BTC laundering? As a newbie, I need an example please. Because they are such a large site you can deposit coins and get back different coins than you sent them which means you have effectively "laundered them". But I was told that such a single traceable coin doesn't exists! They're only values linked to transactions. You can't get different coins because you din't send coins. You can track transactions, not coins. The transaction trail is you-->satoshi dice-->you and anyone knows it because they know all the satoshi dice addresses. Exactly why it cannot be used for money laundering! It is equivalent to leaving the coins in the address, money-laundering wise, and equivalent to losing ~2% of your coins, expected value wise.
|
|
|
Resubmitting: 1KLk5kFHAdo3h9ucVh2GSL1grqD42y9np2 This time, I will pay for web hosting with it.
|
|
|
1 @ 3.5
Invalid. The minimum bid is 12.50 BTC. Invalid. The minimum bid is 12.50 BTC.
|
|
|
I believe it had been calculated because of the deflationary component limit of 8 decimals... maybe it was a subjective assumption?
The number of decimal places is arbitrary it can be expended to 12 or 20,000 if necessary. Yeah. That would be the standard wisdom around here, except that making it happen practically ... not sure it's that easy. I haven't actually seen an in-depth analysis of what it'd take to move all values in the bitcoin system to - say - 128 bits instead of 64. From what I've seen, even today, it'd require quite a bit of work and testing to make this happen smoothly. And when (if) it ever becomes necessary, the whole bitcoin ecosystem will have grown so large that we'll have another Y2K on our hands. This is why it's better done now than later. We only have 3 decimal places remaining until we must switch to 128 bits. However, I assume it can still be done with a hard (as in, very hard) fork: 1. Agree on Bitcoin termination date, and calculate corresponding block height 2. Release clients that conform with new rules once past the termination date 3. After termination date, clients will use the block as a genesis block and begin a new protocol
|
|
|
Obvious satirical account is obvious.
|
|
|
BitcoinIt's Laissez-Fair Good slogan? Sorry couldn't help myself No. Bad slogan. BitcoinIt's Laissez-Faire Much better.
|
|
|
Slots BTC Person 6 12.25 2 12 cablepair
Inaba's bet is not yet valid. You must state the max number of slots you want.
|
|
|
This "phobia" is a bunch of FUD. I watched the video, expecting the worst, and felt nothing. I even got bored halfway through.
Humans are not averse to holes; in fact, there are holes all around us. Our eyes, our nostrils, our ears, are all examples of holes; yet, they are the things located on the face of fellow humans, the part we find most attractive.
|
|
|
Has the outcome of this bet been decided yet? Is the original thread missing, and why?
long time ago. Vandroiy of course won. nope, its there and is linked to in the OP, is it not? This thread was a weasly attempt by Pirate to back out knowing what was coming and the realization that he had actually placed 5k in escrow to cover the bet just sinking in.... YARRRRRRRRRR The OP links to a different bet.
|
|
|
Has the outcome of this bet been decided yet? Is the original thread missing, and why?
|
|
|
BTC laundering? As a newbie, I need an example please. Because they are such a large site you can deposit coins and get back different coins than you sent them which means you have effectively "laundered them". Except that: - SatoshiDice transactions are obvious
- The receiving address is linked to the sending one
|
|
|
The Bitinstant guys are helping Romney by offering this. I am sure they will expect a seat in his administration for this if he wins.
Aren't you involved in BitInstant? Director of marketing, AFAIK.
|
|
|
Are you trying to make it a self fulfilling prophecy?
Well, game theory shows that never works. Nope, just surprised at how accurate that signal historically has been. Maybe it is like rolling the same number five times in a row -- doesn't mean roll number six is any more likely or any more unlikely to be the same number. But it isn't like some obscure concept. It is a pattern that occurs what appears to be simply because bank wires don't clear on weekend days. I have an alternate theory: it's a pattern that occurs because too many people think it is a myth. That explains why the weekend dip tends to delay to Sun-Mon.
|
|
|
I figured it out on my own.... But dree for all your help I would like to pay you and also, ask if you would be willing to help me with code ass need of course you will be paid whats the address? The code that needed to be changed was..... drum roll $result=mysql_query("SELECT * FROM users WHERE username='$username'"); To $result=mysql_query("SELECT * FROM `users` LIMIT 0, 30 "); I don't think this does what you think it does. This happens to work with only one user, but if the number of users increase, then there will be a problem. My address is 16GF23SM6mprHQt55Acav2d2NhzrM5obYF. I will divide the amount up to the others who have helped appropriately.
