You see, now this doesn't make sense to me. When starting a block, I see it like a lottery. There are a finite number of possibilities to test. Granted it is a large number, but finite just the same. When you test one possibility and it fails, the number of possibilities available to the next test is one less. Until the block that you are working on is found, your odds against finding it would decrease. When the block is found, you are starting over in the sense that you have to create a new input to hash and go back to having that very large number of possibilities to work from. I'm told that this way of looking at it is wrong, and i accept that, it just doesn't make any sense to me.
That sounds very interesting and plausible to me. I hadn't considered it in those terms before. However I think the reality is very different as I don't think anyone is keeping track of actual "progress" of the permutations that have been tried. Edit: I believe time and date are part of the data being hashed. So being that the solution is time traveling, is there really a finite number of possible solutions? Edit 2: Also the hash we are looking for isn't a static/specific one. We are just looking for one that meets or exceeds the current difficulty. So there could be an infinite number of solutions, or so it seems to me. There's 2^256 possible hashes. That number is much bigger than a human mind can actually comprehend. There are a *LOT* of solutions. There's also nothing to prevent a duplicate hash (other than the statistical near-impossibility), since hashing involves changing a single bit to get a completely different result hash. There really is *nothing* that resembles progress when mining. Every hash is independent. This is why the rest of the network has no impact on your luck/variance (outside of influencing how quickly the next difficulty adjustment happens). Oh, and work is updated every 30 seconds, meaning more transactions are included, different merkle root. This means a whole new set of hash data even if you repeated the same time, nonce, and extranonce as before for some reason.
|
|
|
All the public entry points are back online. At some point the attacker must have started saving all of the different IPs the pool was rotating between and eventually hit them simultaneously.
Luckily, as stated before, this has *no* impact on miner stability once you've started mining, it only affected new users from connecting or miners from reconnecting. My test miners (batch of USB Erupters set to all the different servers) did not have a single disconnect the entire night, so the filtering is still working flawlessly once you've connected.
|
|
|
Those are megabigpower/100TH. The message is in their coinbase. They've been solo mining for a few weeks now, but it looks like they only recently got their coinbase message to work.
|
|
|
Update on Getwork: It will shut down on Friday, October 11th. Exact time is not known, so best to assume anytime after midnight it may go down.
If you're using an ASICMINER Blade, you can use the slush stratum proxy to connect to BTC Guild via Stratum. This is the most common method to use ASICMINER Blades on modern pools (getwork support is being less supported by pools every month). Simply run the proxy with the argument '-o stratum.btcguild.com' to point it at our servers. You can also use newer versions of bfgminer. Instructions on how to do so are in the 'README.ASIC' file.
|
|
|
Posting this as a reminder for those who haven't read the latest news on the BTC Guild website:
The Getwork server will be shut down in less than one week. The old protocol is finally being taken out back to be put down.
|
|
|
I need to think on this. thanks for being patient with me.
At least you know what you don't know Better than what most can say about themselves!
|
|
|
So what you are saying is that what other pools or miners are doing, regardless of their hash rate or how many blocks they find, has no bearing on a specific pool's luck? even though everytime someone else finds a block you effectively have to start over? I have trouble wrapping my mind around that, but then, i did fail probability and statistics. Correct. Nothing else on the network impacts your expected rate of block solving at a given difficulty. The only minor impact is that when the network is going faster, the odds of an orphaned block are higher (higher block rate = more chance of two blocks at the same time), but those are still a very rare case, and on BTC Guild you're paid for orphans so they wouldn't show any reduction in luck.
|
|
|
Pool luck at the start of a difficulty is always going to be at one extreme or the other most likely. It's only been about 24 hours. In that 18 hours worth of closed shifts at the new difficulty, average luck is 82%. That is pretty insignificant overall. If you kept a watch on last difficulties' luck graph, you should recognize how much it can move when measured in short periods of time. But in the end, the luck almost always ends up +/- a few % for the entire difficulty period. Last difficulty ended ~5% positive. That's actually a fairly significant deviation given the pool's size. The larger the pool, the less they're expected to deviate from neutral as time goes on.
