Hey everyone. Looking for some testnet coins would any kind members who might have some available please reach out or send spare some test net coins to. tb1qkfhrfkrq2vt5kcnsswy9thelmh2vam9yas4n6s Thank you in advance!
|
|
|
I created a simple word smasher as a way to pipe content to BF. So I use the power of 2 scale with randint between specific values. Depending on the size of the list you will need to set the values according. I did find a few wallets this way with specific word lists being used and changes to the values. I have another version that will take content and hash it with hashlib and pipe the output to BF and again this also threw back some results. ## Word Smash Power Of 2 ## Set wordlist and pipe output ## Python from time import sleep import random import sys
my_file = open("words.txt", "r") words = my_file.readlines()
## Power of 2 select from wordlist : ToDo - Evaluate methods i = 1 while i > 0: number_1 = random.randint(0, 128) number_2 = random.randint(0, 256) number_3 = random.randint(0, 512) number_4 = random.randint(0, 1024) number_5 = random.randint(0, 2048) number_6 = random.randint(0, 4096) number_7 = random.randint(0, 8192) number_8 = random.randint(0, 16384) number_9 = random.randint(0, 32768) number_10 = random.randint(0, 65536) number_11 = random.randint(0, 131072) number_12 = random.randint(0, 262144) word_1 = words[number_1] word_2 = words[number_2] word_3 = words[number_3] word_4 = words[number_4] word_5 = words[number_5] word_6 = words[number_6] word_7 = words[number_7] word_8 = words[number_8] word_9 = words[number_9] word_10 = words[number_10] word_11 = words[number_11] word_12 = words[number_12]
print(word_1.rstrip() + " " + word_2.rstrip() + " " + word_3.rstrip() + " " + word_4.rstrip() + " " + word_5.rstrip() + " " + word_6.rstrip() + " " + word_7.rstrip() + " " + word_8.rstrip() + " " + word_9.rstrip() + " " + word_10.rstrip() + " " + word_11.rstrip() + " " + word_12.rstrip()) i += 1 sleep(0.005) pass Some of the values number_1 = random.randint(0, 128) number_2 = random.randint(0, 256) number_3 = random.randint(0, 512) number_4 = random.randint(0, 1024) number_5 = random.randint(0, 2048) number_6 = random.randint(0, 4096) number_7 = random.randint(0, 8192) number_8 = random.randint(0, 16384) number_9 = random.randint(0, 32768) number_10 = random.randint(0, 65536) number_11 = random.randint(0, 131072) number_12 = random.randint(0, 262144)
number_1 = random.randint(0, 1024) number_2 = random.randint(0, 2048) number_3 = random.randint(0, 4096) number_4 = random.randint(0, 8192) number_5 = random.randint(0, 16384) number_6 = random.randint(0, 32768) number_7 = random.randint(0, 65536) number_8 = random.randint(0, 131072) number_9 = random.randint(0, 262144) number_10 = random.randint(0, 524288) number_11 = random.randint(0, 1048576) number_12 = random.randint(0, 2097153)
number_1 = random.randint(0, 2048) number_2 = random.randint(0, 4096) number_3 = random.randint(0, 8192) number_4 = random.randint(0, 16384) number_5 = random.randint(0, 32768) number_6 = random.randint(0, 65536) number_7 = random.randint(0, 131072) number_8 = random.randint(0, 262144) number_9 = random.randint(0, 524288) number_10 = random.randint(0, 1048576) number_11 = random.randint(0, 2097153)
=== OFFSETS ==
number_1 = random.randint(0, 256) number_2 = random.randint(64, 512) number_3 = random.randint(128, 1024) number_4 = random.randint(256, 2048) number_5 = random.randint(512, 4096) number_6 = random.randint(1024, 8192) number_7 = random.randint(2048, 16348) number_8 = random.randint(4096, 32768) number_9 = random.randint(8192, 65538) number_10 = random.randint(16384, 131072) number_11 = random.randint(32768, 262144) number_12 = random.randint(65538, 524288)
|
|
|
Number of things in the release to think about. https://www.bbc.co.uk/news/technology-4819Binance seem to have known exactly how this happens very quickly after the breach. Normal practice would tell you the first release is normally not as in depth as this they state that the hackers must have been patent before striking so were Binance aware of this before time? if not how would they know they were holding off? Another thing they said the following to the bbc According to Binance, the attackers used a variety of techniques to break in. They deployed viruses and used phishing attacks to get security information. and then later The hackers "had the patience to wait" and acquire access to a number of accounts before withdrawing the huge haul of bitcoins, according to Binance. All this info from the first 24 hr's of Binance own investigation? Unless they knew prior they had some kind of issue and they were monitoring the situation seems more likely story.