|
|
|
Okay, the hunt for the meta refresh is really going nowhere. Keep looking for it, and remove it when you find it. Meanwhile, a workaround is to keep the user logged in. At the top of the page: <?php // Start or resume a session session_start(); ?>
In the "Login successful" area of the code: <?php $con=mysql_connect('localhost', '', '') or die('Could not connect: '.mysql_error()); mysql_select_db("", $con); // If we have a login active, assume authentication if (isset($_SESSION['username'])) $username = $_SESSION['username']; // Otherwise, we will authenticate the password else { $username=$_POST['username']; $username=mysql_real_escape_string($username); // PUT YOUR PASSWORD AUTHENTICATION HERE $_SESSION['username'] = $username; }
// Now, we display the email and username as requested $result=mysql_query("SELECT * FROM users WHERE username='$username'"); $row=mysql_fetch_array($result); echo "Email: ".$row['email']."<br/>"; echo "Username: ".$row['username'];
// Finally, close our connection mysql_close ($con); ?>
|
|
|
<?php /* ********** Member Page ********** */ /* Include Class */ require_once('config.inc.php'); require_once("database.class.php"); require_once("member.class.php"); /* Start an instance of the Database Class */ $database = new database(); /* Create an instance of the Member Class */ $member = new member(); ?> This is what is in there lol, I checked config, member and Im pretty sure its not in the db one It's most likely in there somewhere, as it is before the doctype. It'd be helpful if you post the three included files.
|
|
|
I promise you that tag is not in my code that I can see. Is there some way it would be hidden in there?
Could you post "assets/member.inc.php"?
|
|
|
Don't even see that in the code lol
Here is the browser-side code: <meta http-equiv="refresh" content="2;url=" /><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Login</title> <!--CSS Files--> <link rel="stylesheet" type="text/css" href="assets/css/style.css" /> </head>
<body> <div id="members" class="group"> <div class="notice success">Authentication Success</div><p class="options group"><a href="member.php?action=register">Register</a> • <a href="member.php?action=recover-password">Recover Password</a></p></div>
<p> Email: skiz22285@yahoo.com<br/>Username: username2</p>
Login Successful <p><a href="index.php\">Click here to logout!</a></p> </body> </html>
Right before the DOCTYPE, is a meta refresh tag. Remove that.
|
|
|
<meta http-equiv="refresh" content="2;url=" />
Get rid of this.
|
|
|
Update on what the code looks like so far ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title><?php echo $title; ?></title> <!--CSS Files--> <link rel="stylesheet" type="text/css" href="assets/css/style.css" />
<body> <div id="members" class="group"> <?php echo $content; ?>
<?php $username=$_POST['username']; $username=mysql_real_escape_string($username); $result=mysql_query("SELECT * FROM users WHERE username='$username'"); $row=mysql_fetch_array($result); echo "Email: ".$row['email']."<br/>"; echo "Username: ".$row['username']; mysql_close ($con); ?> </p> </body> </html>
Login Successful <p><a href="index.php\">Click here to logout!</a></p> </body> </html> Do the following: - Remove ?> at the beginning of the code.
- Add "</head>" after <link rel="stylesheet" type="text/css" href="assets/css/style.css" />
- Add "</div>" after <?php echo $content; ?>
- Add "<p>" after the </div> you just added.
- Remove the first "</body></html>", located right after the </p>.
- Put back the "$con=mysql_connect('localhost', '', '');
if (!$con) { die('Could not connect: '.mysql_error()); } mysql_select_db("", $con);".
The code should look like this: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title><?php echo $title; ?></title> <!--CSS Files--> <link rel="stylesheet" type="text/css" href="assets/css/style.css" /> </head>
<body> <div id="members" class="group"> <?php echo $content; ?> </div>
<p> <?php $con=mysql_connect('localhost', '', '') or die('Could not connect: '.mysql_error()); mysql_select_db("", $con); $username=$_POST['username']; $username=mysql_real_escape_string($username); $result=mysql_query("SELECT * FROM users WHERE username='$username'"); $row=mysql_fetch_array($result); echo "Email: ".$row['email']."<br/>"; echo "Username: ".$row['username']; mysql_close ($con); ?> </p>
Login Successful <p><a href="index.php\">Click here to logout!</a></p> </body> </html>
|
|
|
|