The IP in your first screenshot shows an IP in Azerbaijan yet BitcoinTalk is actually hosted in the Netherlands and your second screenshot shows different servers all resolving different IP's for BitcoinTalk. This doesn't look good at all. Perhaps BitcoinTalk has been targeted by the great firewall of china. I sincerely hope this is not the case but this doesn't look good at all. Can someone in China try connecting directly to the actual IP: https://109.201.133.195 (ignore SSL warning)
|
|
|
Was in this forum? Any link to the corresponging thread? Who was the first to propose it?
I believe it was coined on this forum, though I can't find the thread as there are too many search results.
|
|
|
Signing a message isn't supported by your client yet. You'd need to export the private key for the Bitcoin address you need to sign a message from and import it into another client that supports signing, such as electrum or bitcoin core. I'm not sure if there are any Android clients that support signing yet. I'm not too familiar with Bitcoin Wallet for Android so I'm not sure how you'd go about exporting it. How would I sign a transaction?
Signing a transaction is essentially sending Bitcoins.
|
|
|
If you don't like the rules go get your own forum.
This is BitcoinTalk, a forum dedicated to discussion of BITCOIN, not whatevercoin. Go away please, thanks.
|
|
|
TradeFortress, care to answer my questions? Can you post a PGP signed message using your old public key ( admin@glados.cc) in order to prove its really you? Could you also use a timestamp authority when signing it, or you could include the hash of the latest block mined. I have no doubt it is really you but that should put everyones mind to rest. Here are my questions, please don't try the technique of selectively answering the ones that suit you and ignoring the others. 1) You said before that inputs.io was hacked but never said what happened to coinlenders.com and your various stocks/bonds (bitbond was one IIRC). Why were none of the people using those reimursed, what happened to those funds? 2) You claim you do not have much Bitcoins. This thread claims that after the hack you were in possession of at least 1300BTC: https://bitcointalk.org/index.php?topic=346236Most of these addresses still have a large balance. How accurate is the data in this thread? If you claim it is not accurate, can you explain why many of these addresses appear as inputs in transactions along with the address 1GLadosEkeAsLReqS3yQ51E1R3wVtbJCDF? 3) You mentioned before that the assets you own are seperate to those of your business. Was Inputs.io, coinlenders and BITBOND all registered and operating as a seperate legal entity? If you were, why did you not publicly publish the information and contact details for this legal entity which you are likely required to do by law in your country? If your business(es) were not operating as a seperate legal entity then you were likely operating as a sole trader - which means these assets legally belong to your debtors because YOU owe the debt and not a seperate legal entity.
|
|
|
could it run bitcoin qt?
i don't think it's possible to run bitcoin qt on mobile os Why would you need to run qt? Just run a app like blockchain.info or something. True, but im too paranoid so i need qt. bitcoin-qt (or bitcoin core as it's known now) currently needs 20+GB of space for the blockchain and is incredibly CPU and IO intensive, too much for most low-end PC's nowadays. I doubt it'll run on a mobile device.
|
|
|
A "domain names & websites for sale" subforum would unclutter the marketplace a lot.
|
|
|
Did you recently click on a link you received in a PM?
Looks like you were a victim of the biLcointalk.org phishing website.
Send theymos a signed message from that address on your profile (follow the instructions in the thread linked by others). I believe the forums keeps a history of bitcoin addresses set in your profile.
Keep in mind theymos is very busy so you'll be waiting a long time for a reply or you may never get a reply at all. You may be better off making another account.
|
|
|
Some people register variations of their nickname in order to prevent scammers from registering them, it's quite common for people to scam using nicknames that look similar to reputable users.
And people who use other bitcoin websites sometimes register their nickname here to prevent scammers from registering it and pretending to be them.
|
|
|
I deleted the spam PMs and banned all of the users and IPs sending them.
The source on the phishing website contains the following: <title>Login</title><!--368ef74f52681c46ec130f3d13d9f239ea78ffb6c1718a5e8bda35ea3af8626a1c46ec130f3d13d9f239ea78ffb6c171138a3f3d4e7f8f4069051c46ec130f3d13d9f239ea78ffb6c171faa6--> Is that last piece a session ID? Maybe you could take a look at the logs and find out what IP was using that session ID. It also looks like the phishing site is including style sheets from bitcointalk.org. You could set up the server to send a modified stylesheet that has a warning message added when it is requested by the phishing domain in order to warn people it is a phishing website.
|
|
|
They appear to have caught him red handed with his laptop open and logged into SR at the San Francisco Library. Sure it would be possible that he was just a moderator that was hired after it opened, but this would not explain how his email address was used for the forum account that posted the first advertisement about silk road (I think it was a weed/drug related forum). Yeah they got him with his laptop decrypted. My main concern is that it clearly doesn't PROVE it's him. Just because he was "allegedly" the first person to post a link to the SR (he didn't even advertise it, just said he was thinking of placing an order there) doesn't mean he owns it and the proof that it was him who posted it wasn't so straight forward either. It definitely makes him a suspect, but it definitely doesn't prove he's DPR IMO. Combining it with all the other circumstantial evidence doesn't really prove anything either. I have yet to see any hard evidence tying him to that identity. Who's to say that circumstantial evidence wasn't planted by the real boss of SR to cover his tracks. You should remember that the FBI apparently was able to seize several thousand bitcoin when they got his laptop (although this also may have been the result of seizing the servers in iceland).
