin thread - Client Update!! (Native I2P, TOR nodes) on: August 18, 2013, 04:20:59 PM
Apologies if this has already been asked upthead. I didn't have time to read the entire thread.

Does Anoncoin not view high-latency for I2P as critically urgent as I do?

https://bitcointalk.org/index.php?topic=273197.msg2950363#msg2950363
https://bitcointalk.org/index.php?topic=276849.msg2955966#msg2955966
https://bitcointalk.org/index.php?topic=273197.msg2950849#msg2950849

I2P doesn't plan on implementing until version 3.0? When is that ETA?

only bitcoin and anoncoin so far work with i2p

Bitcoin doesn't require all winning blocks to be sent over I2P, thus in a high-latency setup, those miners who want their awarded coins to be anonymous, would be at a timing disadvantage.

I assume anoncoin requires all winning blocks to be sent over I2P?
nope, you can send it over i2p, TOR (to clearnet or HS nodes) and clearnet.
the main idea about i2p in anoncoin is to eliminate attacks to find your location and making listening on others connections impossible. (from a technical view)

Don't we want miners to be anonymous when they are awarded coins for PoW of the winning block?

So then if they use the high-latency setting to be confidently anonymous, they are at a speed disadvantage to those miners who don't want to be anonymous (e.g. the corporations, etc).

Also does anyone understand and agree that without high-latency, the NSA knows who you are? (due to timing attacks are possible on low-latency mix-nets)
nope, i2p is end to end encrypted, nobody (beside the involved ones) knows what passes from where to where, ie someone else cant see who published it or how high their latency is.

Timing attacks work regardless of end-to-end encryption.

My understanding is that all low-latency mix-nets are subject to timing attacks. Perhaps you should read up on the research before making a claim? Or am I missing something?

Note Tor and I2P are both Chaum mix-nets (so what applies to low-latency attacks of Tor applies also to I2P):

https://blog.torproject.org/blog/one-cell-enough
http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf
ok, good to see someone with knowledge around here Smiley
i2p user (A) finds blocks, broadcasts to all users in i2p (UI), now some of the UI are connected to clearnet, some user (B) broadcast it over clearnet to the other nodes, so with a timing attack you could find user B but not user A

My understanding is that with a timing attack on low-latency mix-nets, you can identify A because you watch the statistical timing of packets throughout the darknet (I2P) to determine where they are originating from by IP address. It is not necessary to know what it is inside the packets.

Whereas, with high-latency mix-nets, the peers scramble and delay some packets in random orders and delays, so that the statistical timing attack is foiled.
yes, there are delays.

more informations which will answer 90% of your questions:
http://www.i2p2.de/how_threatmodel.html#timing (i would suggest to read the full threat model).
http://www.i2p2.de/techintro.html
http://www.i2p2.de/how_networkcomparisons.html

if your further interested then this can link you to more info -> http://www.i2p2.de/how.html (the rest of the page also, of course)
934  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Official AnonCoin thread - Client Update!! (Native I2P, TOR nodes) on: August 18, 2013, 03:59:39 PM
Apologies if this has already been asked upthead. I didn't have time to read the entire thread.

Does Anoncoin not view high-latency for I2P as critically urgent as I do?

https://bitcointalk.org/index.php?topic=273197.msg2950363#msg2950363
https://bitcointalk.org/index.php?topic=276849.msg2955966#msg2955966
https://bitcointalk.org/index.php?topic=273197.msg2950849#msg2950849

I2P doesn't plan on implementing until version 3.0? When is that ETA?

only bitcoin and anoncoin so far work with i2p

Bitcoin doesn't require all winning blocks to be sent over I2P, thus in a high-latency setup, those miners who want their awarded coins to be anonymous, would be at a timing disadvantage.

I assume anoncoin requires all winning blocks to be sent over I2P?
nope, you can send it over i2p, TOR (to clearnet or HS nodes) and clearnet.
the main idea about i2p in anoncoin is to eliminate attacks to find your location and making listening on others connections impossible. (from a technical view)

Don't we want miners to be anonymous when they are awarded coins for PoW of the winning block?

So then if they use the high-latency setting to be confidently anonymous, they are at a speed disadvantage to those miners who don't want to be anonymous (e.g. the corporations, etc).

Also does anyone understand and agree that without high-latency, the NSA knows who you are? (due to timing attacks are possible on low-latency mix-nets)
nope, i2p is end to end encrypted, nobody (beside the involved ones) knows what passes from where to where, ie someone else cant see who published it or how high their latency is.

Timing attacks work regardless of end-to-end encryption.

