Bitcoin Forum
April 16, 2024, 11:48:25 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 [43] 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 127 »
841  Local / Anfänger und Hilfe / MOVED: Bitcoin – und dann? Wechselstube und EURO für Anfänger on: June 13, 2015, 01:13:05 PM
Bitcointalk - und dann? Regeln und Gepflogenheiten für Anfänger :

Wer seine Posts nicht gelöscht haben will, lässt die Reflinks weg.


This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1088485.0
842  Local / Off-Topic (Deutsch) / MOVED: 0.5 Gramm Gold for free bei BitGold on: June 12, 2015, 04:38:14 PM
Referral spam.
This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1086943.0
843  Local / Biete / MOVED: Biete 2Netflix Accounts zum verkauf on: June 08, 2015, 04:50:36 PM
Das hier ist kein Hehlerforum für Hacker.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1083587.0
844  Local / Biete / MOVED: [Biete] CD-Keys sämtlicher Produkte on: June 07, 2015, 01:49:03 PM
Floord selling keys illegally again.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1080726.0
845  Local / Deutsch (German) / MOVED: Weekly Bitcoin Turnierspiel on: June 07, 2015, 12:17:49 PM
Google Translate Spam.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1083070.0
846  Local / Deutsch (German) / MOVED: Free 0.5 btc BONUS!! on: June 06, 2015, 02:47:54 PM
Referral Spam. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1082548.0
847  Local / Deutsch (German) / MOVED: Free Bitcoins ! on: May 31, 2015, 05:28:41 PM
Referalspam. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1076303.0
848  Local / Altcoins (Deutsch) / MOVED: Gratis 50 NXT fürs anmelden bei NXTBubble.com (Social NXT Gambling) on: May 31, 2015, 01:11:20 PM
Giveaway Threads sind verboten.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1067426.0
849  Local / Biete / MOVED: [New Faucet] MundoBTC - Bis 1000 satoshi alle 30 Minuten on: May 31, 2015, 01:10:32 PM
Google Translate Spam.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1075599.0
850  Local / Deutsch (German) / MOVED: CBX - May 29th, 2015 Announcement – Community Support Needed on: May 30, 2015, 12:21:16 PM
Get a translation and not a google translation. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1074912.0
851  Local / Trading und Spekulation / Re: Der Aktuelle Kursverlauf on: May 29, 2015, 07:33:15 PM
Tja... wenn die - IMHO - wichtigste Alternative/Ergänzung zum BTC hier auf der schwarzen Liste steht tut´s mir Leid um diese Forum...

Bei den Ausschlägen die XRP hin und wieder hinlegt dürfte das sehr wohl einen Einfluss auf den Kursverlauf der anderen Cryptos und damit auch dem "Aktuellen Kursverlauf" des BTC haben...


Bla,bla du regst dich nur darüber auf weil es um deine Lieblingsalternative ging. Bleib einfach beim Thema. Ich verbiete dir nicht im richtigen Bereich über den XRP zu schreiben. Viele lesen hier mit um was über den Bitcoin-Kursverlauf zu erfahren, unter anderem ich.
852  Local / Trading und Spekulation / Re: Der Aktuelle Kursverlauf on: May 29, 2015, 07:26:36 PM
Der HSV-Kommentar bezog sich wenigstens noch auf den Kursverlauf ... Ihr müsst hier nicht reinposten, damit hier irgendwas steht oder ne Diskussion über eure Lieblingscoins entsteht. Gibt genug alternative Threads dafür.
853  Local / Deutsch (German) / MOVED: etzt! 100% Gewinnchance für BTC bei BitYes + Verdiene BTC für Einladungen on: May 28, 2015, 04:14:44 PM
Google Translate Spam.This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1072678.0
854  Local / Treffen / Re: Bundesverband Bitcoin Mitgliederversammlung 20.06.2015 in Hamburg on: May 27, 2015, 08:38:47 PM
Für den Fall, dass jemand eine Mitfahrgelegenheit sucht:
ich fahre am 19. von Heilbronn rauf, zurück am 21.
Ist wahrscheinlich nicht wirklich nützlich für irgendjemand, wer will schon 2 Tage in Hamburg bleiben (und noch dazu mit mir)? Wink

Würde evtl drauf ankommen, wann du fährst und ob du mich und nen Kumpel mitnehmen würdest (und was du an Spritgeld willst) Wink
Aber ich denke, das regeln wir besser per PM.
855  Other / Meta / Re: VIP account with a single space as a Username on: May 26, 2015, 06:49:35 PM
It defiantly did not have it's password reset via email in the last 30 days. If you search the security log for "-  " (a dash followed by two spaces) then you will only find one entry of the password being changed (that requires the knowledge of the previous password).

This account is either a hacked account (by the person who hacked the forum) or is actually the person who ran the referenced scam. His dox was even posted here

or maybe the person who hacked the person who hacked the forum Wink
That is possible but I would find that unlikely personally.

OF course, most likely scenario is non-hacked account, but that is niet fun. no paranoid schitzophrenic would believe that, hence nobody here.
Why don't you answer straight up if this is really your account or if you actually hacked this account.

I am being honest.

this is my account.
yes I know i post different, people change. also duolingo helps.
i came back when i got an email telling me all of my fucking PM's were hacked, not weeks ago i got another saying my PM's were given to the government. you can imagine how one might react to this, in germany privacy is a big issue, if theymos live here in germany i would kick his ass for this shit.