|
|
|
Did you add enough swap space? this can cause the RPI to crash. To add a 1gb swap file, in /swapfile: sudo dd if=/dev/zero of=/swapfile bs=1024M count=1000 sudo mkswap /swapfile sudo swapon /swapfile
|
|
|
Hello, When you refer to (All you need to confirm you are mining to your own address is to examine the coinbase and template sent to you over stratum), does this mean adding my address to the text box and seeing the resulting link? Also, I am mining with an Antminer V9, the Blocks Found Column and Best Shares show nothing? Any idea why? Thanks
No, you can use the master cgminer code in --decode mode and it will tell you exactly what you're mining. Antminers are notorious for buggy code at detecting best shares and blocks found, but there's a good chance blocks found is SUPPOSED to be zero for almost everyone since they're so rare to find. New here with questions, sorry. Will --decode work outside of the V9? What version is needed? Do you have a link to a windows 10 already built version, I don't know how to compile yet? Is antpool solo the same as ckpool solo, all luck? Is a 15gh/s usb miner as lucky as the v9? Just a note I mined with V9's had the same issue buggy as hell no best share value shown had big long drawn email battle with bitmain about the miners power of two issue they dismissed it. None of the firmware they have released for the v9 works well it's what you would call fubar.
|
|
|
Top project whonix comes with the cubes os which is very nice indeed. I would recommend the use of Whonix in the cubes environment works very well.
Keep up the good work!
|
|
|
You are talking of exploiting the ECDSA signatures? If you have the values you can use something like this. #!/usr/bin/env python
import bitcoin import hashlib import random
def ecdsa_sign_k(z, d, k): r, y = bitcoin.fast_multiply(bitcoin.G, k) s = bitcoin.inv(k, bitcoin.N) * (z + r*d) % bitcoin.N v, r, s = 27+((y % 2) ^ (0 if s * 2 < bitcoin.N else 1)), r, s if s * 2 < bitcoin.N else bitcoin.N - s return v, r, s
# Generate secret key & the corresponding public key and address sk = random.SystemRandom().randrange(1, bitcoin.N) Q = bitcoin.fast_multiply(bitcoin.G, sk);
# Sign 2 differents messages with same k signing_k = random.SystemRandom().randrange(1, bitcoin.N) z1 = bitcoin.hash_to_int(hashlib.sha256('first_message').hexdigest()) z2 = bitcoin.hash_to_int(hashlib.sha256('second_message').hexdigest()) v1, r1, s1 = ecdsa_sign_k(z1, sk, signing_k) v2, r2, s2 = ecdsa_sign_k(z2, sk, signing_k) assert r1 == r2 print('+ R used = {:x}'.format(r1))
# Calculate k candidates k_candidates = [ (z1 - z2) * bitcoin.inv(s1 - s2, bitcoin.N) % bitcoin.N, (z1 - z2) * bitcoin.inv(s1 + s2, bitcoin.N) % bitcoin.N ] for k in k_candidates: priv_key = (s1 * k - z1) * bitcoin.inv(r1, bitcoin.N) % bitcoin.N if bitcoin.fast_multiply(bitcoin.G, priv_key) == Q: print('+ Calc key = {0}'.format( priv_key )) break else: print('An unknown error occured.')
|
|
|
Yes it seems you have lost the block the pool OP is missing for around 6 months now so dont expect a reply from him anytime soon.
