Whitepaper link not working
|
|
|
Telegram: Jason Walker: News is coming soon. Devs are working round the clock.
I hope the Dev comes back with a Bang! DAG has accumilated a nice following in a very short time Awaiting for some interesting developments That is all nice and well, but the dev should take 5 min every few days or at least once a week to inform us of the progress on this thread. As it is now, I'm not that confident of this coin. I will report for dev. - My lambo rolling nice,changed wheels yesterday after those rides and drifts,like my new car,thank you community ,have a nice day. lmao...well played. yet another shitcoin to add to the ever growing list!
|
|
|
Going with recommended settings looked to be good for all of about 4.5 minutes. Steady hashrate around 14.5 with 0 hardware errors. Right after 4:30 mark, 2 of the 3 boards just quit. Bumping freq value above or below 400 of no help..just causes them to fail faster or right out of the gate upon reboot.
|
|
|
Just tried giving custom firmware a shot with various settings and sadly unit stopped hashing after only a couple of minutes. Will give it another crack here hopefully sometime later today.
|
|
|
any news dev ?
Yeah...these Mai Tai's are amazing!!
|
|
|
vrm2 is down again ??
Appears so. Been down for me for awhile now out here on the west coast :/
|
|
|
Guess I see now why these puppies haven't gone anywhere. Win some/lose some as the old saying goes.
Explain what you mean. Are you waiting for a crowd to tell you what is good or bad? If you buy coins when they are popular and sell them when they are criticized that is not going to work well probably. Pretty obvious this under-the-radar coin doesn't have anything going for it. Last major release Dec. 14th, 2015 (a veritable lifetime in crypto years). 0 significant vendor or payment gateway support insufficient liquidity on the 1x exchange that lists it (cryptopia) *Gotta say though, that 1-2 litoshi apiece range is looking mighty good if you guys are trying to be the dogecoin of the ltc trading world on cryptopia.
|
|
|
True enough. But can't blame this one on anybody but myself for this FUBAR. Be sure to check and re-check that whatever addy your sending BTC too for long term storage has a private key which is under your control exclusively.
right, i've found your tx on random wallet file... https://puu.sh/xvd8R/b5c28c0035.pngPM sent
|
|
|
Thx for the nice words guys!
Still working my but off to add more and more features!
Greetings!
Eliovp, how does one go about acquiring a copy of your PandaOS? Just received a b5+ unit and not hashing anywhere near it's reported 110MH for eth. Interested in seeing if I can get any closer with your OS.
|
|
|
Guess I see now why these puppies haven't gone anywhere. Win some/lose some as the old saying goes.
|
|
|
Dude it is seriously unbelievable how many hacks/scams there are in Bitcoin. And also do people think stealing other's money is going to make them happy or their life better?! What is wrong with people these days... True enough. But can't blame this one on anybody but myself for this FUBAR. Be sure to check and re-check that whatever addy your sending BTC too for long term storage has a private key which is under your control exclusively.
|
|
|
Some new precautions will be taken on the wiki following this incident: - Copying a sample address or private key from the wiki to a clipboard will also add some text to the clipboard stating that it is a sample key and should not be sent to or imported
- A hatnote will be added to pages that make use of sample keys warning users not to send to or import them
- Private keys will only be included on wiki pages when they are necessary to explain bitcoin functionality
Thx Taras. Hopefully this will help prevent others from making the same mistake. Note to self, if your going to play with publicly exposed private keys, do it on a junker system labeled with a huge bitcoin symbol with a giant red X over it followed by the word dummy!
|
|
|
username: nwfella
*Many thanks.
|
|
|
here is your private key which is easily found with a quick google search: 5HueCGU8rMjxEXxiPuD5BDku4MkFqeZyd4dZ1jvhTVqvbTLvyTJ
you've probably imported this key some time in the past (for some weird reason) and have forgotten about it and now you have paid the price. p.s. it is found here by the way: https://en.bitcoin.it/wiki/Wallet_import_formatGosh darn. It is never a good idea to upload private keys online. That is asking to get your Bitcoin stolen. and look what happened.... live and learn. this just keeps getting better. turns out I cyberheisted myself. The private key I apparently imported while learning about bitcoin-cli from this very same article https://en.bitcoin.it/wiki/Wallet_import_format, didn't give it a label, forgot all about it and then sent the bitcoin to it. What a bone-head maneuver that was. Well, one things for sure, won't be making that mistake again. Undoubtedly some clever hacker out there has some kinda program running to constantly scan that addy and shoot whatever comes into it to privately held wallet. Live and learn indeed!
