Bitcoin Forum
December 02, 2016, 06:24:15 PM *
News: Latest stable version of Bitcoin Core: 0.13.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 3 4 [5]  All
  Print  
Author Topic: 50%  (Read 6741 times)
bcpokey
Sr. Member
****
Offline Offline

Activity: 462


View Profile
June 08, 2011, 06:47:09 AM
 #81

You know what else has already happened too? Tycho has been hacked. That's why he instituted email locks on accounts, because a hacker got into his system and changed peoples addresses. Hacked once...
Please, don't tell about what you don't know.
Most (~14) victims of that attack were using same passwords on deepbit and another pool that got hacked, that's how the attacker got them. Also they were using same passwords for mining and main account.

Very well, my apologies for creating such an insinuation, at the time it occured you did not know how it happened and I must have missed it had you shared the information later.

But it still stands to reason that no one is proof against hacking and it's still a potential risk as was my original point.
1480703055
Hero Member
*
Offline Offline

Posts: 1480703055

View Profile Personal Message (Offline)

Ignore
1480703055
Reply with quote  #2

1480703055
Report to moderator
1480703055
Hero Member
*
Offline Offline

Posts: 1480703055

View Profile Personal Message (Offline)

Ignore
1480703055
Reply with quote  #2

1480703055
Report to moderator
1480703055
Hero Member
*
Offline Offline

Posts: 1480703055

View Profile Personal Message (Offline)

Ignore
1480703055
Reply with quote  #2

1480703055
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1480703055
Hero Member
*
Offline Offline

Posts: 1480703055

View Profile Personal Message (Offline)

Ignore
1480703055
Reply with quote  #2

1480703055
Report to moderator
[Tycho]
Hero Member
*****
Offline Offline

Activity: 742



View Profile WWW
June 08, 2011, 06:50:24 AM
 #82

You know what else has already happened too? Tycho has been hacked. That's why he instituted email locks on accounts, because a hacker got into his system and changed peoples addresses. Hacked once...
Please, don't tell about what you don't know.
Most (~14) victims of that attack were using same passwords on deepbit and another pool that got hacked, that's how the attacker got them. Also they were using same passwords for mining and main account.
Hey [Tycho] what's the [Bounty] on the Block Chain Monitor?
As it says in the forum thread, my part and those two who added their messages.
It's just a strawman, and Tycho knows it.
There is no technical way to find orphaned block chains without everyone running bitcoind to update their software to a specific version that would report orphaned blocks to a central authority.  And the authority would need to be agreed upon.  The client, as it stands, simply abandons them.
This "authority" can just connect to some different points of network and log the blocks.

Welcome to my bitcoin mining pool: https://deepbit.net - Both payment schemes (including PPS), instant payout, no invalid blocks !
ICBIT Trading platform : USD/BTC futures trading, Bitcoin difficulty futures (NEW!). Third year in bitcoin business.
Maxxx
Member
**
Offline Offline

Activity: 70



View Profile
June 08, 2011, 06:51:08 AM
 #83

You know what else has already happened too? Tycho has been hacked. That's why he instituted email locks on accounts, because a hacker got into his system and changed peoples addresses. Hacked once...
Please, don't tell about what you don't know.
Most (~14) victims of that attack were using same passwords on deepbit and another pool that got hacked, that's how the attacker got them. Also they were using same passwords for mining and main account.

Very well, my apologies for creating such an insinuation, at the time it occured you did not know how it happened and I must have missed it had you shared the information later.

But it still stands to reason that no one is proof against hacking and it's still a potential risk as was my original point.

You are definitely correct regardless, about it being a threat. Tycho himself is likely a target as well. His personal home network, work network, etc. It is the online atmosphere in which he is becoming wealthy from. A serious business like that requires serious security.

Time is money. This means that if you have spare time, you can use it to make money.

Modular, open, and stack-able miner case.
Genrobo
Newbie
*
Offline Offline

Activity: 28


View Profile
June 08, 2011, 06:53:29 AM
 #84

You know what else has already happened too? Tycho has been hacked. That's why he instituted email locks on accounts, because a hacker got into his system and changed peoples addresses. Hacked once...
Please, don't tell about what you don't know.
Most (~14) victims of that attack were using same passwords on deepbit and another pool that got hacked, that's how the attacker got them. Also they were using same passwords for mining and main account.
Hey [Tycho] what's the [Bounty] on the Block Chain Monitor?
As it says in the forum thread, my part and those two who added their messages.
It's just a strawman, and Tycho knows it.
There is no technical way to find orphaned block chains without everyone running bitcoind to update their software to a specific version that would report orphaned blocks to a central authority.  And the authority would need to be agreed upon.  The client, as it stands, simply abandons them.
This "authority" can just connect to some different points of network and log the blocks.