My understanding is that all low-latency mix-nets are subject to timing attacks. Perhaps you should read up on the research before making a claim? Or am I missing something?

Note Tor and I2P are both Chaum mix-nets (so what applies to low-latency attacks of Tor applies also to I2P):

https://blog.torproject.org/blog/one-cell-enough
http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf
ok, good to see someone with knowledge around here Smiley
i2p user (A) finds blocks, broadcasts to all users in i2p (UI), now some of the UI are connected to clearnet, some user (B) broadcast it over clearnet to the other nodes, so with a timing attack you could find user B but not user A
935  Alternate cryptocurrencies / Pools (Altcoins) / Re: [ANN] profit switching auto-exchanging pool - middlecoin.com on: August 18, 2013, 02:55:54 PM
yes, but u have to read too.

its clear u cant read 40 sites, but if u wanna know something u can read the last 2 or 3 sites. and with that info he would have known what the pool does, and what profit he will get.
or just use the search function
936  Alternate cryptocurrencies / Announcements (Altcoins) / Re: [ANN] Official AnonCoin thread - Client Update!! (Native I2P, TOR nodes) on: August 18, 2013, 02:24:01 PM
Apologies if this has already been asked upthead. I didn't have time to read the entire thread.

Does Anoncoin not view high-latency for I2P as critically urgent as I do?

https://bitcointalk.org/index.php?topic=273197.msg2950363#msg2950363
https://bitcointalk.org/index.php?topic=276849.msg2955966#msg2955966
https://bitcointalk.org/index.php?topic=273197.msg2950849#msg2950849

I2P doesn't plan on implementing until version 3.0? When is that ETA?

only bitcoin and anoncoin so far work with i2p

Bitcoin doesn't require all winning blocks to be sent over I2P, thus in a high-latency setup, those miners who want their awarded coins to be anonymous, would be at a timing disadvantage.

I assume anoncoin requires all winning blocks to be sent over I2P?
nope, you can send it over i2p, TOR (to clearnet or HS nodes) and clearnet.
the main idea about i2p in anoncoin is to eliminate attacks to find your location and making listening on others connections impossible. (from a technical view)

Don't we want miners to be anonymous when they are awarded coins for PoW of the winning block?

So then if they use the high-latency setting to be confidently anonymous, they are at a speed disadvantage to those miners who don't want to be anonymous (e.g. the corporations, etc).

