Bitcoin Forum
April 15, 2026, 11:08:02 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 »
1  Bitcoin / Bitcoin Discussion / We're under attack again... on: April 09, 2026, 08:26:22 AM
This time, it's after Iran started demanding ships to pay toll fees through their strait using Bitcoin.

It seems that Google is trying to play god again, and they have started suspending Bitcoin channels.



I get that it's Bitcoin.com, so a lot of you will have a good reason not to pity them, but they're going to start doing this to other channels too.

And maybe make Operation Chokepoint 3.0 to break Bitcoin, as if doing that is going to hurt Iran or something.

Doesn't matter which president is sitting, it's the same outcome.

Not holding? Buy some more.

Holding? Do some bitcoin outreach, create software, and record videos.
2  Bitcoin / Bitcoin Discussion / DMCA of Bitcoin-related software on: April 05, 2026, 06:53:11 AM
Have you guys heard of the Claude Code source leak that happened like a week ago, where it was posted on Github and Anthropic was aggressively sending DMCA takedown notices for the repos on Github? And then some guy used AI and millions of tokens to rewrite it in Rust in just a few hours so that DMCA would not apply.

That fork still lives today.

Anyway, it had me thinking, in the event that some exchange or DeFi platform were to accidentally publish their proprietary source code, I wonder if there would be people dedicated enough to make a rewrite clone.

We all know that such code would be useful for informational purposes.

But would it allow us to identify scams and phishing pages more easily, with knowledge of what the platform is supposed to do?
3  Other / Off-topic / What is wrong with HP batteries? on: March 31, 2026, 12:09:10 PM
This is like the 3rd time I need to get a laptop battery replaced in 3 years. Is this normal?

Sometimes I wish I got a Macbook Pro instead, but I couldn't find any in my area.
4  Bitcoin / Bitcoin Discussion / Protect your right to P2P on: March 29, 2026, 12:45:49 PM
Don't let anyone bully you into not buying or selling your crypto P2P.

If only the exchanges control the onramps and offramps, then the governments around the world can do whatever they want to your access and put your coins in a chokehold, when you try to spend them.

They have already failed at stopping Bitcoin itself. Now they are trying to make it harder for people to buy and sell it.

Because they know their currencies are failing and people are running away.

If you've seen any of the proposed laws for hardware wallet regulation, that is just the beginning. Their objective is to seize more money for personal gain.

Be a visionary.

Embrace BTC.
5  Bitcoin / Project Development / Help me test my SSH app on: March 12, 2026, 09:59:11 AM


This is the most advanced SSH app with a GUI in history.

You can use it for things like installing Bitcoin Core, running an Electrum server, verifying bitcoin application checksums and PGP keys, creating watch towers for Lightning Network, using Bitcoin APIs, etc.

The license is GPLv3, I'll release the Github repo soon.

It's closed beta, because I need testers. PM me if you want access. Google account required.
6  Other / Meta / Minor bug report on: March 07, 2026, 09:22:27 AM


It's a bug involving whitespace. It's harmless, and barely noticeable, but I just thought I'd bring it up.

When you begin a post with newline, and you click "Post", it correctly displays with the newlines under the horizontal bar. But when you click 'Edit", the leading newlines are stripped from the post editor, making it look like the were never inserted in the first place.

Also, double newline seems to be collapsed to a single newline after posting.

This post actually contains leading newlines, to show you a practical example of it. It doesn't happen with "Quote".

edited for clarity
7  Bitcoin / Development & Technical Discussion / Has Dandelion ever been implemented? on: February 22, 2026, 12:47:49 PM
From an old mailing list entry about 8 years ago.

Quote
Code:
Dear bitcoin-dev,
   We've put together a preliminary implementation and BIP for
Dandelion, and would love to get your feedback on it. Dandelion is a
privacy-enhancing modification to Bitcoin's transaction propagation
mechanism. Its goal is to obscure the original source IP of each
transaction.

  https://github.com/gfanti/bips/blob/master/bip-dandelion.mediawiki
  https://github.com/gfanti/bitcoin/tree/dandelion

   The main idea is that transaction propagation proceeds in two
phases: first the “stem” phase, and then “fluff” phase. During the
stem phase, each node relays the transaction to a *single* peer. After
a random number of hops along the stem, the transaction enters the
fluff phase, which behaves just like ordinary transaction
flooding/diffusion. Even when an attacker can identify the location of
the fluff phase, it is much more difficult to identify the source of
the stem. Our approach and some preliminary evaluation are explained
in more detail in the BIP. The research paper originally introducing
this idea was recently presented at SIGMETRICS'17.
https://arxiv.org/pdf/1701.04439.pdf

  Compared to the original paper, our current proposal includes
several new design ideas, especially:
 - Stronger attacker model: we defend against an attacker that
actively tries to learn which nodes were involved in the stem phase.
Our approach is called "Mempool Embargo", meaning a node that receives
a "stem phase" transaction behaves as though it never heard of it,
until it receives it again from someone else (or until a random timer
elapses).
 - Robustness. We think the privacy benefit shouldn't come at the
expense of propagation quality. Our implementation is designed so that
if some node drops the transaction (or when Dandelion is adopted only
partially), then the fallback behavior is ordinary Bitcoin
propagation.

  We'd especially like feedback on the implementation details related
to the two points above. The mempool embargo mechanism is tricky,
since it hard to rule out indirect behavior that reveals if a
transaction is in mempool. In the BIP we explain one counterexample,
but at least it requires the attacker to get its connections banned.
Are there other ways we haven't thought of? We think the alternative
approach (bypassing mempool entirely) seems even harder to get right,
and foregoes existing DoS protection.

  We're currently running in-situ benchmark experiments with this code
on testnet and will report on those in this thread if there's
interest.

  Some prior discussion can be found here:
  - https://botbot.me/freenode/bitcoin-wizards/2017-03-29/?msg=83181866&page=2
  - https://botbot.me/freenode/bitcoin-wizards/2017-01-18/?msg=79578754&page=2
  - https://github.com/sbaks0820/bitcoin-dandelion/issues/1 (notes
from gmaxwell that we've mostly incorporated in the current proposal)

Thanks!
-----
Giulia Fanti <gfanti@andrew•cmu.edu>
Andrew Miller <soc1024@illinois•edu>
Surya Bakshi <sbakshi3@illinois•edu>
Shaileshh Bojja Venkatakrishnan <bjjvnkt2@illinois•edu>
Pramod Viswanath <pramodv@illinois•edu>

I came upon this through the Bitcoin Wiki and I think it would be a bandwidth-friendlier alternative for transaction broadacasting than simply syncing an entire node via the Tor network and then relying on that for broadcasting.

