Bitcoin Forum
April 28, 2024, 07:32:27 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: What happens first:
New ATH - 43 (69.4%)
<$60,000 - 19 (30.6%)
Total Voters: 62

Pages: « 1 ... 25813 25814 25815 25816 25817 25818 25819 25820 25821 25822 25823 25824 25825 25826 25827 25828 25829 25830 25831 25832 25833 25834 25835 25836 25837 25838 25839 25840 25841 25842 25843 25844 25845 25846 25847 25848 25849 25850 25851 25852 25853 25854 25855 25856 25857 25858 25859 25860 25861 25862 [25863] 25864 25865 25866 25867 25868 25869 25870 25871 25872 25873 25874 25875 25876 25877 25878 25879 25880 25881 25882 25883 25884 25885 25886 25887 25888 25889 25890 25891 25892 25893 25894 25895 25896 25897 25898 25899 25900 25901 25902 25903 25904 25905 25906 25907 25908 25909 25910 25911 25912 25913 ... 33304 »
  Print  
Author Topic: Wall Observer BTC/USD - Bitcoin price movement tracking & discussion  (Read 26368777 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (174 posts by 3 users with 9 merit deleted.)
jbreher
Legendary
*
Offline Offline

Activity: 3038
Merit: 1660


lose: unfind ... loose: untight


View Profile
February 26, 2020, 05:53:16 PM

This is bad.

Buck up, buttercup. Pain builds character. We shall be victorious.
1714289547
Hero Member
*
Offline Offline

Posts: 1714289547

View Profile Personal Message (Offline)

Ignore
1714289547
Reply with quote  #2

1714289547
Report to moderator
1714289547
Hero Member
*
Offline Offline

Posts: 1714289547

View Profile Personal Message (Offline)

Ignore
1714289547
Reply with quote  #2

1714289547
Report to moderator
The Bitcoin network protocol was designed to be extremely flexible. It can be used to create timed transactions, escrow transactions, multi-signature transactions, etc. The current features of the client only hint at what will be possible in the future.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714289547
Hero Member
*
Offline Offline

Posts: 1714289547

View Profile Personal Message (Offline)

Ignore
1714289547
Reply with quote  #2

1714289547
Report to moderator
vapourminer
Legendary
*
Offline Offline

Activity: 4312
Merit: 3514


what is this "brake pedal" you speak of?


View Profile
February 26, 2020, 05:53:47 PM
Merited by AlcoHoDL (1)

Exactly. I always do this, and also use VM to test-drive apps before installing on my main (host) PC. No viruses, no malware, no corruptions, no problems!

Edit: ...and always disable AutoRun after a Windows installation.

Always do ... what? Always attach found USB to a computer running Knoppix from write-only media? Always attach found USB to a computer running a VM? Always attach found USB to a computer running Knoppix from write-only media within a VM? Great.

What protects your BIOS/FW? What protects your hypervisor?

When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.

How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.

https://en.wikipedia.org/wiki/Firmware#Security_risks

its at the hardware/firmware level. its why its so nasty.

EDIT: badusb
Hyperjacked
Legendary
*
Offline Offline

Activity: 1610
Merit: 1119


It's all mathematics...!


View Profile
February 26, 2020, 05:56:10 PM

I wonder what became of cousin nutildah's BSV short. Grin

I know what happened to my BCH short  Wink


Congrats. To both of you, I might imagine.

For my part, my balls are as big as my bags.

Big balls aren't always a good thing ... 😳 This Johnny Dangerously video is a classic lol!

https://m.youtube.com/watch?v=Et2G6R0MuK8
kurious
Legendary
*
Offline Offline

Activity: 2590
Merit: 1643



View Profile
February 26, 2020, 05:59:33 PM

I am not expecting much lower..  he said (risking looking foolish within hours).

I reckon it'll stop not much lower, above 8400.  Maybe a little higher - but not lower.  

If not all my charts need heavy re-calibration.  My 2 satoshis. I will post reasons if I am not wrong.
Globb0
Legendary
*
Offline Offline

Activity: 2674
Merit: 2053


Free spirit


View Profile
February 26, 2020, 06:02:00 PM

Ooof I just bitcoinwisdomed

I see now ouch
bkbirge
Sr. Member
****
Offline Offline

Activity: 1197
Merit: 482



View Profile
February 26, 2020, 06:02:05 PM

Don't worry folks, I've got a nice chunk of fiat making its way through various systems to eventually make a buy. It's pretty much guaranteed we'll be back at the yearly high before I can make the purchase.
Last of the V8s
Legendary
*
Offline Offline

Activity: 1652
Merit: 4392


Be a bank


View Profile
February 26, 2020, 06:05:59 PM
Merited by JayJuanGee (1), DaRude (1)

The bottom must be near

Ibian
Legendary
*
Offline Offline

Activity: 2268
Merit: 1278



View Profile
February 26, 2020, 06:07:33 PM

Welp, just bought. Another .15 in my pocket. Time for bed.

