Bitcoin Forum
September 26, 2020, 04:13:18 PM *
News: Latest Bitcoin Core release: 0.20.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Project Development / python developer & familiar with basic bitcoin RPC on: September 14, 2018, 11:46:11 AM
If you're a competent python developer and are familiar with basic bitcoin RPC + can quickly learn new libraries / APIs (e.g. IPFS) then comment on twitter to get in touch.

https://twitter.com/alanizBTC/status/1040313617822953472
2  Economy / Auctions / Sell Domain - cryptogallery.org on: August 04, 2018, 09:28:04 AM
I am selling following domains:

cryptogallery.org

bitcoinis.cheap

Starting bid for every domain is 0.01 BTC

We will do Escrow, buyer has to pay for additional transfer and escrow fees.
3  Local / Polski / szukam polskojezycznych ksiazek o bitcoinie on: July 12, 2018, 12:31:59 AM
Hej,

znacie dobre ksiazki o bitcoine w polskim jezyku? Chce komus podarowac a ta osoba niestety nie umie po angielsku Smiley
4  Local / Anfänger und Hilfe / Deutsche bücher über bitcoin&crypto für anfänger on: July 12, 2018, 12:30:20 AM


Hallo alle zusammen,

 

Ich bin auf der Suche nach deutschsprachigen Büchern für Anfänger. Es geht nicht ums trading sondern die idee und technologie dahinter. Gäbe es etwas empfehlenswertes? Leider nur auf deutsch da die Person kein englisch kann, es muss nichts komplexes sein, soll als interessante einführung dienen über bitcoin und die idee dahinter Smiley
5  Local / Alternatywne kryptowaluty / [ANN] BOUNTY [ARO] | Arionum | CPU | Oparte na PHP |Zdecentralizowana rewolucja on: June 15, 2018, 07:12:42 AM
Z dumą chcemy ogłoszic Arionum, nową kryptowalutę zbudowaną od zera!


                                                                                                    




Wprowadzenie:

Arionum zostalo zaprojektowane z myślą o przyszłości, na rynku, gdzie wzrost przebija wszelkie oczekiwania. Arionum dąży zeby móc oferowac bezpieczny system płatności elektronicznych, który jest w stanie skalować bez pogorszenia wydajności lub pogorszenia doświadczenia użytkownika. Arionum oferuje stała stawke 0,25% opłaty za kazda transakcje i ma dynamiczny limit transakcji na blok, dzięki ktoremu pozwala nadążać za rosnącą liczbą transakcji przez cały czas.

Jedną z głównych zalet Arionum jest ta, że został napisany od zera w PHP, jednym z najpopularniejszych języków programowania na świecie. Chociaż PHP nie jest tak szybki jak C++. na przykład, to duża liczba programistów, którzy mogą łatwo zrozumieć i rozwinąć PHP i Arionum, rekompensuje to.
Główną inspiracją był whitepaper napisany przez Satoshi Nakamoto dla bitcoina, ale cały kod został zaprojektowany i napisany przez programistów, aby zachować jego oryginalność.

Arionum uważany jest za monetę demokratyczną i egalitarną, nie posiadającą zadnego pre mine, długi okres kopania, żadnych opłat deweloperskich i algorytm, który jest korzystniejszy dla przeciętnego użytkownika dzięki dostępnym zasobom procesora niż farmy do kopania.


Specyfikacje

Nazwa: Arionum
Symbol: ARO
Czas bloku: ~ 4 minuty
Nagroda kopania: startuje przy 1000 i spadek o 10 za kazdym razem po 10800 blokach
Czas kopania: 8 lat i 4 miesiace
Premine: NIE MA Premine
Oplata za transakcje: Zawsze 0.25%
Block Hash: sha512
Algorytm Kopania: Argon2i + SHA512
Caly zasób monet: 545.399.000
Sygnatura Algorytmu: ECDSA's secp256k1 curve
Baza danych Backend: MySQL / MariaDB
Whitepaper: https://www.arionum.com/wp.pdf

Cele:

   Eksplorator Bloku
    Pula
    Windows php bundle
    Windows GUI Portel
    Escrow system
    Windows GUI Koparka
    Cala API
    Loterie na bazie blockchain
    Bitcoin JSON-RPC API (dla latwiejszej integracji dla gield)
    Dodanie do nowych gield
    Portfel Android

