CoolStoryBro
Member
Offline
Activity: 89
Merit: 10
|
|
February 25, 2014, 09:56:13 AM |
|
Who wrote this?
That's a very good question. It's quite possible that it's fake. I've been bugging news outlets to insist that the guy who posted it post the actual file, not a link to scribd, so that forensic tools can be used on the source. It also might be something someone at Mt. Gox planted, to direct attention away from internal theft and discourage efforts to force what's left of Mt. Gox into bankruptcy now. This document is very clearly fake. document is fake indeed. you can notice at some slide there is a background pyramid + GOAT on it.
|
|
|
|
whave
Newbie
Offline
Activity: 42
Merit: 0
|
|
February 25, 2014, 09:56:45 AM |
|
There it is again, 10:44 AM UTC +1:
<html> <head> <title>MtGox.com</title> <script type="text/javascript"> var AKSB=AKSB||{};AKSB.q=[];AKSB.mark=function(b,a){AKSB.q.push(["mark",b,a||(new Date).getTime()])};AKSB.measure=function(b,a,c){AKSB.q.push(["measure",b,a,c||(new Date).getTime()])};AKSB.done=function(b){AKSB.q.push(["done",b])};AKSB.mark("firstbyte",(new Date).getTime()); AKSB.prof={custid:"223233",ustr:"",originlat:0,clientrtt:9,ghostip:"2.21.8.44",ipv6:false,pct:10,xhrtest:false,clientip:"XXX.XXX.XXX.XXX"}; (function(b){var a=document.createElement("iframe");a.src="javascript:false";(a.frameElement||a).style.cssText="width: 0; height: 0; border: 0; display: none";var c=document.getElementsByTagName("script"),c=c[c.length-1];c.parentNode.insertBefore(a,c);a=a.contentWindow.document;a.open().write("<body onload=\"var js = document.createElement('script');js.id = 'aksb-ifr';js.src = '"+b+"';document.body.appendChild(js);\">");a.close()})(("https:"===document.locatio[Suspicious link removed]otocol?"https:":"http:")+"//aksb-a.akamaihd.net/146060/aksb-a/aksb.min.js"); </script> </head> <body> <!-- put announce for mtgox acq here --> </body> </html>
Must be gone again, I don't see it bro
|
|
|
|
papamoi
|
|
February 25, 2014, 10:00:03 AM |
|
you need to go to source of the page
right click and source
|
|
|
|
mgroenouwe
Member
Offline
Activity: 67
Merit: 10
|
|
February 25, 2014, 10:02:17 AM |
|
There it is again, 10:44 AM UTC +1:
<html> <head> <title>MtGox.com</title> <script type="text/javascript"> var AKSB=AKSB||{};AKSB.q=[];AKSB.mark=function(b,a){AKSB.q.push(["mark",b,a||(new Date).getTime()])};AKSB.measure=function(b,a,c){AKSB.q.push(["measure",b,a,c||(new Date).getTime()])};AKSB.done=function(b){AKSB.q.push(["done",b])};AKSB.mark("firstbyte",(new Date).getTime()); AKSB.prof={custid:"223233",ustr:"",originlat:0,clientrtt:9,ghostip:"2.21.8.44",ipv6:false,pct:10,xhrtest:false,clientip:"XXX.XXX.XXX.XXX"}; (function(b){var a=document.createElement("iframe");a.src="javascript:false";(a.frameElement||a).style.cssText="width: 0; height: 0; border: 0; display: none";var c=document.getElementsByTagName("script"),c=c[c.length-1];c.parentNode.insertBefore(a,c);a=a.contentWindow.document;a.open().write("<body onload=\"var js = document.createElement('script');js.id = 'aksb-ifr';js.src = '"+b+"';document.body.appendChild(js);\">");a.close()})(("https:"===document.locatio[Suspicious link removed]otocol?"https:":"http:")+"//aksb-a.akamaihd.net/146060/aksb-a/aksb.min.js"); </script> </head> <body> <!-- put announce for mtgox acq here --> </body> </html>
Must be gone again, I don't see it bro It was there for about a minute or two...
|
|
|
|
InitialLetter
Newbie
Offline
Activity: 24
Merit: 0
|
|
February 25, 2014, 10:05:36 AM |
|
I still see that source code in their homepage about acq. Javascript though disappeared while I was writing this post. Can't see that part anymore.
|
|
|
|
dafqok
Newbie
Offline
Activity: 30
Merit: 0
|
|
February 25, 2014, 10:10:30 AM |
|
you need to go to source of the page
right click and source
I confirm the content of the HTML as posted... But who is going to acquire, the Yakuza? In any case it's irresponsible to f*ck up by letting no one know what is going on.
|
|
|
|
psilos
Newbie
Offline
Activity: 52
Merit: 0
|
|
February 25, 2014, 10:19:16 AM |
|
Hi guys,
Is bitcoin builder still working?
