Bitcoin Forum
December 08, 2016, 10:12:40 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 [2]  All
  Print  
Author Topic: Bitcoin services under attack?  (Read 4575 times)
carriun
Newbie
*
Offline Offline

Activity: 16


View Profile
May 31, 2011, 12:46:35 PM
 #21

If there is enough disruption in the pools for a couple weeks would the difficulty drop?   How much of the total network  hash rate is made up in pools?
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
1481235160
Hero Member
*
Offline Offline

Posts: 1481235160

View Profile Personal Message (Offline)

Ignore
1481235160
Reply with quote  #2

1481235160
Report to moderator
CydeWeys
Full Member
***
Offline Offline

Activity: 154


View Profile
May 31, 2011, 01:27:01 PM
 #22

all bitcoin transactions are recorded in the blockchain, if you sent it on its way then it irrelevant if their client died or not
look your transaction up on http://blockexplorer.com/

It's not irrelevant if you've emailed them about it and received no response from them in 10+ days.

I accidentally duped a 10 BTC transaction to a merchant using mybitcoin.com and am yet to get any response from them (mybitcoin.com, not the merchant).


Don't use MyBitcoin?  The whole strength of Bitcoin is that it is 100% decentralized; why give that up?
M4v3R
Hero Member
*****
Offline Offline

Activity: 607



View Profile
May 31, 2011, 02:19:47 PM
 #23

If there is enough disruption in the pools for a couple weeks would the difficulty drop?   How much of the total network  hash rate is made up in pools?




Translation: most of it.
mennoman
Jr. Member
*
Offline Offline

Activity: 42


View Profile
May 31, 2011, 02:32:42 PM
 #24

all bitcoin transactions are recorded in the blockchain, if you sent it on its way then it irrelevant if their client died or not
look your transaction up on http://blockexplorer.com/
But sometimes it seems it doesn't work.

This are the news            The Bitcoin Sun            Bitcoin Weekly
Alex Beckenham
Full Member
***
Offline Offline

Activity: 154


View Profile
May 31, 2011, 02:57:51 PM
 #25

all bitcoin transactions are recorded in the blockchain, if you sent it on its way then it irrelevant if their client died or not
look your transaction up on http://blockexplorer.com/

It's not irrelevant if you've emailed them about it and received no response from them in 10+ days.

I accidentally duped a 10 BTC transaction to a merchant using mybitcoin.com and am yet to get any response from them (mybitcoin.com, not the merchant).


Don't use MyBitcoin?  The whole strength of Bitcoin is that it is 100% decentralized; why give that up?

Do you mean boycott all merchants that use mybitcoin.com to accept payments?

That will drastically reduce the take-up rate for new bitcoin merchants.

Not every store owner knows how to set up a wallet on their own server.

grue
Global Moderator
Legendary
*
Offline Offline

Activity: 1932



View Profile
May 31, 2011, 04:17:40 PM
 #26

On the side note, Bitcoin Signature Generator was subject to an attack a week ago. I got hundrets of new registrations with names like:

Code:
1 UNION ALL SELECT null,null,null,null,null--
999999.9 UNION ALL SELECT 0x31303235343830303536--
/\\../\\../\\../\\../\\../\\../\\../etc/passwd
${@print(md5(acunetix_wvs_security_test))}\\
sample@email.tst\' and sleep(4)=\'
etc.

Attacker's IP was: 124.148.255.198
UA String: "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) Havij"

"Havij" is a popular vulnerability scanner. This probably means the attacker is a script kiddie who is bored.

It is pitch black. You are likely to be eaten by a grue.

Tired of annoying signature ads? Ad block for signatures
PabloW
Full Member
***
Offline Offline

Activity: 229


View Profile
June 01, 2011, 02:58:23 AM
 #27

Maybe it's all just a bit lot of coincidences!


Or you mean Bitcoincidences?

 Grin
timmmay
Member
**
Offline Offline

Activity: 70



View Profile
June 01, 2011, 03:14:49 AM
 #28

Maybe it's all just a bit lot of coincidences!


Or you mean Bitcoincidences?

 Grin

Hahaha I like this!

cdhowie
Full Member
***
Offline Offline

Activity: 182



View Profile WWW
June 01, 2011, 04:03:03 AM
 #29

If there is enough disruption in the pools for a couple weeks would the difficulty drop?
Probably not by much.  People will either switch to another pool or solo mine until the pools come back up.  The network doesn't care if the blocks come from pools or not.

Tips are always welcome and can be sent to 1CZ8QgBWZSV3nLLqRk2BD3B4qDbpWAEDCZ

Thanks to ye, we have the final piece.

PGP key fingerprint: 2B7A B280 8B12 21CC 260A  DF65 6FCE 505A CF83 38F5

SerajewelKS @ #bitcoin-otc
jerfelix
Sr. Member
****
Offline Offline

Activity: 266


View Profile
June 01, 2011, 08:50:40 AM
 #30

On the side note, Bitcoin Signature Generator was subject to an attack a week ago. I got hundrets of new registrations with names like:

Code:
1 UNION ALL SELECT null,null,null,null,null--
999999.9 UNION ALL SELECT 0x31303235343830303536--
/\\../\\../\\../\\../\\../\\../\\../etc/passwd
${@print(md5(acunetix_wvs_security_test))}\\
sample@email.tst\' and sleep(4)=\'
etc.

Attacker's IP was: 124.148.255.198
UA String: "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) Havij"

"Havij" is a popular vulnerability scanner. This probably means the attacker is a script kiddie who is bored.

Indeed.  If you have a website with a web form, you will be under attack all the time from these things.  People just leave them running day and night, crawling the web, and looking for vulnerabilities.  I've seen normal sites under attack daily from these.
dacoinminster
Legendary
*
Offline Offline

Activity: 1106


Rational Exuberance


View Profile WWW
June 01, 2011, 02:26:18 PM
 #31

When MtGox got DDOS'd, it was hackers demanding a ransom. I wouldn't be surprised if many pool operators are getting similar demands.

Come to think of it, bitcoin might just be the perfect way to accept a ransom of any kind.

Pages: « 1 [2]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!