Bitcoin Forum
May 22, 2024, 09:29:47 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 [148] 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 291 »
2941  Bitcoin / Bitcoin Discussion / Re: Version 0.6.2 available on: May 11, 2012, 03:28:52 PM
Pieter fixed the "100% usage on OSX bug" and I created and uploaded a fixed version 0.6.2.2 especially for the Mac.

RE: upgrading:  the best upgrade practice is to:

1) Backup your wallet someplace safe (if you're running an 0.6 release then use the Backup Wallet menu item).
2) Shutdown. Make sure Bitcoin isn't still in your system tray-- don't just close the window, shut it down.
3) Wait a minute or two (it can take older versions a minute or two to completely shut down)
4) Install and run the new version.


I know the new version is "faster" to shut down, but how much faster should I expect it to be? I haven't really timed it, but the old version seemed to take between 30 sec and 1 min to shut down completely.
2942  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:53:06 PM
Please don't blame genjix. It's definitely not his fault.

He's not in our mailing list so it couldn't be him.

Well, shit just happens and it's not anyone's fault or incompetence here. I'm the only guy awake when the incident happens.

Ofcourse it's not his fault... It's not your fault either. It's the hackers' fault.
But if you, as a corporation, management and operators included, decide not to reimburse your customers losses, then it's your fault and you should be labeled for what you are.
Take a hint from TradeHill.

Ok. The password reset email was sent to four addresses. I can already confirm that two of them are not compromised. We are waiting for the rest to wake up and check their email accounts. The email account compromise is the direct cause.
Doesn't Rackspace offer you the option of requiring more than one person to sign off on a password change?
2943  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:43:14 PM
This: http://en.wikipedia.org/wiki/Port_knocking Plus this: https://code.google.com/p/google-authenticator/ Plus this: http://en.wikipedia.org/wiki/Virtual_private_network Plus this: http://www.duosecurity.com/vpn

....equals win!
2944  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:37:13 PM
lollerskates
2945  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:28:03 PM
I am angry that our name is being dragged through the mud for something we had no part in.
i dint see your name dragged in mud, less cry more solutions
You must be either blind or oblivious?
2946  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:27:06 PM
There is an awfully lot more noise than signal in this thread.
Definitely. People are reacting emotionally, not rationally.
2947  Bitcoin / Bitcoin Discussion / Re: If you take medicine, I need your help. on: May 11, 2012, 02:21:38 PM
If you are going to be pushing bitcoin on merchants that are new to it, you should recommend a merchant solution of some sort to go with it. MtGox has the lowest fees, but is very basic, Bit-pay has a complete polished product with reasonable (to some) fees, and I haven't looked into Paysius (sp?) since they started, but they offer more competitive fees. There may be others as well.

2948  Other / Off-topic / Re: Noob Question on: May 11, 2012, 02:18:29 PM
what happens once all the coins are mined ? do these devices become redundant, or can they be used for other purposes, and other virtual currencies ?
Mining will always be necessary to confirm transactions, and can continue beyond the cessation of the block reward. Once the block reward stops, you can still make blocks by mining them, but they won't have an inbuilt value other than the transaction fees that you choose to include.
2949  Bitcoin / Bitcoin Discussion / Re: I'm speaking today at American Banker Event - 45 minutes about Bitcoin on: May 11, 2012, 02:16:16 PM
I can haz live stream pls?
2950  Bitcoin / Mining / Re: Open-Source CUDA Compiler on: May 11, 2012, 02:15:18 PM
Just read that NVIDIA announces a Open-Source CUDA Compiler.

Anyone interested in seeing if this can provide better hashing results on NVIDIA based cards.

--
Kris

Poor mining performance on NV has precious little to do with the compiler.
It's just something their H/W is bad at because of missing circuitry.

Pretty much. But damn is it cool for everyone else that can make use of the video card to do computations. Wonder how much speed various supercomputing things will gain.
2951  Bitcoin / Bitcoin Discussion / Re: [Emergency ANN] Bitcoinica site is taken offline for security investigation on: May 11, 2012, 02:07:29 PM
the theft won't "devalue" Bitcoins.  even if the thief sells it's just another buying opportunity and might cause a temporary dip in the price.  but that's assuming he wants to sell.  he could be long term speculator like the rest of us hoping the price goes to $100 before he unloads.  at the very least it will take him time to sell to get the right price and there's also the possibility mtgox intervenes once again.  the only one's who will take a loss here are Zhou and possibly some of his customers.
But of course it will, doc, even if they buy the Bitcoins back at market! Hackers are not speculators, just think about every hack that has happened in Bitcoin’s history and the dumping that followed therafter (it is not as easy anymore since Gox collaborates to track stolen coins, but they just arbitrage it from a different exchange, and I suspect it is usually BTC-E.com). In addition, there is the breach of confidence that this currency is perhaps nothing but a collective subsidy to hackers.
Quit trolling, asswipe. Unfounded accusations aren't cool. Also, you are the hacker, send me the money Tongue

2952  Economy / Goods / Re: Spend Bitcoins (worldwide) | Buy Bitcoins (worldwide) on: May 11, 2012, 02:01:06 PM
Refund was received.  You rock.

