Bitcoin Forum
November 17, 2017, 07:59:12 PM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 [960] 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 ... 2138 »
  Print  
Author Topic: Swedish ASIC miner company kncminer.com  (Read 3006397 times)
texaslabrat
Jr. Member
*
Offline Offline

Activity: 56


View Profile
October 30, 2013, 05:42:25 PM
 #19181

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Juptier permanently hi-jacked?



hard reset should reset the passwords I believe.
1510948752
Hero Member
*
Offline Offline

Posts: 1510948752

View Profile Personal Message (Offline)

Ignore
1510948752
Reply with quote  #2

1510948752
Report to moderator
1510948752
Hero Member
*
Offline Offline

Posts: 1510948752

View Profile Personal Message (Offline)

Ignore
1510948752
Reply with quote  #2

1510948752
Report to moderator
1510948752
Hero Member
*
Offline Offline

Posts: 1510948752

View Profile Personal Message (Offline)

Ignore
1510948752
Reply with quote  #2

1510948752
Report to moderator
Coinlancer is Disrupting the Freelance marketplace!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1510948752
Hero Member
*
Offline Offline

Posts: 1510948752

View Profile Personal Message (Offline)

Ignore
1510948752
Reply with quote  #2

1510948752
Report to moderator
1510948752
Hero Member
*
Offline Offline

Posts: 1510948752

View Profile Personal Message (Offline)

Ignore
1510948752
Reply with quote  #2

1510948752
Report to moderator
Phoenix1969
Legendary
*
Offline Offline

Activity: 938


LIR DEV


View Profile
October 30, 2013, 05:49:15 PM
 #19182

btw... of all the experimenting on the sats...70-79 seems to be the optimum temp
It takes about 1 and 1/2 hours to 2 hours to see the results on the graph, but looks to be a signifigant difference when you include several machines... about 40 gh/s for me... just by monitoring temps to 70-79 instead of letting them drop to 55-60 overnight. I use cardboard to block a bit of the airflow, and monitor the temps on the GUI, then watch for the results on the graph, and how high they peak over a couple hours. Well worth it for me.
When they said "Over-cooled", they weren't kidding!


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRide
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
[BTC]▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
Biffa
Legendary
*
Online Online

Activity: 1344



View Profile
October 30, 2013, 06:03:39 PM
 #19183

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him remote access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Jupiter permanently hi-jacked?



Change the root password then you can always get in and change the admin password

Phoenix1969
Legendary
*
Offline Offline

Activity: 938


LIR DEV


View Profile
October 30, 2013, 06:05:27 PM
 #19184

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him remote access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Jupiter permanently hi-jacked?



Change the root password then you can always get in and change the admin password
reset button indeed resets passwords


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRide
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
[BTC]▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
chrono030
Member
**
Offline Offline

Activity: 114


View Profile
October 30, 2013, 06:06:17 PM
 #19185

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him remote access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Jupiter permanently hi-jacked?



Why in the world would you give him access to the device.  Just point your miner at his address at eligius and be done.
dwdoc
Legendary
*
Offline Offline

Activity: 966


- - -Caveat Aleo- - -


View Profile
October 30, 2013, 06:11:19 PM
 #19186

Thanks. My Jupiters are at Anotherhost so my VPN password would have to be reset along with the "front button" hard reset, but it is all doable. As to why a 3rd party might need access I can only speculate they may be switching between pools or between alt coins.
xyzzy099
Legendary
*
Online Online

Activity: 988



View Profile
October 30, 2013, 06:13:42 PM
 #19187

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him remote access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Jupiter permanently hi-jacked?



Why in the world would you give him access to the device.  Just point your miner at his address at eligius and be done.

+1

Someone with root access could theoretically do a 'rm -rf /' or equivalent - intentionally or even non-intentionally.  Then you would probably need KnC support just to unbrick the unit.  I would not give anyone I don't trust 100% direct login access to my miner(s).

Libertarians:  Diligently plotting to take over the world and leave you alone.
dwdoc
Legendary
*
Offline Offline

Activity: 966


- - -Caveat Aleo- - -


View Profile
October 30, 2013, 06:25:50 PM
 #19188

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him remote access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Jupiter permanently hi-jacked?



Why in the world would you give him access to the device.  Just point your miner at his address at eligius and be done.

+1

Someone with root access could theoretically do a 'rm -rf /' or equivalent - intentionally or even non-intentionally.  Then you would probably need KnC support just to unbrick the unit.  I would not give anyone I don't trust 100% direct login access to my miner(s).


