v0.12.3 has QR code support
If anyone would test it for me that would be great as I don't own a smart phone. Rigth now I am encoding: Bitcoin:$BitcoinAddress$ Please let me know if it is correct
I think Jan has fixed it now, but his mobile wallet used to choke on the capital B in Bitcoin, I believe the spec says it should be lower case.
|
|
|
This is awesome, I love the way you guys think.
If you were going to consider a PCIe based modular system, note that PICMG 1.3 is an industry standard already, and seems to me that it would suit. This would allow modules to be swapped out when the future performance increases come along. You could cut costs by using a single cheap PCIe switching/fanout chip and splitting the lanes so that each slot would only get 1x electrical connectivity. This is plenty for this application, and would even work for some video and GPU compute applications such as regular video card based bitcoin mining.
There are cases and power supplies already designed around the standard too, so that is an advantage.
|
|
|
Also, making the join and part messages a little less intrusive would be cool. Perhaps a smaller font and in grey, instead of red.
|
|
|
test post via WAP crap
It works! But it shows a mobile phone icon lol. Unless you did that on purpose.
|
|
|
yeh get it off google sites. unless your doing client side hashing of the address's.
I dont see your choice of hosting it on their rather than saving litterally a few BTC. a VPS is very low cost and easy as hell to set up.
Only marginally more secure, unless you can encrypt the disk.
|
|
|
I'm still trying to figure out how you bypass Google when using their hosting? So your website has a set of forms asking for things such as bitcoin address, email address, etc. Where does the form POST to? I assume it gets stored on a Google Docs spreadsheet, which you then access to transfer the data to your setup. I hate to sound paranoid and tinfoil-ish, but I can't reasonably expect Google to actually delete anything that gets submitted, even if you request them to, based on their business of data collection on anyone and everything.
|
|
|
So where is the mass leak ?
Were those images it ?
I'm guessing it's going to be all Patrick's email, unfortunately. Seems logical anyway. Where did you hear this? I didn't hear it, I am just making an assumption based on the fact that his email server was compromised.
|
|
|
Can anyone help me out with this? I would greatly appreciate it if anyone could. It is for educational purposes only, to expand my knowledge.
Education is about learning how to learn, just as much as it is about the knowledge itself. I think you need to learn how to do some independent research and analysis.
|
|
|
So where is the mass leak ?
Were those images it ?
I'm guessing it's going to be all Patrick's email, unfortunately. Seems logical anyway.
|
|
|
Are you saying the actual led actually fell off or are you talking about the light guide? I have had a light guide fall off on one of my units before. If its the actual led how did you reattach it?
Yeah... the LED is SMT, so it probably didn't fall off, but the little plastic thing easily could have if the package was thrown across the room or tossed onto a truck carelessly (not infeasible). Watching a large package sorting operation a la USPS, UPS, FedEx, etc, is a hair-raising experience.
|
|
|
1) The SSL certificate is from a SSL provider that has been compromised.
It doesn't matter if a site uses a "weak" certificate authority, since any CA can override any other CA's certificates. (The CA system is terrible.) It's smartest to use the cheapest CA you can. StartCom/StartSSL has been compromised? Do please enlighten me - I make extensive use of their services. It has been compromised in the past, so it likely will again in the future. You should simply just not use StartCom, especially after you've been hacked yourself. StartCom should have been completely blacklisted in browsers. Ah yes, I remember that incident now, it was during the Comodo debacle - [...]"StartCom was lucky enough, I already connected to their HSM, got access to their HSM, sent my request, but lucky Eddy [StartCom CEO Eddy Nigg] was sitting behind HSM and was doing manual verification."[...] Yeah this is lame. I wonder if there is a list of CA's that can definitely and for sure say that they have never been breached. I bet it is fairly short.
|
|
|
Too bad. I wanted to accept Bitcoin but I'm applying for a merchant account at the moment and the bank doesn't seem to like it. There's only one bank for me to choose from.
This is a mainstream product so Bitcoin support has to be dropped. :-(
So even a merchant service provider (paysius, bit-pay) won't make your bank happy? You don't actually ever touch the coins yourself with an MSP. Also fees, but PP charges them too.
|
|
|
A registrar with a built-in Route 53 frontend. That's actually pretty cool.
|
|
|
(there's also 2 versions of the B: ฿ or Ƀ)
I actually like that second one: Ƀ
|
|
|
Now what is ⊅?
That is the new BTC monetary emblem! Ctrl+Shift Then U-2-2-8-5. φ ^ that's what I get from alt+2285, using ctrl+shift did nothing at all.
|
|
|
Hosted by Google, no less. What makes you think that things deleted after 7 days are actually deleted?
|
|
|
Price negotiable, bumping for sales!
|
|
|
Bump for sales! Price reduced, this is a nice compact powerhouse that will easily run an overclocked 7970 or even 7990 if they ever get released...
It is also very very quiet due to the watercooling system. The rad is attached to the bottom of the main 200(?)mm case fan, which is a low velocity high flow unit. It also has a 120mm Scythe fan on the other side of the rad - this fan makes a lot more noise, but isn't needed if you aren't overclocking. This system hasn't been overclocked, but if you want to do so, just connect the Scythe fan and turn it up to 11.
|
|
|
You don't have to worry about the gubmint, you have to worry about the hacker (or rackpace admin /tinfoil) getting your claims info so they can steal your coins again for the second time. And I guess, having your phone number and other information spread all over the internets
Um, that is a new certificate (did you look?) generated 5/16/2012 by Patrick's personal account. After the hack. Presumably the previous cert was compromised and then revoked afterwards, but I don't have a copy of the fingerprint so I can't check its revocation status.
|
|
|
1) The SSL certificate is from a SSL provider that has been compromised.
It doesn't matter if a site uses a "weak" certificate authority, since any CA can override any other CA's certificates. (The CA system is terrible.) It's smartest to use the cheapest CA you can. StartCom/StartSSL has been compromised? Do please enlighten me - I make extensive use of their services. Basically all SSL is compromised. http://youtu.be/Z7Wl2FW2TcA watch this Yeah OK, well I thought you meant they might have had the private key to their root certificate compromised, or their systems broken into and bad certs issued, or whatever. My projects aren't anything the gubmint is interested it so I'm not really worried.
|
|
|
|