    Linux GUI Portfel
    Mac GUI Portfel
    iOS Portfel
    System Majatków
    System Aliasow
    Procesor płatności
    Katalog stron akceptujących ARO

Do Pobrania:
Kod źródłowy: https://github.com/arionum/node
CLI Portfel: https://github.com/arionum/lightWalletCLI
Koparka: https://github.com/arionum/miner (proof of concept, obsolete now)
Koparka Java: https://github.com/ProgrammerDan/arionum-java  ( Created by ProgrammerDan )
Koparka Python: https://github.com/protovist/arionum-miner (Created by Protovist)
Koparka C++: https://bitbucket.org/cryptogone/ariocppminer (Created by Cryptogone, has 0.5% dev fee)
Koparka GPU: https://bitbucket.org/guli13/arionum-gpu-miner (Created by Guli, has 0.5% dev fee)
Windows Pakiet: https://www.arionum.com/files/ArionumWin.zip   ( For a guide, check: http://aropool.com/info )
Windows Portfel: https://www.arionum.com/LightArionumC/setup.exe (Source: https://github.com/arionum/lightWalletGUI)
Android Portfel: https://play.google.com/store/apps/details?id=arionum.net.cubedpixels (Source: https://github.com/CuteCubed/Arionum-Wallet-Android - Created by Cuby)
Kod źródłowy puli: https://github.com/arionum/pool (beta)
JSON-RPC API: https://github.com/arionum/json-rpc (beta, simulates the bitcoin API)


Oficjalne linki
Oficjalna strona: https://www.arionum.com
Eksplorator Bloku: https://arionum.info
Forum: https://forum.arionum.com
FAQ: https://forum.arionum.com/viewtopic.php?f=13&t=11

Media Spolecznosciowe
Twitter: https://twitter.com/ArionumCrypto
Discord: https://arionum.info/discord/
Telegram: https://arionum.info/telegram/
Facebook: https://www.arionum.info/facebook
Youtube: https://www.arionum.info/youtube
Steemit: https://www.arionum.info/steemit

Pule
Oficjalne Pule: http://aropool.com
Oficjalne Male Pulel: http://aro.cool
DecardCoin's Pula: http://hashe.rs/
OvErLoDe's Pulal: http://arionum.rocks
x23a1s's Pula: http://aro.kiramine.com/
Jammy's Pula: https://aro.party

Fundusze deweloperskie
ARO: 5WuRMXGM7Pf8NqEArVz1NxgSBptkimSpvuSaYC79g1yo3RDQc8TjVtGH5chQWQV7CHbJEuq9DmW5fbm CEW4AghQr
LTC: LWgqzbXGeucKaMmJEvwaAWPFrAgKiJ4Y4m
BTC: 1LdoMmYitb4C3pXoGNLL1VRj7xk3smGXoU
ETH: 0x4B904bDf071E9b98441d25316c824D7b7E447527
BCH: qrtkqrl3mxzdzl66nchkgdv73uu3rf7jdy7el2vduw

Gieldy
Mercatox - https://mercatox.com/exchange/ARO/BTC
OctaEx - https://octaex.com/trade/index/market/aro_btc [ludzie zgłaszali problemy z wypłatami, sugerujemy wycofanie Twoich monet ARO do czasu rozwiązania problemów)

Jeśli chcesz wesprzeć rozwój Arionum, możesz przekazać darowiznę na adresy wymienione powyżej.

Ogłoszenie:

Oficjalne ogłoszenie: https://bitcointalk.org/index.php?topic=2710248.0
6  Economy / Services / SEARCHING: Developer for Twitter and Reddit Tipbot on: May 19, 2018, 11:01:07 PM
Hi guys,

I am searching someone who can develop a twitter and reddit tipbot for kekcoin.
More information about kekcoin here:

https://kekcoin.co/
https://twitter.com/KekcoinCore/status/992114088556814337

If you think you can do it then please message me or join the telegram group to clear and discuss all details.
7  Alternate cryptocurrencies / Speculation (Altcoins) / $DAL - DallarCoin Airdrop what do you think about the potential? on: April 01, 2018, 01:02:51 PM
DallarCoin is a POS Coin and the do currently a small airdrop of their development fund 20.000 coins for everyone who joins discord.
Not much to do and I think Dallar can be worth something in future Smiley

What do you think?