There are way more clearnet nodes than Tor nodes anyway.
8  Local / النقاشات الأخرى / كيفية تحضير معدتك لشهر رمضان on: February 17, 2026, 12:03:54 PM
مع اقتراب شهر رمضان المبارك، من الضروري أن نختار سحورنا بعناية حتى لا نشعر بالجوع طوال اليوم. ولحسن الحظ، يمكننا اتباع نظام غذائي محدد يؤخر الشعور بالجوع حتى المساء.

لاختيار أفضل الأطعمة لسحور ، من الضروري فهم كيفية عمل المعدة.

توجد ثلاثة مصادر رئيسية للطاقة في الطعام: الكربوهيدرات، والبروتين، والدهون. للمعدة جدول زمني للشعور بالجوع، يتحدد بمواعيد تناول الوجبات. غالبا تشعر بالجوع قبل موعد الوجبة مباشرة، حتى لو لم يكن هناك طعام.

الكربوهيدرات

تهضم الكربوهيدرات والألياف، مثل الخبز والمعكرونة والأرز والبطاطا، بسرعة أكبر بكثير من البروتينات والدهون. وهي ليست مفيدة جدا للصيام لأن الطاقة تستهلك بعد بضع ساعات.

السكر نوع بسيط من الكربوهيدرات يهضم بسرعة فائقة. أنصح بعدم تناول الأطعمة السكرية على السحور.

البروتين

يبقى البروتين في جسمك لبعض الوقت على شكل عضلات، والتي يمكن تكسيرها أثناء الجوع.

  • عدس
  • حمص
  • دجاج
  • لحم بقري
  • أنواع عديدة من الأسماك
  • بيض
  • لبن (حليب)
  • زبادي

الدهون

تحتوي الدهون على كميات كبيرة من الطاقة، ويستغرق هضمها وقتا أطول من الكربوهيدرات والبروتينات. وهذا ما يجعلها الخيار الأمثل للصيام. يوجد نوعان رئيسيان من الدهون: الدهون غير المشبعة والدهون المشبعة. كما توجد الدهون المتحولة، والتي تتواجد بكثرة في الوجبات السريعة، ولكنها ضارة جدا بالصيام ويجب تجنبها.

الدهون غير المشبعة هي مثل زيت الزيتون والأفوكادو والمكسرات والطحينة (وهي نوع مفضل لدي من السودان) وأنواع معينة من الأسماك مثل السلمون والسردين والتونة.

الدهون المشبعة هي مثل زبدة الفول السوداني والجبن وزيت جوز الهند وبعض أنواع اللحوم.

الطاقة الموجودة في الأطعمة

تقاس الطاقة بالكيلو كالوري (kcal). عادة ما تجد عند شراء أي منتج من السوبر ماركت عدد الكيلو كالوري لكل غرام مدونا على ظهر العبوة. كما تذكر أيضا المكونات التالية:

- الكربوهيدرات (غرام)

- البروتين (غرام)

- الدهون، المشبعة وغير المشبعة (غرام). وإذا وجدت الدهون المتحولة، فسيتم ذكرها أيضا.

- الألياف - وهي نوع من الكربوهيدرات، لذا يمكن تجاهلها.

كل ما عليك فعله هو حساب النسب المئوية لكل عنصر غذائي رئيسي. إذا كان غنيا بالبروتين أو الدهون، فيمكنك تناوله. أما إذا كان غنيا بالكربوهيدرات أو الدهون المتحولة، فتجنبه.

kcal في الأطعمة الشائعة:

تونة في زيت نباتي - 300 kcal
أفوكادو - 240 kcal
زبدة الفول السوداني (1 ملعقة كبيرة) - 95 kcal
زيت زيتون (1 ملعقة كبيرة) - 120 kcal
طحينة (1 ملعقة كبيرة) - 100 kcal
بيضة واحدة - 75 kcal
شريحة جبن شيدر - 100 kcal
جبن صلب - 400 kcal
أنواع أخرى من الجبن (فيتا، موزاريلا) - حوالي 280 kcal
لحم بقري قليل الدهن - 200 kcal
لحم بقري متوسط ​​الدهن - 280 kcal
حليب كامل الدسم (كوب واحد) - 150 kcal
زبادي يوناني - 100 kcal
عدس (100 غرام) - 120 kcal
حمص (100 غرام) - 170 kcal



لكي تتمكن من إتمام يوم صيامك من الفجر حتى المساء، يجب أن يحتوي سحورك على ما بين 1800 و 2400 kcal.

إذا كنت تعيش في منطقة حارة وتتعرق بكثرة، أو تقوم بأعمال يدوية شاقة أو تمشي لمسافات طويلة، فأنت بحاجة إلى تناول ما يقارب 2400 kcal. يستهلك الجسم الطاقة بشكل أسرع عند التعرق أو العمل.

انعدام الطاقة يعني عدم القدرة على العمل، وضياع اليوم.

حجم الحصة الموصى به لسحور

هذه هي وجبتي المفضلة للسحور. تتكون في معظمها من الدهون مع قليل من البروتين، وتحتوي على حوالي 2200 kcal. لكنني أمشي كثيرا خلال اليوم وأحمل أشياء ثقيلة، لذا قد أزيد الكمية إذا شعرت بالجوع مبكرا.

- حبتان من الأفوكادو 480 سعرة حرارية
- علبة تونة واحدة 300 سعرة حرارية
- 4 ملاعق كبيرة من زبدة الفول السوداني 380 سعرة حرارية
- ملعقتان كبيرتان من زيت الزيتون للتونة (التونة تحتاج إلى زيت الزيتون لزيادة الدهون) 240 سعرة حرارية
- 8 ملاعق كبيرة من الطحينة 800 سعرة حرارية - يمكنك تقليل كمية الطحينة وإضافة البيض والجبن إذا رغبت.

مناسبة للتخزين طويل الأمد (باستثناء الأفوكادو)، ووقت تحضيرها من 5 إلى 10 دقائق. أضيف أيضا الجوز إذا لم تكن الكمية كافية.

اخترت تحديدا منتجات جافة يمكن تخزينها في الخارج، لذا لم أستخدم البيض أو الجبن.

كان شراء كل هذه الأشياء مكلفا للغاية Sad لكن الحمد لله، يوجد البيتكوين.

نصائح إضافية للصيام

- لا تكثر الكلام. فالماء يفقد بسرعة، وستشعر بالعطش سريعا.
- استخدم الفازلين على شفتيك، فهو يساعد على منع الجفاف ويذكرك بشرب الماء.
- من السهل تجاهل العطش أكثر من الجوع. ولكن إذا لم تتناول طعاما كافيا، أو تناولت الكثير من السكر، فستشعر بجوع شديد.
- النوم قليلا يبطئ عملية الأيض، مما يطيل مدة الصيام قليلا. حاول العودة إلى النوم بعد تناول الإفطار إن أمكن.
- لا ترتدي سترات إلا إذا كان الجو باردا.
- لا تدع الآخرين يغضبونك. فهذا سيتعبك ويفسد كل الجهد الذي بذلته في تحضير سحورك.
- ستكتسب وزنا بعد الصيام. هذا طبيعي، فقط مارس المزيد من الرياضة بعد انتهاء رمضان. لا تقلل من كمية السحور لتعويض ذلك.

