This new firmware is either going exactly half as fast, or is triggering a bug in cgminer to make it display exactly half as fast as it should be going. I suspect the latter.
EDIT: cgminer shows 433 mhash/s
|
|
|
hoo is nothing more than a scummy bastard, constantly spewing veiled death threats and promises of mutilation. Go fuck yourself, hoo.
|
|
|
One important question I don't think has been addressed here yet:
What about verification documents that were emailed to Bitcoinica? Were those compromised?
He said they weren't. That they were stored encrypted at some other server. Now I'm not sure if that was on this thread or on the statement they had at blogspot which is no longer there and nobody knows if was real or fake. EDIT: Just checked and it was not in this thread. I remember reading that as well. I thought it was in this thread. Perhaps the post has been edited/deleted. I remember something like that from the Linoide debacle, but not this thread. It was in this thread but appears to have been removed.
|
|
|
If bitcoins completely disappeared would these machines have any resale value? I don't understand why everyone argues that they will not pay off even if it takes 2 years to break even, you still have the machine, say it is worth $5k after two years thats a 16% return. I may not completely understand the risks but sounds solid to me.
We would like to let all our clients know that, in case of Bitcoin failure, we will make all our units OpenSource, and thus making it possible for the clients to sell their units to various industries at almost certainly higher price than they purchased it in the first place. Regards, BF Labs Inc. Lol I knew this would be the first question to come up. Anyway the fact that they are willing to open source it and we know now the chip is an FPGA are both very good news.
Also it is more likely the hashing power of the Single or Mini-rig will not be profitable long before Bitcoin goes down, remember you used to be able to mine with "KILOhashes"
Why are you looking a gift horse in the mouth? You have less faith in Bitcoin surviving than BFL does! And if you think Bitcoin is going to collapse any time soon, why don't you go make it happen, so you can get your beloved SDK?
|
|
|
This only happens when I attempt to mine if that helps.
Reduce your overclocking.
|
|
|
are they trying to hide it by making it whole bunch of small transfers?
You got it.
|
|
|
This is great, however I don't care to compile for Windows. I have a few HE.net tunnels that I should be able to test with, is there a way to disable IPv4 in the client in order to run the tests?
|
|
|
Very good prices.
i APROVE!
Me too ! This has the scammer seal of approval Stop being an idiot creating more spam by following him around quoting his posts. He can't edit or delete them, so they will stay anyway.
|
|
|
hi,
@rjh That looks alright, but it doesnt say what antitamper it has, it looks like someone with physical access to the machine could just take the key out, then probe it for the secret key I would be a little hessitant about running a multimillon dollar business on a $500 key. (it mentions sha but not sha256...)
The Edge usecase is a bit more relevant, when in remote operation mode (via ssh/tls/cert based) it takes a physical device (smart card) inserted at the remote management location to sign something. so you could have 4 cards, a,b,c and d. card a inserted allows signing of transactions upto $1000. if card b is inserted then you can process transactions of $1000 - $5000. for any transactions over $5000 you need cards c and d.
you can have multiple copies of each card with thier own unique encryption code and with their own revocation certificates.
you would always have key a in until you need to process large transactions, then once an hour put card b in once all transactions are verified and clear transactions that are $1000-$5000, then twice a day, you and someone else have to insert keys c and d to process the really large transactions.
on top of this, if anyone tries to mess with the device it will purge all the keys off the device, to a standard you could not get them back by probing or skimming the chips. but not the cards. (which are on the other side of the world anyway) you can then use the cards and the master cards to reprogram the device remotely.
This kind of functionality has been around and avaliable to the public for at least 4 or 5 years. I guess that the Edge costs around $7000 based of the pricing of thales' other products.
physical access does you no good at all.