Here is the official announcement: https://bitcointalk.org/index.php?topic=2899692.0

And here the airdrop announcement: https://twitter.com/DallarCoin/status/980250022448115718
8  Alternate cryptocurrencies / Speculation (Altcoins) / KeK -The coin for MEMES - billion dollar project? on: January 11, 2018, 07:22:55 PM
Hi guys, do you know kekcoin? Its currently very big lowcap but I am confident that this will be big.
They are working now on the MEMECHAIN which will be able to integrate with every social media(facebook twitter reddit 9gag etc..) and also reddit TIPBOT!
Besides this they are implementing now SEGWIT and ATOMIC SWAPS!

It is currently on cryptopia and still very cheap. Its a buy and hodl for me for next months or even longer. After they release the working product I expect it to get to the billion dollar marketcap over some time (1-2 years) So when you have patience and want a 100x Coin here it is!

What do you think? For me the memes are too big too not achieve such price ranges!

https://kekcoin.co/
9  Other / Politics & Society / Internet Chemoterapy on: December 14, 2017, 11:35:58 PM
Hey guys read this please, it sounds really scary.. what do you think?

The source: http://archive.is/PQAnU#selection-9.43-17.3353

Internet Chemotherapy was a 13 month project between Nov 2016 - Dec 2017.
It has been known under names such as 'BrickerBot', 'bad firmware
upgrade', 'ransomware', 'large-scale network failure' and even
'unprecedented terrorist actions.' That last one was a little harsh,
Fernandez, but I guess I can't please everybody.

You can download the module which executes the http and telnet-based
payloads from this router at http://91.215.104.140/mod_plaintext.py. Due to
platform limitations the module is obfuscated single threaded python, but
the payloads are in plain view and should be easy to figure out for any
programmer worth his/her/hir salt. Take a look at the number of payloads,
0-days and techniques and let the reality sink in for a moment. Then
imagine what would've happened to the Internet in 2017 if I had been a
blackhat dedicated to building a massive DDoS cannon for blackmailing the
biggest providers and companies. I could've disrupted them all and caused
extraordinary damage to the Internet in the process.

My ssh crawler is too dangerous to publish. It contains various levels of
automation for the purpose of moving laterally through poorly designed
ISP networks and taking them over through only a single breached router.
My ability to commandeer and secure hundreds of thousands of ISP routers
was the foundation of my anti-IoT botnet project as it gave me great
visibility of what was happening on the Internet and it gave me an
endless supply of nodes for hacking back. I began my non-destructive ISP
network cleanup project in 2015 and by the time Mirai came around I was
in a good position to react. The decision to willfully sabotage other
people's equipment was nonetheless a difficult one to make, but the
colossally dangerous CVE-2016-10372 situation ultimately left me with no
other choice. From that moment on I was all-in.

I am now here to warn you that what I've done was only a temporary band-
aid and it's not going to be enough to save the Internet in the future.
The bad guys are getting more sophisticated, the number of potentially
vulnerable devices keep increasing, and it's only a matter of time before
a large scale Internet-disrupting event will occur. If you are willing to
believe that I've disabled over 10 million vulnerable devices over the 13-
month span of the project then it's not far-fetched to say that such a
destructive event could've already happened in 2017.

YOU SHOULD WAKE UP TO THE FACT THAT THE INTERNET IS ONLY ONE OR TWO
SERIOUS IOT EXPLOITS AWAY FROM BEING SEVERELY DISRUPTED. The damage of
such an event is immeasurable given how digitally connected our societies
have become, yet CERTs, ISPs and governments are not taking the gravity
of the situation seriously enough. ISPs keep deploying devices with
exposed control ports and although these are trivially found using
services like Shodan the national CERTs don't seem to care. A lot of
countries don't even have CERTs. Many of the world's biggest ISPs do not
have any actual security know-how in-house, and are instead relying on
foreign vendors for help in case anything goes wrong. I've watched large
ISPs withering for months under conditioning from my botnet without them
being able to fully mitigate the vulnerabilities (good examples are BSNL,
Telkom ZA, PLDT, from time to time PT Telkom, and pretty much most large
ISPs south of the border). Just look at how slow and ineffective Telkom
ZA was in dealing with its Aztech modem problem and you will begin to
understand the hopelessness of the current situation. In 99% of the
problem cases the solution would have simply been for the ISPs to deploy
sane ACLs and CPE segmentation, yet months later their technical staff
still hasn't figured this out. If ISPs are unable to mitigate weeks and
months of continuous deliberate sabotage of their equipment then what
hope is there that they would notice and fix a Mirai problem on their
networks? Many of the world's biggest ISPs are catastrophically negligent
and this is the biggest danger by a landslide, yet paradoxically it
should also be the easiest problem to fix.