I think including the difficulty in a Luck calculation is the wrong thing to do. It is in accurate. What you need to use is the current global hashrate. Difficulty lags too far behind. This is incorrect. At a current network difficulty, a certain number of shares are expected to find a certain number of blocks. That is how the luck is calculated, and that is the correct way to do it. Pool speed/network speed is irrelevant, it is entirely about Blocks Found after X Shares vs Network Difficulty.
|
|
|
Pool luck at the start of a difficulty is always going to be at one extreme or the other most likely. It's only been about 24 hours. In that 18 hours worth of closed shifts at the new difficulty, average luck is 82%. That is pretty insignificant overall. If you kept a watch on last difficulties' luck graph, you should recognize how much it can move when measured in short periods of time. But in the end, the luck almost always ends up +/- a few % for the entire difficulty period. Last difficulty ended ~5% positive. That's actually a fairly significant deviation given the pool's size. The larger the pool, the less they're expected to deviate from neutral as time goes on.
|
|
|
DDoS Attack Updates
The pool has been under attack for over a week straight. The attacks hit in short bursts, moving as DNS changes, and generally lasting 6-12 hours at a time. As many users know by now, these continued attacks have given the pool time to radically adapt it's DDoS defenses in order to create more effective methods to filter out good and bad traffic and prioritize already connected traffic. Once you have started mining successfully, you should not have instability, and that is well reflected by the pool speed over the last few days. Even as the attacks are repeatedly knocking servers down, the speed has been steadily increasing even above it's pre-attack all time high.
There is one major exception at the moment on the filtering, and that is GUI Miner. GUI Miner is currently being caught by the filters that separate good miners from bad miners/bad traffic. I'm trying to find a way to get it separate out, but due to it's very outdated implementation of Stratum (it's using the initial poclbm stratum release without any updates), there isn't any good type of fingerprint that can be used to identify GUIMiner at this time.
|
|
|
Error 1006 Access denied What happened?
The owner of this website (www.btcguild.com) has banned your IP address ().Why Send an email to webmaster@btcguild.com with your IP. IP bans are issued when your IP fails too many login attempts in a certain time frame. Do note that IP bans only affect website access, not mining.
|
|
|
is it safe to go back to the original pool instead of the private gigaforce server?
The private DNS information will remain valid indefinitely. It's actually recommended you continue to use those as your primary pool if you want to mine on BTC Guild. In the event of future attacks, the semi-private servers will be back online before the public servers, and ideally they will remain online as attacks continue, while the public servers may go up/down during the process.
|
|
|
sec_error_ocsp_unknown_cert
That's a generic cloudflare-based error, probably already fixed by the time I woke up.
|
|
|
Wasn't GHash.io a victim of this attack too? Were they? They were solving a *ton* of blocks during the attacks. My understanding is their website went down when all of Cloudflare had a major outage, but the website is just a frontend. I read a few here-say posts that said they were being attacked. But I don't know if it was fact. So, is there possibly some truth to this rumor, Eleuthria? There's a little motive, especially for large mining entities, but nothing that points to any culprit. Innocent until proven guilty, and it's impossible to establish guilt from a DDoS when nobody is trying to take credit/gloating. Knocking off the largest pool for 24 hours really has minimal impact on difficulty though due to failover pools, so the real motive would be someone that actually *gains* something out of it (another pool). But in all likelihood, it was neither.
|
|
|
Wasn't GHash.io a victim of this attack too? Were they? They were solving a *ton* of blocks during the attacks. My understanding is their website went down when all of Cloudflare had a major outage, but the website is just a frontend.
|
|
|
well havent been over 16 since 10673
Which wasn't even 12 hours ago ;p
|
|
|
yea but 74-83 are only in the teens if that. what happened to the 20+ blocks a shift?
Difficulty went up. It only takes 16 to be above neutral at this difficulty+value of N.
|
|
|
man ever since the ddos the pools luck sucks and i have notice a bit difference in my bitcoin ballance. I was getting about 0.1 BTC a day. I know not much but still. i havent enven gotten that since 2013-09-30 03:07:19 AM. Luck hasn't been that bad. We had 25 consecutive shifts at 100% or higher earlier (#10648 - 10672). Only the last 11 shifts have been under expectation, hardly "luck sucks".
|
|
|
If you're still having issues getting connected, please let me know by PM or email. Every testing machine I have has been working quite well for about 12 hours. The only hiccups should've been when some old proxies were closed and the new EU servers brought up.
|
|
|
Just to clarify a common question: If you have been given the semi-private DNS information, you do not need to switch back at any time. The semi-private servers will *not* go down once the attacks are completely over. Staying on the semi-private DNS may end up keeping you online next time an attack hits. It's not a guarantee, but it has worked quiet well for most users so far.
|
|
|
|