Your choices are limited. Live with this accusations, and this account is worthless and say fuck it. Come forward just say that you hacked your way in and this account is worthless, too. Proof that you are the owner of this account and try and get fucked by the victims for your exchange scam. I know some people who would like to have a really nice chat with you (besides Law Enforcement).

Either way stop whining.
856  Local / Deutsch (German) / MOVED: Sharcoin neues Leben on: May 26, 2015, 06:31:40 PM
Google translate spam.

This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1061403.0
857  Local / Anfänger und Hilfe / Re: Endlich ;-) on: May 26, 2015, 06:30:20 PM
Für die, die die Mail noch nicht gelesen haben :

On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:
- Email address
- Password hash (see below)
- Last-used IP address and registration IP address
- Secret question and a basic (not brute-force-resistant) hash of your secret answer
- Various settings

As such, you should change your password here and anywhere else you used that same password. You should disable your secret question and assume that the attacker now knows your answer to your secret question. You should prepare to receive phishing emails at your forum email address.

While nothing can ever be ruled out in these sorts of situations, I do not believe that the attacker was able to collect any personal messages or other sensitive data beyond what I listed above.

Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

I will now go into detail about how well you can expect your password to fare against a determined attacker. However, regardless of how strong your password is, the only prudent course of action is for you to immediately change your password here and everywhere else you used it or a similar password.

The following table shows how long it will take on average for a rather powerful attacker to recover RANDOM passwords using current technology, depending on the password's alphabet and length. If your password is not completely random (ie. generated with the help of dice or a computer random number generator), then you should assume that your password is already broken.

It is not especially helpful to turn words into leetspeak or put stuff between words. If you have a password like "w0rd71Voc4b", then you should count that as just 2 words to be safe. In reality, your extra stuff will slow an attacker down, but the effect is probably much less than you'd think. Again, the times listed in the table only apply if the words were chosen at random from a word list. If the words are significant in any way, and especially if they form a grammatical sentence or are a quote from a book/webpage/article/etc., then you should consider your password to be broken.

Code:
Estimated time (conservative) for an attacker to break randomly-constructed
bitcointalk.org passwords with current technology

s=second; m=minute; h=hour; d=day; y=year; ky=1000 years; My=1 million years

Password length  a-z  a-zA-Z  a-zA-Z0-9  <all standard>
              8    0      3s        12s              2m
              9    0      2m        13m              3h
             10   8s      2h        13h             13d
             11   3m      5d        34d              1y
             12   1h    261d         3y            260y
             13   1d     37y       366y            22ky
             14  43d   1938y       22ky             1My
             15   1y   100ky        1My           160My
-------------------------------------------------------
         1 word  0
        2 words  0
        3 words  0
        4 words  3m
        5 words  19d
        6 words  405y
        7 words  3My

Each password has its own 12-byte random salt, so it isn't possible to attack more than one password with the same work. If it takes someone 5 days to recover your password, that time will all have to be spent on your password. Therefore, it's likely that only weak passwords will be recovered en masse -- more complicated passwords will be recovered only in targeted attacks against certain people.

If your account is compromised due to this, email acctcomp15@theymos.e4ward.com from the email that was previously associated with your account.

For security reasons, I deleted all drafts. If you need a deleted draft, contact me soon and I can probably give it to you.

A few people might have broken avatars now. Just upload your avatar again to fix it.

Unproxyban fee processing isn't working right now. If you want to register and you can't, get someone to post in Meta for you and you'll be whitelisted.

Searching is temporarily disabled, though it won't be disabled for as long as last time because I improved the reindexing code.

If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.

How the compromise happened:

The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything, and I don't yet want to publish everything that I do know, but it seems almost certain that it was a problem on the ISP's end.

After he got KVM access, the attacker convinced the ISP NFOrce that he was me (using his KVM access as part of his evidence) and said that he had locked himself out of the server. So NFOrce reset the server's root password for him, giving him complete access to the server and bypassing most of our carefully-designed security measures. I originally assumed that the attacker gained access entirely via social engineering, but later investigation showed that this was probably only part of the overall attack. As far as I know, NFOrce's overall security practices are no worse than average.

To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.

The forum will pay up to 15 XAU (converted to BTC) for information about the attacker's real-world identity. Exact payment amounts will depend on the quality and usefulness of information as well as what information I've already acquired, but if for example you're the first person to contact me and your info allows me to successfully prosecute this person, then you will get the full 15 XAU. You need to actually convince me that your info is accurate -- just sending me someone's name is useless.

The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net
858  Local / Trading und Spekulation / MOVED: free mining and earning btc here upgrade your level on: May 21, 2015, 11:01:42 AM
Referalspam. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1067381.0
859  Local / Deutsch (German) / MOVED: Erhalten kostenlose neue BTC alle 10 Minuten ,, auch deposite on: May 21, 2015, 07:12:41 AM
Referalspam. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1067175.0
860  Local / Projektentwicklung / MOVED: [neue Wasserhahn!] LITEFISH: 50.000 - 1.000.000 litoshi pro Stunde on: May 21, 2015, 07:12:13 AM
Referalspam. This topic has been moved to Trashcan.

https://bitcointalk.org/index.php?topic=1067210.0
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 [43] 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 127 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!