I've done my part to try to buy the Internet some time, but I've gone as
far as I can. Now it's up to you. Even small actions are important. Among
the things you can do are:

* Review your own ISP's security through services such as Shodan and take
  them to task over exposed telnet, http, httpd, ssh, tr069 etc. ports on
  their networks. Refer them to this document if you have to. There's no
  good reason why any of these control ports should ever be accessible
  from the outside world. Exposing control ports is an amateur mistake.
  If enough customers complain they might actually do something about it!

* Vote with your wallet! Refuse to buy or use 'intelligent' products
  unless the manufacturer can prove that the product can and will receive
  timely security updates. Find out about the vendor's security track
  record before giving them your hard-earned money. Be willing to pay a
  little bit more for credible security.

* Lobby your local politicians and government officials for improved
  security legislation for IoT (Internet of Things) devices such as
  routers, IP cameras and 'intelligent' devices. Private or public
  companies currently lack the incentives for solving this problem in the
  immediate term. This matter is as important as minimum safety
  requirements for cars and general electrical appliances.

* Consider volunteering your time or other resources to underappreciated
  whitehat organizations such as GDI Foundation or Shadowserver
  Foundation. These organizations and people make a big difference and
  they can significantly amplify the impact of your skillset in helping
  the Internet.
 
* Last but not least, consider the long-shot potential of getting IoT
  devices designated as an 'attractive nuisance' through precedent-
  setting legal action. If a home owner can be held liable for a
  burglar/trespasser getting injured then I don't see why a device owner
  (or ISP or manufacturer) shouldn't be held liable for the damage that
  was caused by their dangerous devices being exploitable through the
  Internet. Attribution won't be a problem for Layer 7 attacks. If any
  large ISPs with deep pockets aren't willing to fund such precedent
  cases (and they might not since they fear that such precedents could
  come back to haunt them) we could even crowdfund such initiatives over
  here and in the EU. ISPs: consider your volumetric DDoS bandwidth cost
  savings in 2017 as my indirect funding of this cause and as evidence
  for its potential upside.

--[ 2 - Timeline

Here are some of the more memorable events of the project:

* Deutsche Telekom Mirai disruption in late November 2016. My hastily
  assembled initial TR069/64 payload only performed a 'route del default'
  but this was enough to get the ISP's attention to the problem and the
  resulting headlines alerted other ISPs around the world to the
  unfolding disaster.
 
* Around January 11-12 some Mirai-infected DVRs with exposed control port
  6789 ended up getting bricked in Washington DC, and this made numerous
  headlines. Gold star to Vemulapalli for determining that Mirai combined
  with /dev/urandom had to be 'highly sophisticated ransomware'. Whatever
  happened to those 2 unlucky souls in Europe?
 
* In late January 2017 the first genuine large-scale ISP takedown occured
  when Rogers Canada's supplier Hitron carelessly pushed out new firmware
  with an unauthenticated root shell listening on port 2323 (presumably
  this was a debugging interface that they forgot to disable). This epic
  blunder was quickly discovered by Mirai botnets, and the end-result was
  a large number of bricked units.
 
* In February 2017 I noticed the first Mirai evolution of the year, with
  both Netcore/Netis and Broadcom CLI-based modems being attacked. The
  BCM CLI would turn out to become one of the main Mirai battlegrounds of
  2017, with both the blackhats and me chasing the massive long tail of
  ISP and model-specific default credentials for the rest of the year.
  The 'broadcom' payloads in the above source may look strange but
  they're statistically the most likely sequences to disable any of the
  endless number of buggy BCM CLI firmwares out there.
 
* In March 2017 I significantly increased my botnet's node count and
  started to add more web payloads in response to the threats from IoT
  botnets such as Imeij, Amnesia and Persirai. The large-scale takedown
  of these hacked devices created a new set of concerns. For example,
  among the leaked credentials of the Avtech and Wificam devices there
  were logins which strongly implied airports and other important
  facilities, and around April 1 2017 the UK government officials
  warned of a 'credible cyber threat' to airports and nuclear
  facilities from 'hacktivists.' Oops.
 