اتمنى لكم جميعا رمضان مبارك وصياما مقبولا.
9  Other / Bitcoin Wiki / Preventing null edits on: February 14, 2026, 12:28:29 PM
Is there a way for the wiki to automatically prevent people from creating what's called "null edits" (edits that don't actually edit anything - it's just the person clicking on Save Changes)? The vast majority of my moderation work is spent clicking "Reject" on these kind of edits.
10  Economy / Service Discussion / [Read] How to harden your service from attacks on: February 08, 2026, 10:05:06 AM
So you have just launched your service and posted it on Bitcointalk. Congratulations! Now you have to secure your infrastructure before someone abuses it and causes you downtime. It could be a hacker, a competitor, a disgruntled customer, or anyone else, but knowing how to properly lock down your services will save you a lot of trouble.

Major hacks are often fatal to new services. Most don't survive the reputational fallout that follows it. Therefore, following these simple steps ensures that you never have to deal with those situations.

Table of Contents




0. Prerequisites

If you can't answer YES to all of these, then you need to find a specialist to secure your infrastructure for you. (I am available for hire, offers can be sent to my inbox or my Telegram/email address)

  • You are comfortable with using the Linux console.
  • You know how IP addresses, TCP, and port binding work.
  • You can add rules to a firewall without locking yourself out of SSH.
  • You can write web server and Tor configs without help.
  • You have reasonable experience in shell scripting.
  • You understand how browsers fetch web pages from servers.

Once the basics are covered, it’s time to move from theory into defensive posture. Most attacks that hit new services are boring, automated, and completely preventable.

Bots scan IPv4 nonstop. They are not targeting you. They are targeting anything that answers.

Your job is to make your host uninteresting.



1. Mass SSH Brute-Force

Bots constantly try username/password combinations against port 22. Even tiny VPS instances see thousands of attempts per day. If you have set a complex password, this isn't a big problem, but people with 8-character passwords should pay attention.

Most people configure SSH correctly so this has probably already been done on your server, but I'm leaving this here for completeness anyway.

Solution:

There are three different solutions but you can apply all three at once for maximum security. The first one is to stop using passwords and to use keypairs only. First you have to add a public key to the server:

Code:
ssh-keygen -t ed25519 -a 100 -C "your-email-or-label"  # Linux, Mac OS, and Windows 10+

Type a name or just press enter to use the name id_ed25519, then create a password for encrypting your private key with.

Then install the public key to the server:

Code:
ssh-copy-id -i ~/.ssh/id_ed25519.pub user@server-ip   # it asks for your server password to copy the public key
chmod 600 ~/.ssh/id_ed25519

# You can also copy the key manually into the path, but make sure you fix permissions on the remote host
chmod 600 ~/.ssh/*
chmod 700 ~/.ssh

Then you disable passwordless login:

Code:
sudo vim /etc/ssh/sshd_config

# Change the following two settings to as follows, or add them if they don't exist
# PasswordAuthentication no
# PubkeyAuthentication yes

# Then restart ssh
sudo systemctl restart ssh

The second solution is to ban IP addresses that keep sending invalid usernames/passwords (the default is 3 in a row).

Code:
sudo apt install fail2ban
sudo systemctl enable --now fail2ban

The third solution is to change the default SSH port to something other than 22, via the sshd_config, but this is overkill and not strictly necessary if you have already applied the two other mitigations.



2. Web login / API brute force

Attackers try to brute-force logins against admin panels, WordPress, custom dashboards, and other sorts of APIs The symptoms are similar to what you would see in SSH brute force, but the solution needs to be applied at the web server level.

Rate limit requests in Apache:

Code:
sudo apt install -y libapache2-mod-evasive
sudo a2enmod evasive

# add this to /etc/apache2/mods-enabled/evasive.conf
<IfModule mod_evasive20.c>
    DOSHashTableSize    3097

    # rate limiting per page per IP
    DOSPageCount        5
    DOSPageInterval     60    # seconds

    # rate limiting across all pages per IP
    DOSSiteCount        50
    DOSSiteInterval     60

    DOSBlockingPeriod   300
</IfModule>

# Apply changes
sudo systemctl reload apache2

For nginx - recommended, more granular control than Apache:

Code:
# /etc/nginx/nginx.conf
http {
    # add this to the http block
    limit_req_zone $binary_remote_addr zone=login:10m rate=5r/m;  # adjust limits accordingly

    ...
}

# /etc/nginx/sites-available/some-site.conf
# example server
server {
    listen 443 ssl;

    location /login {
        limit_req zone=login burst=5 nodelay;  # add this line
    }
}

# Apply changes
sudo systemctl reload nginx

If you are using Cloudflare with nginx then to make rate limiting work properly, you must set the IP address from the forwarded IP.

Code:
# /etc/nginx/conf.d/realip.conf
real_ip_header CF-Connecting-IP;

set_real_ip_from 173.245.48.0/20;
set_real_ip_from 103.21.244.0/22;
# etc...  get IP ranges from  https://www.cloudflare.com/ips-v4, https://www.cloudflare.com/ips-v6, or just script it

Adjust for other CDNs accordingly.



3. Vulnerable software & outdated plugins

The number one cause of exploits. Bots test known exploit paths seconds after CVEs become public. More knowledgeable hackers might take days but can find deadlier exploits.

The solution for this is quite easy. Keep all of your software updated automatically.

Debian/Ubuntu:

Code:
sudo apt update
sudo apt install -y unattended-upgrades apt-listchanges

# add the following to /etc/apt/apt.conf.d/20auto-upgrades
APT::Periodic::Update-Package-Lists "1";  # 1 = daily
APT::Periodic::Unattended-Upgrade "1";

# add the following to /etc/apt/apt.conf.d/50unattended-upgrades
"${distro_id}:${distro_codename}-security";
Unattended-Upgrade::Automatic-Reboot "true";
Unattended-Upgrade::Automatic-Reboot-Time "03:30";  # using system's timezone
Unattended-Upgrade::Remove-Unused-Dependencies "true";

Red Hat:

Code:
sudo dnf install -y dnf-automatic
sudo systemctl enable --now dnf-automatic-install.timer

# add this to /etc/dnf/automatic.conf
[commands]
upgrade_type = security
download_updates = yes
apply_updates = yes
reboot = when-needed



4. Exposed internal services

It should not be so easy to have databases and microservices listening on public interfaces, but it's common, and this is a nasty vulnerability that needs to be patched immediately.