Well, note that the YubiHSM is in a small USB stick format - it is designed to be installed inside any server, and then the server itself would have case opening sensors and case locks. I am not sure about the anti-tamper stuff other than that, but the device is designed to be write-only for the keys, and it does its own computations based on signals sent to it to decode. It's kind of complicated and I don't totally understand it, but I think it has a bit more going on behind the scenes then it really looks like. As for the special smart cards - that sounds like an extremely cool technology to have, and it makes a lot of sense with that kind of design. Kind of like a missile launcher where 2 guys both have to turn their keys at the same time. It sounds like it would be expensive though.
|
|
|
Alot of the posts and updates ended up on Twitter and Google+ instead of on my site actually. "I like it... but how do we trust you not to up and steal all the coins in the private key one day?" I strongly feel a legit business model has a longer shelf life than a corrupt one... I don't keep logs or copies of the information provided, not just for your sake but for mine as well. If I kept a copy of addresses/keys and that list got compromised I would get blamed anyhow (as I should be). I know I have ZERO creditably right now which is the reason for the freebies, plus user reviews speak louder than my own. Here is a Private Key example: https://i.imgur.com/GCiucl.jpgKey is clear and legible! Why did you bother to redact the QR code and the bitcoin address? You can compute the address from the private key.
|
|
|
Well here is a sample of the names from the ban list: aiujiugioewg aiuhshuewi fdsafjiodjgew HAIUUHGEWUI fhiuwhgiuewhg FDJSAJGOEW
And I'm guessing it's entirely automated cause it responded to bans regularly, not too fast not too slow. We have much more efficient ways to deal with it now, and it seems to have ceased so should be a lot better here on out.
Those look to be human made. A bot random string generator would use letters found on close keys. The fd sa ui hu ew etc. Yeah when I saw that I thought that they looked exactly like someone banging their fists on a keyboard.
|
|
|
I agree basing longpoll priority on absolute hashrate would be a real shame to all the smaller miners. The original bitcoin vision was that anyone connected to it could contribute a few cycles in a massively distributed computing power entity, and it's actually unfortunate that it is becoming such a "professional job" to actually earn something via mining. On the other hand, all it would take is some kind of nominal number of shares, say 1 in the last minute, to detect an active miner versus a backup miner. It would also kick botnets' arses.
I believe this is the case. At that link, you will see that Slush mentions CPU miners and says that this should deal with them. I assume that the priority doesn't apply to miners over a low rate such as 100mhash, and therefore implementing prioritization on EMC may not make a noticeable difference in load or such things.
|
|
|
So are you saying the server has to reboot to change the root password and the encrypted disk would not be automatically remounted on reboot? I use keys on all my server so I'm not familiar with this.
Well, it might be possible to configure it so that it auto-remounted on reboot, but that would require the boot password to be stored on the machine, which would defeat the purpose of an encrypted disk.
|
|
|
ha ha yeah it was toooo much of a nightmare ha ha But hey if we get a few more customer's because of it then it's worth it Hmm, when trying to make a purchase, it forces me to choose a domain, but then gives me the following for any domain that I enter:The domain you entered is not valid. Enter only the part after the www. and include the TLD
Try another domain
NVM, I guess the software didn't like me entering things in with capital letters.
|
|
|
NEVER DEPOSIT MORE THAN YOU CAN AFFORD TO LOSE HOW FUCKING HARD IS THAT TO COMPREHEND?
|
|
|
How about this? http://www.yubico.com/YubiHSMI don't know the details of how fast it can go or anything like that, but it is intended to be a secure store of secrets.
|
|
|
What's your asking price?
More than he paid, of course!
|
|
|
Ok, so to keep from getting flamed more and to make some future customer's happy we have switched our payment method for bitcoin's over to Bit-Pay. It was an accounting Nightmare! But it's all setup now ha ha So current prices of our ATOM server's are $58.50 a month and you can pay with Bit-Pay so it will be at current market prices! We are also offering a discount for customer's who signup during this month, and it's a recurring discount! Get this month and your second month, so two discounted month's, at 20% discount!Promo code: atomM2012So that's $48.75 a month for your first two month's! Not just the first month but your first TWO!! Link is the same: https://clients.microtronix-tech.com/cart.php?gid=10We offer these server's in Chicago, Denver and Europe with up to 1Gbps port speed! Great news! And it wasn't flaming, just correcting some misconceptions... I hope it wasn't too much of a nightmare though.
|
|
|
|