* The more aggressive scanning also didn't escape the attention of
  civilian security researchers, and in April 6 2017 security company
  Radware published an article about my project. The company trademarked
  it under the name 'BrickerBot.' It became clear that if I were to
  continue increasing the scale of my IoT counteroffensive I had to come
  up with better network mapping/detection methods for honeypots and
  other risky targets.
 
* Around April 11th 2017 something very unusual happened. At first it
  started like so many other ISP takedowns, with a semi-local ISP called
  Sierra Tel running exposed Zyxel devices with the default telnet login
  of supervisor/zyad1234. A Mirai runner discovered the exposed devices
  and my botnet followed soon after, and yet another clash in the epic
  BCM CLI war of 2017 took place. This battle didn't last long. It
  would've been just like any of the hundreds of other ISP takedowns in
  2017 were it not for something very unusual occuring right after the
  smoke settled. Amazingly, the ISP didn't try to cover up the outage as
  some kind of network issue, power spike or a bad firmware upgrade. They
  didn't lie to their customers at all. Instead, they promptly published
  a press release about their modems having been vulnerable which allowed
  their customers to assess their potential risk exposure. What did the
  most honest ISP in the world get for its laudable transparency? Sadly
  it got little more than criticism and bad press. It's still the most
  depressing case of 'why we can't have nice things' to me, and probably
  the main reason for why 99% of security mistakes get covered up and the
  actual victims get left in the dark. Too often 'responsible disclosure'
  simply becomes a euphemism for 'coverup.'
 
* On April 14 2017 DHS warned of 'BrickerBot Threat to Internet of
  Things' and the thought of my own government labeling me as a cyber
  threat felt unfair and myopic. Surely the ISPs that run dangerously
  insecure network deployments and the IoT manufacturers that peddle
  amateurish security implementations should have been fingered as the
  actual threat to Americans rather than me? If it hadn't been for me
  millions of us would still be doing their banking and other sensitive
  transactions over hacked equipment and networks. If anybody from DHS
  ever reads this I urge you to reconsider what protecting the homeland
  and its citizens actually means.
 
* In late April 2017 I spent some time on improving my TR069/64 attack
  methods, and in early May 2017 a company called Wordfence (now Defiant)
  reported a significant decline in a TR069-exploiting botnet that had
  previously posed a threat to Wordpress installations. It's noteworthy
  that the same botnet temporarily returned a few weeks later using a
  different exploit (but this was also eventually mitigated).
 
* In May 2017 hosting company Akamai reported in its Q1 2017 State of the
  Internet report an 89% decrease in large (over 100 Gbps) DDoS attacks
  compared with Q1 2016, and a 30% decrease in total DDoS attacks. The
  largest attack of Q1 2017 was 120 Gbps vs 517 Gbps in Q4 2016. As large
  volumetric DDoS was one of the primary signatures of Mirai this felt
  like concrete justification for all the months of hard work in the IoT
  trenches.
 
* During the summer I kept improving my exploit arsenal, and in late July
  I performed some test runs against APNIC ISPs. The results were quite
  surprising. Among other outcomes a few hundred thousand BSNL and MTNL
  modems were disabled and this outage become headline news in India.
  Given the elevated geopolitical tensions between India and China at the
  time I felt that there was a credible risk of the large takedown being
  blamed on China so I made the rare decision to publically take credit
  for it. Catalin, I'm very sorry for the abrupt '2 day vacation' that
  you had to take after reporting the news.
 
* Previously having worked on APNIC and AfriNIC, on August 9th 2017 I
  also launched a large scale cleanup of LACNIC space which caused
  problems for various providers across the subcontinent. The attack made
  headlines in Venezuela after a few million cell phone users of Movilnet
  lost service. Although I'm personally against government surveillance
  of the Internet the case of Venezuela is noteworthy. Many of the
  LACNIC ISPs and networks have been languishing for months under 
  persistent conditioning from my botnet, but Venezuelan providers have
  been quick to fortify their networks and secure their infrastructure.
  I believe this is due to Venezuela engaging in far more invasive deep
  packet inspection than the other LACNIC countries. Food for thought.
 