I still expect it could go lower, say 40% chance? But good enough for me.
Last of the V8s
Legendary
*
Offline Offline

Activity: 1652
Merit: 4392


Be a bank


View Profile
February 26, 2020, 06:11:35 PM
Merited by infofront (1)

jbreher
Legendary
*
Offline Offline

Activity: 3038
Merit: 1660


lose: unfind ... loose: untight


View Profile
February 26, 2020, 06:13:19 PM
Merited by AlcoHoDL (1)

Exactly. I always do this, and also use VM to test-drive apps before installing on my main (host) PC. No viruses, no malware, no corruptions, no problems!

Edit: ...and always disable AutoRun after a Windows installation.

Always do ... what? Always attach found USB to a computer running Knoppix from write-only media? Always attach found USB to a computer running a VM? Always attach found USB to a computer running Knoppix from write-only media within a VM? Great.

What protects your BIOS/FW? What protects your hypervisor?

When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.

How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.

Well, I must admit that I don’t know all the possible attack vectors. But as one potentially eye-opening matter, your example of ‘AutoRun’ indicates you are assuming that the device identifies only as a storage class device, and that said storage device contains only a filesystem that is know to Windows.

Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?
Ibian
Legendary
*
Offline Offline

Activity: 2268
Merit: 1278



View Profile
February 26, 2020, 06:15:39 PM
Merited by Globb0 (2), JimboToronto (1), infofront (1)

Holy shit you guys just use a different computer for suspicious shit and then chug it.
vapourminer
Legendary
*
Offline Offline

Activity: 4312
Merit: 3514


what is this "brake pedal" you speak of?


View Profile
February 26, 2020, 06:19:54 PM

What protects your BIOS/FW? What protects your hypervisor?

OK if you are an idiot with only 1 PC don't do it. I agree

at this point everyone here should have a few throwaway laptops lying around for sacrificial moments.  no hd or wireless, use a live cd on r/o optical if you really want to inspect random flashdrives. even then it can get a persistent infection that survives power cycling.

jbreher
Legendary
*
Offline Offline

Activity: 3038
Merit: 1660


lose: unfind ... loose: untight


View Profile
February 26, 2020, 06:24:25 PM
Merited by rdbase (1)

Btw last time we past Vegeta we went up pretty fast, remember Vegeta is an iconic character with some real dragon ball Z powers.... One that doesn't let himself to be taken easily... Never saw the episodes? The guy is extremely powerful, probably BTC will be the only one to truly defeat him, time will tell when.

Wait... what?

Now, I never was much interested in Dragon Ball Z, but my kid used to watch it all the time, so I’ve been exposed. Accordingly, I may be laboring under a misconception. But...

My understanding is that it is not Vegeta whose power is over 9000. Rather, Vegeta is describing the power of some other character.

No?
Correct https://www.youtube.com/watch?v=eT7u8R2d8hc / https://www.youtube.com/watch?v=17zNW-wz35E (dont click if you have epiletic seizures Undecided )
Goku he is the one on my hat for reference.
And to keep it stable. Someone suggested it being him in his Ultra Instinct blue. Embarrassed

We need another hero to emerge for $10,000! Maybe the Hoff? Grin https://www.youtube.com/watch?v=ZTidn2dBYbY
David Hasselhoff - True Survivor from Kung Fury.
.. "hear the ticking of the countdown clocks tonight" "We need some action, if we want to take our love from here!"  Grin
"The phoenix rises again!"


Haha. That’s spectacular. Never seen that before - thanks.

By some odd conincidence, last night was the first time I became aware of this: https://www.youtube.com/watch?v=3MMMe1drnZY

Dip? In these times of hardship, always remember. We. Are. Groot.
Globb0
Legendary
*
Offline Offline

Activity: 2674
Merit: 2053


Free spirit


View Profile
February 26, 2020, 06:34:18 PM

What protects your BIOS/FW? What protects your hypervisor?

OK if you are an idiot with only 1 PC don't do it. I agree

at this point everyone here should have a few throwaway laptops lying around for sacrificial moments.  no hd or wireless, use a live cd on r/o optical if you really want to inspect random flashdrives. even then it can get a persistent infection that survives power cycling.



I mean I'm not picking up random drives.

But if I did what they gonna hijack?  just my latest Gerald Celente video or something.

Maybe wall observer. If I start acting weird assume I'm burned.



AlcoHoDL
Legendary
*
Online Online

Activity: 2352
Merit: 4138


Addicted to HoDLing!


View Profile
February 26, 2020, 06:36:50 PM
Merited by Globb0 (5)

When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.

How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.

Well, I must admit that I don’t know all the possible attack vectors. But as one potentially eye-opening matter, your example of ‘AutoRun’ indicates you are assuming that the device identifies only as a storage class device, and that said storage device contains only a filesystem that is know to Windows.

Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?

What you're saying makes sense, I did assume that we were talking about a storage class device. I admit I wasn't aware of the "BadUSB" exploit. Will look it up, thanks for this. I guess I was lucky enough to not receive a "BadUSB" device (or maybe I did, and not aware of it?).

As others have pointed out, the best option is a separate, clean PC, with everything sanitized after use by restoring from known, clean images.