The solution is different for each service because they have different config files, but to quickly find all of the exposed ports, run this command:

Code:
ss -tulpn src 0.0.0.0

Then firewall the services or bind them to localhost accordingly.



5. DDoS & resource exhaustion

Commercial DDoS services are available for quite cheap, so as a result, DDoS attacks are like mosquitoes bothering you at night. You can't just block IP addresses with the firewall because they keep changing.

Everyone knows the symptoms:
  • Load average explodes
  • SSH lags
  • Complete cut-off of service to the web resource

Personally I have a lot of experience with DDoS mitigation, and I have written about it elsewhere which I will quote here. Most of these solutions are only possible when you have big company infrastructure, but a one-man shop like you can apply a few of these configs on your server for basic DDoS protection.

Quote
Disclaimer: To roll our your own load balancing, you need quite a lot of money. Load balancers like F5 BIG-IP are really expensive and go into the 5 figures. But I guess for a mixer that makes tens of millions of dollars in profit a month, that is a drop in the bucket. Also there is Kemp LoadMaster that's cheaper (around thousands, rather than tens of thousands).

You will need a team of people to deal with networking maintenance of this hardware so it's really only reasonable if you partner with a datacenter company who offers such hardware.

Assuming you don't want to buy a hardware load balancer for some reason, you can make a DIY load balancer with HAproxy like this:

Code:
frontend web_frontend
    bind <public-ip>:80
    mode http
    acl abuse src_http_req_rate(10s) gt 100
    http-request deny if abuse
    default_backend web_servers

backend web_servers
    mode http
    balance roundrobin
    server server1 <private-ip-1>:80 check
    server server2 <private-ip-2>:80 check
    ... add more as needed ...

 # block layer 7
acl invalid_user_agent hdr(User-Agent) -m len 0
http-request deny if invalid_user_agent

or just purchase a license to RELIANOID if you don't want to write a bunch of config yourself.

But this method is less robust against DDoS attacks which nowadays can overwhelm 10Gbps Etherenet cables and Linux software.

Now you need to configure iptables to drop excessive connections from IP addresses:

Code:
iptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above 50 -j DROP

This sinkholes IP addresses that open more than 50 concurrent TCP connections to HTTP port 80. This doesn't stop the requests themselves but it prevents your own server from uploading reply spam packets to them, which massively improves performance during an attack.

Here is the config I used to drop all offending connections when BitMixList was under DDoS attack some time ago.

Code:
###################################################################
 # Anti-DDoS protection                
 # cuts off all upload traffic to DDoS IPs
 # Credit: https://web.archive.org/web/20220720030447/https://javapipe.com/blog/iptables-ddos-protection/
 # place this in /etc/sysctl.d/99-antiddos.conf and reboot the server

kernel.printk = 4 4 1 7      
kernel.panic = 10                      
kernel.sysrq = 0            
kernel.shmmax = 4294967296          
kernel.shmall = 4194304    
kernel.core_uses_pid = 1
kernel.msgmnb = 65536            
kernel.msgmax = 65536          
vm.swappiness = 20      
vm.dirty_ratio = 80        
vm.dirty_background_ratio = 5  
fs.file-max = 2097152      
net.core.netdev_max_backlog = 262144
net.core.rmem_default = 31457280
net.core.rmem_max = 67108864
net.core.wmem_default = 31457280
net.core.wmem_max = 67108864
net.core.somaxconn = 65535  
net.core.optmem_max = 25165824  
net.ipv4.neigh.default.gc_thresh1 = 4096
net.ipv4.neigh.default.gc_thresh2 = 8192
net.ipv4.neigh.default.gc_thresh3 = 16384
net.ipv4.neigh.default.gc_interval = 5                                                  
net.ipv4.neigh.default.gc_stale_time = 120
net.netfilter.nf_conntrack_max = 10000000
net.netfilter.nf_conntrack_tcp_loose = 0
net.netfilter.nf_conntrack_tcp_timeout_established = 1800
net.netfilter.nf_conntrack_tcp_timeout_close = 10
net.netfilter.nf_conntrack_tcp_timeout_close_wait = 10
net.netfilter.nf_conntrack_tcp_timeout_fin_wait = 20  
net.netfilter.nf_conntrack_tcp_timeout_last_ack = 20
net.netfilter.nf_conntrack_tcp_timeout_syn_recv = 20
net.netfilter.nf_conntrack_tcp_timeout_syn_sent = 20
net.netfilter.nf_conntrack_tcp_timeout_time_wait = 10
net.ipv4.tcp_slow_start_after_idle = 0
net.ipv4.ip_local_port_range = 1024 65000
net.ipv4.ip_no_pmtu_disc = 1
net.ipv4.route.flush = 1
net.ipv4.route.max_size = 8048576
net.ipv4.icmp_echo_ignore_broadcasts = 1
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_congestion_control = htcp
net.ipv4.tcp_mem = 65536 131072 262144
net.ipv4.udp_mem = 65536 131072 262144
net.ipv4.tcp_rmem = 4096 87380 33554432
net.ipv4.udp_rmem_min = 16384
net.ipv4.tcp_wmem = 4096 87380 33554432
net.ipv4.udp_wmem_min = 16384
net.ipv4.tcp_max_tw_buckets = 1440000
net.ipv4.tcp_tw_recycle = 0
net.ipv4.tcp_tw_reuse = 1
net.ipv4.tcp_max_orphans = 400000
net.ipv4.tcp_window_scaling = 1
net.ipv4.tcp_rfc1337 = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_synack_retries = 1
net.ipv4.tcp_syn_retries = 2
net.ipv4.tcp_max_syn_backlog = 16384
net.ipv4.tcp_timestamps = 1
net.ipv4.tcp_sack = 1
net.ipv4.tcp_fack = 1
net.ipv4.tcp_ecn = 2
net.ipv4.tcp_fin_timeout = 10
net.ipv4.tcp_keepalive_time = 600
net.ipv4.tcp_keepalive_intvl = 60
net.ipv4.tcp_keepalive_probes = 10
net.ipv4.tcp_no_metrics_save = 1
net.ipv4.ip_forward = 1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.all.accept_source_route = 0
net.ipv4.conf.all.rp_filter = 1
# Uncommenting this will break all of your bridged network interfaces like Docker (docker0), libvirt (virbr0), LxC (lxcbr0) etc. on this server and destroy VMs and containers networking, so I don't use this
#net.ipv4.ip_forward = 0

But the most powerful anti-DDoS method is BGP with anycast.

You can literally deploy swarms of servers and then the BGP protocol will just redirect traffic to another server when one goes down to DDoS (after you take the attacked server off the BGP network of course). Repeat ad infinitum. And Anycast is a form of networking where you assign an IP address to many different servers.