* In August 2017 F5 Labs released a report called "The Hunt for IoT: The
  Rise of Thingbots" in which the researchers were perplexed over the
  recent lull in telnet activity. The researchers speculated that the
  lack of activity may be evidence that one or more very large cyber
  weapons are being built (which I guess was in fact true). This piece
  is to my knowledge the most accurate assessment of the scope of my
  project but fascinatingly the researchers were unable to put two and
  two together in spite of gathering all the relevant clues on a single
  page.
 
* In August 2017 Akamai's Q2 2017 State of the Internet report announces
  the first quarter in 3 years without the provider observing a single
  large (over 100 Gbps) attack, and a 28% decrease in total DDoS attacks
  vs Q1 2017. This seems like further validation of the cleanup effort.
  This phenomenally good news is completely ignored by the mainstream
  media which operates under an 'if it bleeds it leads' mentality even
  when it comes to information security. This is yet another reason why
  we can't have nice things.
 
* After the publication of CVE-2017-7921 and 7923 in September 2017 I
  decided to take a closer look at Hikvision devices, and to my horror
  I realized that there's a technique for botting most of the vulnerable
  firmwares that the blackhats hadn't discovered yet. As a result I
  launched a global cleanup initiative around mid-September. Over a
  million DVRs and cameras (mainly Hikvision and Dahua) were disabled
  over a span of 3 weeks and publications such as IPVM.com wrote several
  articles about the attacks. Dahua and Hikvision wrote press releases
  mentioning or alluding to the attacks. A huge number of devices finally
  got their firmwares upgraded. Seeing the confusion that the cleanup
  effort caused I decided to write a quick summary for the CCTV people at
  http://depastedihrn3jtw.onion.link/show.php?md5=62d1d87f67a8bf485d43a05ec32b1e6f
  (sorry for the NSFW language of the pastebin service). The staggering
  number of vulnerable units that were online months after critical
  security patches were available should be the ultimate wakeup call to
  everyone about the utter dysfunctionality of the current IoT patching
  process.
 
* Around September 28 2017 Verisign releases a report saying that DDoS
  attacks declined 55% in Q2 2017 vs Q1, with a massive 81% attack peak
  decline.
 
* On November 23rd 2017 the CDN provider Cloudflare reports that 'in
  recent months, Cloudflare has seen a dramatic reduction in simple
  attempts to flood our network with junk traffic.' Cloudflare speculates
  it could've partly been due to their change in policies, but the
  reductions also line up well with the IoT cleanup activities.
 
* At the end of November 2017 Akamai's Q3 2017 State of the Internet
  report sees a small 8% increase in total DDoS attacks for the quarter.
  Although this was a significant reduction compared to Q3 2016 the
  slight uptick serves as a reminder of the continued risks and dangers.
 
* As a further reminder of the dangers a new Mirai strain dubbed 'Satori'
  reared its head in November-December of 2017. It's particularly
  noteworthy how quickly the botnet managed to grow based on a single
  0-day exploit. This event underlines the current perilous operating
  state of the Internet, and why we're only one or two severe IoT
  exploits away from widespread disruption. What will happen when nobody
  is around to disable the next threat? Sinkholing and other whitehat/
  'legal' mitigations won't be enough in 2018 just like they weren't
  enough in 2016. Perhaps in the future governments will be able to
  collaborate on a counterhacking task force with a global mandate for
  disabling particularly severe existential threats to the Internet, but
  I'm not holding my breath.

* Late in the year there were also some hysterical headlines regarding a
  new botnet that was dubbed 'Reaper' and 'IoTroop'. I know some of you
  will eventually ridicule those who estimated its size at 1-2 million
  but you should understand that security researchers have very limited
  knowledge of what's happening on networks and hardware that they don't
  control. In practice the researchers could not possibly have known or
  even assumed that most of the vulnerable device pool had already been
  disabled by the time the botnet emerged. Give the 'Reaper' one or two
  new unmitigated 0-days and it'll become as terrifying as our worst
  fears.

--[ 3 - Parting Thoughts

I'm sorry to leave you in these circumstances, but the threat to my own
safety is becoming too great to continue. I have made many enemies. If
you want to help look at the list of action items further up. Good luck.