I know, but say it again I like it. Smiley
TWSS
2953  Other / Archival / Re: Pictures of your mining rigs! on: May 11, 2012, 01:57:13 PM
Click it....
2954  Economy / Marketplace / Re: ["WAIT LIST"] BFL Singles Order Date / Ship Date on: May 11, 2012, 01:44:38 AM
My order (3/8/12) was shipped on 5/7 and I received it on 5/8

It's a rev 3 with the smaller extra fan on the bottom.

The thing came with absolutely no documentation, not that I really need it, but perhaps BFL should at least include a piece of paper saying to go to bitcointalk.
Are you sure you didn't miss the nice bit of card stock with links and info? Maybe it's at the bottom of the box.

I double checked the box, there's nothing, even stuck under the little flaps of the box.  Undecided 

What info is on that card?
Sorry I don't have it beside me otherwise I'd scan it and upload it. You could probably email them for the info.
The most important bits are the links to download mining software, but those are on their site anyways.
2955  Bitcoin / Mining / Re: Mr. Unknown keeps getting bigger on: May 11, 2012, 01:11:22 AM
"Unknown" isn't necessarily a single entity, and often consists of mis-identified known pool blocks.
2956  Economy / Marketplace / Re: List of honest traders. on: May 11, 2012, 01:01:19 AM
My list of honest buyers:
    MasonIII
    yunk3r
    the joint
And to think that I had doubts. Forgive me for ever considering it.
2957  Economy / Trading Discussion / Re: How to prove that you own/control a private key after it has been stolen on: May 11, 2012, 12:48:32 AM
The above post was made with a lot of haste, due time constraints. However, I had a little time to think about it, and have refined the procedure a little bit below, to hopefully be a bit more clear:

Key #1 is a standard message signing key, and it could be any valid format such as RSA, PGP, GPG, etc.
Key #2 is the private key to the bitcoin address that you wish to prove that you own.

  • Create a message that contains the fingerprint of Key #1, the bitcoin address, the current date and time, and optionally any other info that you want to include such as your -otc nick, you bitcointalk.org nick, your name, etc.
  • Sign the message with the bitcoin private key (Key #2).
  • Sign the previous signature with Key #1
  • Timestamp the whole works with a signature and a time from a trusted timestamp server such as Verisign et al.
  • Publish the blob of data on a website somewhere.

The timestamping part of the process is explained somewhat generally here: http://en.wikipedia.org/wiki/Trusted_timestamping
My understanding is that the data is hashed with a one way hash (perhaps SHA256?) and then the hash is signed by the trusted time stamping authority.

I will attempt to demonstrate using my signature donation address, my -otc GPG key, and a public timestamp server. I fear that the process may fall apart at the timestamp step, but hopefully we can figure this out for ease of use in the future.

My donation address is: 1NgLdhjHfLbcVawMk4DNEv8yf9ZzzNJV6U
My -otc data is here: http://bitcoin-otc.com/viewgpg.php?nick=rjk and the fingerprint is 585C086DAD92DCA4080BD9740B9FF092ACB50C08

My message is as follows:
Code:
I (rjk) control this bitcoin address: 1NgLdhjHfLbcVawMk4DNEv8yf9ZzzNJV6U My key fingerprint is: 585C086DAD92DCA4080BD9740B9FF092ACB50C08 This message was created 5/10/2012 8:40PM Eastern time
When I sign that message with the key for 1NgLdhjHfLbcVawMk4DNEv8yf9ZzzNJV6U, I get the following:
Code:
G9fe7xx/dCESzyxkpISxCzNXCXYRA7u1ALR8aG8LC4eRGXhApqA9/Q4OSzJiKgf0Pgi5ifnwkHcVSJH93/tadsI=
I then sign the signature with my -otc ID:
Code:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

