Is the site down ?
It is for me.
|
|
|
So if I ordered a BFL Single unit today, when is the expected delivery? I'm too lazy to read this entire thread.
4-6weeks I see what you did there.
|
|
|
I don't have permission, but I can't be caught because I'm the only person smart enough in IT to figure out what's going on! Then they probably wouldn't notice if you just took a few computers home with you for your "pockets benefit", either... As a matter of fact, they dont. I've taken 10+ sticks of RAM, a few PSUs, tons of HDDs, printer power supplies, a laptop, a PC Ebay FTW You're a thief and you admit it. I want nothing to do with you.
|
|
|
Interesting theories. But even if none of them are associated with Bitcoin in any way, it might be good to try and get them involved.
|
|
|
OK.. 0.0.0.0 aside.. got a serious question... How do you come up with the IP address of the miner/pool? Looking at raw blocks in block explorer I don't see an IP address anyplace .. Sigg The chart uses known IPs of pools (that people report, or that are shown in pool docs for connecting your miner).
|
|
|
This might be considered somewhat off-topic for your question, but make sure you have permission to do this or you could get into trouble.
|
|
|
Keep us posted. Are you planning to hook a BFL single to this?
|
|
|
If there's a joke in there somewhere, I'm too stupid to see it. What's the punch line? Bail and legal defense fund placeholder. I was thinking the same thing. He wants a record of the transactions so the ADA’s case is a slam dunk. Will there be a separate thread listing the chronology of the crimes committed with said weapon or will that just be posted here as well? lol I appreciate the humor, but where I live, I can order everything I need (except the lower, which i've already purchased from a dealer) shipped to my door, and be completely legal. I love living in the middle of nowhere. Well those rabbits in you back woods are sure gonna be pissed when you get this assault rifle complete. Make sure to test it with a rubber band to guarantee it can be bump-fired like a full automatic US Army issued M-16. That you'll end up with a lot of fire power to hunt with when you’re done; unless of course you’re hunting people (which was my first joke). Then that weapon is perfect as that's what it was designed for originally. Good luck with your project. You seem to be somewhat misinformed as to the nature and purpose of firearms.
|
|
|
Awesome thread.
As for the receiver, another option might have been an 80% receiver if there are any companies accepting bitcoins.
|
|
|
Someone please buy this and keep it running...!
A couple people have offered. I kind of hate to bring this up, but given that jav gets to keep all the coins that go unclaimed.... well, I'd call that pretty big incentive to shut it down.
TBH, I kinda think that's uncalled for. I think he mentioned he'd honor people's claims even after it's shut down. We've been in discussion with jav regarding buying the site, and we will unfortunately not go through with it. I hope someone else steps up and have the money to invest in it. -- Regards, Jim Bit LC Inc. https://www.bitlc.netWhat is the general price range he's looking for?
|
|
|
AMD Sempron for 1 Satoshi, shipping $189.00 :rolleyes:
|
|
|
So what is the latest has the 43,000 bitcoins left the wallet yet ?
What exactly do you mean by "left the wallet"?
|
|
|
i mean seriously, could not this whole thing been prevented if the wallet was just encrypted?
Obviously the software running against the hot wallet has to have access to it. This means that if someone roots the server, they'll be able to have the same access to the hot wallet. Encryption would not have entered into it. Zhou, good on you for covering this! I'm having a hard enough time covering the BTCinch theft; I can only imagine how pissed you are at linode. In this case, encryption would have protected the wallet because the attacker was only able to get root access after a reboot. why would a reboot stop the attacker from seeing the wallet being unencrypted during the next use? You have to enter the wallet password/passphrase after rebooting/restarting bitcoin. am i missing something here? wouldn't that entry be exactly what the attacker would be waiting for? Yes, an attack like that could also be done, although it would have to be slightly more sophisticated than today's attack. Likely you would modify bitcoind to log the passphrase to a file somewhere.
|
|
|
i mean seriously, could not this whole thing been prevented if the wallet was just encrypted?
Obviously the software running against the hot wallet has to have access to it. This means that if someone roots the server, they'll be able to have the same access to the hot wallet. Encryption would not have entered into it. Zhou, good on you for covering this! I'm having a hard enough time covering the BTCinch theft; I can only imagine how pissed you are at linode. In this case, encryption would have protected the wallet because the attacker was only able to get root access after a reboot. why would a reboot stop the attacker from seeing the wallet being unencrypted during the next use? You have to enter the wallet password/passphrase after rebooting/restarting bitcoin.
|
|
|
All customer passwords were encrypted with BCrypt.
The correct term is "hashed", not "encrypted". Huge difference. i sure hope Zhou knows the difference Well, he mentioned BCrypt, which is a hashing function, not an encryption function. I think he just inadvertently used the wrong term here.
|
|
|
All customer passwords were encrypted with BCrypt.
The correct term is "hashed", not "encrypted". Huge difference.
|
|
|
Zhou, thank you sincerely for being honorable, reporting quickly and fully, and absorbing the loss.
Very impressed with you and Slush today. I give you my sincere gratitude.
+1;
|
|
|
|