Bitcoin Forum
February 18, 2020, 01:05:05 AM *
News: Latest Bitcoin Core release: 0.19.0.1 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 [86] 87 88 89 90 91 92 93 »
  Print  
Author Topic: [ANN] ChipMixer.com - Bitcoin mixer / Bitcoin tumbler - mixing reinvented  (Read 65079 times)
jackg
Copper Member
Legendary
*
Offline Offline

Activity: 1652
Merit: 1542


https://bit.ly/387FXHi ← lightning theory


View Profile
September 23, 2019, 12:48:42 AM
 #1701


DDoS attacks of this sort don't really impact the way chipmixer operates
and actually improves privacy. 

You're right there!
Its a lot harder to do chain analysis on inputs and outputs if they're delayed in transit. If ChipMixer take about 4 days to respond normally, then people might not check their emails for a while afterwards so you can't even look at the time the site came back online to do analysis as the user might wait a day or two.

Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 23, 2019, 10:51:28 AM
 #1702

@chipmixer:

Did u take precautions after fixing ?

https://fossbytes.com/tor-project-fixing-ddos-vulnerable-bug-in-onion-sites/

best regards
1Referee
Legendary
*
Offline Offline

Activity: 2156
Merit: 1414


View Profile
September 24, 2019, 09:59:14 AM
 #1703

DDoS attacks of this sort don't really impact the way chipmixer operates
and actually improves privacy. 

It does improve privacy to some degree, but considering that chips are usually created days before, and there are a wide variety of users actually using ChipMixer, it's already a difficult task for any agency to connect dots that link to your identity, especially when you choose multiple smaller chips and only use one of them to conduct a transaction.

At this stage it's more of an annoyance to people, because most of them don't look at the site not responding the way you and some others here do.
moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 24, 2019, 08:15:03 PM
 #1704

chipmixer tor service still down

best regards
Gyrsur
Legendary
*
Offline Offline

Activity: 2422
Merit: 1262


I, Quant


View Profile
September 24, 2019, 11:48:30 PM
 #1705

chipmixer tor service still down

best regards

confirmed

btc2usd.biz
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile WWW
September 25, 2019, 12:40:22 PM
 #1706

very very strange that tor down and regular domain working
Gyrsur
Legendary
*
Offline Offline

Activity: 2422
Merit: 1262


I, Quant


View Profile
September 26, 2019, 06:12:59 PM
 #1707

very very strange that tor down and regular domain working

tor side still down. honeypot?

TryNinja
Legendary
*
Offline Offline

Activity: 1288
Merit: 1824



View Profile
September 26, 2019, 06:17:52 PM
 #1708

tor side still down. honeypot?
Feel free to check the website SSL certificate.

Gyrsur
Legendary
*
Offline Offline

Activity: 2422
Merit: 1262


I, Quant


View Profile
September 26, 2019, 06:22:53 PM
 #1709

tor side still down. honeypot?
Feel free to check the website SSL certificate.

better you try to learn the differences of the OSI layers next time.  Grin

EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink

TryNinja
Legendary
*
Offline Offline

Activity: 1288
Merit: 1824



View Profile
September 26, 2019, 06:43:48 PM
 #1710

EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink
Hey man, it's called "personal message" for a reason. Angry

On a side note, I actually have an exam tomorrow about Cisco's CCNA chapter 09 and the transport layer. So that's funny for you to say. lol Cheesy

Gyrsur
Legendary
*
Offline Offline

Activity: 2422
Merit: 1262


I, Quant


View Profile
September 26, 2019, 06:54:31 PM
Last edit: September 26, 2019, 07:05:03 PM by Gyrsur
 #1711

EDIT: his response via PM:

better you try to learn the differences of the OSI layers next time.  Grin
Ty for the well thought comment, troll. Wink
Hey man, it's called "personal message" for a reason. Angry

On a side note, I actually have an exam tomorrow about Cisco's CCNA chapter 09 and the transport layer. So that's funny for you to say. lol Cheesy

ok, then this quick escalation is maybe usefull:

encryption (SSL) and addressing (IP) are using different layers. if a service is reachable via ordinary IP (and not Tor) collection of metadata is possible even if the data exchange is encrypted itself.

https://www.geeksforgeeks.org/tcp-ip-model/

EDIT: but could be CM is too lazy to update their Tor implementation because there was a DDOS fix not long time ago. but if I want to mix my coins I will ever connect via Tor to this service.

moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 27, 2019, 02:18:27 PM
 #1712

I've got an problem

i have forgot to note down the last 3 digits from my voucher code  ( yes i know incredibly stupid )

any chance to recover ?

best regards
jackg
Copper Member
Legendary
*
Offline Offline

Activity: 1652
Merit: 1542


https://bit.ly/387FXHi ← lightning theory


View Profile
September 27, 2019, 05:34:45 PM
 #1713

I've got an problem

i have forgot to note down the last 3 digits from my voucher code  ( yes i know incredibly stupid )

any chance to recover ?