There will also be those who will criticize me and say that I've acted
irresponsibly, but that's completely missing the point. The real point
is that if somebody like me with no previous hacking background was able
to do what I did, then somebody better than me could've done far worse
things to the Internet in 2017. I'm not the problem and I'm not here to
play by anyone's contrived rules. I'm only the messenger. The sooner you
realize this the better.

-Dr Cyborkian a.k.a. janit0r, conditioner of 'terminally ill' devices.
10  Alternate cryptocurrencies / Speculation (Altcoins) / Future of Chronobank $TIME ? on: December 07, 2017, 11:53:55 AM
Hi

as you all know Bittrex will delist TIME tomorrow. The founder of Chronobank announced that they are working with their lawyers on it because Bittrex did not get some documents.. honestly I think they will delist it tomorrow but I will hold the tokens on my hardware wallet. I am sure the time for time will come in 2018 even without bittrex.
What do you think guys? The team told that they are working on other exchanges mostly Binance to get added.
11  Alternate cryptocurrencies / Altcoin Discussion / deadcoins on: October 23, 2017, 04:50:25 AM
Hey everybody,

I just discovered http://deadcoins.com/
A nice website with all cryptotokens ever that are already dead. The list is so huuge lol. Unfortunately not complete many information missing.

And since I am new to this universe I dont know all of them but I want to try to add some information over the time to this site.

My idea is to write here in this thread about interesting coins from the past which are already dead and a small anecdote (for example biggest pump, scam, nice logo design etc)
Some small histories only so that we will collect here the history about old not existing coins. So that they wont be lost!

Would appreciate your help guys!
12  Local / Polski / Stworzenie polskiej gieldy bitcoin altcoin on: September 28, 2017, 07:45:33 PM
Witam,


szuka w polsce firmy IT lub znajacych sie na fachu osob(front end back end software dev) ktore pomoga mi stworzyc gielde dla bitcoin altcoin i ktora z uplywem czasu bedzie mogla konkurowac z miedzynarodowymi gieldami. Czy zna sie ktos tu na tym albo zna firmy ktore przyjely by takie zlecenie? Smiley

pozdrawiam
13  Economy / Services / Search: Front end, back end and software dev for my new exchange on: September 28, 2017, 07:27:40 PM
Hey all,

I am in the process of creating a small only bitcoin altcoin exchange(no fiat) and searching Front end, back end and software dev for my new exchange.
Anybody here who wants to join? Its still an idea and I am in the process now of searching some skilled devs who could create something cool.
Also if you know companys who could do that just write it down here.

thanks !
14  Local / Off-Topic (Deutsch) / Programmieren einer Altcoin Exchange on: September 28, 2017, 07:21:04 PM
Hallo alle,

zuerst es geht mir darum nicht fett Kohle zu machen(die habe ich dank bitcoins mehr oder weniger) sondern ich will etwas für mich cooles "erschaffen" was auch andere Leute verwenden könnten. Und zwar eine reine Bitcoin Altcoin exchange ohne Fiat Währungen. Ein kleines Projekt zum herumspielen welches eventuell ich weiter fortführen würde wenn es "erfolgreich" ist. Mit erfolgreich meine ich funktioniert. Da ich was programmieren angeht eine null bin, würde ich gerne einige Leute die Ahnung haben anstellen und mit mir an der Entwicklung weiterarbeiten alles betreuen usw. Nur wo kann ich nach solchen "Spezialisten" suchen oder Firmen?
Kennt Ihr gewissen Entwickler oder Firmen die sich mit sowas beschäftigen? Egal oder in Europa oder weltweit ich bin offen.

Für Anregungen Ideen wo ich suchen schauen bzw auf was ich achten muss wäre ich dankbar  Smiley

Danke
15  Alternate cryptocurrencies / Speculation (Altcoins) / PURA COIN the next DASH!? on: August 15, 2017, 10:04:15 PM
Hi all,

in the last weeks I noticed there was a swap from ICASH to PURA. The swap happened on coinexchange and after that I bought some PURA and made big profit  Grin
ICASH/PURA is a Dash clone so I am curious what you think about it, do you think it can reach similar lvl like Dash in future?

https://coinmarketcap.com/currencies/pura/#charts

https://twitter.com/PURACOIN

https://puranetwork.com/

old Icash thread with information about swap an pura https://bitcointalk.org/index.php?topic=1534280.1020

share yout thoughts about this new coin!
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!