G9fe7xx/dCESzyxkpISxCzNXCXYRA7u1ALR8aG8LC4eRGXhApqA9/Q4OSzJiKgf0Pgi5ifnwkHcVSJH93/tadsI=
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJPrF8WAAoJEAuf8JKstQwIt4oIAIBTOMSf8Dfa0PcXTlzuhniZ
VdcecUUILR28Ikvq5xux2TrW6dm9hpnkwUcluPeq6pCo9bMlYF+jgN1iTnYUFdN0
wMlB9PSPs5GSN4WDyu5sKdLaN5hVZTXb4IabGJNvDyqkIMco02VgLZR5+AoX6BJj
wh4qk26Ckv/bLjPxRWW57rdUUOw83I/YTTFuPwMQbp8AsJADpRhQJhuNo5aE6SGW
R5c6TiTg9n4Mva02a4YZjzZ+dNuX21mH6hMDroI4pk8gQJz9gWLotGCO0JF59Y7e
uSnWRzT0YJ84cP8uc46LrUWHvgK4kM9jbFlSr8WhPpp/WsH7eGn8sbbH5fH6eFE=
=pKQ2
-----END PGP SIGNATURE-----
Now I need to hash the above blob and sign it with a trusted timestamp server. There is a web service at http://timemarker.org/en/GetStamp.aspx but it doesn't seem to load reliably. There may be better services, or it might be possible to do it a different way. I was able to get it to work though, and the result is:
Code:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Timestamp-version:  1.0
Description:        timestamp
Signed-by:          http://timeMarker.org/
Timestamp:          Fri, 11 May 2012 00:45:03 GMT
Number:             13080
Ref-Hash-SHA512:    546100a6ee3597206d5997322978960e6abf5afdb66823198bdea632b4d7877d9d9a42ec352eed8a37ab1710730e21cfedafc616eca7a700e1989ffa1e051328
Ref-Hash-RIPEMD160: 83d20c3a748cd05a6bc55daad2c720d6b4b3cb1f
Hash-SHA512:        7d2a8a4319c01bfef0e404948ab0fe9fa28cf012e1e7a9a45c5da53bed1a0a363e6aadb7aab20f6e8dab96d9b9885a1222ccb6dc4f2289dea60d44ed5113b1c0
Hash-RIPEMD160:     868e087ef8f9024209e73e0fee52d2971513c657
-----BEGIN PGP SIGNATURE-----

Version: BCPG v1.32

iQEcBAEBAgAGBQJPrGEPAAoJEPKfyyzv5FwHGTAIAJeBSIPa9SedxzsdhnnfHI8i
EDgZH/H6qt2JvmLxr9oPnGFc2jb6+45cTjS8c3LsbKMk8eFt0afF+S4D7POiXl9M
fs6sW8TzkAxbEf1qvIO4c0js4iohBY2UnfmfcPH018b3a/PYVYy06qcaMzJq3IP8
O09msBgT/LyXNw37fuf3eaXTbUVYJxcYvPYKydE8IZ4W1IHVH0coMWKcCg6AT6SY
mcxwxgichIi1HQr82bM1MpSsWKE3v+hao1dvRORTpbjM+FQR6tgQ8baYL2uAkHBK
6RGs/JDVmcqhtx5u67tDq4oHEpxoMOk2EGZ9puJMetdaI4Z2tNRK0oUedBSDvRM=
=ZkFP
-----END PGP SIGNATURE-----

So theoretically, that should be able to prove that I controlled 1NgLdhjHfLbcVawMk4DNEv8yf9ZzzNJV6U prior to 00:45:03 GMT 5/11/2012, as per the time stamping service.
2958  Economy / Trading Discussion / How to prove that you own/control a private key after it has been stolen on: May 10, 2012, 11:04:32 PM
So these days, it seems that bitcoin private keys are being stolen all the time. I'd like to know the best way for a victim to prove that they owned the keys FIRST, potentially enabling them to recover funds.
As we know, anyone with the private key can sign a message from it. I would like to know whether my idea would work - basically it is as follows:

Before you are hacked, and when you have reasonably good proof that your keys are secure and un-hacked, perform the following steps:
  • This assumes that you have an existing -otc signing key, or that you can create one and keep it completely separate from your bitcoin keys, and protected with a strong password.
  • Take the key fingerprint from the RSA signing key, and create a message that contains that fingerprint, as well as a statement that you control it, plus any other identifying information that you wish to include.
  • Sign that message with your RSA key.
  • Sign the previously signed message with the bitcoin key.
  • MOST IMPORTANT STEP: Sign the final message with a signature from a known timestamp server, such as Verisign. This is the part that I am not sure about - can you timestamp arbitrary data in the same manner that you can timestamp an executable?
Once you have done this, you can prove that you owned a compromised key prior to it being compromised, and you can sign messages to that effect with your RSA key. Obviously, if both are stolen, you are SOL.

Would this work? Does anyone have any reason why it might not work, or perhaps a better way to do it?
2959  Other / Off-topic / Re: Problems with CGMiner 2.4.1 and Singles? on: May 10, 2012, 10:10:31 PM
You need a version of CGMINER compiled with --enable-bitforce


All the official binaries are.

I wish it was but it's not. I'm in the process of compiling them again with --enable-bitforce.

Is it possible that the windows version only supports COM1-COM10 then?
For high COM numbers, you need to use "\\.\COM25" for example. Anything over 9 requires \\.\COMxx
2960  Other / Off-topic / Re: Problems with CGMiner 2.4.1 and Singles? on: May 10, 2012, 10:04:09 PM
You need a version of CGMINER compiled with --enable-bitforce


All the official binaries are.
Pages: « 1 ... 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 [148] 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 ... 291 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!