Show Posts
|
Pages: [1] 2 3 4 5 6 7 »
|
They used Privacy Shark and its owner Dalin Owen recommended Morning Star Holdings (a Nevis corporation mill) to them. It's doubtful that anyone will disclose any information about the actual owner of Mybitcoin without an order from a Nevis court because these services are set up precisely to offer safe haven from legal actions.
Why would a business ask a web host for advice on where to incorporate? That whole statement is ridiculous.
|
|
|
The tech explanation doesn't add up. Is he saying they were the victim of double spend attacks? That's the only reason 1 vs 1000 confirmations should matter. It would be so hard to pull off a double spend in this manner that this still smacks of BS.
|
|
|
Here we have a mtgox user who got owned due to a process on mtgox that made it easy for the attacker to do so via a password reset while having access to the user's email account.
It strikes me as very beneficial for mtgox to close this hole.
The "hole" happens to be standard security procedure for every site on the internet... even banks. If you lose control of it there is nothing a site can reasonably be expected to do.
|
|
|
perhaps it should not be so easy to reset a password on mtgox then? perhaps it should be more painful for those who forget their passwords and have to wait for a call from a mtgox employee who will then quiz them about details of their account?
Come on, there's only so much mtgox can do. If someone breaks into your primary email address they've got you.
|
|
|
Not me. I lost either $100 in the postal service or 140 odd BTC in a scam called bitcoin4cash.com, take your pick. What a welcoming way for my first Bitcoin transaction to go, way back in April. I tried contacting the guy, the only solution he could come up with was effectively "wait for it...wait for it..." until the order got "cancelled" by an "automated system" and he started ignoring my mail. It would have been worth resending for me, but how can I resend to a guy like that? I believe his alias is "Mad Hatter" on the forum.
Rumor has it that bitcoin4cash and mybitcoin.com were both the same guy.
|
|
|
People seem pretty sure that they have already clearly identified the entire little "posse" of amateur crime guys involved. At this point, their only hope is if they start ratting each other out. If they haven't already. Do you have a link to the progress on identifying these people? I haven't seen anything beyond all the fake dns info. I'd be very curious to see where the collective investigation work stands.
|
|
|
This whole thing still looks to me like a kid in over his head trying to pretend he runs a fortune 500 company out his basement. The whole "from the desk of..." thing really cracks me up. The BS description of his security posture and the liberal use of the word "we" is somehow supposed to make you think you are talking to some professional team when its obvious to everyone this is not the case.
|
|
|
Jered, you've made the mistake of assuming all your customer's share a similar set of political beliefs.
I just withdrew the last of my dwolla and btc from your site and will not be returning.
Oddly enough I was willing to put up with the growing pains you had when dealing with bank transfers but this kind of thing is too much.
|
|
|
A jar of honey fresh from a beekeeper.
|
|
|
A wallet interface that supports encryption is being developed for bitcoinj as we speak. When it is finished it will support use cases like two factor authentication and per account encryption.
|
|
|
Can this be done with script?
You could get close and have it validated as a good transaction today. All you'd have to do is send money to yourself with this script. If <encryptedAddress> is a pgp encrypted bitcoin private key: scriptPubKey: <encryptedAddress> OP_DROP <pubKey> OP_CHECKSIG scriptSig: <sig>
|
|
|
Its interesting but this part: The client checks every transaction's unclaimed outputs to see if any of its keys decrypt the primary key or the secondary key to a private key whose corresponding public key is the one in the output.
would be brutally expensive at a certain volume of transactions.
|
|
|
From a consumer psychology perspective the push to move the decimal confuses me.
People would much rather pay 0.017 for something than 1.70 even if the underlying value is the same.
Retailers go to great lengths to make prices appear small for a reason.
|
|
|
I've not only done business with him I've met him several times.
Very trustworthy and a nice guy to boot.
Have no worries about dealing with him.
|
|
|
My account works, though I had no BTC there.
Well thats not a good sign.
|
|
|
Same here.
I think I only had ~3.5 on there but I can't get in.
Anyone know what the site owner's account is on the forum?
|
|
|
I'm surprised I haven't seen this discussed here but there was a lawsuit recently where a customer's stolen credentials were used to transfer large sums of money from a bank. The bank refused to cover the customer's losses so the customer sued and lost. Short version: http://www.wired.com/threatlevel/2011/06/bank-ach-theft/Details: http://www.bankinfosecurity.com/articles.php?art_id=3705&opg=1Its possible there will be more of a move toward this in the industry. One of the complaints about bitcoin has been that unlike a bank when your money is stolen you have no recourse. If this case starts to set a wider precedent that could no longer be a valid argument.
|
|
|
Seems like the ripple project may help with this. rippleplay even tracks the dominant BTC exchange rate: https://ripplepay.com/
|
|
|
MyBitcoin is still accepting payments with only 1 confirmation. This is insane for a bank. Any miner capable of mining two blocks in a row can steal money from MyBitcoin pretty easily. I'm surprised no one has attempted it yet.
There's another attack made possible by accepting payments with less than 6 confirmations that would allow you to see exactly which coins MyBitcoin has, and possibly do other damage.
Don't leave us hanging! As long as it doesn't allow someone to go right out and do it what is the < 6 block attack?
|
|
|
|