There's a lot of software to make a server announce Anycast IPs to the network, like Quagga, BIRD, FRRouting, and so on. Their config looks something like this:

Code:
# For BIRD
router id <router-ip>;
protocol bgp {
    local as <your-asn>;
    neighbor <upstream-router-ip> as <upstream-asn>;
    export all;
    import all;
}

As you can see, this requires your own ASN (Autonomous System Number - a cluster of IP addresses that are owned by you) and you will need to cooperate with your ISP to receive BGP packets to your router. Costs a lot of money as well.

You should combine all of these methods to protect your web service. Maybe they are not feasible for mixer operators which are usually small groups of 1-5 people, but you should definitely coordinate with a local, large, hosting provider which allows such websites such as mixing, to provide you DDoS protection.



5.1. Origin server hardening

Cloudflare is not a holy grail. Cloudflare and other CDNs protect layer 7 (i.e. HTTP) traffic from flooding your server, but if someone can find your IP address by another way, they can bypass your CDN and attack your server (forcing you to use all of the mitigations I wrote above).

You might ask, how is this possible?

First of all, there are usually two ways for the public to access your website:

- By domain name (https://example.com:443)
- By IP address (http://11.22.33.44:80) <-- no real users do this

Basically what people do is reverse-lookup the IP address of your domain name, and usually they will get a CDN IP. However, IPv4 scanning is very simple and low-cost to perform (it's how the SSH brute-force bots from section 1 were made possible), some people just scan entire hosting providers' subnets - now the hosting providers know this so they send abuse reports to the provider who then suspends the server fairly quickly.

Once finding your IP address like this they can flood your web server port with TCP packets, SYN spam, etc etc.

The way to prevent this is to disable IP address resolution at the firewall level, and force users to only access your site by domain name. First, you must set up your website with a CDN, as you will be blocking all other source IP addresses.

Paste this into your shell:

Code:
sudo apt install -y nftables
sudo systemctl enable --now nftables
sudo nft -f - <<'NFT'
table inet filter {
  set cf4 { type ipv4_addr; flags interval; }
  set cf6 { type ipv6_addr; flags interval; }

  chain input {
    type filter hook input priority 0;
    policy drop;

    iif "lo" accept
    ct state established,related accept

    # SSH (adjust if needed)
    tcp dport 22 accept

    # Only Cloudflare may reach HTTP/HTTPS
    tcp dport {80, 443} ip  saddr @cf4 accept
    tcp dport {80, 443} ip6 saddr @cf6 accept

    # Add other ports here as necessary
    # All other inbound traffic will be blocked

    # Optional ping
    ip protocol icmp accept
    ip6 nexthdr icmpv6 accept
  }
}
NFT

Create the following script at /usr/local/sbin/nft-update-cloudflare.sh

Code:
#!/usr/bin/env bash
set -euo pipefail

CF_V4_URL="https://www.cloudflare.com/ips-v4"
CF_V6_URL="https://www.cloudflare.com/ips-v6"

TABLE_FAMILY="inet"
TABLE_NAME="filter"
SET4="cf4"
SET6="cf6"

tmp="$(mktemp)"
trap 'rm -f "$tmp"' EXIT

# Ensure sets exist (no-op if they already do)
nft list set ${TABLE_FAMILY} ${TABLE_NAME} ${SET4} >/dev/null 2>&1 || \
  nft add set ${TABLE_FAMILY} ${TABLE_NAME} ${SET4} "{ type ipv4_addr; flags interval; }"

nft list set ${TABLE_FAMILY} ${TABLE_NAME} ${SET6} >/dev/null 2>&1 || \
  nft add set ${TABLE_FAMILY} ${TABLE_NAME} ${SET6} "{ type ipv6_addr; flags interval; }"

# Build a valid nft script (TOP-LEVEL commands)
{
  echo "flush set ${TABLE_FAMILY} ${TABLE_NAME} ${SET4}"
  while read -r cidr; do
    [[ -n "$cidr" ]] && echo "add element ${TABLE_FAMILY} ${TABLE_NAME} ${SET4} { $cidr }"
  done < <(curl -fsS "$CF_V4_URL")

  echo "flush set ${TABLE_FAMILY} ${TABLE_NAME} ${SET6}"
  while read -r cidr; do
    [[ -n "$cidr" ]] && echo "add element ${TABLE_FAMILY} ${TABLE_NAME} ${SET6} { $cidr }"
  done < <(curl -fsS "$CF_V6_URL")
} > "$tmp"

nft -f "$tmp"

Run it:

Code:
sudo chmod +x /usr/local/sbin/nft-update-cloudflare.sh
sudo /usr/local/sbin/nft-update-cloudflare.sh

If you use another CDN, update the script accordingly with their page of IP ranges.



6. Malicious request/command execution

These have a variety of different names (Cross-Site Request Forgery, Cross Site Scripting, SQL injection, command injection, execution from uploaded files, web shells, etc., and I will try to cover how to defend yourself from each one.



6.1. SQL injection

Never build SQL with string concatenation. Always use prepare statements i.e. parameterized queries ($pdo or $wpdb). For dynamic ORDER BY / column names, allowlist the column names and directions using a check in code since you can’t parameterize identifiers safely.

Examples:

Code:
$stmt = $pdo->prepare("SELECT * FROM users WHERE email = :email AND status = :status");
$stmt->execute([
  ":email" => $email,
  ":status" => $status,
]);
$rows = $stmt->fetchAll();

global $wpdb;
$sql = $wpdb->prepare(
  "SELECT * FROM {$wpdb->users} WHERE user_email = %s",
  $email
);
$row = $wpdb->get_row($sql);



6.2. Command injection / shell injection

Don’t call a shell with user input. Prefer native APIs (filesystem, image libraries, HTTP clients). If you must run a process: use exec without a shell and pass args as an array.

JS example:

Code:
import { spawn } from "node:child_process";

// validate inputPath and outputPath somewhere here

const child = spawn("/usr/bin/convert", ["-resize", "200x200", inputPath, outputPath], {
  shell: false,
});  // safe

For PHP: Never use system/exec/shell_exec. If unavoidable, use strict allowlists for program name / args along with escapeshellarg, but treat this as last resort.



6.3. Cross-Site Scripting (stored/reflected/DOM)

It means your code accidentally runs user input. Usually this is the fault of PHP, but some people manage to mess this up with other programming languages and even pure Javascript too.

Example: If you use DOM to print user input in a <div>, and the user typed <script>alert(1);</script>, it will execute Javascript instead of showing output.

Another example:

Your code:
Code:
<input value="USERNAME">

User input:
Code:
" autofocus onfocus=alert(1) "

What your code creates in the DOM
Code:
<input value="" autofocus onfocus=alert(1) ">     !!! code execution

Escape at the moment you output, right before it renders. All of these characters should be escaped:

Code:
& < > " '

Encode URLs and check the scheme before embedding. Or, avoid embedding URLs in the first place. That's how "click link to run malware" hacks work.