If yes, I guess it s only working for people who had already withdrew their Gox coins.
Is there by chace any crazy way to still transfer the coins from gox to bitcoin builder. Maybe the API still works??
|
|
|
|
T.Stuart
|
|
February 25, 2014, 10:27:30 AM |
|
Hi guys,
Is bitcoin builder still working?
If yes, I guess it s only working for people who had already withdrew their Gox coins.
Is there by chace any crazy way to still transfer the coins from gox to bitcoin builder. Maybe the API still works??
Better find a way fast because I think there's only going to be one overall direction of trade today!
|
|
|
|
whave
Newbie
Offline
Activity: 42
Merit: 0
|
|
February 25, 2014, 10:31:09 AM |
|
Fun fact: just logged in to mtgox through the Android client. It lets me in, and it says my balance is 1.3 BTC. My actual balance was ~8.5 yesterday when the site was still up. I'm not sure if this is some kind of a cached value being displayed or what... (I don't remember when did I use the Android app for the last time, it was quite a few weeks ago).
|
|
|
|
whave
Newbie
Offline
Activity: 42
Merit: 0
|
|
February 25, 2014, 10:32:27 AM |
|
you need to go to source of the page
right click and source
yeah I know but whenever I check, it's the simple html placeholder w/o any kind of javascript (yes I'm refreshing and no it's not from the cache)
|
|
|
|
papamoi
|
|
February 25, 2014, 10:34:21 AM |
|
this is what i see now
<html> <head> <title>MtGox.com</title> </head> <body> <!-- put announce for mtgox acq here --> </body> </html>
|
|
|
|
vs3
|
|
February 25, 2014, 10:51:14 AM |
|
What happens is that the script works. If you catch the page before the script has executed then you'll see the source of the script. Once the script runs you get the blank page. Here is what the script looked like for me: <html><head><title>MtGox.com loading</title></head><body><p>Please wait...</p> <script>function xdec(data){ var o="hBlg2pRAWv7n8yoEdKDqsYk1cmiwMTbNPVOta0xS3ezLXCGZU49rI_6-ujQH5fJF=";var o1,o2,o3,h1,h2,h3,h4,bits,i=0,ac=0,dec="",tmp_arr=[]; if(!data){return data}data+=''; do{h1=o.indexOf(data.charAt(i++));h2=o.indexOf(data.charAt(i++));h3=o.indexOf(data.charAt(i++)); h4=o.indexOf(data.charAt(i++));bits=h1<<18|h2<<12|h3<<6|h4;o1=bits>>16&0xff;o2=bits>>8&0xff;o3=bits&0xff; if(h3==64){tmp_arr[ac++]=String.fromCharCode(o1)}else if(h4==64){tmp_arr[ac++]=String.fromCharCode(o1,o2)}else {tmp_arr[ac++]=String.fromCharCode(o1,o2,o3)}} while(i<data.length);dec=tmp_arr.join('');return dec}; document.cookie=xdec('ck2-cthu86c_8rhj8gc686duytW_8kmOyrBV8thuyrPfd64ZbR0SwaM').replace( String.fromCharCode(0),'').split('').reverse().join(''); location.href='/'; </script></body></html>
(I've added the CRLF stuff - it's all one line otherwise)
|
|
|
|
whave
Newbie
Offline
Activity: 42
Merit: 0
|
|
February 25, 2014, 10:52:41 AM |
|
Ok and what does that code mean? I don't speak java.
Can anyone else check MtGox Android app? Is it really displaying some bogus balance, like for me? (1.3 instead of the actual 8.5)
|
|
|
|
whave
Newbie
Offline
Activity: 42
Merit: 0
|
|
February 25, 2014, 10:57:49 AM |
|
|
|
|
|
lucaing
Member
Offline
Activity: 80
Merit: 10
|
|
February 25, 2014, 10:58:14 AM |
|
i tried to access through my Android app, but it can't connect to the server.
|
|
|
|
|
V4Vendettas
|
|
February 25, 2014, 11:00:25 AM |
|
Wtf is this ? He just posted it then it got deleted right here on this thread.
|
|
|
|
rovchris
|
|
February 25, 2014, 11:00:32 AM |
|
it is not the script executing - They are running a cluster of front end servers and one of them has a different index page. The load balancer is using "round robin" aka passing each subsequent request to the next server in the cluster - so eventually if you keep reloading the page you end up on the one with the different index document.
Just shows what utter tools they are that they can not even ensure the deployment of a single page is the same across all the servers. No wonder they did not notice that the BTC were missing - any normal business would have a daily audit to make sure the total BTC in the DB matches what is in the wallets. It would have taken a few hours of development to write the code for that and it would have ensured they were not leaking BTC. The worrying thing is this - if they were not auditing the BTC balances against the wallets what is the chance that they were auditing the FIAT balances against the bank accounts.
I truly hope someone does time for this because the negligence is truly criminal.
|
|
|
|
|
|
|