best regards

Send them an email they might be able to help you. If you have the session token or the deposit address they will be more likely to work out its yours better (did you do it recently)?

moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 27, 2019, 05:53:43 PM
 #1714

Quote
(did you do it recently)?



about 10 min before i have posted here

Update: i ve sent an email to chipmixer

thnx for guidance

best regards

jackg
Copper Member
Legendary
*
Offline Offline

Activity: 1652
Merit: 1542


https://bit.ly/387FXHi ← lightning theory


View Profile
September 27, 2019, 07:17:04 PM
 #1715

Quote
(did you do it recently)?



about 10 min before i have posted here

Update: i ve sent an email to chipmixer



Ah yeah they should be able to recover it then as long as you've sent either the deposit address or session token... You're fairly active on this thread so you probably already know it make take some time for then to respond so make sure your session doesn't expire before they do.

ChipMixer
Sr. Member
****
Offline Offline

Activity: 356
Merit: 293


ChipMixer.com | ChipMixerwzxtzbw.onion


View Profile WWW
September 27, 2019, 11:10:54 PM
Merited by malevolent (1)
 #1716

There is no fix yet  https://trac.torproject.org/projects/tor/ticket/29607

Tor project have plan what should be fixed, idea how to do that and vague idea how exactly to do that. Issue is 7 months old - it will not be ready this year.

btctaipei
Jr. Member
*
Offline Offline

Activity: 58
Merit: 13


View Profile
September 28, 2019, 04:21:38 AM
 #1717

There is no fix yet  https://trac.torproject.org/projects/tor/ticket/29607
Tor project have plan what should be fixed, idea how to do that and vague idea how exactly to do that. Issue is 7 months old - it will not be ready this year.

Analysis on Tor Ticket#29607:
===================
I think tor dev team need to realize that going after establish_intro() and place proof of work(PoW) burden on client and have guard enforce it with Enble_PoW_Defenese set by your service node isn't going to help.  From what I've seen a resourceful attacker (like government and banking sector with access to big data) can outperform standard user by order of magnitude >  2^10 or better; so the issue here isn't about how to make establish circuit more expensive but it had to do with tor routing layer enhancement to permit propagation to scrub / packet at the guard node(s).  Which is not going to be easy (similar to how BGP flow-spec works) because this feature can cause Tor network can potentially be unstable if implemented incorrectly (alot of testing, IMHO).

as of Sat Sep 28 04:20:21 UTC 2019, both

http://chipmixerwzxtzbw.onion
https://chipmixer.com

are up and I've completed about 15 successful sessions in less then 2 minutes.

my PGP Key https://pastebin.com/b7nYutWC
pgp key server search 0x4BCC117F9EFB1A97
moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 28, 2019, 09:25:00 AM
Last edit: September 28, 2019, 10:03:40 AM by moejoejay
 #1718

@chipmixer:

Noted in the fossbyte article:

Quote
Besides this, there will be a new option for .onion site operators, using which they can enable defenses for their sites. Whenever it is enabled, Tor users will be able to access those sites under attack, but it will take a longer time to establish the connection.

Noted in the Ticket related to the Tor Issue:

https://www.hackerfactor.com/blog/index.php?/archives/777-Stopping-Tor-Attacks.html

But i think ure have it discovered already

best regards

moejoejay
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
September 28, 2019, 12:25:04 PM
Last edit: September 28, 2019, 01:38:59 PM by moejoejay
 #1719

could someone explain to me how i can verify the receipt from chipmixer?

my receipt:

Code:
--- MESSAGE ---
This is a receipt / confirmation that you have received following
private keys from ChipMixer:
### CHIP SIZE: xxxxx BTC
Address: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; Private key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


This message is signed with ChipMixer's Bitcoin address:
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

--- SIGNATURE ---
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
--- END ---

In which way i have to insert these infos in electrum that im able to verify the receipt ?

best regards
TryNinja
Legendary
*
Offline Offline

Activity: 1288
Merit: 1824



View Profile
September 28, 2019, 12:36:57 PM
 #1720

could someoone explain to me how i can verify the receipt from chipmixer?

my receipt:

--- MESSAGE ---
This is a receipt / confirmation that you have received following
private keys from ChipMixer:
### CHIP SIZE: xxxxx BTC
Address: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; Private key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


This message is signed with ChipMixer's Bitcoin address:
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

--- SIGNATURE ---
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
--- END ---

In which way i have to insert these infos in electrum that im able to verify the receipt ?

best regards
Tools -> Sign/verify a message.

A window will popup.

Put the whole message (marked as green) in the "Message" field.
Put the whole signature (marked as red) in the "Signature" field.
Put the address indicated in the message (bolded, and which is indicated by "This message is signed with ChipMixer's Bitcoin address") in the "Address" field.

Now click "Verify" and it will show up as valid or invalid. Make sure you don't miss any space or character.

Pages: « 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 [86] 87 88 89 90 91 92 93 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!