If you are embedding something in Javascript (not HTML), encode the string to JSON first because "abc" is valid JSON but something like '"; evil_command(); //' will escape all of the quotes, which then breaks the output.

Set a CSP to prevent external scripts from running. Start with the following, then expand as needed (scripts, cdn, etc.).

In PHP, disable uploaded file execution in your configuration like this:

Code:
php_admin_flag engine off

Code:
Content-Security-Policy: default-src 'self'; object-src 'none'; base-uri 'self'; frame-ancestors 'none'



6.4. Server-Side Request Forgery

In general, never render anything from user-controlled strings without escaping them first, and only allow the user code to embed what is absolutely necessary, using maps or dictionaries to map user identifiers with the actual target values to embed/run/etc., and set appropriate timeout & size limits.

If you must allow users to submit URLs as input you must block the following addresses, otherwise the mitigations you've applied in section 5.1 will be breached:

Code:
Loopback: 127.0.0.0/8, ::1
Private: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
Link-local: 169.254.0.0/16, fe80::/10
Unique local IPv6: fc00::/7
Cloud metadata (varies): commonly 169.254.169.254 or provider-specific hostnames


Some other things you have to defend against:

  • DNS rebinding - map to IP addresses instead
  • Alternate IP formats like 2130706433, octal, hex
  • @ userinfo tricks such as https://allowed.com@169.254.169.254/
  • Embedded newlines / header injection
  • Redirects to internal IPs

It is better to run your services inside Docker or K8s containers so you can then configure an allowlist for those processes without affecting the rest of your system.



7. Data exposure via search engines

An embarrassingly common occurrence where admins leave unnecessary files in their web root, which then become downloadable by Google, using a practice called "dorking".

To mitigate this, you have to clean your web root folder often, remove things like .bak and .env files from it which are not supposed to be served, or add a location block in your web server to make them resolve to 404 (not to 403 because then people will figure out that the files exist).



8. Closing words

Prevention is better than cure.

You are not hiding from attackers.

You are building layers that make automated exploitation fail so the attacker moves to the next target.

Most criminals choose the easiest victim.

Don’t be it.
11  Economy / Gambling discussion / Champions League 25/26 Knockout Stage Discussion on: February 08, 2026, 05:10:44 AM
Disclaimer - signature spam is not allowed here. You must have something meaningful to say, and if you're just posting garbage to fill your quota, your post will be deleted.



This thread is dedicated to serious discussions around betting, odds analysis, predictions, and news around the UEFA Champions League 2025/26 knockout stages. The other thread is just too long and unwieldy to have any sort of proper discussion without an army of users burying your post in pages of nonsense replies, so I've created this one. It will be locked following the conclusion of the final.



Group Stage Results:

PositionTeam NameMatches PlayedWinsDrawsLossesGoals For (GF)Goals Against (GA)Goal Difference (GD)Points
1Arsenal88002341924
2Bayern München87012281421
3Liverpool86022081218
4Tottenham85211771017
5Barcelona85122214816
6Chelsea85121710716
7Sporting CP85121711616
8Manchester City8512159616
--------------   (Playoffs / Seeded)
9Real Madrid85032112915
10Inter8503157815
11Paris Saint-Germain842221111014
12Newcastle84221771014
13Juventus83411410413
14Atlético de Madrid84131715213
15Atalanta84131010013
16Bayer Leverkusen83321314-112
--------------   (Playoffs / Unseeded)
17Borussia Dortmund83231917211
18Olympiacos83231014-411
19Club Brugge83141517-210
20Galatasaray8314911-210
21Monaco8242814-610
22Qarabağ83141321-810
23Bodø/Glimt82331415-19
24Benfica83051012-29
--------------   (Eliminated)
25Marseille83051114-39
26Pafos8233811-39
27Union SG8305817-99
28PSV8224161608
29Athletic Club8224914-58
30Napoli8224915-68
31Copenhagen82241221-98
32Ajax8206821-136
33Frankfurt81161021-114
34Slavia Praha8035519-143
35Villarreal8017518-131
36Kairat Almaty8017722-151

Playoff Matches and Dates:

DateTime (CET)Matchup (First Leg)
Feb 1718:45Galatasaray vs Juventus
Feb 1721:00Monaco vs Paris Saint-Germain
Feb 1721:00Borussia Dortmund vs Atalanta
Feb 1721:00Benfica vs Real Madrid
Feb 1818:45Qarabağ vs Newcastle
Feb 1821:00Club Brugge vs Atlético de Madrid
Feb 1821:00Bodø/Glimt vs Inter
Feb 1821:00Olympiacos vs Bayer Leverkusen

DateTime (CET)Matchup (Second Leg)
Feb 2418:45Atlético de Madrid vs Club Brugge
Feb 2421:00Bayer Leverkusen vs Olympiacos
Feb 2421:00Inter vs Bodø/Glimt
Feb 2421:00Newcastle vs Qarabağ
Feb 2518:45Atalanta vs Borussia Dortmund
Feb 2521:00Juventus vs Galatasaray
Feb 2521:00Paris Saint-Germain vs Monaco
Feb 2521:00Real Madrid vs Benfica

Full Knockout Bracket:


From UEFA.com

Team Betting Odds:

TeamLeague Phase PosPolymarket Probability (%)Implied American Odds
Arsenal120+400
Bayern München218+456
Liverpool39+1011
Tottenham42+4900
Barcelona512+733
Chelsea65+1900
Sporting CP71+9900
Manchester City810+900
Real Madrid97+1329
Inter103+3233
Paris Saint-Germain1110+900
Newcastle122+4900
Juventus131+9900
Atlético de Madrid142+4900
Atalanta151+9900
Bayer Leverkusen16<1>+9900
Borussia Dortmund171+9900
Olympiacos18<1>+9900
Club Brugge19<1>+9900
Galatasaray201+9900
Monaco21<1>+9900
Qarabağ22<1>+9900
Bodø/Glimt231+9900
Benfica241+9900
Note: Probabilities and implied odds from Polymarket as of February 08, 2026; probabilities do not sum to 100% due to market fees and liquidity. Implied odds are approximate.
12  Economy / Exchanges / Get your money out of Binance NOW! on: February 06, 2026, 06:03:02 AM
As I type this in a cafe, sipping a cup of coffee and devouring an éclair, a post just came on my reddit feed about Binance's involvement in this "crash".

Here is the Reddit post in question: https://www.reddit.com/r/CryptoCurrency/s/vXODlw2m6m

Here is the post where it says Binance is trying to "leverage" its SAFU fund:

https://bitcointalk.org/index.php?topic=5573259.0

You don't buy the dip with emergency funds.