Make sure your address says self when mining here its the only way you get the reward.
|
|
|
From version 0.1.5 I think with the lost coins and other factors it will be under 21 million coins total somewhere around the 20.5 million coins is a good estimate. int64 CBlock::GetBlockValue(int64 nFees) const { int64 nSubsidy = 50 * COIN;
// Subsidy is cut in half every 4 years nSubsidy >>= (nBestHeight / 210000);
return nSubsidy + nFees; }
unsigned int GetNextWorkRequired(const CBlockIndex* pindexLast) { const unsigned int nTargetTimespan = 14 * 24 * 60 * 60; // two weeks const unsigned int nTargetSpacing = 10 * 60; const unsigned int nInterval = nTargetTimespan / nTargetSpacing; Some of the things that in bitcoin that should not be changed unless there is full consent and I would agree that there MAX_MONEY for bitcoin should not be increased if the supply is inflated we become nothing more than the central banks printing press and it would have a negative impact on bitcoin. Some of the principals and fundamentals in bitcoin should always be. 1. Increase of the total number of bitcoin issued above and beyond the 21 million. While precision may be increased the proportions must stay the same. 2. Rules that add any requires or explicit centralization like changes that would require that transactions or blocks be signed by any central organization. 3. Deletion or revocation "and or I believe" Redistribution of coins that are deemed to be either lost or unused. The Fundamentals 21 million coins TOTAL. No censorship = Nobody should be able to prevent valid tx's from being confirmed on the network. Open-Source = Bitcoin source code should always be open for anyone to read, modify, copy, share. Permissionless = No gatekeepers should ever prevent anybody from being part of the network Pseudonymous = No ID should be required to own or use Bitcoin. Fungible = All coins are equal and should be equally spendable. Irreversible Transactions = Confirmed blocks should be set in stone. Blockchain History should be immutable. If we lose the above we're going to have a "Bad Time"
|
|
|
Were you accepting funds from exchange wallets? Sometimes when they send payments you can have 100's of inputs that show on explorer could it be it's picking up all the inputs to your wallet and thinking they were all to you and not just the output.
This might throw off some kinds of calculation software.
|
|
|
This might be what your looking working in debian sudo apt-get install build-essential libtool autotools-dev automake pkg-config bsdmainutils curl git
Then choose:
------------------------------------------------- Option A: Cross-compile Windows wallets (64 bit) -------------------------------------------------
sudo apt-get install g++-mingw-w64-x86-64 mingw-w64-x86-64-dev
# Pick posix version for the following!
sudo update-alternatives --config x86_64-w64-mingw32-gcc sudo update-alternatives --config x86_64-w64-mingw32-g++
cd depends
make -j 24 HOST=x86_64-w64-mingw32
# *** TIME FOR A REST HERE THIS TAKES SOME TIME ***
cd ..
./autogen.sh
CONFIG_SITE=$PWD/depends/x86_64-w64-mingw32/share/config.site ./configure --prefix=/
make -j 24
Optional: strip the binaries to reduce size at this point if you're going to share them.
------------------------------------------------- Option B: Compile native Linux wallets -------------------------------------------------
cd depends
make -j 24
# *** ANOTHER PLEASE WAIT MOMENT OR TWO ***
cd ..
./autogen.sh
CONFIG_SITE=$PWD/depends/x86_64-pc-linux-gnu/share/config.site ./configure --prefix=/
make -j 24
Optional: strip the binaries to reduce size at this point if you're going to share them.
|
|
|
WARNING - USE THIS POOL AT YOUR OWN RISK
POOL op is currently MIA - and there has been no response to PM's by forums members.
Tagging OP with RED TRUST until there is some news from the OP.