@jojo69, @xyzzy099, @vapourminer, also thanks -- merited.
rdbase
Legendary
*
Offline Offline

Activity: 2856
Merit: 1499


Join the world-leading crypto sportsbook NOW!


View Profile WWW
February 26, 2020, 06:38:28 PM

Btw last time we past Vegeta we went up pretty fast, remember Vegeta is an iconic character with some real dragon ball Z powers.... One that doesn't let himself to be taken easily... Never saw the episodes? The guy is extremely powerful, probably BTC will be the only one to truly defeat him, time will tell when.

Wait... what?

Now, I never was much interested in Dragon Ball Z, but my kid used to watch it all the time, so I’ve been exposed. Accordingly, I may be laboring under a misconception. But...

My understanding is that it is not Vegeta whose power is over 9000. Rather, Vegeta is describing the power of some other character.

No?
Correct https://www.youtube.com/watch?v=eT7u8R2d8hc / https://www.youtube.com/watch?v=17zNW-wz35E (dont click if you have epiletic seizures Undecided )
Goku he is the one on my hat for reference.
And to keep it stable. Someone suggested it being him in his Ultra Instinct blue. Embarrassed

We need another hero to emerge for $10,000! Maybe the Hoff? Grin https://www.youtube.com/watch?v=ZTidn2dBYbY
David Hasselhoff - True Survivor from Kung Fury.
.. "hear the ticking of the countdown clocks tonight" "We need some action, if we want to take our love from here!"  Grin
"The phoenix rises again!"


Haha. That’s spectacular. Never seen that before - thanks.

By some odd conincidence, last night was the first time I became aware of this: https://www.youtube.com/watch?v=3MMMe1drnZY

Dip? In these times of hardship, always remember. We. Are. Groot.
Yeah, he is an 80's icon we can all be certain his legacy will never die in the face of destruction. Grin
Grabbed it from the playlist here of many other retro tunes.
https://www.youtube.com/watch?v=ZTidn2dBYbY&list=RDZTidn2dBYbY&index=1
Here is one you will like since they have a bear at the beginning which bares a strikingly resemblance to you!
Just a bit more happier. Cheesy

https://youtu.be/PJQVlVHsFF8
Last of the V8s
Legendary
*
Offline Offline

Activity: 1652
Merit: 4392


Be a bank


View Profile
February 26, 2020, 06:41:17 PM
Merited by VB1001 (3)


@jojo69, @xyzzy099, @vapourminer, also thanks -- merited.
those guys are like 150 years old
each
VB1001
Legendary
*
Offline Offline

Activity: 938
Merit: 2540


<<CypherPunkCat>>


View Profile WWW
February 26, 2020, 06:47:49 PM

Another Trilegendary. Wink

edit: I don't know what I was thinking, I seemed to see 2997 Roll Eyes
jbreher
Legendary
*
Offline Offline

Activity: 3038
Merit: 1660


lose: unfind ... loose: untight


View Profile
February 26, 2020, 06:48:11 PM
Merited by vapourminer (1), AlcoHoDL (1)

When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.

How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.

Well, I must admit that I don’t know all the possible attack vectors. But as one potentially eye-opening matter, your example of ‘AutoRun’ indicates you are assuming that the device identifies only as a storage class device, and that said storage device contains only a filesystem that is know to Windows.

Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB?

What you're saying makes sense, I did assume that we were talking about a storage class device. I admit I wasn't aware of the "BadUSB" exploit. Will look it up, thanks for this. I guess I was lucky enough to not receive a "BadUSB" device (or maybe I did, and not aware of it?).

As others have pointed out, the best option is a separate, clean PC, with everything sanitized after use by restoring from known, clean images.

@jojo69, @xyzzy099, @vapourminer, also thanks -- merited.

Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable?

What does your sanitization consist of? Just filesystem drive? Just disk? How do you know you’ve not been victim of a BIOS hack, which is unlikely to be recovered from, and may propagate to other machines if you are not careful never to use same storage device between machines.

In the end, there is no perfect security. This is true. It is all a tradeoff. I guess all I’d like to advocate for are: have some idea of the risks, and; I doubt the proabability of finding satoshi’s private keys on some rando USB device found in the street is anywhere near the probability of falling victim to a simple intentional exploit.
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
February 26, 2020, 07:05:55 PM
Merited by JimboToronto (1), bkbirge (1)

Remember guys, it's time in the market, not timing the market.
Pages: « 1 ... 25813 25814 25815 25816 25817 25818 25819 25820 25821 25822 25823 25824 25825 25826 25827 25828 25829 25830 25831 25832 25833 25834 25835 25836 25837 25838 25839 25840 25841 25842 25843 25844 25845 25846 25847 25848 25849 25850 25851 25852 25853 25854 25855 25856 25857 25858 25859 25860 25861 25862 [25863] 25864 25865 25866 25867 25868 25869 25870 25871 25872 25873 25874 25875 25876 25877 25878 25879 25880 25881 25882 25883 25884 25885 25886 25887 25888 25889 25890 25891 25892 25893 25894 25895 25896 25897 25898 25899 25900 25901 25902 25903 25904 25905 25906 25907 25908 25909 25910 25911 25912 25913 ... 33304 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!