Those are good points I guess there is no way to give access to just the web interface and block ssh access.
If not I guess the renter would have to prepay enough to justify the risk.
Phoenix1969
Legendary
*
Offline Offline

Activity: 938


LIR DEV


View Profile
October 30, 2013, 06:31:35 PM
 #19189

The reset button resets both the ssh and gui passwords to origonal
Found out the "Hard way"...hehe


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRide
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
[BTC]▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
sickpig
Legendary
*
Offline Offline

Activity: 1218


View Profile
October 30, 2013, 06:41:50 PM
 #19190

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Juptier permanently hi-jacked?



hard reset should reset the passwords I believe.

hard reset just copy a bunch of pristine files placed in /config in various places, among them /config/shadow.factory
will be copied over /etc/shadow. that means that after an hard reset the pwd for root will be re-set to admin.

what if during the period of time u rent your miner that guy just change /config/shadow.factory? Tongue

anyway as long as u have physical access to the miner u could reflash your miner  using RecoveryFile (https://www.kncminer.com/userfiles/file/SD_image_0.96.1.zip) and everything will be under your control again.

Bitcoin is a participatory system which ought to respect the right of self determinism of all of its users - Gregory Maxwell.
-Redacted-
Sr. Member
****
Offline Offline

Activity: 420



View Profile
October 30, 2013, 06:45:59 PM
 #19191

Set up a non-root user and allow him to log onto the box with that.  Restrict what can be executed via sudo.  

Why does the user need SSH access to the box anyway?  Give him web access, and move the web page that allows changing passwords out of the cgi-bin directory so it can't be accessed from the web interface until you put it back.
xyzzy099
Legendary
*
Online Online

Activity: 988



View Profile
October 30, 2013, 06:52:05 PM
 #19192

I have a hypothetical question. If a 3rd party wants to rent a few days of hashtime on my Jupiter and I give him access including my password, if he changes the password without telling me is there any way to regain access without the new password or is the Juptier permanently hi-jacked?



hard reset should reset the passwords I believe.

hard reset just copy a bunch of pristine files placed in /config in various places, among them /config/shadow.factory
will be copied over /etc/shadow. that means that after an hard reset the pwd for root will be re-set to admin.

what if during the period of time u rent your miner that guy just change /config/shadow.factory? Tongue

anyway as long as u have physical access to the miner u could reflash your miner  using RecoveryFile (https://www.kncminer.com/userfiles/file/SD_image_0.96.1.zip) and everything will be under your control again.


If someone was REALLY malicious, they could possibly use those low-level i2c commands to actually do physical damage to the miner - like setting the PLLs to ridiculously high values, or whatever...  Maybe write a script that just blasts random values over I2C, and see if you can make something smoke Shocked

I can't imagine why anyone would want to do something like that - but it's still something to consider if you are giving root access to random people...

Libertarians:  Diligently plotting to take over the world and leave you alone.
Phoenix1969
Legendary
*
Offline Offline

Activity: 938


LIR DEV


View Profile
October 30, 2013, 06:53:12 PM
 #19193

Set up a non-root user and allow him to log onto the box with that.  Restrict what can be executed via sudo.  

Why does the user need SSH access to the box anyway?  Give him web access, and move the web page that allows changing passwords to somewhere else so it can't be accessed from the web interface until you put it back.
I'm sure there's a way to remove the reset password fieldsin the gui... but can't tell you how, because I'm not a linux efficienado
maybe you can block the security page entirely...?


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRide
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
[BTC]▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
-Redacted-
Sr. Member
****
Offline Offline

Activity: 420



View Profile
October 30, 2013, 06:58:32 PM
 #19194

cd /www/pages/cgi-bin
mv passwd.cgi  /

done...  It will produce a 404 error if they try to go to that selection.

To put it back
cd /www/pages/cgi-bin
mv /passwd.cgi  .


Might want to do the same with upgrade.cgi, too...

dwdoc
Legendary
*
Offline Offline

Activity: 966


- - -Caveat Aleo- - -


View Profile
October 30, 2013, 07:07:05 PM
 #19195

cd /www/pages/cgi-bin
mv passwd.cgi  /

done...  It will produce a 404 error if they try to go to that selection.

To put it back
cd /www/pages/cgi-bin
mv /passwd.cgi  .


Might want to do the same with upgrade.cgi, too...



Nice.  Smiley
sickpig
Legendary
*
Offline Offline

Activity: 1218


View Profile
October 30, 2013, 07:17:32 PM
 #19196


If someone was REALLY malicious, they could possibly use those low-level i2c commands to actually do physical damage to the miner - like setting the PLLs to ridiculously high values, or whatever...  Maybe write a script that just blasts random values over I2C, and see if you can make something smoke Shocked

I can't imagine why anyone would want to do something like that - but it's still something to consider if you are giving root access to random people...


yeah this could be done I suppose and it's nasty.

the best thing should do like -redacted- change web interface in such a way they could not gan control of the miner or just create a normal user and grant him  the right to do the minimum amount of things to let him mining (using sudo maybe)

Bitcoin is a participatory system which ought to respect the right of self determinism of all of its users - Gregory Maxwell.
FiatKiller
Sr. Member
****
Offline Offline

Activity: 378


View Profile
October 30, 2013, 07:23:13 PM
 #19197

suck if the "renter" installed malicious firmware...  lol

LTC: LdxgJQLUdr8hZ79BV5AYbxkBUdaXctXAPi
MoonCoin Gambling: https://coin-horse.com/MON/
texaslabrat
Jr. Member
*
Offline Offline