|
|
|
https://bitcoin.org/bin/block-chain/Found this torrent link on the bitcoin.org website might be useful. Note the block height is 317000 for this. I have no clue how this is maintained or updated someone else might have a better answer for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Torrent info hash: 36719ba2cecf9f3bd7c5abfb7a88e939611b536c Torrent magnet link: magnet:?xt=urn:btih:36719ba2cecf9f3bd7c5abfb7a88e939611b536c&dn=bootstrap.dat&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A80&tr=udp%3A%2F%2Ftracker.publicbt.com%3A80&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.com%3A1337&tr=http%3A%2F%2Fbttracker.crunchbanglinux.org%3A6969%2Fannounce
Block height: 317000 Filename: bootstrap.dat Byte size: 22566124235 SHA1: 2e6e5dd20cd9c21960ba94f7265f42c4b6443758 SHA256: d05062052be4dd6fbaeac5f17598e52f7ad545f9f938acefaf7067ecce1d7b5a
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org
iQEcBAEBCgAGBQJT+PcrAAoJEL8a4JGi25zKmj4H/i8xKIXW/xnw5i5Pc+ciUuc2 Zo+KxQd1YGRmJSvGsyTgTqK4IJUBD8s8tIGTtznCJ2/Q3wIdZmoqxkST7r4rqJly cOyJ/n19K5beYvVekIgHVXFmhdJhZf8KNnyuV+DpHmmLKYyZtvkoY9b3hEBHVtSM AkjuWyA9IEPeghxBX32JAToXOZGs9vZghNyIMg/fWbGLuv1oX7QCjAAua0NAMbLX diSvVcLXskTRy38W4whz1DX6ruL8mPRYH5Ko6/cmtVqEkr53aEwYf1XJGHHAz3+J nEHecxBUbiRhDwMdCVtqzKudXWVDtkgVQmRxrkKTw63NTVMge4eEziE2+7JQgq8= =p9TY -----END PGP SIGNATURE-----
|
|
|
Really nice setup with the solar have you thought about liquid cooling the miners in novec or dielectric coolant? https://www.engineeredfluids.com/coolfluidsBeen looking at pulling the boards from my miners and sinking them into this stuff.
|
|
|
Giving this topic another 14 days for pool op to respond then it's red trust i'm afraid no reply last account hacked. And there has been lots of members reached out to him with no response back.
Yeah, I'm not holding my breath... but my bounty still stands. I believe the total bounty is 3 LTC combined. Hell, I'm even willing to give the OP my 1 LTC bounty if he/she just happens in and does the right thing without being prompted. it sucks but he hasnt been online for nearly 6 months. there was some big storms in US. specially in California and midwest. also i think a few big tornadoes. i have no idea if he lives in US tho. maybe he lost access to the pools wallet.. no funds have moved for a long time. at this point it seems something has happened to him. hopefully nothing fatal or really bad. I hope that the OP is safe but people are risking hashrate on this pool and there seems to be no contact point for the OP anymore I see there is a 2nd account that has some trust from philipma1957. But the account has not been online for some time now and has not responded to PM's or reply's to the topic.
|
|
|
Nice hit to the winner! Had a rental going watched the stats tick back to 0.00 diff checked wallet thinking this time! No luck. again "shares": 8915002565, "bestever": 53999534193,
|
|
|
Giving this topic another 14 days for pool op to respond then it's red trust i'm afraid no reply last account hacked. And there has been lots of members reached out to him with no response back.
|
|
|
I’ve been trying to connect the oldest bitcoin executable but I can’d Get it to connect. Anybody have a clue as to how I can connect it to other peers? Easy way?
As far as I am aware you can't use that version anymore you won't get any connections or sync the blockchain. I have a feeling v0.1.0 makes calls to the IRC channel to look for peers. https://github.com/Dan-McG/bitcoin-0.1.0/blob/master/src/net.cppbool GetMyExternalIP(unsigned int& ipRet) { CAddress addrConnect("72.233.89.199:80"); // whatismyip.com 198-200
SOCKET hSocket; if (!ConnectSocket(addrConnect, hSocket)) return error("GetMyExternalIP() : connection to %s failed\n", addrConnect.ToString().c_str());
char* pszGet = "GET /automation/n09230945.asp HTTP/1.1\r\n" "Host: www.whatismyip.com\r\n" "User-Agent: Bitcoin/0.1\r\n" "Connection: close\r\n" "\r\n"; send(hSocket, pszGet, strlen(pszGet), 0);
string strLine; while (RecvLine(hSocket, strLine)) { if (strLine.empty()) { if (!RecvLine(hSocket, strLine)) { closesocket(hSocket); return false; } closesocket(hSocket); CAddress addr(strLine.c_str()); printf("GetMyExternalIP() received [%s] %s\n", strLine.c_str(), addr.ToString().c_str()); if (addr.ip == 0) return false; ipRet = addr.ip; return true; } } closesocket(hSocket); return error("GetMyExternalIP() : connection closed\n");
|
|
|
Surprised there has been no response to this topic.
I would guess the client "should" be banning the peers if they are sending something malformed? From the post above it seems they are pretty close in the IP ranges so I would guess they are being run by the same person.
I'm sure some core guru will be along with a more detailed answer but it is concerning if the number of these nodes continues to grow.
|
|
|
|