Here is @OgNasty, whose opinion on Bitcoin price I highly respect, telling people on the WO thread that we're not at the bottom yet:

https://bitcointalk.org/index.php?topic=178336.msg66375365#msg66375365

I am telling you guys, get your money out of Binance NOW.

Don't even keep your shitcoins there.

I have a feeling this post is either going to either be wrong or it will be massive foresight before 2026 is finished.

Edit: spelling
13  Other / Meta / Beware of BLTCOINTALK.ORG on: February 01, 2026, 07:00:22 AM
There is currently a fake Bitcointalk clone with URL bltcointalk.org (L) online with a sticked message (topic ID 5572197) called "Administrator needs a loan". Over there it shows a post from Cyrus claiming that it's for a mini-vacation:



The problem is... This topic is not real. The actual topic on Bitcointalk just shows Cyrus moving somebody's Marketplace thread to another board.

Definitely be careful when you type Bitcointalk in your address bar, and do not send any money to those addresses and especially do not click on the login and register buttons or your account will definitely be hacked.

Is there a way to take down that site?
14  Other / Archival / monero.town verification on: January 18, 2026, 02:42:37 PM
username: bitmixlist

(This post is for verification of the Monero.town registration only.)
15  Other / Archival / Extension test on: January 17, 2026, 03:00:40 PM
Do not reply here
16  Economy / Services / [ALWAYS OPEN] BitMixList.org AML Checker FREE Signature Campaign on: January 13, 2026, 01:30:35 PM


With the creation of the AML score checker, BitMixList offers some of the cheapest AML checks on the market.
We are also a directory of trusted mixers and exchanges with resources on how to preserve your privacy and safety.

This is a free campaign; you do not get paid for wearing these materials. You should wear them to help the cause.

Likewise, there is no weekly post minimum/maximum or spreadsheet, and there is no campaign manager monitoring this thread (that doesn't mean you can spam though): Do not attempt to post an application form, because there is none. People who want to participate can indicate so by replying here. Feel free to wear and remove them an unlimited number of times.



Avatars:

                                                                                                                                                                                       




Signatures:

Full Member
Quote from: Full Member
Code:
[center][url=https://bitmixlist.org/][color=#406]██[/color][color=#729]██[/color][color=#527]██[/color][color=#618]██[/color][color=#729]██[/color]          [font=arial black][b][color=#000]B   I   T   [color=#a7f]M   I   X[/color]   L   I   S   T   [color=#a7f].   o   r   g[/color][/b][/font]          [color=#729]██[/color][color=#618]██[/color][color=#527]██[/color][color=#729]██[/color][color=#406]██[/color][/url]
[b][url=https://www.altcoinstalks.com/index.php?topic=319120.0][color=#a7f][  [font=arial black][color=#35193f]Altcoinstalks[/font]  ][/url]  [url=https://bitcointalk.org/index.php?topic=5477452.0][color=#35193f][  [font=arial black][color=#a7f][btc] Bitcointalk[/font]  ][/url][/b]
[url=https://bitmixlist.org/][color=#406]██[/color][color=#729]██[/color][color=#527]██[/color][color=#618]██[/color][color=#729]██[/color]          [font=arial][b][color=#527]Mi[color=#416]xe[color=#415]rs[color=#304]  [color=#a7f]•[/color]  [color=#405][nbsp][color=#406]E[color=#517]xc[color=#527]ha[color=#618]ng[color=#729]es[color=#618]  [color=#a7f]•[/color]  [color=#729]A[color=#618]ML[color=#517] [color=#416]Ch[color=#304]ec[color=#204]ke[color=#305]r[/font]          [color=#729]██[/color][color=#618]██[/color][color=#527]██[/color][color=#729]██[/color][color=#406]██[/color][/url][/center]

Sr Member
Quote from: Sr Member

▀██░▐███████▄▄
███░▐██▀▀▀▀████▄
███░▐███████▀███
███░▐███████████
███░▐██▄▄▄▄▄████
███░▐██████████▄
███░▐███████▀████
███░▐████████████
███░▐████████████
███░▐██▄▄▄▄▄█████
▄██░▐██████████▀
.
BitMixList
██████
██
██
██
██
██
██
██
██
██
██
██
██████
██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████
.
MIXERS  EXCHANGES   AML CHECKER
.

██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████
██████
██
██
██
██
██
██
██
██
██
██
██
██████
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
Altcoinstalks
.

▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
BTC Bitcointalk
.

▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Code:
[center][table][tr][td][url=https://bitmixlist.org/][size=2pt][color=#a7f]
▀██░▐███████▄▄
[color=transparent]██[/color]█░▐██▀▀▀▀████▄
[color=transparent]██[/color]█░▐██[color=#eef]█████[/color]▀███
[color=transparent]██[/color]█░▐██[color=#eef]██████[/color]███
[color=transparent]██[/color]█░▐██▄▄▄▄▄████
[color=transparent]██[/color]█░▐██████████▄
[color=transparent]██[/color]█░▐██[color=#eef]█████[/color]▀████
[color=transparent]██[/color]█░▐██[color=#eef]██████[/color]████
[color=transparent]██[/color]█░▐██[color=#eef]██████[/color]████
[color=transparent]██[/color]█░▐██▄▄▄▄▄█████
▄██░▐██████████▀[/td][td][/td]
[td][size=5pt][color=transparent].[/color][/size]
[size=15pt][font=montserrat,arial black][b][url=https://bitmixlist.org/][color=#35193f]Bit[color=#a7f]Mix[/color]List[/td][td][/td][td][/td][td][/td][td][/td][td][/td]
[td][size=2pt][color=#35193f]██████
██
██
██
██
██
██
██
██
██
██
██
██████[/td]
[td][center][size=2pt][color=#35193f]██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████
[size=6pt][color=transparent].
[b][url=https://bitmixlist.org/][font=arial][size=11pt][color=#527]MI[color=#416]XE[color=#415]RS[color=#304][nbsp][color=#a7f]•[/color][color=#405][nbsp][color=#406]E[color=#517]XC[color=#527]HA[color=#618]NG[color=#729]ES[color=#618][nbsp][color=#a7f]•[/color][color=#729][nbsp][color=#729][nbsp]A[color=#618]ML[color=#517][nbsp][color=#416]CH[color=#304]EC[color=#204]KE[color=#305]R[/font][/b]
[size=5pt].[/size][/color][/size]
██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████[/td]
[td][right][size=2pt][color=#35193f]██████
██
██
██
██
██
██
██
██
██
██
██
██████[/td][td][/td]
[td][size=2pt][color=#a7f]█▀▀▀▀











█▄▄▄▄[/td]
[td][center][size=2pt][color=#a7f]▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
[color=transparent][size=6pt].
[b][url=https://www.altcoinstalks.com/index.php?topic=319120.0][size=9pt][font=Montserrat,arial black][color=#35193f]Altcoinstalks[/b]
[size=7pt].[/color]
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄[/color][/size][/td]
[td][right][size=2pt][color=#a7f]▀▀▀▀█