Activity: 56


View Profile
October 30, 2013, 07:39:49 PM
 #19198


If someone was REALLY malicious, they could possibly use those low-level i2c commands to actually do physical damage to the miner - like setting the PLLs to ridiculously high values, or whatever...  Maybe write a script that just blasts random values over I2C, and see if you can make something smoke Shocked

I can't imagine why anyone would want to do something like that - but it's still something to consider if you are giving root access to random people...


yeah this could be done I suppose and it's nasty.

the best thing should do like -redacted- change web interface in such a way they could not gan control of the miner or just create a normal user and grant him  the right to do the minimum amount of things to let him mining (using sudo maybe)

I would set it up as a gimped version of the knc hosting model.  No ssh access, and strip out all the web interface pages except the login, status, and mining pages.  The only thing a 3rd party renter needs to be able to do is log on to the device, change pool settings, and restart the cgminer process.  Everything else they can submit a "support ticket" for....and some sort of SLA for response time can be written into the rental agreement.
Biffa
Legendary
*
Online Online

Activity: 1344



View Profile
October 30, 2013, 08:10:51 PM
 #19199

Those are good points I guess there is no way to give access to just the web interface and block ssh access.
If not I guess the renter would have to prepay enough to justify the risk.

As I said, the root password is not the same as the admin password, you can change the root password to be different to the admin (web login) password.

So change the root password and they can't ssh into the box, they can just use the web admin.

To change the root password from ssh just type passwd

Try it, change the root password, then logout of ssh and login again with the new root password.

You will notice that the web account still uses the old password.

If you want to change the web account password its: passwd admin

Phoenix1969
Legendary
*
Offline Offline

Activity: 938


LIR DEV


View Profile
October 30, 2013, 08:12:40 PM
 #19200

Here are some steps to streamline access to your miner through putty..
1. Open the putty session window, and input your I.P. normally in the hostname field, but DO NOT HIT ENTR.
    a. Instead, take your mouse pointer, highlight the saved sessions field(with a single left-click), and input your miner's I.P. again.
2. on the window/behavior tab to the left, un-check the "warn before exit" box.
3. on the connection/data tab, enter "root" to the auto-login username field.
4. on the SSH tab, enter "screen -r" into the "remote command" field.
5. back on the Session tab, at bottom of page, check the "close window on exit"....... "always"
6. now hit the SAVE button, and close putty
7. Go to your desktop & right-click for a context menu, and go to new/ shortcut.
8. input the location of putty for starting it. Use full file location to execute putty & input your miner's I.P. address as such...    
 C:\Users\Ewik\Desktop\putty.exe -load "123.123.123.4" -pw password
click next, input a name for your new shortcut, click finish.

Now, when you click on the shortcut, it will start putty with your miner's ip, and enter "root" for you, and enters your password, enters the "screen -r" for you, and jumps into cgminer window.
it all happens very fast then
click on shortcut... you're in!
BAM


                     ▀▀█████████▀████████████████▄
                        ████▄      ▄████████████████
                     ▄██████▀  ▄  ███████████████████
                  ▄█████████▄████▄███████████████████
                ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀████████
                                               ▀▀███▀
    ▄█▀█       ▄▀  ▄▀▀█  ▄▀   █████████████████▄ ██▀         ▄▀█
   ▄█ ▄▀      ▀█▀ █▀ █▀ ▀█▀  ███████████████████ █▀ ▀▀      ▄▀▄▀
  ▄█    ▄███  █     █   █   ████████████████████  ▄█     ▄▀▀██▀ ▄███
███▄▄▄  █▄▄▄ █▄▄ ▄▄▀   █▄▄ ██████████████████▀▀   █▄▄ ▄▄ █▄▄█▄▄▄█▄▄▄
                           ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                            ▀▀█████████████▄
                                █████████████▄
                                  █████████████▄
                                    ▀███████▀▀▀▀▀
                                      ▀████▀
                                        ▀█▀
LetItRide
                        ▄███████████▄
                       ██  ██████████▄
                     ▄█████████████  ██▄
            ▄▄▀█▄▄▄▄▄████████████████████▄
        ▄▄█▀   ███████████  █████  ████  █
    ▄██████ ▄▄███████████████████████████▀
 ▄▀▀ ██████████████████████████  ████  █
█  ▄███████████▀▀▀█████████████████████
██████████████    ████████▀▀██████  █▀
██████████████▄▄▄██████████   ▀▀▀▀▀▀▀
███▀ ▀██████████████████████
██    ███████████████████████
██▄▄██████████████████████████
██████████████▀   ██████████
  █████████████   ▄██████▀▀
     ▀▀██████████████▀▀
         ▀▀██████▀▀
[BTC]▄█████████████▀ ▄█
██            ▄█▀
██          ▄██ ▄█
██ ▄█▄    ▄███  ██
██ ▀███▄ ▄███   ██
██  ▀███████    ██
██    █████     ██
██     ███      ██
██      ▀       ██
██              ██
▀████████████████▀
Pages: « 1 ... 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 [960] 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 ... 2138 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!