When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
:|
Or let's say, they always assume the smaller portion of the network was correct...
THAT WOULD MAKE A FORK IN THE BLOCK CHAIN EVEN EASIER TO DO.

Your logging at different points in the network idea is not sound.

17YwW6cuSbXLT8cvvdAcfy1iHyPkhVE7CG
Donations welcome, not required.
I'll be honest, any donations aren't used for a good cause, they go directly to booze, food, herbal substances Wink, and computer hardware.
I will squander the money, but hell, at least you know one person is having a good time.
Hawkix
Hero Member
*****
Offline Offline

Activity: 517



View Profile WWW
June 08, 2011, 06:55:24 AM
 #85

This is how it will end soon:




Donations: 1Hawkix7GHym6SM98ii5vSHHShA3FUgpV6
http://btcportal.net/ - All about Bitcoin - coming soon!
bcpokey
Sr. Member
****
Offline Offline

Activity: 462


View Profile
June 08, 2011, 06:57:35 AM
 #86

This is how it will end soon:





I like that, I'm stealing it for the other thread.
grndzero
Sr. Member
****
Offline Offline

Activity: 392


View Profile
June 08, 2011, 06:57:49 AM
 #87

You know what else has already happened too? Tycho has been hacked. That's why he instituted email locks on accounts, because a hacker got into his system and changed peoples addresses. Hacked once...
Please, don't tell about what you don't know.
Most (~14) victims of that attack were using same passwords on deepbit and another pool that got hacked, that's how the attacker got them. Also they were using same passwords for mining and main account.
Hey [Tycho] what's the [Bounty] on the Block Chain Monitor?
As it says in the forum thread, my part and those two who added their messages.
It's just a strawman, and Tycho knows it.
There is no technical way to find orphaned block chains without everyone running bitcoind to update their software to a specific version that would report orphaned blocks to a central authority.  And the authority would need to be agreed upon.  The client, as it stands, simply abandons them.
This "authority" can just connect to some different points of network and log the blocks.

When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
:|
Or let's say, they always assume the smaller portion of the network was correct...
THAT WOULD MAKE A FORK IN THE BLOCK CHAIN EVEN EASIER TO DO.

Your logging at different points in the network idea is not sound.

If there is difference detected then it would be cause for inspection and alert people that something might be wrong. i would have achieved what it was set out to do and the people who really understand the protocol better would look at it and see if there was a problem. It's an early warning system, not a prevention method.

It would also be a good thing to have in place in the future so that it can be adapted if any new exploits are discovered.

Ubuntu Desktop x64 -  HD5850 Reference - 400Mh/s w/ cgminer  @ 975C/325M/1.175V - 11.6/2.1 SDK
Donate if you find this helpful: 1NimouHg2acbXNfMt5waJ7ohKs2TtYHePy
[Tycho]
Hero Member
*****
Offline Offline

Activity: 742



View Profile WWW
June 08, 2011, 07:04:24 AM
 #88

This "authority" can just connect to some different points of network and log the blocks.
When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
Looks like you don't get the idea.
That's the whole point of the service - to detect presence of the other set.

Welcome to my bitcoin mining pool: https://deepbit.net - Both payment schemes (including PPS), instant payout, no invalid blocks !
ICBIT Trading platform : USD/BTC futures trading, Bitcoin difficulty futures (NEW!). Third year in bitcoin business.
Genrobo
Newbie
*
Offline Offline

Activity: 28


View Profile
June 08, 2011, 07:08:05 AM
 #89

This "authority" can just connect to some different points of network and log the blocks.
When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
Looks like you don't get the idea.
That's the whole point of the service - to detect presence of the other set.

Detection is not a solution.

Prevention is.

Think of it like AIDS
By the time you 'detect' it
It's DEFINITELY too late.

17YwW6cuSbXLT8cvvdAcfy1iHyPkhVE7CG
Donations welcome, not required.
I'll be honest, any donations aren't used for a good cause, they go directly to booze, food, herbal substances Wink, and computer hardware.
I will squander the money, but hell, at least you know one person is having a good time.
kidgorgeous
Member
**
Offline Offline

Activity: 75


View Profile
June 08, 2011, 07:10:51 AM
 #90

So [Tycho], clearly you getting 50% of the hashing power has ruffled some feathers and even has me slightly concerned. What do you think is the best route to ensure individuals confidence? Would you be opposed to instituting a lock on new user registration on your pool until other pools increase their network share?