30k came from a SR server, 140k came from his laptop. By the way, it's interesting to compare these figures to the estimated volume of the SR mixer.... I have a feeling they didn't find all the BTC, the numbers seemed way off when I looked at it. If I was running a website like SR I sure as hell would have a ton of cash tidied away safely, perhaps a paper wallet or such.... Ross' excuse for the 140k on his laptop was that he was an early adopter and high-frequency bitcoin trader and he earned those Bitcoins from that. This is what his friends and family thought he did for a living too. I haven't seen the FBI come out and say "these coins came from the SR mixer" or prove in anyway they were involved in the SR. It's a plausible excuse, I wish the FBI would investigate this side of the case more but they probably won't seeing as they'll likely win that asset forfeiture so why would they care.
|
|
|
Referring to bolded section, I considered this but quickly dismissed it as it would certainly not be an issue to upload a keylogger and wait.
Why would an attacker even need to upload one? hardware keyloggers are really cheap: https://www.keelog.com/There is no question about it, if someone can modify your hardware they can easily steal your data, there are plenty of ways to do this kind of thing. How about a Raspberry Pi with a hardware keylogger connected to your keyboard, a SATA interface connected to your drive and a 3G modem to send back the data, all of that is dirt cheap and freely available. <$100 and you can exfiltrate data from an airgapped machine pretty easily. You could probably make it smaller by using a modified android phone instead for example.
|
|
|
I don't think Captcha is ever locally generated, otherwise it would be very easy to "crack" the captcha as someone could just run a script to figure out what the correct text should be.
I am interested to see if this explanation will be accepted by the defense and the court.
There are plenty of implementations for locally generating captchas (cool-php-captcha is a popular one). Bitcointalk uses the stock SMF one. They are obviously easier to crack than something like recaptcha, but they do provide some kind of protection. Most Tor hidden services use them, it's generally a bad idea to include external elements on a hidden service and most captcha services use javascript too which is problematic with TBB. It's a very plausible explanation, in fact according to the FBI Ross had written in his logs that on a number of occasions he had found/introduced similar IP leaks on SR and the SR forums and had to move servers a couple of times and the alleged dates of these incidents seem to coincide with downtime of SR and SR forums. On top of that it looks like Christopher Tarbell was on this case, he has made a name for himself having taken down many high profile cybercriminals - in fact even for similar mistakes such as this, Sabu (LulzSec hacker) was caught by Tarbell because he leaked his IP when connecting to an IRC chatroom, I'm not sure why they kept the method of discovery of the server secret until now though. I'm still not entirely convinced Ross is DPR either, their evidence on this end is HIGHLY circumstantial IMO.
|
|
|
A better article on this here: http://krebsonsecurity.com/2014/09/dread-pirate-sunk-by-leaky-captcha/Seems only Zerocoin would be safe from them as long as no back doors or police/nsa doors etc are not in it.
Did you even read the link? the SR was taken down by an extremely dumb mistake when implementing an anti-spam captcha. Nothing to do with Bitcoin whatsoever.
|
|
|
- CAPTCHA on SR site wasn't configured correctly with TOR and leaked the IP of the server
Oh my god. When I had a look at SR I remember looking at that captcha and wondering how they were locally generating such a high quality captcha code.
|
|
|
Shem wasn't a banker or any other kind of criminal.
Apparently even Charlie disagrees with you, since he is pleading guilty. That doesn't mean that he is actually guilty. He was given an impossible choice, if he pleaded not guilty he faced up to 30 years in prison, by pleading guilty he only faces up to 60 months. Nobody would risk that even if they were completely innocent, doing a couple of months is clearly a better choice than risking getting up to 30 years, you can't predict what a judge/jury will do. The fact that they offered him such a deal speaks volumes about how strong their case was. 94% of people in the US plead guilty to their charges as part of a plea bargain, in both federal and state cases, source: https://www.bja.gov/Publications/PleaBargainingResearchSummary.pdf
|
|
|
Best of luck.
I think you are the first ever person to be prosecuted for not filing suspicious activity reports. It's an absolutely ridiculous situation especially when you look at the mass money laundering that occurred at HSBC.
|
|
|
If you look at the blockchain link you'll notice they tagged the address they sent from, it links to their website. They're trying to advertise their Bitcoin-accepting Forex website. They're using the Blockchain to spam essentially, kind of fitting seeing as forex sites have a reputation for sending spam emails.
|
|
|
I get this error from time to time, mainly when trying to post.
FF 24.7
|
|
|
|