▄▄▄▄█[/td][td][/td]
[td][size=2pt][color=#35193f]█▀▀▀▀











█▄▄▄▄[/td]
[td][center][size=2pt][color=#35193f]▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
[color=transparent][size=6pt].
[font=Montserrat,arial black][url=https://bitcointalk.org/index.php?topic=5477452.0][size=9pt][color=#a7f][btc][nbsp][b]Bitcointalk[/font]
[size=7pt].[/color]
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄[/color][/size][/td]
[td][right][size=2pt][color=#35193f]▀▀▀▀█











▄▄▄▄█[/td][/tr][/table][/center]

Hero - Legendary Member
Quote from: Hero - Legendary Member
Code:
[center][table][tr][td][url=https://bitmixlist.org/][size=2pt][glow=#313,1][color=#313]█████████████████████████
████[color=#a7f]███[/color]█▌[color=#a7f]████████[/color]████████
█████[color=#a7f]██[/color]█▌[color=#a7f]██[/color]▄▄▄▄[color=#a7f]████[/color]▀█████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]█████▄[color=#a7f]███[/color]█████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]██████[color=#a7f]███[/color]█████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]████▀[color=#a7f]███[/color]▄█████
██████[color=#a7f]█[/color]█▌[color=#a7f]█████████[/color]▀██████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]▄▄▄▄▄[color=#a7f]████[/color]▀████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]██████[color=#a7f]████[/color]████
██████[color=#a7f]█[/color]█▌[color=#a7f]██[/color]██████[color=#a7f]████[/color]████
█████[color=#a7f]██[/color]█▌[color=#a7f]██[/color]▀▀▀▀▀[color=#a7f]████[/color]▄████
████[color=#a7f]███[/color]█▌[color=#a7f]█████████[/color]▄██████
█████████████████████████[/td]
[td][size=1px][color=transparent].[/color][/size]
[font=arial black][size=24pt][glow=#35193f,1][color=#35193f].[size=11pt][sup][size=15pt][font=montserrat,arial black][b][url=https://bitmixlist.org/][color=#fff]Bit[color=#a7f]Mix[/color]List[/sup][/size][nbsp][nbsp][b][glow=#425,2][color=#425].[/glow][glow=#527,2][color=#527].[/glow][glow=#729,2][color=#729].[/glow][url=https://bitmixlist.org/][color=#FFF][glow=#527,2][size=15pt][sup][size=11pt][font=arial]MI[/glow][glow=#416,2][size=15pt][sup][size=11pt][font=arial]XE[/glow][glow=#415,2][size=15pt][sup][size=11pt][font=arial]RS[/glow][glow=#304,2][size=15pt][sup][size=11pt][font=arial][nbsp]•[/glow][glow=#405,2][size=15pt][sup][size=11pt][font=arial][nbsp][/glow][glow=#406,2][size=15pt][sup][size=11pt][font=arial]E[/glow][glow=#517,2][size=15pt][sup][size=11pt][font=arial]XC[/glow][glow=#527,2][size=15pt][sup][size=11pt][font=arial]HA[/glow][glow=#618,2][size=15pt][sup][size=11pt][font=arial]NG[/glow][glow=#729,2][size=15pt][sup][size=11pt][font=arial]ES[/glow][glow=#618,2][size=15pt][sup][size=11pt][font=arial][nbsp]•[/glow][glow=#729,2][size=15pt][sup][size=11pt][font=arial][nbsp]A[/glow][glow=#618,2][size=15pt][sup][size=11pt][font=arial]ML[/glow][glow=#517,2][size=15pt][sup][size=11pt][font=arial][nbsp][/glow][glow=#416,2][size=15pt][sup][size=11pt][font=arial]CH[/glow][glow=#304,2][size=15pt][sup][size=11pt][font=arial]EC[/glow][glow=#204,2][size=15pt][sup][size=11pt][font=arial]KE[/glow][glow=#305,2][size=15pt][sup][size=11pt][font=arial]R[/glow][/b][glow=#305,2][color=#305]....[/color][font=arial black][url=https://www.altcoinstalks.com/index.php?topic=319120.0][color=#888][size=7pt][sup][size=17pt][glow=#a7f,1][color=#a7f]..[b][color=#fff][size=8pt][sup][size=9pt][font=Montserrat,arial black]Altcoinstalks[/b]..[/color][/glow][/sup][/size][/font][nbsp][font=arial black][color=#888][size=7pt][sup][size=17pt][glow=#fff,1][color=#fff]..[color=#a7f][size=8pt][sup][size=9pt][font=Montserrat,arial black][url=https://bitcointalk.org/index.php?topic=5477452.0][glow=#a7f,1][color=#a7f].[color=#fff][btc][/color].[/glow][nbsp][color=#a7f][b]Bitcointalk[/b][/sup][/color][color=#fff]..[/color][/glow][/sup][/size][/font][size=12pt][nbsp][/size][/td][/tr][/table][/center]
17  Bitcoin / Development & Technical Discussion / v30 yanked? on: January 06, 2026, 06:03:02 PM
I just read the news that Bitcoin Core 30 and 30.1 were pulled from the downloads because they could delete some Satoshi-era wallets during migration, I guess of really old wallet.dat version.

How does this kind of bug manage to sneak into Core's codebase in the first place? You'd think that triage would make this sort if bug easily detectable once maintainers share it with each other.

And why is it still pinned on Bitcointalk? It should be yeeted out until 30.2 is released.

18  Other / Bitcoin Wiki / What should be done with this page? on: December 14, 2025, 02:14:55 PM
https://en.bitcoin.it/wiki/Statistics

The Statistics page, which is directly linked from the front page, seemed to have been created with the idea of showing the current block tip, difficulty, and number of coins in circulation.

Obviously that never worked out, since everything is just replaced with dots now, and block explorers have more or less made that function obsolete.

Or was there another purpose intended for this page?
19  Other / Meta / Watchlist.php only removes 1000 topics at once on: November 29, 2025, 02:38:04 PM
I am trying to clear my watchlist and keep only the topics I want, since I can't change the threads in "Show new replies to your posts". But I think I've run into a bug - I can't remove more than 1000 or so topics at once, even if I click "check all" and then "remove checked". Is this a forced limitation to avoid making the database a bottleneck?
20  Other / Off-topic / X.com on: November 12, 2025, 07:05:40 PM
Has anyone else here been locked out of their X/Twitter accounts? It seems that people with 2FA are experiencing an "infinite loop" of security key re-enrollment prompts... preventing them from even logging in.

Edit: See https://www.windowscentral.com/software-apps/live/x-goes-down-hard-with-a-security-yubikey-error-affecting-millions-of-twitter-users
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!