1KHxCRniFNmS7ChiPqaewmokuCABk2PRQn
[Tycho]
Hero Member
*****
Offline Offline

Activity: 742



View Profile WWW
June 08, 2011, 07:14:38 AM
 #91

So [Tycho], clearly you getting 50% of the hashing power has ruffled some feathers and even has me slightly concerned. What do you think is the best route to ensure individuals confidence? Would you be opposed to instituting a lock on new user registration on your pool until other pools increase their network share?
Already answered on this in my thread.
Actually I don't see other pools doing something to get more hashrate. Panic is not a solution.

Recent USD/BTC rate jump may be followed by immense influx of new miners - that's their opportunity.

Welcome to my bitcoin mining pool: https://deepbit.net - Both payment schemes (including PPS), instant payout, no invalid blocks !
ICBIT Trading platform : USD/BTC futures trading, Bitcoin difficulty futures (NEW!). Third year in bitcoin business.
grndzero
Sr. Member
****
Offline Offline

Activity: 392


View Profile
June 08, 2011, 07:15:18 AM
 #92

This "authority" can just connect to some different points of network and log the blocks.
When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
Looks like you don't get the idea.
That's the whole point of the service - to detect presence of the other set.

Detection is not a solution.

Prevention is.

Think of it like AIDS
By the time you 'detect' it
It's DEFINITELY too late.

Just because an attack is implemented doesn't mean it will succeed. Just because someone introduces a modified block chain doesn't mean that will get accepted. Knowing nuclear missiles are coming at you gives you time to get to an underground bunker.

Ubuntu Desktop x64 -  HD5850 Reference - 400Mh/s w/ cgminer  @ 975C/325M/1.175V - 11.6/2.1 SDK
Donate if you find this helpful: 1NimouHg2acbXNfMt5waJ7ohKs2TtYHePy
bullox
Member
**
Offline Offline

Activity: 112


View Profile
June 08, 2011, 07:19:21 AM
 #93

This "authority" can just connect to some different points of network and log the blocks.
When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
Looks like you don't get the idea.
That's the whole point of the service - to detect presence of the other set.

Detection is not a solution.

Prevention is.

Think of it like AIDS
By the time you 'detect' it
It's DEFINITELY too late.

Just because an attack is implemented doesn't mean it will succeed. Just because someone introduces a modified block chain doesn't mean that will get accepted. Knowing nuclear missiles are coming at you gives you time to get to an underground bunker.
Yep, it gives you ~10min to sell your BTC off en masse before the collapse occurs
grndzero
Sr. Member
****
Offline Offline

Activity: 392


View Profile
June 08, 2011, 07:25:46 AM
 #94

This "authority" can just connect to some different points of network and log the blocks.
When the majority of the network is reporting one set of blocks as being accurate, and the minority is reporting a different set as accurate...

Wouldn't the authority automatically assume the majority?...
Looks like you don't get the idea.
That's the whole point of the service - to detect presence of the other set.

Detection is not a solution.

Prevention is.

Think of it like AIDS
By the time you 'detect' it
It's DEFINITELY too late.

Just because an attack is implemented doesn't mean it will succeed. Just because someone introduces a modified block chain doesn't mean that will get accepted. Knowing nuclear missiles are coming at you gives you time to get to an underground bunker.
Yep, it gives you ~10min to sell your BTC off en masse before the collapse occurs

The price of bitcoin can collapse without any security issues on the network. There should be something to prevent this too.

We need regulation on this free market thing.

Ubuntu Desktop x64 -  HD5850 Reference - 400Mh/s w/ cgminer  @ 975C/325M/1.175V - 11.6/2.1 SDK
Donate if you find this helpful: 1NimouHg2acbXNfMt5waJ7ohKs2TtYHePy
grndzero
Sr. Member
****
Offline Offline

Activity: 392


View Profile
June 08, 2011, 12:37:53 PM
 #95

Bump because there's not enough deepbit threads on the main page.

Ubuntu Desktop x64 -  HD5850 Reference - 400Mh/s w/ cgminer  @ 975C/325M/1.175V - 11.6/2.1 SDK
Donate if you find this helpful: 1NimouHg2acbXNfMt5waJ7ohKs2TtYHePy
rezin777
Full Member
***
Offline Offline

Activity: 154


View Profile
June 08, 2011, 01:35:04 PM
 #96

The price of bitcoin can collapse without any security issues on the network. There should be something to prevent this too.

What kind of argument is this?  Huh

The price of Bitcoin can collapse for thousands of unknown reasons. Not much we can do.

The price of Bitcoin can collapse if people lose trust in the networks ability to secure transactions. We can promote a healthy network.

None of this requires regulation... just a group of well informed, willing miners.
Pages: « 1 2 3 4 [5]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!