Also does anyone understand and agree that without high-latency, the NSA knows who you are? (due to timing attacks are possible on low-latency mix-nets)
nope, i2p is end to end encrypted, nobody (beside the involved ones) knows what passes from where to where, ie someone else cant see who published it or how high their latency is.
937  Alternate cryptocurrencies / Altcoin Discussion / Re: mcx passwords on: August 18, 2013, 02:20:09 PM
well, i had a chat with RS on IRC, i asked him if can publish it, he went mad and didnt answer anymore (so i cutted the things below):
Code:
<K1773R> RealSolid: https://bitcointalk.org/index.php?topic=270155.0 <-- can i get a ACK/NACK on this? ie that you store the users PW in plain (or decryptable only by X ppl)
<RealSolid> passwords are stored encrypted yeah
<RealSolid> they are the only identifyable information atm, i may change it in the future and have other info i force people to enter
<RealSolid> name of first pet, etc
<K1773R> as suggestion, hash the passwords...
<K1773R> in 1970-1980 hashing started, now we have 2013!
<RealSolid> no
<RealSolid> theres no added security to my system in salting them
<K1773R> i like your idea about the selfbuild engine + DB alot, as its secure. but this is horrible
<K1773R> i dont talk abuot salting, i talk about hashing!
<RealSolid> or hashing
<RealSolid> that may change as i adapt future requirements of course
<K1773R> not hashing is a huge security risk, mtgox had to learn it the hard way
<RealSolid> haha
<RealSolid> thinking its a security risk shows your ignorance on mcxnow security
<K1773R> hmm, "they are the only identifyable information atm" <-- so you identify users per password and not per user id?
<RealSolid> no but if they want a reset its the only info they have put in there
<RealSolid> so i either offer no resets or add more info they can store to prove they are account holders
<K1773R> so if someone forgot his password (and really forgot), hes totally fucked or you just give it to them?
<RealSolid> the exchanges that do password email resets are way more insecure
<K1773R> i agree that password email resets are extreme insecure
<RealSolid> same with automated password recovery
<RealSolid> the mcxnow database is undumpable from the internet and you should be using a unique password at the site anyhow, this is what i tell everyone <RealSolid> if you K1773R use a unique password at mcxnow there is no difference whether i hash+salt+shit on your password
<RealSolid> so im not sure what *your* personal issue is with the way i handle passwords, even if you think its insecure, when you should be following good security protocol as a security expert :P
<K1773R> if someone successfully takes over your engine, he gets access to the user DB as its needed to identify persons right? so why not just dumping this, all thats needed is to break the encryption (password? privkey? combination?) and you have the password of every person @ mcxnow
<K1773R> or did i miss something?
<RealSolid> i protect the people who are insecure people by nature by not allowing auto password resets and requiring they remember part of their password
<RealSolid> the only person who can "take over the engine" is someone who works at the datacenter of the exchange server
<RealSolid> not internet hackers
<RealSolid> and ive added protection against local admin hacking by encrypting everything the exchange uses
<RealSolid> nothing is fullproof of course, but worrying about your unique password being in the wild is nothing compared to losing all your funds right?
<K1773R> how comes? if your engine needs informations to identifiy users (ie, username + password), as soon you got the engine, you also got the encrypted password, all you need then is to encrypt it
<RealSolid> and as soon as you got the engine youve got all the funds too if youre an elite hacker who can decrypt and reverse engineer a x64 binary
<K1773R> yes, i liked your setup alot as its the only exchange i saw knowing something about security, this is just the little ugly thing that poped up, so im wondering ;)
<RealSolid> so if a compromised amazon elite hacker data center admin finds out about the mcxnow exchange server we could be in trouble
<RealSolid> so what do you propose to do instead of what i do to verify lost passwords?
<RealSolid> just lock people out of accounts if they forget?
<K1773R> nope, its a tough question
<RealSolid> to be honest i think only morons/haters care about this because as a specific user if you use unique password at mcxnow you are no more or less compromised if the database gets breached
<K1773R> i have no idea so far how an average person could be able to get his account back due to missing knowledge
<RealSolid> so why should *YOU* care about these people?
<K1773R> well, i dont care about anyone usual ;)
<K1773R> so if we are in trouble (stolen funds), would you pay it back out of ur pocket?
<RealSolid> people recommend salting and hashing passwords because sql and other database technologies are often compromised, mine cant be from the internet
<K1773R> if yes, well then i dont care anymore
<RealSolid> worrying about rogue elite datacenter admin hacker taking your password is the least of your worries, the funds are more important :P
<RealSolid> and unlike pretty much all other exchanges except perhaps mtgox ive put a lot of thought into protecting against those
<K1773R> so you would pay back the stolen funds?
<RealSolid> i dont have enough money to do that
<RealSolid> if theres a 50/50 split on funds in hot/cold for instance, i guess id just pay back the percentage in cold to everyone
<K1773R> ok
<RealSolid> to me thats pretty much game over material though
<RealSolid> so i never want it to happen at all
<RealSolid> hence the paranoia and security
after this, he didnt answer me anymore :S well, i for myself will stay @ mcxnow for "now", will see how things work out.

EDIT: seems he wasnt mad, just busy, will edit again if neccessary.
EDIT2: chat updated.
938  Alternate cryptocurrencies / Altcoin Discussion / Re: mcx plaintext passwords on: August 18, 2013, 01:05:32 PM
Don't follow established practices just do anything you feel like no matter how stupid (and pointless).  
like using a different password for every website?  I know you guys have an agenda to push here, and need to make rs or the website look bad, but try harder.  
if RS really stores the password in plain or any reversible format (ie, not hashing them probperly, md5 isnt probperly Tongue) then he lost me, i havent seen any proof of this or did i miss it (due to ignore this usascum moron)?



He is storing them in reversible format. If you want to recover your password, he gives you your password and he sees your password. There is no "password recovery" form on the site, and I think only way to recover the password is:
1) message rs that you lost your password.
2) tell a part of your password/describe your password, so that he can confirm "it is really you" who is recovering
3) he returns you passwords as a string   and in the process he sees your password.  When I did this procedure, I was feeling like my privacy has been breached.


Now even if you think I am moron, you know something you didn't know before.

And if someone has done the procedure, please confirm it is really done this way, as I am not making this up.


i apologize if this really is true!
939  Alternate cryptocurrencies / Pools (Altcoins) / Re: [ANN] profit switching auto-exchanging pool - middlecoin.com on: August 18, 2013, 12:55:54 PM
hi!

is this a good pool?
how long after submitting shares does my address show up on the front stat page?
can i use one single btc address with all of my miners?

thanks for the info Smiley
no, this is a horrible pool, all the stats are fake, you get no money -.- oh cmon?
940  Bitcoin / Electrum / Re: False proxy in electrum on: August 18, 2013, 09:57:10 AM
solution -> proxychains!
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 [47] 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 122 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!