|
|
|
here is your private key which is easily found with a quick google search: 5HueCGU8rMjxEXxiPuD5BDku4MkFqeZyd4dZ1jvhTVqvbTLvyTJ
you've probably imported this key some time in the past (for some weird reason) and have forgotten about it and now you have paid the price. p.s. it is found here by the way: https://en.bitcoin.it/wiki/Wallet_import_formatYup, that would certainly be it. Doesnt take away the finamcial stimg obviously nor tell me exactly how i initially exposed it..thanks for the heads up, at least now i know definitively why my lively satoshis got snatched away right before my watery, frustration filled eyes. Talk about incentive for purchasing a dedicated hardware wallet. So pissed, no wonder all those hacker stereotypes are all wearin masks!!
|
|
|
Indeed, the history of your address seems to indicate that this has been going on for a while... although almost all of them anyway drain the address after receiving even from 2013. The most recent are the ones similar to the one you posted though - near instant spends after confirmation. You need to do that wipe right now.
Doing it now. Also going thru and trying to verify i dont have any sort of recurring payouts going to it.
|
|
|
Can you recall what did you do with your Bitfinex account? because why in the hell did it goes to a wrong person and did you contact Bitfinex support already? did you messed up for yourself?
Nope, not a bitfinex issue at all. As I mentioned in the OP it looks like this addy has been compromised for quite sometime as seemingly all previous tx's have behaved in exactly the same way. I believe the source of the problem is either: a.) a compromised private key for that specific addy or b.) the laptop that had full core running on it has been compromised by an unauthorized usb stick being plugged into it :/ Hard to believe I ended up having to screw up with over $3400+ in BTC before I noticed it. In total, 1.45602349 BTC has been lost to this compromised addy.
|
|
|
Tis indeed a seriously sad day for yours truly. I went ahead and pulled out the majority of my holdings on Bitfinex to this locally controlled Core wallet address 1GAehh7TsJAHuUAeKZcXf5CnwuGuGgyX2S Sadly, the second it received it's first confirmation it was on its way to some fat happy hacker's wallet here https://blockchain.info/address/1PYnrYNPiq7YWrxFGMhJhm9Jqwnuoaj1qE*Not sure if as a result of recently purchased USB stick that was unfortunately plugged into my Core system or if the private key on that addy has been compromised for sometime now but definitely first strange behavior like this I've noticed from any addy's held in this node's wallet.
/facepalm, further investigation reveals that this addy has always behaved this way so apparently it's been compromised for sometime time to do a full wipe on this puppy and start from scratch sadly. Where the heck is the dang Ctrl-Z function on this thing!! :/
|
|
|
Huh, this part doesn't make a whole lotta sense to me: How that can be true? 1/ Imagine there are two addresses which are man's and woman’s profiles. Both have an info, for woman it is something like age, body, height, breast, images and so on. But most important is that both have a location, like a city, and a reputation. 2/ Man is searching for women near him using a web application, or a mobile phone app. When he is interested in some woman, he transfer SEXS tokens to her in amount she wants for some service like erotic massage, private dance or sex. But these tokens are not in her wallet, but in a two-step contract. What is important, man’s wallet generates access key, which can be used later if service completed. For woman it is a signal the man are interested, have real intense and solvent. They can start a communication using methods they want. Man receive access to private information of the woman, like more photos, name or something she decides, and vise versa. 3/ If they make an agreement, they meet (in a public place, for example). So there can be no fraud. If she is not the person at the profile, she wouldn’t get the access key. If he is not the guy she was expected, she wouldn’t proceed with the relationship. They are both in no risk. 4/ If they are ready to proceed, she scans the access key, and man gets the service. Otherway contract will be closed automatically in 48 hours, and man will get SEXS tokens back and can start with another try. There will be the same outcome if she will not respond to a request, or they would not meet each other. 5/ After that, they both have 24 hours to leave a feedback to each other and gain reputation.
It is just one of possible scenarios we will offer.
*How does this scenario alleviate counter-party risk for the girl involved? Let's presume everything else is satisfied, she who she says she is, he is who is says he is, she goes through with it and he decides to screw her (pun intended) on the payment side of things?
|
|
|
Not nearly as good a deal as your other offer for 0.01 BTC for lifetime hosting...highly suspect!!
|
|
|
|