Only recently did it become available on a motherboard, but I'm not interested in the formfactor that it became available on. However, the Quad Core is simply 2 Dual Core chips on one package, so testing a Dual Core should get some close numbers. I do have a Dual Core (Zotac ZBOX NANO based on the VX900H chipset), so maybe I'll test it sometime.
|
|
|
The website still contains javascript that fucks up my browser I caught it using 6GB of RAM just now, and had to kill it - even though I got this window about stopping the script, it still froze the browser.
|
|
|
Nope, the proof of work is all throwaway data that is useless. Basically, you take the transaction headers, add a random piece of data, and hash the whole works twice with SHA256. If the result is under a certain value, it is said to meet the current difficulty, and is accepted as valid (as well as reproducible). If it does not meet the criteria, the random "nonce" value is changed, and the same thing happens - over and over and over until a correct value is found. Read also here: https://en.bitcoin.it/wiki/MythsAlso read about how the proof of work works at this link: https://en.bitcoin.it/wiki/Proof_of_work
|
|
|
Basically, after TradeHill went down and out of business, CryptoXchange was advertising up a storm and asking for everyone's business. Well, it looks like they got all or most of TH's business, along with all the headaches that someone with that transaction volume also gets. It's fairly obvious that they bit off more than they could chew.
|
|
|
Show us where the Koran says that stuff, otherwise don't make the mistake of thinking that it applies to all Islamic faiths.
One guy writing fucked up shit and putting it in a book doesn't mean what he says applies to everyone.
|
|
|
Or is this like waiting for your physical issue of Bitcoin magazine to arrive?
|
|
|
What a low tech, trashy looking place.
Show us a pic of your spectacular workbench!
|
|
|
There is no way to change the firmware on the singles without a windows machine? Who the hell runs windows these days?
Satoshi The CIA's top group of cryptographers...... FTFY
|
|
|
Seems like I struck a nerve Hey, I was very upset when I upgraded my dual boot Win7/Gentoo HD to a SSD, only had enough room for one, and had to choose Windooze. Well, only sorta upset because the SSD is kickass. Larger SSDs are faster....
|
|
|
It's not volume-related, and being "old school" has nothing to do with it either. Free Yubikeys are given to people who had a transaction rolled back back when prices dropped to $0.01
You, sir, are a bullshitter. Read the post date - August 2011. It was true then, although it may be unrelated now. It's a shame that they have to give them away instead of people being smart enough to order them in the first place. They really don't cost much when you buy them, but it does cost mtgox a lot just to give them away en masse. My understanding was that a MtGox Yubikey was a Yubikey with an AES key put into it by MtGox. Actually, that's two AES keys - one for the short press (logging in), and one for the long press (withdrawing funds).
AES is a symmetric algorithm - in this case, I understand this to mean that MtGox and the key know the same secret number.
That said, I don't understand how can a third party make use of a MtGox Yubikey without knowing that number?
I believe that you can validate against a given authentication server without needing to know the secret.
|
|
|
Yeah, it's a few months old, but here it is - Dr. Neil deGrasse Tyson's keynote at the 28th National Space Symposium: http://youtu.be/VLzKjxglNyEIt's an hour long, so get a comfy chair. Skip to 5:00 for the beginning. One of the things he proposes is that NASA's budget be doubled, which he says would create innovation and inspire everyone. Personally, I tend to agree. What about you guys? Is he right, or is it all BS?
|
|
|
I seriously hope that they are not using a broom in a static sensitive environment. If this truly is an assembly room, I now have serious reservations about BFL. I do not see grounding straps used, the staff are not wearing anti-static outer garments and the flooring is hardly what should be used in electronic assembly. Open liquids (coffee cup) in an electronic assembly room??? Seriously??? Maybe a QA center for units already assembled, and thus already static protected? I hope this picture is a joke else everybody should be really careful about ordering from BFL and demand proper assembly conditions. Also, failure rate currently unknown, presumed to be one single unit that ngzhang has dissected. If it works, who cares?
|
|
|
See look guys, 3 reps doing nothing but answering emails all day. You can't say they aren't trying. However BFL, it seems that you may be better suited to being a wholesaler only, perhaps you should use Roger ( http://memorydealers.com/) as your distribution point for customer sales.... EDIT: Or maybe cablesaurus: http://cablesaurus.com/
|
|
|
well, at least they caught some bad guys. i wonder what other forums they are running??
dun dun dun..... bitcointalk.org. Whaddya know, theymos is an FBI agent! j/k
|
|
|
I made a helpful diagram just to be sure. Socat is capable of the same things that "stunnel" is, but is also capable of so much more. Whereas with Stunnel you would need to perform encryption and decryption on the public-facing server, as well as the internal server, you don't have to do that with Socat. (However you still have the option to.) Socat allows you to pass arbitrary binary data (read: SSL data) via a socket, which is important when you are dealing with encrypted data. Client --> Socat --> Tor Software --> Cloud of onions --> Tor Software --> apache/nginx/whatever -- ^Still encrypted here ^de/encryption is here | v Still encrypted here | Client <-- Socat <-- Tor Software <-- Cloud of onions <-- Tor Software <--| And I thank torwallet.net for bringing this invaluable tool to my attention, because I had used stunnel in the past and this is just taking it to the next level.
|
|
|
I know you meant that, and you are incorrect. The private key of the SSL certificate is stored on the .onion site, not on the torwallet.net server. Perhaps you should look closer at how socat works: it has the option to serve up its own certificate, but that is not in use here. It is simply concatenating data between ports 443 and 9050, in both directions.
I mean the private key of the SSL certificate of torwallet.net, not the SSL certificate of the .onion site ...... The SSL private key for torwallet.net is stored on the .onion server, and the .onion server does all the encryption and decryption. That's why it's a little slow; all the traffic must pass through tor first to get to and from the remote .onion server torwallet.net does not have a private key of its own stored on it or in use for it.
|
|
|
I need that power strip arrangement at my workbench NAO.
|
|
|
However, he cannot obtain the private key by hacking torwallet.net. He can only obtain it by hacking the onion site itself. That socat tool is pretty damn cool; I've added it to my arsenal.
Most .onion sites don't bother having SSL enabled because Tor provides encryption... but for external access, this is a perfect example of how to use it.
The hacker don't need the wallet private key to withdraw BTC. Only the secret codes are needed That's correct, however URL query strings are encrypted when using SSL, so they can't be sniffed. If someone tried to MITM after compromising Torwallet.net, the SSL certificate would have a different fingerprint and it would be detected as an error, since you have created a special exemption in your browser for that specific fingerprint. One the torwallet.net page it claims "Seizing or hacking this server will have no effect on TORwallet's services and gain you no bitcoins, only our wrath", but this is wrong. If the torwallet.net server is hacked, the private key of the SSL certificate is exposed, and the hacker will know the URL query strings That is not correct. Torwallet.net does not contain any private keys, and it is a separate server from the .onion site. They are not hosted on the same server. Not sure what's so hard to understand about that. I mean private key of the SSL certificate, not private key of BTC accounts. Not sure what's so hard to understand about that...... I know you meant that, and you are incorrect. The private key of the SSL certificate is stored on the .onion site, not on the torwallet.net server. Perhaps you should look closer at how socat works: it has the option to serve up its own certificate, but that is not in use here. It is simply concatenating data between ports 443 and 9050, in both directions.
|
|
|
|